Evans et al v. Skolnik et al
Filing
365
ORDER directing Clerk to enter judgment in favor of Defendants on the Fourth Amendment claims and close case. Signed by Judge Robert C. Jones on 2/16/16. (Copies have been distributed pursuant to the NEF - JC)
1
2
3
4
UNITED STATES DISTRICT COURT
5
DISTRICT OF NEVADA
6
DONALD YORK EVANS et al.,
7
Plaintiffs,
8
vs.
9
HOWARD SKOLNIK et al.,
10
Defendants.
11
12
I.
)
)
)
)
)
)
)
)
)
)
3:08-cv-00353-RCJ-VPC
ORDER
PROCEDURAL HISTORY
13
Plaintiffs Donald York Evans and John Witherow filed the Complaint in June 2008
14
alleging that Defendants illegally intercepted privileged communications between Attorney
15
Evans and his client, Withrow, who was in the custody of the Nevada Department of Corrections
16
(“NDOC”) at Nevada State Prison (“NSP”). (See Compl., ECF No. 2). Plaintiffs listed as
17
Defendants Inmate Calling Solutions (“ICS”), Howard Skolnik, Don Helling, William Donat,
18
Brian Henley, and L. Baker. (See id.). The First Amended Complaint (“FAC”) added Embarq
19
and Global Tel*Link (“GTL”) as Defendants. (See First Am. Compl., ECF No. 33). Evans
20
stipulated to dismiss his claims against ICS. Witherow filed the Second Amended Complaint
21
(“SAC”),1 which listed 116 causes of action against ICS, Embarq, GTL, Skolnik, Helling,
22
Henley, Lea Baker, and I. Connally. (See Second Am. Compl., ECF No. 80). The first and
23
second causes of action were for declaratory and injunctive relief, respectively. The third
24
1
25
Witherow filed the SAC in pro se. The Court treated the SAC as applying only to
Witherow and treated the FAC as continuing to apply to Evans.
1
through one-hundred-and-fourteenth causes of action alleged violations of the Fourth
2
Amendment and the Electronic Communications Privacy Act (“ECPA”), 18 U.S.C. § 2511, by
3
Baker’s and Connally’s interceptions of attorney–client communications between Witherow and
4
his various attorneys between May 8, 2007 and July 30, 2008. The one-hundred-and-fifteenth
5
cause of action was a failure-to-train claim against Skolnik. The one-hundred-and-sixteenth
6
cause of action was a respondeat superior claim against Henley, Donat,2 and Helling.
7
Embarq, ICS, and GTL separately moved to dismiss. Witherow opposed the motions, but
8
Evans failed to oppose them, and the Magistrate Judge issued a Report and Recommendation
9
(“R&R”) recommending that the Court grant the motions as against Evans because he failed to
10
oppose them3 and as against Witherow because he had not sufficiently alleged movants were
11
state actors or that they intentionally intercepted his communications. The Court adopted the
12
R&R and granted the motions to dismiss, later clarifying that Witherow did not have leave to
13
amend. At that stage, the following claims remained: (1) Witherow had 116 claims under the
14
SAC against Skolnik, Helling, Henley, Donat, Baker, and Connally; and (2) Evans had three
15
claims under the FAC against Skolnik, Helling, Henley, Donat, and Baker.
16
The Magistrate Judge later issued a thirty-six-page R&R as to Witherow’s motions to
17
amend and for partial summary judgment and Defendants’ motions for summary judgment. The
18
Magistrate Judge recommended denying Witherow’s motions and granting Defendants’ motions,
19
except as to Witherow’s claim for illegal initial screening under the ECPA. The Magistrate
20
Judge found that Witherow had exhausted his administrative remedies, that Evans had no
21
standing to assert constitutional violations of the attorney–client privilege apart from Witherow,
22
23
24
2
Although listed in this cause of action and under the “Parties” section of the SAC, Donat
is not listed in the caption of the SAC.
3
25
ICS’s motion was moot as against Evans, because Evans had already stipulated to
dismiss his claims against ICS.
Page 2 of 7
1
that Evans had no standing to assert claims based upon failures to investigate Witherow’s
2
grievance(s), that Plaintiffs had no constitutional claims because they had no reasonable
3
expectation of privacy in calls they knew were being monitored, that Evans’s potential claim
4
against Baker under the ECPA was futile because discovery sanctions prevented him from
5
presenting evidence sufficient to prove it, that Witherow’s claims under the ECPA were
6
precluded insofar as they alleged initial screening violations because it was clear he received the
7
requisite notice, that there remained genuine issues of material fact whether Defendants engaged
8
in extended monitoring of Witherow’s calls in violation of the ECPA, that no liberty interest had
9
been violated supporting a due process violation, and that no claims lied for failure to respond to
10
grievances or for supervisory liability. The Magistrate Judge noted that Witherow was no longer
11
entitled to injunctive relief, but that he could seek damages under the ECPA. The Hon. Gloria
12
M. Navarro adopted the R&R.
13
The case was reassigned to this Court for trial. The jury returned a verdict for
14
Defendants. Plaintiffs appealed. The Court of Appeals affirmed in all respects but one: it
15
reversed and remanded for further proceedings as to the Fourth Amendment claims, ruling that
16
this Court should examine those claims in the first instance under the “normative inquiry”
17
approach, see United States v. Scott, 450 F.3d 863, 867 (9th Cir. 2005), not the “reasonable
18
expectation of privacy” approach, with appropriate deference to Defendants in light of any
19
legitimate penological concerns, see Turner v. Safley, 482 U.S. 78, 89 (1987). The mandate has
20
issued, and the Court now conducts the required analysis.
21
II.
22
DISCUSSION
The Court finds that the Fourth Amendment claims fail. As the Court of Appeals has
23
ruled, Plaintiffs’ expectation of confidential attorney–client communications cannot have been
24
destroyed by subjective knowledge that the “well-recognized” right of private attorney–client
25
communications had in reality been compromised by monitoring. See Scott, 450 F.3d at 867
Page 3 of 7
1
(quoting Smith v. Maryland, 442 U.S. 735, 740 n.5 (1979)). However, the legitimate penological
2
interests of ensuring that the right to confidential attorney–client communications is not abused
3
and that contraband information is not sent out of the prison makes the practice of periodically
4
“checking in” on the calls of inmates after initial screening to ensure they are still privileged, i.e.,
5
that the attorney has not handed the telephone over to a non-attorney such as a family member or
6
even a criminal confederate once the parties have become confident monitoring has ceased,
7
constitutionally reasonable.
8
9
Prison regulations generally survive constitutional challenges if they are “reasonably
related to legitimate penological interests.” Turner, 482 U.S. at 89. The right at issue “must be
10
exercised with due regard for the ‘inordinately difficult undertaking’ that is modern prison
11
administration.” Thornburgh v. Abbott, 490 U.S. 401, 404 (1989) (quoting Turner, 482 U.S. at
12
85). The Turner factors are: (1) whether the regulation is rationally related to a legitimate and
13
neutral objective; (2) whether there are alternative means of exercising the right at issue; (3) the
14
impact the requested accommodation will have on other inmates and prison staff; and (4) the
15
existence of obvious, easy alternatives. Id. at 414–18.
16
As noted above, there is a legitimate penological interest in ensuring that the ability to
17
make non-monitored calls is not abused, i.e., is not used except when speaking with an attorney
18
about legal matters. There is no “alternative means” of exercising the right at issue if the right is
19
perceived as absolute. But the right is not absolute. In the prison context, the right may be
20
abridged according to the contours defined by the standards of Turner. Third and fourth, there
21
are no obvious, easy alternatives, and ending the practice could destroy the ability of prison staff
22
to prevent abuses, because periodic checks are the only feasible way, and probably also the least
23
intrusive way, to ensure the right of privileged communications may be enjoyed without being
24
abused short of permitting only in-person communications in the prison itself with pre-screened
25
attorneys or sending prison guards to attorney’s offices to confirm the identity of the call
Page 4 of 7
1
recipient and guard the exterior of the room during the call to ensure no unauthorized parties
2
partake in the call. Even then, the attorney could forward the call without the guard’s
3
knowledge, or a third party could join the call on another line. The former alternative would
4
destroy the right of prisoners to make confidential telephone calls from prison, and the latter
5
alternative would be prohibitively expensive and time consuming. Even an automated warning
6
such as, “Attention, in ten seconds prison staff will join the call to reconfirm the identity of the
7
recipient” would not work, because an attorney could be standing by to take the receiver in the
8
event such a warning were announced, or a third party could simply pretend to be an attorney for
9
a minute or so at the appropriate time. The periodic checks must be surreptitious, and indeed
10
periodic as opposed to only initial, to be effective. Knowledge that only an initial check may
11
ever be performed would invite abuse.
12
Even without the above analysis, the Court of Appeals has recently spoken to the issue in
13
a highly analogous context, explicitly ruling that the contents of legal mail, not only the exterior
14
of the envelope, may be inspected for contraband. See Nordstrom v. Ryan, 762 F.3d 903, 909
15
(9th Cir. 2014) (quoting Wolff v. McDonnell, 418 U.S. 539, 577 (1974)). That is, prison officials
16
may “inspect” but not “read” legal mail:
17
18
19
20
21
22
23
24
25
Corrections officials obviously have good reason to be on the lookout for contraband,
escape plans, and other mischief that could jeopardize institutional security. Officials
likewise have every right to inspect an inmate’s outgoing legal mail for such
suspicious features as maps of the prison yard, the times of guards’ shift changes, and
the like. Prison officials know what to look for. But inspecting letters and reading
them are two different things, as the Supreme Court recognized in Wolff v.
McDonnell. What prison officials don't have the right to do is read a confidential
letter from an inmate to his lawyer. This is because it is highly likely that a prisoner
would not feel free to confide in his lawyer such things as incriminating or intimate
personal information—as is his Sixth Amendment right to do—if he knows that the
guards are reading his mail.
Reading legal mail—not merely inspecting or scanning it—is what Nordstrom
alleges the Department of Corrections is doing, and it is what he seeks to enjoin. We
hold today that his allegations, if true, state a Sixth Amendment violation.
Id. at 906 (citation omitted).
Page 5 of 7
1
The question here is whether periodic “check-ins” of an attorney–client call constitute
2
“inspecting” or “scanning” the conversation (which is permitted) as opposed to “reading” it
3
(which is not). The Court finds that the “check-ins” in this case were permitted “inspections.”
4
Although extended monitoring of a legal telephone call, i.e., “listening to” it, would be analogous
5
to “reading” legal mail, periodic “check-ins” on legal telephone calls are analogous to
6
“inspecting” or “scanning” legal mail. Just as with the mail in Nordstrom, there must be some
7
way for prison officials to “inspect” or “check” a telephone call for contraband communications
8
within the boundaries of Turner without “reading” or “listening to” it in the legal sense,
9
otherwise a prisoner could circumvent the recognized right of the prison to inspect
10
communications for contraband merely by utilizing a verbal rather than written form of
11
communication. The permitted inspection of verbal legal communications such as telephone
12
calls must exceed merely approving the dialed number or confirming the identity of the initial
13
recipient, because inspections of written legal communications for contraband information such
14
as maps or guard shift times is permitted, id. at 909, and discovering these things necessarily
15
requires examining the contents of the letter to some extent, not merely examining the address on
16
the envelope.
17
Just as a prison official inspecting legal mail may look at it briefly to determine whether
18
there is any contraband communications,4 a prison official may conduct analogously limited
19
periodic checks of verbal legal communications for the same purpose. The Court is confident
20
that neither the majority nor the dissent in Nordstrom would find any constitutional violation in
21
the present case. The majority would approve the “check-in” practice based on its distinction
22
23
24
25
4
It necessarily follows from the Court of Appeals’ distinction between “inspecting” and
“reading” legal mail that a prison official’s “inspection” may consist of perceiving and mentally
processing the substance of some sampling of the entire communication in order to make a
determination as to whether there is contraband present without the inspection constituting
“reading” in the legal sense. See id. at 915–16 (Bybee, J., dissenting).
Page 6 of 7
1
between “inspecting” and “reading,” whereas the dissent would find the communications had
2
been “read” but perceive no constitutional fault with that. In summary, brief, periodic checks (as
3
opposed to extended monitoring) of attorney–prisoner telephone calls to reconfirm the legal
4
nature of the telephone call or to inspect for contraband information does not violate the
5
Constitution. That is all that happened here, and Defendants are therefore entitled to summary
6
judgment against the Fourth Amendment claims as a matter of law.
7
8
9
CONCLUSION
IT IS HEREBY ORDERED that the Clerk shall enter judgment in favor of Defendants on
the Fourth Amendment claims and close the case.
10
IT IS SO ORDERED.
11
Dated this 16th day of February, 2016.
12
13
14
_____________________________________
ROBERT C. JONES
United States District Judge
15
16
17
18
19
20
21
22
23
24
25
Page 7 of 7
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?