Utilizing a Private Investigator without getting into trouble Presented by: Maisie A. Barringer Rob L. Kimmons.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Understanding the Fair Debt Collection Practices Act
Legal and Ethical Issues. 1. Describe and explain legal and ethical issues. 2. Describe guidelines for avoiding legal action and list methods for protecting.
Through 2008 Season Barry Bonds 762 Home Runs Roger Clemens 354 Wins Alex Rodriguez 553 Home Runs.
News Gathering & the Law The Role of the First Amendment The text of the First Amendment, by its terms, says nothing about a right to gather news or a.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
Lecturer: Miljen Matijašević Session 8, 7 May 2014.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Comm2315.wordpress.com.  On the Record – All statements are subject for use in the story. Everything a source says or s you is.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
CALIFORNIA PUBLIC RECORDS ACT Presented by Maribel S. Medina January 16, 2014.
1 PROCEDURAL DUE PROCESS. 2 Texas Education Agency provides Notice of Procedural Safeguards Rights of Parents of Students with Disabilities Download this.
Licensing & Regulation Division Senior Sergeant Brett Kahan Presentation to the Association of Investigators & Security Professionals.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Law and Justice: Chapter 6 Lawyers. Lawyers What is a Lawyer What is a Lawyer Someone who argues points of law for a client Someone who argues points.
Yes No Yes No Yes No Yes No Yes No Yes No Yes No.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
Pretext Phone Calls Legal in Canada!!. Police-guided pretext phone calls do not violate Charter s. 8 if prior: -One party consent -Judicial Authorization.
"Can I give this out?" What Frontline Staff Need to Know About FOI and Privacy 2010 LGMA Administrative Professionals' Conference Paul Hancock, City of.
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
Rules of Discovery and Privileged Communications Court Systems and Practices.
Todd K. Hayden VIDEO TAPING ON SCHOOL BUSES: WHAT SHOULD YOU BE CONCERNED ABOUT?
UNITED STATES LAW KNOW YOUR LEGAL RIGHTS. Your Legal Rights  In general, non-immigrants in the United States have the same constitutional protections.
EMPLOYEE TERMINATIONS Becky S. Knutson Davis Brown Law Firm.
Lawyers. Some background info There are more than 1 million lawyers in the U.S. Most lawyers rarely go to court –They give advice, negotiate settlements,
Use Policies Deputy Attorney General Robert Morgester
Class 6 Internet Privacy Law Social Media Privacy.
Driver Records Driver License News. DRIVER PRIVACY PROTECTION ACT.
REAL ESTATE LICENSE LAWS ► CHAPTER 10 © 2009 South-Western, Cengage Learning.
How to Select and Pre-screen a Home Improvement Contractor.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Public Records Overview and Case Update: September 11, 2015 presentation Patricia Gleason Special Counsel for Open Government.
Computer and Network Use Policies ITSS 4201 Internet Insurance and Information Hiding ► University of Palestine ► Eng. Wisam Zaqoot ► Feb 2010.
+ Rules & Types of Evidence. + Rules of Evidence During a trial, either the Crown or the defence may object to questions asked by the opposing attorney.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Confidentiality Training. Confidentiality Confidentiality is the expectation of and right to privacy afforded to student and their parents. These rights.
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Invasion of Privacy in Digital Media Basic Concepts.
How to Choose a Criminal Defense Lawyer Ph ,
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Sgt. Melissa Holbrook Houston Police Department  Read report  Run criminal history check  Run location history for prior calls for service  Run check.
Public Records Training Manitowoc City Attorney’s Office.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
CHAPTER 15 QUESTIONS. Question #1 What is a bureaucracy? A large, complex, administrative structure that handles the everyday business of an organization.
Land Mark Supreme Court Cases Assignment
Eliseo Lugo III.  Objectives: By the end of class, students will be able to:  Name at least five situations in which a person might wish to consult.
RACIAL DISPARITIES IN THE LAW Created by: Cathi, Nicole, Eunice and Jeanell.
HIPAA Privacy What Every Staff Member Needs to Know.
Are you prepared for an IRS or DOL audit?.. Agenda 2014 IRS/DOL audit activity Areas of audit focus Received an audit letter? Now what? Working with an.
The Freedom of Information Act Made Simple.. What’s the main point? Main Point : to ensure that electors are fully advised of the activities/decisions.
Protecting PHI & PII 12/30/2017 6:45 AM
Driver Privacy Rights and Agency Liability
Confidentiality October 14, 2005.
Family Education Rights and Privacy Act
Immigration Sensitive Locations Policy Overview
Open Government Overview
Pre-Trial Procedures Search and Seizure.
Georgia Law and Consequences Regarding Computer / Internet Usage for Students E. Logan Butler Attorney at Law Patterson Moore Butler, LLC
Overview of Private Investigation Industry
Search laws CLU3ME: Unit #3 - Day Five.
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Presentation transcript:

Utilizing a Private Investigator without getting into trouble Presented by: Maisie A. Barringer Rob L. Kimmons

Client is NOT a PI DON’T ADVISE YOUR CLIENT TO PERFORM SURVEILLANCE OR ANY OTHER TECHNOLOGICAL SNOOPING AS CIVIL AND CRIMINAL CHARGES COULD FOLLOW DON’T ALLOW YOUR CLIENT TO ASSIST THE PI IN SURVEILLANCE EXPLAIN TO YOUR CLIENT THAT THE PI WILL NOT COMMUNICATE DURING SURVEILLANCE (BLUE MOON)

Investigate Your Investigator Check the state licensing board for complaints, insurance coverage and license status Check length of time in practice, ask if they are experienced in “domestic” work Possible other “domestic” referrals

Who is a PI? Must be licensed by the state of Texas Attorneys while engaged in the practice of law are exempted Off-duty police officers are NOT allowed to perform PI work unless they hold a license Hiring an unlicensed PI to perform investigations carries a criminal penalty in the state of Texas

What Can a PI Do? Locate people Find assets/“bugs” Run license plates Locate and interview witnesses Locate criminal records Rebuild wiped computer hard- drives

PI Cannot Do: Trespass on private property Impersonate law enforcement Wiretap without consent or record a private conversation of which no party has knowledge Tamper with mail Harass or act unlawfully

Invasions of Privacy Setting up video in client’s bedroom Entering private offices without permission Entering home without permission

Tips for Clients Don’t use tracking devices or spyware for property you don’t own Don’t intercept text messages/ s without consent Don’t impersonate someone or create fake social media profiles Harass others (particularly in social media)

Disclosure of the PI Discovery requests Retained expert/consulting only expert Retained by the client versus the attorney