Lead Opinion
¶ 1. This appeal arises out of a John Doe investigation, pursuant to Wis. Stat. § 968.26 (2001-02),
I. BACKGROUND
¶ 2. This case arises out of a John Doe proceeding commenced in July of 2001 by the Dane County District Attorney to investigate the political caucuses that once existed for both parties in the Assembly and the Senate and to investigate whether the relationship of the caucuses to Wisconsin's senators and representatives, or the activities of certain legislators, contravened criminal laws. The matter currently before us is a challenge to a John Doe subpoena issued to the Legislative Technology Services Bureau (LTSB) for electronically stored communications
¶ 3. In 1997, as a response to its increasing use of technology, the legislature enacted Wis. Stat. § 13.96, thereby creating the LTSB. The LTSB maintains legislators', constituents' and service agency e-mails; Internet web page development and access; office programs
¶ 4. In this action, the John Doe judge has ordered the LTSB to produce the backup tapes that were made on December 15, 2001 for all 54 servers, or in the alternative, to extract all "documents" for certain named legislators, their aides, and every person who worked in the Democratic and Republican caucuses for both the Senate and the Assembly. The subpoena duces tecum defined "document" as:
hard copies or electronic files and e-mails, drafts, revisions, attached "post-it" notes or other supplemental material, graphic images, photographic images, disks, video recordings, tapes, or written materials regardless of how kept or denominated, and without regard to whether you consider any document to be public or private material.
II. DISCUSSION
A. Standard of Review
¶ 6. Statutory interpretation, or the application of a statute to a known set of facts, presents questions of law that we review without deference to the circuit court. Deutsches Land, Inc. v. City of Glendale,
B. The John Doe Proceeding
¶ 7. To properly analyze the claimed defenses to and arguments in support of the subpoena, we must first discuss the John Doe proceeding itself. It is an investigation created by Wis. Stat. § 968.26, which provides in relevant part:
*217 If a person complains to a judge that he or she has reason to believe that a crime has been committed within his or her jurisdiction, the judge shall examine the complainant under oath and any witnesses produced by him or her and may, and at the request of the district attorney shall, subpoena and examine other witnesses to ascertain whether a crime has been committed and by whom committed.
¶ 8. The purpose of a John Doe proceeding is to ascertain if a crime has been committed and who likely committed it. State ex rel. Unnamed Person No. 1 v. State,
¶ 9. We have held that witnesses in John Doe proceedings need not be apprised of the scope of the investigation. State ex. rel. Jackson v. Coffey, 18 Wis. 2d
¶ 10. A John Doe judge has broad, but not unlimited, powers. State v. Washington,
C. Statutory Privilege
¶ 11. Wahl contends that Wis. Stat. § 13.96, as it interacts with Wis. Stat. § 905.01, creates a statutory privilege that, while not expressly stated, is implicit in LTSB's obligation to treat all information within its possession as confidential. Therefore, as the legal custodian of the information stored by the LTSB, he is not required to comply with the subpoena.
¶ 12. When we are presented with a question of statutory interpretation, we attempt to ascertain and give effect to the meaning of the statute. State ex rel. Kalal v. Circuit Court for Dane County,
¶ 13. Wisconsin Stat. § 13.96 was created by 1997 Wis. Act 27, § 18m as a response to the legislature's ever-increasing reliance on computer-assisted communications. The LTSB serves legislators who belong to all political parties, and it warehouses data that the recipients and creators may deem confidential. Section 13.96 provides in relevant part:
The legislative technology services bureau shall be strictly nonpartisan and shall at all times observe the confidential nature of the data and information originated, maintained or processed by electronic equipment supported by it.
Wahl relies on the § 13.96 mandate of confidentiality as
Except as provided by or inherent or implicit in statute or in rules adopted by the supreme court or required by the constitution of the United States or Wisconsin, no person has a privilege to:
(1) Refuse to be a witness; or
(2) Refuse to disclose any matter; or
(3) Refuse to produce any object or writing; or
(4) Prevent another from being a witness or disclosing any matter or producing any object or writing.
¶ 14. However, just because data is to be kept confidential, it does not necessarily follow that Wahl has a legal privilege not to produce it. The concepts of "confidential" and "legal privilege" are very different.
¶ 15. "Confidential" data is that which is "meant to be kept secret." Black's Law Dictionary 294 (7th ed. 1999). Legal privilege is a broader concept. It includes having the legal right not to provide certain data when faced with a valid subpoena.
¶ 16. Additionally, privileges are the exception and not the rule; therefore, they are narrowly construed. Burnett,
¶ 17. Furthermore, it is a "well-accepted legal principle, a fundamental tenet of our modern legal system,... that the public has a right to every person's evidence except for those persons protected by a constitutional, common-law, or statutory privilege." State v. Gilbert,
D. Wisconsin Constitutional Claims
1. Article IY Section 16
¶ 18. Wahl also contends that he is excused from complying with the subpoena because Article IY Section 16 of the Wisconsin Constitution provides that "[n]o member of the legislature shall be liable in any civil action, or criminal prosecution whatever, for words spoken in debate." It is Wahl's position that according to State v. Beno,
¶ 19. For the purpose of our discussion, we shall assume that Wahl could argue correctly that he can assert any defense that might be available to a legislator under Article IY Section 16. However, given the state of the record before us, we cannot determine whether constitutionally permissible criminal charges are under investigation in the John Doe proceeding or whether the allegations are intertwined with duties the legislators were elected to perform. Accordingly, we
¶ 20. Section 16 is one of several provisions in Wisconsin's constitution that protects the independent functioning of the legislative branch. It ensures that legislators are not distracted from nor hindered by other overly aggressive branches of government or by private litigants, as they perform the tasks for which they were elected. Beno,
¶ 21. Article iy Section 16 protects "the legislator not only from adverse judgments but also from questioning in a judicial proceeding." Id. at 142. However, as we have explained before:
The constitution literally protects the member from liability for "words spoken in debate." The clause thus focuses upon matters occurring in legislative deliberations. ... The principle accorded legislators by [S]ec*225 tion 16 exists only to the extent necessary for the adequate functioning of the state legislative body.
Id. Notwithstanding these substantial protections, Section 16 does not endow a legislator with "unlimited absolute personal immunity from substantive liability or from any obligation to testify in a judicial proceeding." Id. at 143. For example, Section 16 may not always provide a safe haven for a legislator who has committed a criminal or an unconstitutional act, even if done during the course of his official duties. Id. at 143 n.6.
¶ 22. As set forth above, our past examinations of Section 16 focused on use, or potential use, of constitutionally protected communications. However, Wahl seems to argue that Section 16's protections go beyond prohibiting use and also create a privilege to prevent disclosure. Wahl develops no legal argument to support that contention. The only case he cites in regard to Section 16 is Beno. But as we have explained, Beno concludes that the purpose of Section 16 is to limit the use that may be made of "words spoken in debate." It grants immunity for those tasks undertaken in fulfillment of the legislator's constitutional functions so as not to chill the legislator's efforts on behalf of the electorate. Id. at 142. However, Beno does not address attempts to keep legislative communications secret.
¶ 23. Because Wisconsin has a long history of open government that is now provided by statute as well as case law, Wis. Stat. §§ 19.31 to 19.39; Linzmeyer v. Forcey,
E. Separation of Powers and Article IY Section 8
¶ 24. Wahl makes two separation of powers arguments that we consider together. First, he asserts that the subpoena intrudes into a "core zone" of legislative power thereby violating an area constitutionally reserved exclusively to the legislature contrary to the separation of powers doctrine. Second, he contends that Wis. Stat. § 13.96 is an Article IY Section 8 "rule of proceeding" that may be interpreted only by the legislature. The State counters that it is the prerogative of the executive branch to investigate crime and assure the faithful execution of the laws, which is the object of all aspects of the John Doe proceeding. It also asserts that § 13.96 is not a rule of proceeding, but even if it were, courts may interpret it as not precluding executive inquiry into potential criminal acts of the legislature.
¶ 25. Separation of powers is a foundational principle of our tri-partite system of government, wherein each branch has equal power and a region of independent authority. Washington,
¶ 26. The LTSB has not demonstrated why the use of the data it has collected cannot be shared with the executive branch when potentially criminal conduct is at issue. The subpoena is not attempting to change the way in which the legislature functions, but rather attempting to gather information to investigate the commission of a crime. If all of the documents maintained by LTSB were out-of-bounds to such an investigation, the legislature would have effectively immunized its members and employees from criminal prosecution and in so doing usurped the role of the executive branch in assuring the faithful execution of the laws and the prosecution of crime. And finally, all of the information sought concerns past communications. It does not concern present or future communications within the legislature.
¶ 27. A related question is presented by the LTSB's argument that only the legislature can determine if the subpoena is enforceable because Wis. Stat. § 13.96 is a "rule of proceeding." Article I\J Section 8 of the Wisconsin Constitution provides that "[e]ach house may determine the rules of its own proceedings . .. ." The LTSB cites this section of the constitution as a "textually demonstrable constitutional commitment" that the question of the subpoena's enforceability is a non-justiciable political question.
¶ 29. At its core, the LTSB's argument depends upon our conclusion that Wis. Stat. § 13.96 is a "rule of proceeding" within the meaning of Article I\( Section 8 of the Wisconsin Constitution. Therefore, we may exercise our jurisdiction to decide whether § 13.96 is a "rule of proceeding" because that issue presents as a question of constitutional interpretation. State ex rel. Elfers v. Olson,
¶ 30. We note that Wis. Stat. § 13.96 has nothing to do with the process the legislature uses to propose or pass legislation or how it determines the qualifications of its members. It simply provides for assistance with electronic data and for an electronic storage closet for
¶ 31. Moreover, the subpoena seeks information in the course of an investigation into potentially criminal conduct, a function of the executive branch. And finally, Wis. Stat. § 13.96 is not necessarily in conflict with a John Doe judge's statutory authority to investigate whether a crime has been committed. Provision of the communications requested can be accomplished in a manner that continues their confidential nature until the legislator or legislative employee can be heard by a court on the merits of any claim of privilege for individual communications. Accordingly, we conclude that neither the separation of powers nor Article iy Section 8 provides an absolute defense to the compulsion of a John Doe subpoena. We do not address whether privilege may lie for any individual communication because that question is not before us, as we have no way of knowing what the tapes may contain.
F. Claim of Overbroad Subpoena
¶ 32. We now turn to the scope of the subpoena to the LTSB. The subpoena, as modified by the order of November 4, 2002, requested "all digital computer information or data maintained by" the LTSB, including, but not limited to, the contents of all electronic
¶ 33. The John Doe judge ordered Wahl, as custodian of the records at the LTSB, to produce the communications contained on backup tapes as of December 15, 2001.
¶ 34. When we review a John Doe subpoena, a foundational issue may be constitutional in nature. For example, does the issuance of a subpoena in a John Doe proceeding, the sole purpose of such proceeding being to investigate alleged criminal activity, have the potential to affect Fourth Amendment rights? The issue of whether the subpoena is overbroad and oppressive, and thus unreasonable, was raised by Wahl. This is a Fourth
1. Fourth Amendment principles
¶ 35. The Fourth Amendment, made applicable to the states through the Fourteenth Amendment, provides:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
U.S. Constitution, Amend. IV; see Mapp v. Ohio,
¶ 36. At the time the Fourth Amendment was being drafted, searches were based on warrants as a matter of course.
¶ 37. The Fourth Amendment, then, proscribed "unreasonable searches and seizures" not as an independent governing standard of search and seizure, but instead with reference to the illegality of general warrants.
¶ 38. While the United States Supreme Court construed the Fourth Amendment as not preventing a court from compelling documentary evidence, either through a warrant or a subpoena duces tecum, a demand for such evidence violates the Fourth Amendment's reasonableness test if it lacks "the particularity required in the description of documents." Hale,
Doubtless many, if not all, of these documents may ultimately be required, but some necessity should be shown... or some evidence of their materiality produced, to justify an order for the production of such a mass of papers. A general subpoena of this description is equally indefensible as a search warrant would be if couched in similar terms.
Hale,
¶ 39. In 1967, the United States Supreme Court decided Katz v. United States.
¶ 41. The Supreme Court repeatedly has explained that elected officials do not park their constitutional rights at the door when they assume public office. Bond v. Floyd,
¶ 42. With these concepts in mind, we turn now to the specifics of this case to determine if the legislators
2. The subpoena to Wahl
¶ 43. Using Justice Harlan's two-step Fourth Amendment analysis, we conclude that there is a reasonable expectation of privacy in the data stored on the backup tapes, and that the August 14, 2002, John Doe judge's subpoena duces tecum, as modified by the subsequent order, is overbroad. Therefore, we also conclude that execution of the subpoena duces tecum, as modified, would constitute an unreasonable search and seizure.
¶ 44. The first part of the two-step reasonableness test is to assess the actual, subjective expectation of privacy. Katz,
¶ 45. The State maintains that the records sought are records of public officials affected by Wis. Stat. § 19.32(2), which provides that at least some of the materials sought are public records and, as such, are
¶ 46. The more difficult question here is whether public employees' and elected officials' expectations of privacy in the electronically stored data they have created or received at work is one society recognizes as reasonable. See Katz,
¶ 47. Technology clearly has changed the ways in which we work and communicate with others. The federal government recognized that changing technology required changing laws, and to address those
¶ 48. Legislators use electronic technology to compose budgets, to prepare position papers, and to draft legislation; they communicate with each other, with their staff members and with their constituents via e-mail and instant messaging. According to the LTSB, the legislative e-mail system processes more than 60,000 transactions each day.
¶ 49. These circumstances — the way in which the legislature now does business; that the LTSB was created to serve legislators on "both sides of the aisle;"
¶ 50. When we examine whether the Fourth Amendment was violated, we determine whether the government intrusion was reasonable. O'Connor,
¶ 51. Here, the subpoena requested all of the data from the computer system of an entire branch of state government in order to investigate whether a crime has been committed. It did not specify the topics or the types of documents in which evidence of a crime might be found.
¶ 52. However, we do not conclude that all documents the John Doe judge seeks in order to investigate whether a crime has been committed are inaccessible. We do, however, require more than a generalized demand for those documents. Because it is clear that another subpoena likely will issue, and because the record before us contains neither the John Doe petition used to initiate the John Doe proceeding nor the affidavit or other showing the district attorney made to obtain the subpoena, we find it necessary to summarize the requirements of the district attorney before any further subpoena is issued. In so doing, we point out that it is the district attorney's burden to provide support to the John Doe judge for a constitutionally sufficient subpoena, as he is the party who commenced the proceeding and sought the subpoena. See Reimann,
3. John Doe subpoena standard
¶ 53. The subpoena power of a John Doe judge is set forth in Wis. Stat. § 968.26. It provides in relevant part:
[T]he judge ... at the request of the district attorney shall, subpoena and examine other witnesses to ascertain whether a crime has been committed and by whom committed. ... A court, on the motion of a district*241 attorney, may compel a person to testify or produce evidence under s. 972.08(1),19 . . . subject to the restrictions under s. 972.085.
Section 968.26 generally applies to the acts of a judge who conducts a John Doe proceeding. The provision relative to subpoenaing witnesses by a judge does not mention the production of documents. However, the last sentence of § 968.26, which applies to a court, not to a judge, does address the production of documents to which the immunity afforded under Wis. Stat. § 972.08(1) attaches. The division of responsibility between a judge and a court in these two provisions is consistent with a John Doe judge's inability to grant the immunity, see Jackson,
¶ 54. Wisconsin Stat. § 968.135 provides in relevant part:
*242 Upon the request of the . . . district attorney and upon a showing of probable cause under s. 968.12, a court shall issue a subpoena requiring the production of documents, as specified in s. 968.13(2).
Section 968.135 refers to subpoenas duces tecum issued by a court, not by a judge. It requires probable cause to believe that the subpoena duces tecum will produce evidence of a crime. See State v. Swift,
¶ 55. Additionally, because the data sought is meant to establish criminal conduct and may be data in which a person has a reasonable expectation of privacy, there must be a particularized showing in the affidavit of the district attorney requesting a subpoena. Cf. Washington,
¶ 56. We conclude by reminding all who participate in John Doe investigations that the power wielded by the government is considerable. Accordingly, there is a potential for infringing on Fourth Amendment and other constitutional rights. Hale,
The final responsibility for the proper conduct of such [John Doe] proceedings rests with the presiding judge, whose obligation it is to ensure that the considerable powers at his or her disposal are at all times exercised with due regard for the rights of the witnesses, the public, and those whose activities may be subject to investigation.
State v. O'Connor,
III. CONCLUSION
¶ 57. We conclude that all of the documents requested are not privileged; that on this record, we cannot determine how Article IY Section 16 of the Wisconsin Constitution relates to the data sought by the subpoena duces tecum and that even when Section 16 does apply, it provides only use immunity and not secrecy for communications of government officials and employees; and that neither the separation of powers doctrine nor Article IY Section 8 is sufficient to excuse compliance with a valid John Doe subpoena. However, because we also conclude that the subpoena is overly
By the Court. — The supervisory writ is granted quashing the subpoena of the John Doe judge.
Notes
All subsequent references to the Wisconsin Statutes are to the 2001-02 version unless otherwise indicated.
Throughout this opinion we will use "communications," "data" and "documents" interchangeably in reference to the electronic databank of the LTSB the subpoena seeks.
The reasons supporting secrecy of the proceedings are: to keep a John Doe target from fleeing; to prevent potential defendants from collecting perjured testimony for trial; to prevent attempts to thwart the investigation, tamper with potential testimony or hide evidence; to free witnesses from the threat of retaliation; and to prevent testimony that may be mistaken or untrue from becoming public. Wisconsin Family Counseling Servs., Inc. v. State,
In this argument, Wahl contends that while he is privileged from producing the data requested, the legislators who created or received the data may not be. However, in other arguments, for example, the argument under Wisconsin Constitution Article W Section 16, he takes the opposite approach and asks us to permit him to raise any defense to production that a legislator could raise.
Both the State and the John Doe judge are parties to this appeal. However, since they are united in interest, we will collectively refer to them as "the State," unless the context requires otherwise.
Privilege is defined as, "[A] special legal right, exemption, or immunity granted to a person or class of persons; an exception to a duty." Black's Law Dictionary 1215 (7th ed. 1999).
As we noted earlier (¶ 11 n.4), Wahl's position about whether he would be privileged to refuse to provide the data if he was permitted to raise all defenses a legislator could raise is not entirely consistent.
We point out, however, that our conclusion in this regard should not be read to mean that there is no privilege that a legislator could ever raise to prevent disclosure of a particular communication now existing on the backup tapes.
The criteria that generally are described as relating to a separation of powers argument based on the contention that the issue is a political question are:
*228 a textually demonstrable constitutional commitment of the issue to a coordinate political department; or a lack of judicially discoverable and manageable standards for resolving [the issue]; or the impossibility of deciding without an initial policy determination of a kind clearly for nonjudicial discretion; or the impossibility of a court's undertaking independent resolution without expressing lack of the respect due coordinate branches of government; or an unusual need for unquestioning adherence to a political decision already made; or the potentiality of embarrassment from multifarious pronouncements by various departments on one question.
Baker v. Carr,
The LTSB was formerly known as the Wisconsin Integrated Legislative Information System (WILIS).
Wahl has stored the backup tapes in a lock-box.
As the Fourth Amendment plainly states, constitutionally sufficient warrants are those "particularly describing the place to be searched, and the persons or things to be seized."
A leading Fourth Amendment commentator noted, "[T]he Framers did not address warrantless intrusions at all in the Fourth Amendment or in the earlier state provisions; thus, they never anticipated that 'unreasonable' might be read as a standard for warrantless intrusions." Paul Taylor, The Scope of Government Access to Copies of Electronic Communications Stored with Internet Service Providers: A Review of Legal Standards, 6 J. Tech. L. & Pol'y 109,126 (Fall 2001) [hereinafter A Review of Legal Standards] (referring to Thomas Y. Davies, Recovering the Original Fourth Amendment, 98 Mich. L. Rev.
The subpoena in Hale v. Henkel demanded:
1. -All understandings, agreements, arrangements, or contracts ... between [the company for which Hale worked and six named companies],
2. All correspondence by letter or telegram between [Hale's company and the six named companies],
*234 3. All reports made or accounts rendered by [the six named companies to Hale's company],
4. Any agreements or contracts or arrangements ... between [Hale's company and certain other companies].
5. All letters received by [Hale's company] since the date of its organization from thirteen other companies . .. and also copies of all correspondence with such companies.
Hale v. Henkel,
Taylor also noted that Congress wanted to encourage the development and proliferation of new communications technology, but knew that in order for such development and proliferation to succeed, consumers needed to trust that their privacy was protected. A Review of Legal Standards, supra, at 126.
Online petitions and e-mail to legislators are what at least one commentator has described as "the Internet-age equivalents of traditional techniques like direct mail and paper petitions." National Public Radio, Political Activists Turn to the Web (November 7,2003), at www.npr.org/display_pages/features /feature_1495180.html.
Because the records sought are computer records, a key word search would not have been too difficult to incorporate into the subpoena. However, while a key word search may have been helpful, the requirements set out in ¶¶ 53-55 below are also necessary to a valid subpoena.
Wis. Stat. § 972.08(1) provides immunity from criminal prosecution based on the self-incriminating nature of the records that one is compelled to produce, thereby affording protection for Fifth Amendment rights.
Concurrence Opinion
¶ 58. (concurring). I write separately. I am concerned that the majority opinion addresses many issues, but comes to few answers that will provide guidance to the litigants and the John Doe judge.
¶ 59. The opinion does conclusively decide that the subpoena is overbroad. The majority opinion discusses the Fourth Amendment at length, but this discussion is not based on any arguments briefed by the parties and is unnecessary to the holding of the case. While I join the court in its conclusion to quash the subpoena, I do not join the discussion regarding Fourth Amendment jurisprudence.
¶ 60. I also write to comment on the issue of production of electronic information. This case involves a subpoena for electronic information and raises many of the same kinds of issues that are raised in discovery of electronic information.
¶ 61. In 2004, most information is kept in digital form, and discovery, preservation, and production of electronic information is one of the leading legal issues facing not only corporate America but also government. Reform in discovery, including electronic discovery, is a priority in several jurisdictions. This court has not previously confronted the issue of discovery of electronic data.
¶ 62. Electronic discovery (or production of electronic information) poses the same problems as conventional discovery (and production) of documents, but also poses unique problems. The volume, number of
¶ 63. The following are recurring themes in the literature on electronic document production: lawyers and judges must become better educated about electronic information and discovery thereof; the parties must meet, confer, and seek to identify the information management system, the people knowledgeable about the system, what information is and is not accessible, and the scope of each party's rights and responsibilities; discovery (production) requests should be as clear as possible about the data being requested; responding parties are in the best position to evaluate the procedures, methodologies, and technologies appropriate for preserving and producing their own electronic data; and trial courts may need to be more active in managing electronic discovery and production than in managing conventional discovery or production of information, especially when parties cannot agree about the scope of the request for electronic information. The literature on electronic discovery is growing both in print and on the Internet.
¶ 65. For the reasons set forth, I write separately.
