Most people assume the Fourth Amendment is a government problem. Police need warrants. Federal agents follow protocols. Private investigators, corporate security teams, and forensic consultants hired by civil litigants — they operate outside constitutional constraints.
That assumption is wrong often enough to matter.
The Fourth Amendment prohibits unreasonable searches and seizures. By its text and a century of case law, it applies to government actors. But the line between “government” and “private” is not always where you think it is — and in digital forensics, crossing that line invisibly is easier than most practitioners realize.
The State Action Doctrine: A Brief Primer
The Fourth Amendment says the government can’t conduct unreasonable searches. The state action doctrine is how courts determine whether conduct is “government” conduct in the first place.
The basic rule from Burdeau v. McDowell, 256 U.S. 465 (1921), is that the Fourth Amendment protects against governmental, not private, action. In Burdeau, company agents broke into an employee’s office, rifled through his papers, and turned them over to federal prosecutors. The Supreme Court held that the Fourth Amendment didn’t apply because the initial search was conducted by private parties, not the government.
That ruling is still good law. But the exceptions to it have expanded significantly in the 100 years since, and digital evidence cases have generated fact patterns that Burdeau‘s authors couldn’t have anticipated.
When Private Actors Become State Actors
The state action doctrine has two primary exceptions that convert private conduct into government conduct for Fourth Amendment purposes.
The Government Nexus Test
If the government directs, controls, or participates in a private search, the private party becomes an instrument or agent of the government, and the search is subject to Fourth Amendment scrutiny. Courts look at:
- Whether the government knew about and acquiesced in the intrusive conduct
- Whether the private party’s purpose was to assist law enforcement or to further their own purposes
This isn’t a bright-line rule, and courts apply it inconsistently. But some patterns have emerged in digital forensics contexts.
The tip scenario: A corporate IT administrator discovers what appears to be child sexual abuse material on an employee’s work computer while performing routine maintenance. He calls the police before doing anything else. Officers arrive, tell him to continue his search and share what he finds. He does. This is a government-directed search — the officer’s instruction to continue transforms the IT admin into a government agent. Evidence obtained after that point is subject to Fourth Amendment suppression analysis.
The sharing scenario: A spouse hires a private investigator. The PI accesses the other spouse’s personal devices using credentials found on a shared family computer, collects everything they can find, and hands it to the police. If the PI was operating independently to gather civil litigation evidence, state action is unlikely. If the police suggested what to look for or asked the PI to report back to them, state action is much more plausible.
The concurrent investigation scenario: Law enforcement and a private party (employer, insurance company, competing business) are simultaneously investigating the same person. They share information and techniques. At some point the private investigation stops being independent and becomes an arm of the government investigation. Courts have found state action in these situations, though the threshold varies by circuit.
The Public Function Exception
The second exception applies when a private party performs a function that is traditionally exclusively reserved to the state — like running a private jail or operating a company town. This exception rarely applies in digital forensics, but it occasionally surfaces when private security firms are given substantial law enforcement authority by contract with a government entity.
The Jacobsen Framework: What Happens After a Private Search
Even when a private search is genuinely private — no government involvement — the Fourth Amendment still governs what law enforcement does afterward.
In United States v. Jacobsen, 466 U.S. 109 (1984), the Supreme Court held that the Fourth Amendment is not violated when the government examines what a private party has already searched, as long as the government doesn’t exceed the scope of the private search.
The Jacobsen framework matters enormously in digital forensics. Here’s the practical problem it creates.
A FedEx employee opens a damaged package and finds what appears to be cocaine. He calls the DEA. The DEA agent looks at the same package and performs a field test on the powder. No Fourth Amendment violation — the agent only looked at what the private party had already searched.
Now apply that to digital evidence. An IT manager, worried about data theft, reviews files on a former employee’s company laptop and finds what looks like child sexual abuse material in a folder called “personal docs.” She calls the police. The police look at the same folder and see the same images. Under Jacobsen, no Fourth Amendment problem.
But what if the police then look at other folders the IT manager never accessed? What if they examine metadata the IT manager never looked at? What if they image the entire drive, giving themselves access to the full file system rather than just the folders the IT manager reviewed?
The Jacobsen framework says the government is limited to the scope of the original private search. Going beyond that scope requires a warrant. In the digital context, this creates a genuine practical problem: what counts as the “scope” of a private digital search?
Courts have struggled with this. The Sixth Circuit in United States v. Lichtenberger, 786 F.3d 478 (6th Cir. 2015), found a Fourth Amendment violation when a girlfriend who found disturbing images on her boyfriend’s laptop showed them to police, and police then looked through additional files on the laptop that she hadn’t shown them. The court held that the police search exceeded the scope of the private search, which covered only what she had viewed.
The Eleventh Circuit, in different factual circumstances, has reached different conclusions. There’s no uniformity here, which means you need to know your circuit.
Digital-Specific Complications
Traditional Fourth Amendment analysis was built for physical searches of physical spaces. Digital evidence doesn’t map cleanly onto those concepts.
The Scope Problem
When someone searches a physical space — goes through the drawers in an office — the scope of the search is defined by what they physically touched and looked at. That’s observable and bounded.
A digital search is different. If a private party “searches” a phone by looking at text messages in the native Messages app, have they searched the entire phone? Just the messages app? Just the conversations they opened? If police later image the entire phone, that almost certainly exceeds the scope of the private search — but courts haven’t consistently said so.
The practical advice for examiners working in situations where evidence might be shared with law enforcement: document exactly what you accessed, in what order, and what you saw. That documentation defines the scope of the private search under Jacobsen, which determines how much of the subsequent government examination will be challenged.
The Riley Problem
Riley v. California, 573 U.S. 373 (2014), held that police need a warrant to search the contents of a cell phone incident to arrest. The Court emphasized the vast quantity and sensitivity of data on modern smartphones.
Riley is a Fourth Amendment case that applies to government searches. It doesn’t directly apply to private searches. But it signals how courts are thinking about digital devices — as repositories of deeply personal information, not just containers that happen to hold some data.
Private forensic examiners who access smartphones or other devices should understand that even where the Fourth Amendment doesn’t directly apply, courts are increasingly treating digital privacy as a serious value. That affects how judges view evidence obtained through questionable private searches, even if the technical legal challenge isn’t a Fourth Amendment claim.
Cloud Evidence and the Third-Party Doctrine
The third-party doctrine, historically, held that you have no Fourth Amendment expectation of privacy in information you voluntarily share with a third party. Share your bank records with the bank, no Fourth Amendment protection.
Carpenter v. United States, 585 U.S. 296 (2018), significantly narrowed that doctrine. The Court held that the government needed a warrant to obtain cell-site location information from a wireless carrier, even though the information was voluntarily shared with the carrier in a technical sense. The Court emphasized the comprehensive, detailed picture that long-term location data creates.
Carpenter applies to government investigations. But it’s reshaping how courts think about digital privacy more broadly. Private parties accessing cloud data need to think carefully about the authorization issues under the Stored Communications Act, which — as discussed in our guide to the [Stored Communications Act and self-help forensics](/stored-communications-act-self-help-forensics/) — provides statutory privacy protections that don’t depend on the Fourth Amendment.
Implications for Private Digital Forensics Practitioners
If you’re a private examiner — not a government agent — the Fourth Amendment almost certainly doesn’t apply directly to your work. But there are three reasons you should still care about it.
First, the government may inherit your work. If your investigation produces evidence that law enforcement later uses, the Jacobsen analysis applies. If you want your work to be usable in a criminal context, you need to understand what limitations will apply to the government’s subsequent use of it.
Second, parallel state tort claims. Even where the Fourth Amendment doesn’t apply, private searches can give rise to state law claims — invasion of privacy, trespass to chattels, conversion. These are litigated under state standards, which vary, but the Fourth Amendment analysis often provides a useful framework for thinking about whether the search was reasonable.
Third, judicial skepticism. Judges know when evidence was obtained in a way that looks like a government search wearing private clothes. Even where there’s no technical suppression motion, evidence obtained through aggressive private searches can be excluded under FRE 403 (unfair prejudice, confusion, or waste of time) or meet judicial skepticism during authentication. Doing it right isn’t just about legal compliance — it’s about persuasion.
Practical Guidelines for Private Forensic Examiners
Get written authorization from someone who has the legal right to authorize access to the device or account in question. For corporate investigations, that’s typically the employer for company-owned devices and the employee (with consent) for personal devices. For family law matters, it’s more complicated — see our piece on [community property and digital evidence in divorce proceedings](/community-property-digital-evidence/).
Document your search scope in real time. What did you access? In what order? What did you find and where? This documentation matters if law enforcement later becomes involved and the Jacobsen analysis needs to be applied to your search.
Don’t take direction from law enforcement while conducting a private search. If police are present, asking questions, suggesting where to look, or telling you to continue after you’ve found something — stop. You may have just become a government agent. Consult with counsel before proceeding.
Know the difference between a company device and a personal device accessed through a company network. These are legally different situations with different authorization requirements.
And if your client asks you to access an account using credentials they provide for someone who isn’t your client — stop there. That’s a Stored Communications Act problem at minimum, and depending on the circumstances, it may create state action issues if your investigation is coordinated with law enforcement.
FAQ
If I’m a private investigator hired by a civil litigant, does the Fourth Amendment ever apply to me?
Rarely, but yes. If law enforcement directed, controlled, or participated in your investigation — even informally — you may be functioning as a government agent. The key questions are whether the government knew about and acquiesced in your conduct, and whether your purpose was to assist law enforcement vs. serve your private client. If there’s any coordination with police or prosecutors, talk to your client’s attorney before proceeding.
Can a company’s IT department search an employee’s personal device if it’s connected to the company network?
Connecting to a company network typically doesn’t grant the company authorization to search a personal device. The company may be able to monitor network traffic, enforce security policies, and restrict access — but physical or forensic access to the personal device itself requires either the employee’s consent or a court order. Accessing a personal device without authorization exposes the company to state computer fraud claims and potentially SCA liability.
What is Burdeau v. McDowell and why does it still matter?
Burdeau v. McDowell, 256 U.S. 465 (1921), established that the Fourth Amendment applies only to government action, not to searches by private parties. Even if a private party conducts an illegal search and turns evidence over to prosecutors, the evidence isn’t subject to Fourth Amendment suppression (though other doctrines may apply). It’s still good law, and it’s why prosecutors sometimes encourage private parties to “find” things through private searches — though that encouragement can itself trigger state action analysis.
Does Riley v. California affect private forensic examinations of phones?
Riley directly applies only to government searches incident to arrest. It doesn’t prohibit private examinations of phones. But it signals judicial thinking about digital privacy, and examiners should expect that any search of a phone — private or government — will be scrutinized carefully. Authorization matters. Scope matters. Document both.
If I find evidence of a crime during a private civil investigation, am I required to report it to law enforcement?
Generally, private citizens don’t have a legal duty to report crimes, with narrow exceptions (some states require reporting of child abuse, for example). But how you interact with law enforcement after finding the evidence matters. Voluntarily turning over evidence to police is different from police directing your search before you found it. And if you’re a licensed private investigator, your state’s licensing requirements may impose additional duties. Consult with counsel before making that call.