Evans et al v. Skolnik et al

Filing 365

ORDER directing Clerk to enter judgment in favor of Defendants on the Fourth Amendment claims and close case. Signed by Judge Robert C. Jones on 2/16/16. (Copies have been distributed pursuant to the NEF - JC)

Download PDF
1 2 3 4 UNITED STATES DISTRICT COURT 5 DISTRICT OF NEVADA 6 DONALD YORK EVANS et al., 7 Plaintiffs, 8 vs. 9 HOWARD SKOLNIK et al., 10 Defendants. 11 12 I. ) ) ) ) ) ) ) ) ) ) 3:08-cv-00353-RCJ-VPC ORDER PROCEDURAL HISTORY 13 Plaintiffs Donald York Evans and John Witherow filed the Complaint in June 2008 14 alleging that Defendants illegally intercepted privileged communications between Attorney 15 Evans and his client, Withrow, who was in the custody of the Nevada Department of Corrections 16 (“NDOC”) at Nevada State Prison (“NSP”). (See Compl., ECF No. 2). Plaintiffs listed as 17 Defendants Inmate Calling Solutions (“ICS”), Howard Skolnik, Don Helling, William Donat, 18 Brian Henley, and L. Baker. (See id.). The First Amended Complaint (“FAC”) added Embarq 19 and Global Tel*Link (“GTL”) as Defendants. (See First Am. Compl., ECF No. 33). Evans 20 stipulated to dismiss his claims against ICS. Witherow filed the Second Amended Complaint 21 (“SAC”),1 which listed 116 causes of action against ICS, Embarq, GTL, Skolnik, Helling, 22 Henley, Lea Baker, and I. Connally. (See Second Am. Compl., ECF No. 80). The first and 23 second causes of action were for declaratory and injunctive relief, respectively. The third 24 1 25 Witherow filed the SAC in pro se. The Court treated the SAC as applying only to Witherow and treated the FAC as continuing to apply to Evans. 1 through one-hundred-and-fourteenth causes of action alleged violations of the Fourth 2 Amendment and the Electronic Communications Privacy Act (“ECPA”), 18 U.S.C. § 2511, by 3 Baker’s and Connally’s interceptions of attorney–client communications between Witherow and 4 his various attorneys between May 8, 2007 and July 30, 2008. The one-hundred-and-fifteenth 5 cause of action was a failure-to-train claim against Skolnik. The one-hundred-and-sixteenth 6 cause of action was a respondeat superior claim against Henley, Donat,2 and Helling. 7 Embarq, ICS, and GTL separately moved to dismiss. Witherow opposed the motions, but 8 Evans failed to oppose them, and the Magistrate Judge issued a Report and Recommendation 9 (“R&R”) recommending that the Court grant the motions as against Evans because he failed to 10 oppose them3 and as against Witherow because he had not sufficiently alleged movants were 11 state actors or that they intentionally intercepted his communications. The Court adopted the 12 R&R and granted the motions to dismiss, later clarifying that Witherow did not have leave to 13 amend. At that stage, the following claims remained: (1) Witherow had 116 claims under the 14 SAC against Skolnik, Helling, Henley, Donat, Baker, and Connally; and (2) Evans had three 15 claims under the FAC against Skolnik, Helling, Henley, Donat, and Baker. 16 The Magistrate Judge later issued a thirty-six-page R&R as to Witherow’s motions to 17 amend and for partial summary judgment and Defendants’ motions for summary judgment. The 18 Magistrate Judge recommended denying Witherow’s motions and granting Defendants’ motions, 19 except as to Witherow’s claim for illegal initial screening under the ECPA. The Magistrate 20 Judge found that Witherow had exhausted his administrative remedies, that Evans had no 21 standing to assert constitutional violations of the attorney–client privilege apart from Witherow, 22 23 24 2 Although listed in this cause of action and under the “Parties” section of the SAC, Donat is not listed in the caption of the SAC. 3 25 ICS’s motion was moot as against Evans, because Evans had already stipulated to dismiss his claims against ICS. Page 2 of 7 1 that Evans had no standing to assert claims based upon failures to investigate Witherow’s 2 grievance(s), that Plaintiffs had no constitutional claims because they had no reasonable 3 expectation of privacy in calls they knew were being monitored, that Evans’s potential claim 4 against Baker under the ECPA was futile because discovery sanctions prevented him from 5 presenting evidence sufficient to prove it, that Witherow’s claims under the ECPA were 6 precluded insofar as they alleged initial screening violations because it was clear he received the 7 requisite notice, that there remained genuine issues of material fact whether Defendants engaged 8 in extended monitoring of Witherow’s calls in violation of the ECPA, that no liberty interest had 9 been violated supporting a due process violation, and that no claims lied for failure to respond to 10 grievances or for supervisory liability. The Magistrate Judge noted that Witherow was no longer 11 entitled to injunctive relief, but that he could seek damages under the ECPA. The Hon. Gloria 12 M. Navarro adopted the R&R. 13 The case was reassigned to this Court for trial. The jury returned a verdict for 14 Defendants. Plaintiffs appealed. The Court of Appeals affirmed in all respects but one: it 15 reversed and remanded for further proceedings as to the Fourth Amendment claims, ruling that 16 this Court should examine those claims in the first instance under the “normative inquiry” 17 approach, see United States v. Scott, 450 F.3d 863, 867 (9th Cir. 2005), not the “reasonable 18 expectation of privacy” approach, with appropriate deference to Defendants in light of any 19 legitimate penological concerns, see Turner v. Safley, 482 U.S. 78, 89 (1987). The mandate has 20 issued, and the Court now conducts the required analysis. 21 II. 22 DISCUSSION The Court finds that the Fourth Amendment claims fail. As the Court of Appeals has 23 ruled, Plaintiffs’ expectation of confidential attorney–client communications cannot have been 24 destroyed by subjective knowledge that the “well-recognized” right of private attorney–client 25 communications had in reality been compromised by monitoring. See Scott, 450 F.3d at 867 Page 3 of 7 1 (quoting Smith v. Maryland, 442 U.S. 735, 740 n.5 (1979)). However, the legitimate penological 2 interests of ensuring that the right to confidential attorney–client communications is not abused 3 and that contraband information is not sent out of the prison makes the practice of periodically 4 “checking in” on the calls of inmates after initial screening to ensure they are still privileged, i.e., 5 that the attorney has not handed the telephone over to a non-attorney such as a family member or 6 even a criminal confederate once the parties have become confident monitoring has ceased, 7 constitutionally reasonable. 8 9 Prison regulations generally survive constitutional challenges if they are “reasonably related to legitimate penological interests.” Turner, 482 U.S. at 89. The right at issue “must be 10 exercised with due regard for the ‘inordinately difficult undertaking’ that is modern prison 11 administration.” Thornburgh v. Abbott, 490 U.S. 401, 404 (1989) (quoting Turner, 482 U.S. at 12 85). The Turner factors are: (1) whether the regulation is rationally related to a legitimate and 13 neutral objective; (2) whether there are alternative means of exercising the right at issue; (3) the 14 impact the requested accommodation will have on other inmates and prison staff; and (4) the 15 existence of obvious, easy alternatives. Id. at 414–18. 16 As noted above, there is a legitimate penological interest in ensuring that the ability to 17 make non-monitored calls is not abused, i.e., is not used except when speaking with an attorney 18 about legal matters. There is no “alternative means” of exercising the right at issue if the right is 19 perceived as absolute. But the right is not absolute. In the prison context, the right may be 20 abridged according to the contours defined by the standards of Turner. Third and fourth, there 21 are no obvious, easy alternatives, and ending the practice could destroy the ability of prison staff 22 to prevent abuses, because periodic checks are the only feasible way, and probably also the least 23 intrusive way, to ensure the right of privileged communications may be enjoyed without being 24 abused short of permitting only in-person communications in the prison itself with pre-screened 25 attorneys or sending prison guards to attorney’s offices to confirm the identity of the call Page 4 of 7 1 recipient and guard the exterior of the room during the call to ensure no unauthorized parties 2 partake in the call. Even then, the attorney could forward the call without the guard’s 3 knowledge, or a third party could join the call on another line. The former alternative would 4 destroy the right of prisoners to make confidential telephone calls from prison, and the latter 5 alternative would be prohibitively expensive and time consuming. Even an automated warning 6 such as, “Attention, in ten seconds prison staff will join the call to reconfirm the identity of the 7 recipient” would not work, because an attorney could be standing by to take the receiver in the 8 event such a warning were announced, or a third party could simply pretend to be an attorney for 9 a minute or so at the appropriate time. The periodic checks must be surreptitious, and indeed 10 periodic as opposed to only initial, to be effective. Knowledge that only an initial check may 11 ever be performed would invite abuse. 12 Even without the above analysis, the Court of Appeals has recently spoken to the issue in 13 a highly analogous context, explicitly ruling that the contents of legal mail, not only the exterior 14 of the envelope, may be inspected for contraband. See Nordstrom v. Ryan, 762 F.3d 903, 909 15 (9th Cir. 2014) (quoting Wolff v. McDonnell, 418 U.S. 539, 577 (1974)). That is, prison officials 16 may “inspect” but not “read” legal mail: 17 18 19 20 21 22 23 24 25 Corrections officials obviously have good reason to be on the lookout for contraband, escape plans, and other mischief that could jeopardize institutional security. Officials likewise have every right to inspect an inmate’s outgoing legal mail for such suspicious features as maps of the prison yard, the times of guards’ shift changes, and the like. Prison officials know what to look for. But inspecting letters and reading them are two different things, as the Supreme Court recognized in Wolff v. McDonnell. What prison officials don't have the right to do is read a confidential letter from an inmate to his lawyer. This is because it is highly likely that a prisoner would not feel free to confide in his lawyer such things as incriminating or intimate personal information—as is his Sixth Amendment right to do—if he knows that the guards are reading his mail. Reading legal mail—not merely inspecting or scanning it—is what Nordstrom alleges the Department of Corrections is doing, and it is what he seeks to enjoin. We hold today that his allegations, if true, state a Sixth Amendment violation. Id. at 906 (citation omitted). Page 5 of 7 1 The question here is whether periodic “check-ins” of an attorney–client call constitute 2 “inspecting” or “scanning” the conversation (which is permitted) as opposed to “reading” it 3 (which is not). The Court finds that the “check-ins” in this case were permitted “inspections.” 4 Although extended monitoring of a legal telephone call, i.e., “listening to” it, would be analogous 5 to “reading” legal mail, periodic “check-ins” on legal telephone calls are analogous to 6 “inspecting” or “scanning” legal mail. Just as with the mail in Nordstrom, there must be some 7 way for prison officials to “inspect” or “check” a telephone call for contraband communications 8 within the boundaries of Turner without “reading” or “listening to” it in the legal sense, 9 otherwise a prisoner could circumvent the recognized right of the prison to inspect 10 communications for contraband merely by utilizing a verbal rather than written form of 11 communication. The permitted inspection of verbal legal communications such as telephone 12 calls must exceed merely approving the dialed number or confirming the identity of the initial 13 recipient, because inspections of written legal communications for contraband information such 14 as maps or guard shift times is permitted, id. at 909, and discovering these things necessarily 15 requires examining the contents of the letter to some extent, not merely examining the address on 16 the envelope. 17 Just as a prison official inspecting legal mail may look at it briefly to determine whether 18 there is any contraband communications,4 a prison official may conduct analogously limited 19 periodic checks of verbal legal communications for the same purpose. The Court is confident 20 that neither the majority nor the dissent in Nordstrom would find any constitutional violation in 21 the present case. The majority would approve the “check-in” practice based on its distinction 22 23 24 25 4 It necessarily follows from the Court of Appeals’ distinction between “inspecting” and “reading” legal mail that a prison official’s “inspection” may consist of perceiving and mentally processing the substance of some sampling of the entire communication in order to make a determination as to whether there is contraband present without the inspection constituting “reading” in the legal sense. See id. at 915–16 (Bybee, J., dissenting). Page 6 of 7 1 between “inspecting” and “reading,” whereas the dissent would find the communications had 2 been “read” but perceive no constitutional fault with that. In summary, brief, periodic checks (as 3 opposed to extended monitoring) of attorney–prisoner telephone calls to reconfirm the legal 4 nature of the telephone call or to inspect for contraband information does not violate the 5 Constitution. That is all that happened here, and Defendants are therefore entitled to summary 6 judgment against the Fourth Amendment claims as a matter of law. 7 8 9 CONCLUSION IT IS HEREBY ORDERED that the Clerk shall enter judgment in favor of Defendants on the Fourth Amendment claims and close the case. 10 IT IS SO ORDERED. 11 Dated this 16th day of February, 2016. 12 13 14 _____________________________________ ROBERT C. JONES United States District Judge 15 16 17 18 19 20 21 22 23 24 25 Page 7 of 7

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?