                                [J-107-2018] [MO: Baer, J.]
                       IN THE SUPREME COURT OF PENNSYLVANIA
                                   WESTERN DISTRICT


    COMMONWEALTH OF PENNSYLVANIA,                :    No. 16 WAP 2018
                                                 :
                        Appellee                 :    Appeal from the Order of the Superior
                                                 :    Court entered December 21, 2017 at
                                                 :    No. 435 WDA 2017, affirming the
                v.                               :    Judgment of Sentence of the Court of
                                                 :    Common Pleas of Butler County
                                                 :    entered March 9, 2017, at No. CP-10-
    JON ERIC SHAFFER,                            :    CR-0000896-2016.
                                                 :
                        Appellant                :    ARGUED: December 6, 2018

                        CONCURRING AND DISSENTING OPINION

JUSTICE WECHT                                        DECIDED: JUNE 18, 2019
        I concur only in the result that today’s learned Majority reaches. The Majority

chooses to invoke our discretionary authority to affirm an order upon any basis, and does

so on the basis of the “private search” doctrine.1 I would address instead the question of

abandonment of privacy, which is the issue upon which this Court granted allocatur. As

applied to these facts, this abandonment issue happens to resolve here in the

Commonwealth’s favor. Accordingly, I would affirm the judgment of sentence, and I join

the Majority only insofar as it reaches the same result. As my path to that result diverges

from the Majority’s, I respectfully dissent from the Majority’s rationale.

        As the Majority aptly summarizes the history of the case,2 I reiterate here only

those facts and events necessary to this discussion. On May 27, 2016, Jon Shaffer filed

a motion seeking suppression of the child pornography seized from his personal

computer. As the Majority recounts, Shaffer argued that Officer Christopher Maloney

1       Maj. Op. at 1-2 & n.1.
2       Id. at 2-12.
unconstitutionally searched Shaffer’s computer without a search warrant when he

directed a CompuGig employee to open the files on Shaffer’s computer and then

proceeded to view those files. Shaffer argued that neither exigent circumstances nor any

other exception to the warrant requirement of our Constitutions3 justified the warrantless

intrusion. Shaffer asserted that he had a legitimate expectation of privacy in the contents

of his laptop computer, an expectation which, he maintained, he did not relinquish by

providing the computer to CompuGig for repairs.

       The Commonwealth responded by arguing that Shaffer abandoned any

expectation of privacy that he had in the computer. The Commonwealth relied primarily

upon the Superior Court’s decision in Commonwealth v. Sodomsky, 939 A.2d 363 (Pa.

Super. 2007), a case that is both factually and legally similar to the instant dispute.

       On July 7, 2016, the trial court held a hearing on Shaffer’s suppression motion.

Following testimony from CompuGig employee John Eidenmiller and Officer Maloney, the

inquiry focused primarily upon the applicability of Sodomsky. The trial court found that

the facts of this case were close enough to those in Sodomsky that the court was bound

to apply its rationale. However, the trial court disagreed with the Commonwealth’s

assertion that Shaffer abandoned his expectation of privacy the moment he delivered the

computer to CompuGig. Instead, the trial court determined, it was not until Shaffer

requested repairs that he abandoned any expectation that the contents of the computer

would be kept private. At that point, Shaffer forfeited any right to challenge Officer

Maloney’s actions. Consequently, the trial court denied Shaffer’s suppression motion,



3      In his brief to this Court, Shaffer invokes both the Fourth Amendment to the United
States Constitution and Article I, Section 8 of the Pennsylvania Constitution. See Brief
for Shaffer at 8. Shaffer does not provide an analysis pursuant to Commonwealth v.
Edmunds, 586 A.2d 887 (Pa. 1991), in an effort to demonstrate that the Pennsylvania
Constitution provides greater protections than its federal counterpart.


                              [J-107-2018] [MO: Baer, J.] - 2
and, later sitting as the fact-finder, convicted Shaffer of the charges stemming from the

images obtained from the computer.

       Initially, what is most important is what did not occur during the suppression

proceedings. At no point did the Commonwealth assert that Officer Maloney’s actions

with respect to the computer were constitutional due to an earlier private search. The

Commonwealth placed all of its eggs into the Sodomsky basket (which addressed only

whether a person has an expectation of privacy in these circumstances), and did not

invoke the private search doctrine. The trial court ruled upon expectation of privacy

grounds; it did not find that the search was a private one.

       Shaffer had no reason to anticipate or rebut any argument that Officer Maloney’s

warrantless inquiry into the files on his computer was permissible as an extension of

CompuGig’s private search. More importantly, Shaffer had no opportunity to create a

record to defend against such an argument. As the Majority explains, the applicability of

the private search doctrine hinges principally upon whether the police officer exceeded

the bounds of the private action already undertaken.4 Given no reason to believe that the

Commonwealth would one day claim that the search at issue was a private search,

Shaffer had no cause specifically to cross-examine either Officer Maloney or CompuGig’s

Eidenmiller regarding the particular actions performed by each. In a case involving the

private search question, such cross-examination would be undertaken in order to

ascertain whether Officer Maloney did, in fact, exceed the parameters of Eidenmiller’s

actions.

       The case continued in the same character before the Superior Court, where the

focus of the parties and the appellate panel remained upon Shaffer’s expectation of


4     See Maj. Op. at 20 (citing United States v. Jacobsen, 466 U.S. 109, 115, 117
(1984)).


                             [J-107-2018] [MO: Baer, J.] - 3
privacy in the computer or his abandonment thereof. Once more, the Commonwealth did

not raise the argument that the private search doctrine applied, and the Superior Court

accordingly did not address that doctrine. The Superior Court held only that Shaffer had

abandoned his expectation of privacy in the computer.

      We granted allocatur to address the following question:

      Does an individual give up his expectation of privacy in the closed private
      files stored on his computer, merely by taking his computer to a commercial
      establishment for service or repair, where the service or repair requested
      does not render the viewing of the citizen[’]s closed private files as
      foreseeable to either the customer or the computer technician?

See Commonwealth v. Shaffer, 188 A.3d 1111 (Pa. 2018) (per curiam). Our order did

not mention the private search doctrine, nor can one reasonably argue that the doctrine

was fairly encompassed within the stated question. Nor did we direct any briefing or

argument on the private search doctrine.5

      The private search doctrine did not make any appearance in this case until it

surfaced as the Commonwealth’s third line of argument in its brief to this Court.6 The

Majority relies exclusively upon this tardy assertion to uphold Shaffer’s judgment of

sentence. Under the “affirm-on-any-basis” jurisprudential device–which alternatively is

known as the “right-for-any-reason” doctrine—the Majority undeniably has the



5       As the Majority correctly notes, the failure of the Commonwealth at any point to
raise the issue does not amount to waiver of its right to raise it before us now. See Maj.
Op. at 23-24 (citing Rufo v. Bd. of License & Inspection Review, 192 A.3d 1113, 1123
(Pa. 2018)). As the appellee at all stages, the Commonwealth had no burden to preserve
any particular issue on pain of waiver. However, as I discuss below, the Commonwealth’s
failure to do so undermines the notion that an issue raised for the first time before this
Court is “of record” for purposes of our ability to affirm an order on any basis, and this
failure places the other party at a significant disadvantage in his or her ability to argue
successfully to this Court.
6     See Brief for the Commonwealth at 17.


                             [J-107-2018] [MO: Baer, J.] - 4
discretionary authority to resolve the case in this manner. But there are compelling

reasons not to do so.

                        I.    The Right-For-Any-Reason Doctrine

       The “right-for-any-reason” doctrine “allows an appellate court to affirm the trial

court’s decision on any basis that is supported by the record.” In re A.J.R.-H., 188 A.3d

1157, 1175-76 (Pa. 2018) (citing Ario v. Ingram Micro, Inc., 965 A.2d 1194, 1200 (Pa.

2009)).

       The rationale behind the “right for any reason” doctrine is that appellate
       review is of “the judgment or order before the appellate court, rather than
       any particular reasoning or rationale employed by the lower tribunal.” Ario,
       965 A.2d at 1200 (citing Hader v. Coplay Cement Mfg. Co., 189 A.2d 271,
       274-75 (Pa. 1953)). As the United States Supreme Court has explained,
       “The reason for this rule is obvious. It would be wasteful to send a case
       back to a lower court to reinstate a decision which it had already made but
       which the appellate court concluded should properly be based on another
       ground within the power of the appellate court to formulate.” Sec. & Exch.
       Comm’n v. Chenery Corp., 318 U.S. 80, 88 (1943).

Id. at 1176 (citations modified).

       However jurisprudentially economical the use of the doctrine may be, an appellate

court is not bound to utilize it any time it can scour the record and find another basis upon

which to affirm. The doctrine is, and always has been, discretionary and prudential. See

id. at 1176 (“This Court has stated that an appellate court may apply the right for any

reason doctrine . . . .”) (emphasis added); Commonwealth v. Wholaver, 177 A.3d 136,

145 (Pa. 2018) (“[I]t is well settled that this Court may affirm a valid judgment or order for

any reason appearing as of record.”) (emphasis added); E. J. McAleer & Co. Inc. v.

Iceland Prod., Inc., 381 A.2d 441, 443 n.4 (Pa. 1977) (“We may, of course, affirm the

decision of the trial court if the result is correct on any ground without regard to the

grounds which the trial court itself relied upon.”) (emphasis added).




                              [J-107-2018] [MO: Baer, J.] - 5
       The principal restraint upon an appellate court’s discretionary prerogative to apply

the right-for-any-reason doctrine arises when the record does not contain a sufficient

factual basis to support the new grounds for affirmance. As we explained most recently

in In re A.J.R.-H., an appellate court may apply the doctrine if “the established facts

support a legal conclusion producing the same outcome. It may not be used to affirm a

decision when the appellate court must weigh evidence and engage in fact finding or

make credibility determinations to reach a legal conclusion.” In re A.J.R.-H., 188 A.3d at

1176 (citing Chenery Corp., 318 U.S. at 88; Bearoff v. Bearoff Bros., Inc., 327 A.2d 72,

76 (Pa. 1974)).

       Thus, at the forefront of any inquiry into the propriety of the application of the right-

for-any-reason doctrine is the question of whether the newly asserted basis for affirmance

is “of record,” i.e., whether the basis is supported by the existing factual record. In

conducting this inquiry, we should not ignore how the record in this case was created. At

no point before or during the evidentiary hearing on Shaffer’s motion did the

Commonwealth raise the private search doctrine. Although the Commonwealth bears no

issue-preservation duty as appellee, the arguments that it advanced in service of its initial

burden at the suppression hearing played a significant role in the creation of the factual

record.

       At the heart of any private search doctrine analysis is the question of whether the

police officer’s subsequent actions exceeded those of the private citizen who conducted

the first search.7 Had Shaffer been put on notice, actual or constructive, that he would

have to rebut a private search argument, then or in the future, his counsel could have

conducted the hearing differently, as any reasonably competent lawyer would. To defend

against any private search claim, Shaffer’s counsel no doubt would have cross-examined


7      See Jacobsen, 466 U.S. at 115, 117; see also Maj. Op. at 20.


                               [J-107-2018] [MO: Baer, J.] - 6
Eidenmiller in detail regarding the steps that the latter took until he eventually discovered

the pornographic files.      Counsel then would have inquired as extensively into

Eidenmiller’s actions when Officer Maloney directed him to locate and display the files for

the second time. Finally, counsel would have engaged in a similarly detailed examination

of Officer Maloney. Only then would Shaffer have a factual record sufficient to oppose a

claim of a private search and to argue that any discrepancies between the two searches

(assuming that there were discrepancies and that the second search exceeded the first)

rendered the private search doctrine inapplicable. At the very minimum, Shaffer should

have had the opportunity to create a sufficient record.

       I do not maintain that notice always is a necessary precondition to application of

the right-for-any-reason doctrine. Rather, under circumstances such as those presented

here, the manner in which the record is created is both an important factor in an appellate

court’s consideration of whether to apply the right-for-any-reason doctrine, and a

significant factor in the crucial inquiry of whether the newly asserted basis for affirmance

is “of record.”

       The sole inquiry from the outset of this case up to and through our grant of allocatur

was whether Shaffer had an expectation of privacy in the laptop computer that he dropped

off for repairs at CompuGig. That inquiry differs significantly from one assessing the

private search doctrine. As a general matter, there are two essential elements that must

be present before any search can be challenged constitutionally. The area searched

must be an area in which the person challenging the search has a reasonable expectation

of privacy, see Commonwealth v. Hawkins, 718 A.2d 265, 267 (Pa. 1998), and the search

must be performed by a state actor. Commonwealth v. Price, 672 A.2d 280, 283 (Pa.

1996). The former element concerns whether the challenger has a privacy right in the

area that was searched. The latter addresses the issue of who conducts the search.




                              [J-107-2018] [MO: Baer, J.] - 7
These two elements entail different substantive analyses and examinations, both as to

law and as to fact.      The factual record created to establish one element cannot

automatically be substituted as a sufficient factual record for the other. We cannot graft

an evidentiary record focused entirely upon Shaffer’s expectation of privacy onto the

Commonwealth’s new invocation of the private search doctrine. These are apples and

oranges.

        To find a sufficient record basis for application of the private search doctrine, the

Majority highlights a brief exchange between the Commonwealth’s attorney and Officer

Maloney, as well as two limited interactions between Shaffer’s counsel and Officer

Maloney.8 These excerpts cannot suffice as an evidentiary record that would enable a

proper analysis of the private search doctrine under the facts and circumstances of this

case.    The Commonwealth was not attempting to establish that Officer Maloney’s

examination of the computer did not exceed Eidenmiller’s initial actions.              More

importantly, a brief two question/and two answer exchange between Shaffer’s counsel

and Officer Maloney that touched inadvertently upon matters that sometime later might

be deemed pertinent to the private search doctrine is a far cry from the examination that

would be necessary to build a record adequate to evaluate the private actor versus state

actor dilemma.

        A review of one aspect of those exchanges will illustrate my point. When Officer

Maloney was on the stand, Shaffer’s counsel asked him whether Eidenmiller, at the

officer’s request, opened the file containing the pornographic images. Officer Maloney

responded, “Yes, sir, he showed me the exact route taken to find the images.”9 The

Majority construes this statement as conclusive evidence that Eidenmiller did, in fact, take


8       See Maj. Op. at 24-25.
9       N.T., 7/7/2016, at 30.


                                 [J-107-2018] [MO: Baer, J.] - 8
the same exact path in front of Officer Maloney, and, therefore, that Officer Maloney did

not (and could not) exceed the scope of the private search. The problem is that Shaffer’s

counsel did not test that statement through cross-examination. He simply let it go. The

reason for the free pass is not difficult to discern. Shaffer’s counsel had no reason to

know that the parallelism between the two searches would be an issue in the case, or

that years later that one answer would form the factual basis to deny his client relief on a

newly asserted, and entirely different, legal basis. Instead, counsel let Officer Maloney

testify effectively to a legal conclusion without exploring the factual basis for that

conclusion, through no fault of his own. No one would anticipate that a case would take

on such a different character at the last stage of state appellate proceedings. That

counsel, by happenstance or coincidence, stumbled upon one or two questions relevant

to the new issue upon which this Court now chooses to focus does not mean that the

record suffices for purposes of our discretionary application of the right-for-any-reason

doctrine.

       Moreover, the problem is not only that the issue is not “of record.” The problem

also is that it is inequitable to employ our discretionary authority to apply the right-for-any-

reason doctrine here, inasmuch as the issue was thrust upon Shaffer only at this very late

stage in the proceedings. When the Commonwealth raised the private search doctrine

for the first time as its third argument in its brief to this Court, Shaffer was forced to

respond to a new legal theory for the first time in his reply brief to this Court. Reply briefs,

by rule, must be limited to 7000 words, and may not exceed fifteen pages.10 But the page

limit is not the greatest obstacle that Shaffer must overcome. It is not what puts him at a

significant disadvantage, not what hinders his ability to defend against the

Commonwealth’s newly asserted theory. It is the state of the record in this case that


10     See Pa.R.A.P. 2135(a)(1).


                               [J-107-2018] [MO: Baer, J.] - 9
precludes Shaffer effectively from defending against the new claim. The record before

this Court is one tailored (“teed up,” as we say) specifically to the question of whether

Shaffer retained an expectation of privacy in his laptop computer when he turned it over

for repairs. It is not a record containing any meaningful evidentiary development of the

facts necessary for evaluation of the private search doctrine in the context of this case.

Shaffer is forced—in a reply brief—to try to make the record that we have suffice for the

record that we need. He is forced to cram the proverbial square peg into a round hole.

       The right-for-any-reason doctrine is premised primarily upon the desirability of

conserving judicial and prosecutorial resources. Laudable as that goal may be, we still

must be judicious in our exercise of discretion, and we should not wield that tool when it

would impose upon one litigant an inequitable handicap. We should apply the doctrine

only when the newly invoked basis for relief truly is of record, and where the applicability

of that new basis is sufficiently clear, such that further proceedings on remand would be

a waste of time and resources. That is not the case here.

       There is another reason that I would not apply the right-for-any-reason doctrine in

this case. As I discuss in greater detail in Part III below, Shaffer’s judgment of sentence

should be affirmed on the merits of the question upon which we actually granted allocatur.

In other words, there is no reason to find an alternative basis to affirm when the case, as

is, necessitates affirmance on the precise question presented.

                          II.       The Private Search Doctrine

       Before proceeding to the merits of the abandonment of privacy question presented

by this case, I will assume for the moment that it would be an equitable exercise of our

discretion to apply the right-for-any-reason doctrine; I do so in order to note my

disagreement with the Majority’s application of the private search doctrine.




                                [J-107-2018] [MO: Baer, J.] - 10
       The seminal case regarding the private search doctrine is the Supreme Court of

the United States’ decision in Jacobsen. In that case, a supervisor at an airport location

of Federal Express noticed that a forklift had damaged a package. Jacobsen, 466 U.S.

at 111. Together with the office manager, the supervisor opened the damaged package

in order to inventory its contents pursuant to a written insurance protocol. Inside the

package was a tube assembled from duct tape. The Federal Express employees cut

open the tube and found baggies containing what they believed to be cocaine.

Immediately, they called the DEA and returned the baggies to the tube. A DEA agent

arrived, removed the baggies from the tube, and examined the substance, which tested

positive for cocaine. Id. at 111-12. Other DEA agents arrived on the scene and, ultimately,

obtained a search warrant based in large part upon the search performed by the first

agent. Id. at 112.

       As the Majority recounts, the Supreme Court considered the DEA agent’s initial

search as a private search because “the federal agents did not infringe any

constitutionally protected privacy interest that had not already been frustrated as the

result of private conduct.” Id. at 126. Because the initial invasion of privacy occurred at

the hands of a private individual, and was not performed by a government agent, the

subsequent search by the DEA agent was not unreasonable.

       This doctrine poses readily identifiable risks to an individual’s right of privacy, and

entails a considerable potential for abuse. The private search doctrine essentially places

the state actor behind private eyes, allowing a law enforcement officer to go wherever a

private person before him has gone. To cabin the potential hazard to privacy rights, the

Supreme Court limited the subsequent governmental action to the bounds of the actions

of the private individual. Any additional actions “must be tested by the degree to which




                             [J-107-2018] [MO: Baer, J.] - 11
they exceeded the scope of the private search.” Id. at 115 (citing Walter v. United States,

447 U.S. 649 (1980)).

       More significant to the case sub judice, and as another limitation on the private

search doctrine, the Supreme Court explained that the DEA’s subsequent opening of the

package did not exceed the parameters of the initial, private search because “there was

a virtual certainty that nothing else of significance was in the package and that a manual

inspection of the tube and its contents would not tell [the DEA agent] anything more than

he already had been told.”       Id. at 119.   It is this statement that distinguishes the

circumstances in Jacobsen from Officer Maloney’s actions in this case.

       In Jacobsen, the DEA agent opened a package that contained a tube. In the tube

were plastic bags containing cocaine. There was nothing else to find or discover. The

DEA’s re-examination of the package posed no additional threat to Jacobsen’s privacy.

It was “a virtual certainty” that the second search would reveal nothing but what the

Federal Express employees had found and reported.

       The same cannot be said for a personal computer. Regardless of the path taken

by CompuGig’s Eidenmiller to locate the suspicious files as directed by Officer Maloney,

there existed a very real potential for exposure of information not yet discovered by the

private search. In 2019, one’s personal computer contains a wealth of information, both

private and public. Even the screen saver, wallpaper, and names of files on the home

screen of a computer can expose private information about the individual who owns the

computer. Unlike a duct tape tube that has only one area where items can be stored, a

personal computer offers virtually limitless areas for exploration. An inadvertent click on

a file or tab could uncover to a state actor private information that was not part of the

information collected initially by the private actor. Eidenmiller’s navigation of a personal

computer at the direction of a police officer does not entail the same “virtual certainty,” or




                              [J-107-2018] [MO: Baer, J.] - 12
near guarantee, that no other private information could fall into the hands of the law

enforcement agent in the same way that the tube in Jacobsen did. The tube in Jacobsen

was a limited vessel, eliminating the possibility that the DEA agent would be able to

exceed the bounds of the private search. Indeed, if the tube could be said to have an

opposite, that opposite would be a personal computer.

       Because nothing in the record as established in this case convincingly

demonstrates a “virtual certainty” that Officer Maloney’s second, warrantless search

would not exceed the scope of the initial private search and would not reveal information

other than what Eidenmiller already had discovered, I would find the private search

doctrine to be inapplicable in this case in the event that the doctrine was properly before

us.

       That does not mean that I would reverse the lower courts. For the reasons that

follow, I would hold that Shaffer ultimately, though not initially, abandoned his expectation

of privacy in the computer.

         III.   Shaffer’s Expectation of Privacy in the Personal Computer

       We granted allocatur in this case to consider whether the owner of a personal

computer abandons his or her expectation of privacy in closed files on that computer the

moment he or she drops it off with a computer repair service. This question necessarily

implicates the third-party doctrine. When we accepted this appeal, we provided ourselves

with an opportunity to reconsider that doctrine in the context of our modern high-tech

world, a world in which the interaction between technology and one’s personal information

has changed significantly from the past.

       In Katz v. United States, 389 U.S. 347 (1967), the United States Supreme Court

stated for the first time that the Fourth Amendment to the United States Constitution

“protects people, not places.” Id. at 351. Katz expanded the protections of the Fourth




                              [J-107-2018] [MO: Baer, J.] - 13
Amendment to include those places where one enjoys a reasonable expectation of

privacy. This landmark decision marked the beginning of our current understanding that

a person, place, area, or thing is protected by the Fourth Amendment if the person

asserting the protection seeks to preserve the area or place infringed upon as private,

and if the expectation of privacy is one that society would deem reasonable.           See

Commonwealth v. Shabezz, 166 A.3d 278, 288 (Pa. 2017).

       The third-party doctrine addresses the question of whether a person’s expectation

of privacy applies when the object as to which the expectation is asserted is placed in the

hands of a third person. Had this case been brought even a decade ago, its resolution

as a matter of federal constitutional law would have been relatively straightforward. In

United States v. Miller, 425 U.S. 435 (1976), and Smith v. Maryland, 442 U.S. 735 (1979),

the Supreme Court of the United States firmly established the third-party doctrine,

effectively holding that a person retained no expectation of privacy in materials given over

to the possession of a third party. In Miller, the Court held that Miller’s bank records

actually were business records of the bank in which Miller could “assert neither ownership

nor possession.” Miller, 425 U.S. at 440. Further, the records, in possession of a third

party, could not be deemed exclusively private to Miller as they were “exposed to [bank]

employees in the ordinary course of business.” Id. at 442. Miller had “take[n] the risk, in

revealing his affairs to another, that the information [would] be conveyed by that person

to the [g]overnment.” Id. at 443.

       In Smith, the Supreme Court addressed Smith’s claim that he held a reasonable

expectation of privacy in a pen register that recorded the outgoing numbers dialed from

his landline telephone. The Court rejected Smith’s claim, opining that it “doubt[ed] that

people in general entertain any actual expectation of privacy in the numbers they dial.”

Smith, 442 U.S. at 742. The Court noted that, at the time, telephone companies used




                             [J-107-2018] [MO: Baer, J.] - 14
dialed numbers for a variety of legitimate business purposes. When a person makes a

call, the Smith Court reasoned, he or she voluntarily conveyed the dialed number to the

phone company, which received the information in the regular course of business. Thus,

as in Miller, Smith had assumed the risk that, by dialing a number, he subjected himself

to the possibility that the telephone company would turn his dialing information over to the

government. The Court explained that “a person has no legitimate expectation of privacy

in information he voluntarily turns over to third parties.” Id. at 743-44.

       Under a reading of only Miller and Smith, it would appear that Shaffer could claim

no legitimate expectation of privacy in his computer once he turned it over to CompuGig.

By doing so, he would be deemed by those precedents voluntarily to have exposed the

computer’s contents to CompuGig’s employees, who received the information in the

regular course of their business. The argument would follow that Shaffer assumed the

risk that a person working at CompuGig could turn any information found on the computer

over to the police.

       However, the jurisprudential landscape has evolved since the 1970’s. A fair review

of the United States Supreme Court’s recent cases, beginning with United States v.

Jones, 565 U.S. 400 (2012), reveals that the Miller/Smith view of the third-party doctrine

now is somewhat antiquated, inasmuch as modern technology has caused the High Court

to think differently about third-party interactions. In 2012, the Court in Jones confronted

the question of whether affixing a GPS device to a person’s vehicle and tracking his or

her movements—without a search warrant—constitutes a search or seizure under the

Fourth Amendment. Id. at 402. In deciding that doing so was indeed a search, the Court

(in an opinion authored by Justice Scalia) emphasized the intrusiveness that the

government’s actions entailed: “The Government physically occupied private property for

the purpose of obtaining information.” Id. at 404. The Court had “no doubt” that this was




                              [J-107-2018] [MO: Baer, J.] - 15
a search for purposes of the Fourth Amendment. Id. The installation of the GPS device

effectively was a trespass that, for twenty-eight days, permitted the government to know

and evaluate all of Jones’ vehicular movements.

       Justice Scalia’s majority opinion drew two concurrences relevant here. First,

Justice Alito, joined by Justices Ginsburg, Breyer, and Kagan, rejected Justice Scalia’s

trespass-oriented approach to the case.          These four Justices would have simply

concluded that attachment of the GPS device to Jones’ car was a search because it

violated Jones’ reasonable expectation of privacy through “the long-term monitoring of

the movements of the vehicle he drove.” Id. at 419. Justice Alito opined that “the use of

longer term GPS monitoring in investigations of most offenses impinges on expectations

of privacy. For such offenses, society's expectation has been that law enforcement

agents and others would not—and indeed, in the main, simply could not—secretly monitor

and catalogue every single movement of an individual's car for a very long period.” Id. at

430.

       Justice Sotomayor authored a concurring opinion in which she questioned whether

the “Executive, in the absence of any oversight from a coordinate branch, [should have]

a tool so amenable to misuse, especially in light of the Fourth Amendment’s goal to curb

arbitrary exercises of police power . . . .” Id. at 416. More importantly for present

purposes, Justice Sotomayor opined that “it may be necessary to reconsider the premise

that an individual has no reasonable expectation of privacy in information voluntarily

disclosed to third parties.” Id. at 417. Specifically with regard to the “digital age,” Justice

Sotomayor found the third-party doctrine to be “ill suited” because people now “reveal a

great deal about themselves to third parties in the course of carrying out mundane tasks.”

Id. “People disclose the phone numbers that they dial or text to their cellular providers;

the URLs that they visit and the e-mail addresses with which they correspond to their




                              [J-107-2018] [MO: Baer, J.] - 16
Internet service providers; and the books, groceries, and medications they purchase to

online retailers.” Id. In Justice Sotomayor’s view, a strict application of the third-party

doctrine no longer is feasible. This is an idea that would pick up steam a few years later

in Carpenter v. United States, 138 S. Ct. 2206 (2018).

       In Carpenter, the Supreme Court granted certiorari to determine “how to apply the

Fourth Amendment to a new phenomenon: the ability to chronicle a person’s past

movements through the record of his cell phone signals.” Id. at 2216. At issue were

records obtained from communications between a person’s cellular telephone and a

cellular tower.   Through these records, police could track a person’s movement or

determine whether that person had been in a particular area during a certain time period.

       In a majority opinion authored by Chief Justice Roberts, the Court declined to

extend Miller’s and Smith’s strict third-party doctrine to preclude an expectation of privacy

in the cellular tower records. The Court held first that, although Miller and Smith apply to

phone numbers and bank records, the doctrine cannot apply automatically to the cellular

tower records at issue. The core inquiry still must be whether society would deem

reasonable an expectation of privacy in the area or items that were searched or seized.

At the time that Miller and Smith were decided, few would have imagined a society so

technologically advanced, or one in which citizens were so attached to electronic devices.

Quoting Riley v. California, 573 U.S. 373 (2014) (holding that police must get a warrant

before searching a cellular telephone seized incident to an arrest), the Court repeated its

view that cell phones have become a “feature of human anatomy,” which “tracks nearly

exactly the movements of its owner.” Carpenter, 138 S.Ct. at 2218. Modern people

“compulsively carry cell phones with them all the time. A cell phone faithfully follows its

owner beyond public thoroughfares and into private residences, doctor’s offices, political

headquarters, and other potentially revealing locales.” Id.




                             [J-107-2018] [MO: Baer, J.] - 17
       The Court also found it important that cellular towers do not merely log phone

numbers. The towers in actuality compile a comprehensive and detailed record of a

person’s movements. These towers had generated “seismic shifts in digital technology

that made possible the tracking of not only Carpenter’s location but also everyone else’s,

not for a short period but for years and years.” Id. at 2219. The unique nature of the

compilation of data by these towers necessarily overcomes the strict parameters of the

third-party doctrine. “[A]n individual maintains a legitimate expectation of privacy in the

record of his physical movements as captured through [cellular tower records.]” Id. at

2217. Thus, the reach of the earlier third-party doctrine cases has been substantially

limited in this context.

       That the records technically are compiled for commercial purposes cannot negate

a person’s expectation of privacy.       In Carpenter, the government seized records

encompassing one hundred and twenty-seven days of activity, “an all-encompassing

record of the holder’s whereabouts.” Id. As was the case with the GPS tracker in Jones,

the “time stamped data provides an intimate window into a person’s life, revealing not

only his particular movements, but through them his ‘familial, political, professional,

religious, and sexual associations.’” Id. (quoting Jones, 565 U.S. at 415 (Sotomayor, J.,

concurring)). Like the cell phones themselves, the records “hold for many Americans the

privacies of life.” Id. (citation and quotation marks omitted).

       Rejecting a rote application of the third-party doctrine, as advocated by the

Government and the dissenting Justices, the Carpenter Court explained that the doctrine

is rooted in a “reduced” expectation of privacy; it does not mean that a person has no

expectation of privacy at all. “[T]he fact of ‘diminished privacy interests does not mean

that the Fourth Amendment falls out of the picture entirely.’” Id. at 2219 (quoting Riley,

573 U.S. at 392). Neither Miller nor Smith relied solely upon the fact that the relevant




                             [J-107-2018] [MO: Baer, J.] - 18
materials were in the hands of another. Instead, the Court considered “the nature of the

particular documents sought” to determine whether there was “a legitimate expectation

of privacy concerning their contents.” Id. at 2219 (citation and quotation marks omitted).

       In dissent, Justice Thomas expressed reservations as to the continued viability of

the third-party doctrine, as Justice Sotomayor had done in her concurring opinion in

Jones. In Justice Thomas’ view, the Court approached the case incorrectly, inasmuch as

the Court should not have contemplated at all whether a search occurred, but instead

should have considered whose property was searched. Justice Thomas noted that the

Fourth Amendment protects people from unreasonable searches of “their” places,

property, and effects. Id. at 2235 (Thomas, J., dissenting). Thus, “each person has the

right to be secure against unreasonable searches . . . in his own person, house, papers,

and effects.”   Id. (quoting Minnesota v. Carter, 525 U.S. 83, 92 (1998) (Scalia, J.,

concurring) (emphasis in original)). In Carpenter, the cellular tower records did not belong

to Carpenter. Thus, according to Justice Thomas, he had no viable Fourth Amendment

claim. Notably, this approach would eliminate the third-party doctrine altogether. As long

as a person owned the property, he or she could claim a Fourth Amendment violation

regardless of who was in possession at the time that the search occurred.

       It is noteworthy that both Justices Thomas and Sotomayor have opined that the

long standing third-party doctrine is no longer sustainable, albeit for different reasons.

Nonetheless, what is important presently is that Carpenter itself provides the roadmap to

resolving the expectation of privacy issue before us today.          Foremost, Carpenter

expressly rejected the notion that a person loses all expectation of privacy in an object

immediately upon it landing in the hands of a third party. The Court emphasized that,

while one may have a diminished expectation of privacy in that object, he or she does not

invariably forfeit his or her expectation of privacy entirely. Examining Miller and Smith,




                             [J-107-2018] [MO: Baer, J.] - 19
the Court noted that what matters most was not that the materials at issue were in the

hands of another, but rather “the nature of the particular documents sought” in

ascertaining whether there existed a reasonable expectation of privacy in the contents

searched or seized. Carpenter, 138 S. Ct. at 2219.

       In the modern digital age, personal computers and similar devices are quite like

the cellular telephones at issue in Riley and the tracking of movements in Jones and

Carpenter. Americans use these computing devices to aid in almost every aspect of their

daily lives. We use them to get an education, to discuss politics and current events, to

find a romantic partner, and to pay our bills. We store personal digital photographs on

them, and engage in personal correspondence.              We use computers for work,

entertainment, and religion. We chronicle our lives with them. We shop with them. We

pay our taxes with them. The personal computer, although not always carried everywhere

we go like cell phones, has become equally important to the functioning of our daily lives.

A search of a computer can provide the government with a complete snap-shot of a

person’s private life, revealing information related to every aspect of our lives, including

those things we seek to keep most private. “An Internet search and browsing history, for

example, can be found on an Internet-enabled [personal computer] and could reveal an

individual's private interests or concerns—perhaps a search for certain symptoms of

disease, coupled with frequent visits to WebMD.” Riley, 573 U.S. at 395-96.

       Personal computers, like modern cellular telephones, “are not just another

technological convenience. With all they contain and all they may reveal, they hold for

many Americans the privacies of life.” Id. at 403 (citation and quotation marks omitted).

For these reasons, personal computers align with cellular phones, GPS devices, and

long-term records of a person’s movements, such that the third-party doctrine does not

automatically extinguish any and all expectation of privacy that a person has in his or her




                             [J-107-2018] [MO: Baer, J.] - 20
computer when it is in the hands of another.11 The protection of the Fourth Amendment

simply “does not fall out of the picture entirely.” See Carpenter, supra.12

       Nonetheless, that Shaffer maintained some expectation of privacy even though he

submitted the computer to CompuGig does not mean that Shaffer retained that

expectation forever. It is axiomatic that a person who has an expectation of privacy also

can abandon that expectation. Commonwealth v. Dowds, 761 A.2d 1125, 1131 (Pa.

2000). Abandonment is a question of intent, and “may be inferred from words spoken,

acts done, and other objective facts.” Id. (citing Commonwealth v. Shoatz, 366 A.2d 1216,

1220 (Pa. 1976)).

       Presently, Shaffer’s words and actions demonstrate clearly that he abandoned his

expectation of privacy in the computer.13 In November 2015, Shaffer’s laptop stopped

11     The Majority chooses to resolve this case on the basis of the private search
doctrine, concluding that “an individual’s expectation of privacy at the moment he
relinquishes his computer to a commercial establishment for repair is irrelevant to our
constitutional analysis because the computer technicians examining the contents of the
computer are private actors, not subject to the restrictions of the Fourth Amendment.”
Maj. Op. at 32. I disagree. If the expectation of privacy was irrelevant, then the Supreme
Court of the United States’ analyses in Smith (bank records) and Miller (pen register)
would be irrelevant. In those cases, the Supreme Court held that the defendants could
not challenge a subsequent search or seizure of the relevant materials because, once
those materials were exposed to a third party, the defendants no longer retained an
expectation of privacy in them. The Court did not predicate its holding that the seizures
were constitutional on the rationale that the subsequent search did not exceed what was
exposed to the third-parties. Moreover, if a person does not hold an expectation of privacy
in an item being searched, then it does not matter whether the person performing the
search is a private or state actor.
12     My perspective also is congruent with Pennsylvania’s Article I, Section 8 third-party
doctrine. See Commonwealth v. DeJohn, 403 A.2d 1283 (Pa. 1979) (holding that,
contrary to Miller and Smith, under the Pennsylvania Constitution, a person retains a
reasonable expectation of privacy in bank records even though a bank employee would
have free access to view the contents contained therein).
13      The Majority characterizes the application of an abandonment theory to the facts
of this case as “profound,” and observes that such a theory is less protective (in some
instances) of privacy rights than is the private search doctrine. Maj. Op. at 32. To be sure,



                             [J-107-2018] [MO: Baer, J.] - 21
operating correctly. He believed that his son had downloaded some files on the computer

that had affected its functionality. On November 25, 2015, Shaffer took the laptop to

CompuGig for service. On the intake form, Shaffer indicated that the computer had been

affected by “Spyware/virus” and that it could not “get the Internet.” He also indicated that,

after his son had downloaded something, the laptop’s performance was riddled by “pop

ups.”

        Shaffer provided CompuGig with his password, to allow CompuGig access to the

computer, and he requested restorative services.            Eidenmiller performed a basic

diagnostic test, which revealed that the hard drive was failing. An administrator from

CompuGig called Shaffer and told him of the results of this initial test. The administrator

also informed Shaffer that the repairs would cost more than the initial estimate of $160.

Shaffer told the administrator that, based upon the diagnostics, he wanted to replace the

failing hard drive despite the increased cost. Shaffer then authorized further repairs.

Shaffer made no efforts to limit CompuGig’s access to any file or folder on the laptop.



any time that the state obtains and exercises carte blanche authority to invade a person’s
effects, a profound act occurs, regardless of whether that search occurs because the
person has given up any right to challenge the search or because the state actor is merely
following the actions of a private citizen. It is true as well that the private search doctrine
affords an extra layer of constitutional protection beyond that allowed by the traditional
third-party doctrine, inasmuch as the latter necessarily entails an absolute abandonment
of any and all privacy interests in the property or item provided to the third party, i.e., the
person “checks his privacy interest at the door.” Id. at 32. I depart from the Majority
because, as explained hereinabove, I would not apply the traditional third-party doctrine.
The Supreme Court of the United States’ case law has evolved to the degree that a
person no longer categorically checks his privacy interest at the door, at least when the
item now in the hands of a third party is a personal computer. Having retained some
privacy in that personal computer, the owner may, by limiting access to certain areas of
the device, retain some of his or her privacy interest in it. Put differently, with regard to
her personal computer and similar devices, a person does not automatically grant access
to all of the files stored anywhere on the computer simply by turning it over for service.
Of course, as with Shaffer here, the facts of the case may demonstrate that the person
intended to grant unfettered access to the entire computer.


                              [J-107-2018] [MO: Baer, J.] - 22
       Eidenmiller was not a party to that call, but he continued to work on the laptop.

Acting on what he believed was Shaffer’s request, Eidenmiller attempted to take an image

of the hard drive and to place that image into a new hard drive. Although he successfully

imaged the old hard drive, he was unable to insert that image onto a new hard drive. A

CompuGig employee once more contacted Shaffer and told him of the failed attempt.

       Eidenmiller then determined that the only other way to save the files on the

defective hard drive was to manually copy the files and transfer them to the new hard

drive one-by-one. CompuGig again contacted Shaffer and informed him that this was the

last viable option to save the files. Shaffer consented to the work.

       On these facts, Shaffer undeniably abandoned whatever expectation of privacy

that he retained in the computer. Thus, by the time that Officer Maloney observed the

pornographic photographs, Shaffer was unable to claim an expectation of privacy in the

electronic folders in which they were stored. Having no such expectation, Shaffer is not

entitled to suppression of those images.

                                      *      *      *

       Determination of whether a person has an expectation of privacy in an area

searched is no easy task. It requires consideration of a number of factors, some of which

are not always readily apparent. Police officers in the field make these decisions every

day across Pennsylvania. Occasionally, and no doubt frustratingly, an appellate court will

hold that an officer’s estimation of a person’s expectation of privacy was erroneous,

leading to the suppression of evidence and, possibly, the dismissal of charges.

       The risk of such an outcome often can be ameliorated by following the letter of our

Constitutions and obtaining a search warrant when probable cause exists. It is true that

an officer is not required to get a warrant to search an area in which the suspect has no

expectation of privacy. However, simply because an officer is not required to get a




                             [J-107-2018] [MO: Baer, J.] - 23
warrant does not mean that he or she cannot (or should not) do so. To obtain a warrant

is to provide the subsequent search with an added layer of protection from challenge,

inasmuch as the search was authorized by a neutral and detached magistrate. Pre-

approval of the search by a judicial officer eliminates the officer’s need to make the much

riskier decision of determining on the spot whether the subject has an expectation of

privacy.

       In some instances, it will be patent and obvious that the suspect has no expectation

of privacy in the area that the officer seeks to search. However, this is not that case.

CompuGig had sole possession of Shaffer’s computer. An identified witness informed

the police that he observed what he believed to be child pornography on the computer.

Clearly, probable cause existed to obtain a warrant to search the computer. Instead of

searching the computer immediately, the better (and more constitutionally adherent)

practice is to secure the computer and proceed to get a warrant, thereby avoiding the risk

of erroneously calculating whether Shaffer had an expectation of privacy.

                                       *     *      *

       For the reasons discussed, I concur in the result reached by the Majority. I dissent

as to the Majority’s legal analysis.




                              [J-107-2018] [MO: Baer, J.] - 24
