250 F.3d 980 | 6th Cir. | 2001
Lead Opinion
OPINION
With certain exceptions, the federal wiretap act criminalizes and creates civil liability for intentionally intercepting electronic communications without a judicial warrant. This case was brought under the federal wiretapping act, known as the Electronic Communications Privacy Act, 18 U.S.C. §§ 2510-2522. It raises the question of whether the police department may tap a police officer’s pager without a warrant or notice to the officer. The police department, through use of a duplicate or “clone” pager, tapped without a warrant the plaintiffs pager provided' by the department because it erroneously thought he was assisting drug dealers. The case turns on what is meant when the Act uses the phrase “in the ordinary course of business” to create two exceptions to the prohibition against wiretapping.
In the present case it is both clear and conceded that the definition of “intercept” in the Act includes pagers within the language “acquisition of the contents of any ... electronic ... device.”
(5) “electronic, mechanical, or other device” means any device or apparatus which can be used to intercept a wire, oral, or electronic communication other than—
*983 (a) any telephone or telegraph instrument, equipment or facility, or any component thereof, (i) furnished to the subscriber or user by a provider of wire or electronic communication service in the ordinary course of its business and being used by the subscriber or user in the ordinary course of its business or furnished by such subscriber or user for connection to the facilities of such service and used in the ordinary course of its business; or (ii) being used by a provider or wire oi’ electronic communication service in the ordinary course of business, or by an investigative or law enforcement officer in the ordinary course of his duties.
18 U.S.C. § 2510(5) (emphasis added).
The first problem is what the underlined phrase “other than” (normally an adverbial phrase, see Webster’s Third Int’l Diet (1958)) is supposed to modify. Does it modify the immediately preceding action “to intercept [an] ... electronic device,” or does it act as an adjective, modifying “device or apparatus” or does it modify some other action or thought not expressed in clear language? The second problem is: does the use of “in-the-ordinary-course-of-business” language, as an exception, imply, and therefore mean, that the tapping of the communication is so routine, customary or well accepted that the parties to the tapped communication would, should or did know of the tap. We will deal with these two issues of interpretation below.
1. The Meaning of the Phrase “Other Than.” — There is no discussion in the case law of what the phrase “other than” in the statutory definition of “electronic, mechanical or other device” is to modify. Its dictionary label as an adverbial phrase would indicate that it is to modify the immediately preceding verb phrase “to intercept a wire, oral, or electronic communication.” This does not make sense when read with the language that follows it.
If “other than” modifies “used to intercept ... electronic communication,” the scope of the “other than” exception would be as broad as the statute itself. This means, therefore, that “other than” must modify the nouns “device or apparatus.” The language immediately following “other than” is “any telephone or telegraph, or any component thereof,” all of which are also nouns. A better word choice than the “other than” phrase probably would have been “excluding” because subparts (a) and (b) to § 2510(5) are exclusions to the main definition. In any event, the cases discussing these exceptions apply “other than” this way, and it is the only way that makes sense.
2. Exceptions to Liability.— We conclude that the exceptions do not apply to this case. Both the “ordinary course of business” exception, or “business use” exception as it is also called, as well as the law enforcement exception, require that the interception of a communication be undertaken by employers or law enforcement agencies in the ordinary course of their businesses using equipment provided by a communications carrier as part of the communications network. For this exception to apply, we must find, first, that the equipment used to make the interception be “furnished to the subscriber or user by a provider of wire or electronic communication service in the ordinary course of its business and being used by the subscriber or user in the ordinary course of its business ...” § 2510(5)(a)(i). Although plaintiff raises the issue of whether a clone pager fits within the definition prescribed in the exception, it is clear that the clone pager, a piece of electronic communication equipment, was provided to the City by MobileComm, a Bell South company, in the ordinary course of
The second part of the exception requires that the clone pager be used in “the ordinary course” of the police department’s business. “Ordinary course of business” is not defined in the statute, but it generally requires that the use be (1) for a legitimate business purpose, (2) routine and (3) with notice. There is some disagreement in the case law about whether “covert” monitoring can ever be in the “ordinary course of business.” Although we do not find that the statute requires actual consent for the exception to apply, we do hold that monitoring in the ordinary course of business requires notice to the person or persons being monitored. Because it is undisputed here that plaintiff was not given any notice that his pager was being monitored, the exceptions cannot apply.
Most courts interpreting these exceptions have held that advance notice in some form is necessary. “What is ordinary is apt to be known; it imports implicit notice.” Amati v. City of Woodstock, 176 F.3d 952, 955 (7th Cir.), cert denied, — U.S. -, 120 S.Ct. 445, 145 L.Ed.2d 362 (1999). In Bohach v. City of Reno, 932 F.Supp. 1232 (D.Nev.1996), police officers claimed that the police department’s retrieval of stored messages generated by their pagers was a violation of the Act. The court held that the officers had no reasonable expectation of privacy when the police department warned pager users in advance that their messages would be logged on the network. In Sanders v. Robert Bosch Corp., 38 F.3d 736, 740-42 (4th Cir.1994), the Fourth Circuit held that recording all telephone conversations on certain lines after bomb threats were received by the company was not in the ordinary course of business where the employees did not receive notice of the recording.
Defendants here did not routinely monitor officers’ pagers or give notice to officers that random monitoring of their department-issued pagers was possible. We disagree with defendants to the extent that they contend that plaintiff impliedly consented to the interception of his pages by the clone pager simply because he accepted and used a department-issued pager. The general policy of the department that department-issued equipment, which includes the pager, was not to be “converted to personal use” cannot provide the necessary notice to officers to find consent to surreptitious interception of their messages by clone pagers. The so-called policy prohibiting personal use cannot form an after-the-fact justification for intercepting plaintiffs pager where the policy had not been enforced and the department conceded it was aware that pagers were used by many members of the force for personal use.
We do not find any need under the facts presented here to analyze the “business use” and “law enforcement” exceptions separately. Congress most likely carved out an exception for law enforcement officials to make clear that the routine and almost universal recording of phone lines by police departments and prisons, as well as other law enforcement institutions, is exempt from the statute. See First v. Stark Cnty. Bd. of Comm’rs, No. 99-3547, 2000 WL 1478389 (6th Cir. Oct.4, 2000). Such a system routinely and indiscriminately records all phone activity in and out of the police department. This practice is well known in the industry and in the general public, and the courts have ruled that even prisoners are entitled to some form of notice that such conversations may be monitored or recorded. United States v. Paul, 614 F.2d 115 (6th Cir.1980); see also, e.g., United States v.
3. Municipal Liability Under the Privacy Act. — Plaintiff seeks to hold the City liable under the wiretapping act, as well as Jeffrey Kruithoff, a police department employee. Defendants raise the question of whether the City is a “person” for purposes of the Act. The statute defines “person” as “any employee, or agent of the United States or any State or political subdivision thereof, and any individual, partnership, association, joint stock company, trust or corporation.” 18 U.S.C. § 2510(6).
Most courts addressing the issue have held that the 1986 amendments indicate that a governmental entity may be liable in a civil suit under the Act. Organizacion JD Ltda. v. United States Dep’t of Justice, 18 F.3d 91, 94-95 (2d Cir.1994); Conner v. Tate, 130 F.Supp.2d 1370, 1374-75 (N.D.Ga.2001); Dorris v. Absher, 959 F.Supp. 813, 819-20 (M.D.Tenn.1997) (municipal liability exists), aff'd in part on other grounds and rev’d in part, 179 F.3d 420 (6th Cir.1999) (claims against county were settled prior to appeal and therefore not addressed on appeal); PBA Local No. 38 v. Woodbridge Police Dep’t, 832 F.Supp. 808, 822-23 (D.N.J.1993).
Only the Seventh Circuit has ruled to the contrary. Amati v. City of Woodstock, 176 F.3d 952, 956 (7th Cir.), cert. denied, — U.S. -, 120 S.Ct. 445, 145 L.Ed.2d 362 (1999). It based its cursory decision to exempt governmental entities from liability under the Act solely on the plain language of the definition of “person” in the statute, which does not expressly include governmental entities; but it did not deal with the meaning of the word “entity.” Finding no ambiguity, it refused to look to the legislative history. But we look to the legislative history in order to give meaning to the word “entity,” which was added to the definition in 1987.
The provision of the Act providing for civil liability, section 2520,
Based on the amendments to the statute and the legislative history behind them, as well as the case law considering the issue, we hold that governmental entities may be liable under 18 U.S.C. § 2520. Finding that a municipality may be liable under the
4. The Fourth Amendment. — Plaintiff also claims that monitoring his pager through use of the clone pager constitutes an illegal “search and seizure” in violation of his Fourth Amendment rights, actionable through 42 U.S.C. § 1983. The defendants argued, and the district court agreed, that plaintiff had no right to privacy in his department-issued pager and that no Fourth Amendment violation occurred.
Supreme Court precedent makes it clear that courts should avoid unnecessary adjudication of constitutional issues. Ashwander v. Tennessee Valley Authority, 297 U.S. 288, 347, 56 S.Ct. 466, 80 L.Ed. 688 (1936) (Brandéis, J., concurring) (“The Court will not pass on a constitutional question, although properly presented by the record, if there is also present some other ground upon which the case may be disposed of.”). Accord United States v. Vaughn, No. 97-3539, 1998 WL 774004, *3, 248 F.3d 1154 (6th Cir. Oct.13, 1998). Where a statutory or nonconstitutional basis exists for reaching a decision, as it does here, it is not necessary to reach the constitutional issue.
One application of this doctrine is the principle of statutory construction that states that a comprehensive statute, like the federal wiretapping statute, designed to protect specific constitutional values may be read to provide the exclusive remedies in the field so long as the statute itself suffers no constitutional infirmity. Sutherland Statutory Construction § 499-500 (1984 ed.). See, e.g., Preiser v. Rodriguez, 411 U.S. 475, 489-90, 93 S.Ct. 1827, 36 L.Ed.2d 439 (1973) (although § 1983 by its terms was literally applicable to prisoners’ actions, some actions lie under habeas corpus as “the more specific act”); Lee v. Hughes, 145 F.3d 1272, 1276-77 (11th Cir.1998) (given comprehensive statutory scheme established by Civil Service Reform Act, federal officer was precluded from raising § 1983 claim); NAACP, Detroit Branch v. Detroit Police Officers Ass’n, 900 F.2d 903, 912-13 (6th Cir.1990) (plaintiff cannot bring claims under §§ 1981 and 1983 that fall within Title VII’s parameters). The Electronic Communications Privacy Act is part of detailed legislative scheme under Title III of the Omnibus Crime and Control Act of 1986. The legislation seeks to balance privacy rights and law enforcement needs, keeping in mind the protections of the Fourth Amendment against unreasonable search and seizure. Congress made the Act the primary vehicle by which to address violations of privacy interests in the communication field. Berry v. Funk, 146 F.3d 1003, 1013 (D.C.Cir.1998) (citing City of Milwaukee v. Illinois, 451 U.S. 304, 314, 101 S.Ct. 1784, 68 L.Ed.2d 114 (1981)). No claim is made that the statute is unconstitutional or that it is less protective of privacy rights than the Fourth Amendment. The plaintiff makes no claim that Fourth Amendment rights, as they relate to wiretapping, are broader or more comprehensive than the federal statute. There is no difference between the conduct relevant to plaintiffs statutory claim and the conduct relevant to his constitutional claim. Because no argument is made that the substantive or remedial standards provided by the Fourth Amendment differ from the federal statute, we do not reach any question of interpretation under the Fourth Amendment. All such constitutional issues are pretermitted.
5. Qualified Immunity for Kruithoff. — As an alternative to affirming summary judgment, Kruithoff urges us to affirm the district court as to him on the
CONCLUSION
For the foregoing reasons, we reverse the district court’s grant of summary judgment to defendants, affirm the denial of plaintiffs partial motion for summary judgment and remand to the district court for further proceedings.
. Section 2510(4) says: " 'intercept' means the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device....”
. 18 U.S.C. § 2520 provides:
Except as provided in 2511(2)(a)(ii), any person whose wire, oral or electronic communication is intercepted, disclosed, or intentionally used in violation of this chapter may in a civil action recover from the person or entity which engaged in that violation such relief as may be appropriate.
Dissenting Opinion
concurring in part and dissenting in part.
The panel majority has reversed the district court’s grant of summary judgment to the defendant-appellees, finding that the electronic monitoring at issue in this case did not fall within one of the statutory exclusions provided by the federal wiretapping laws. In so doing, the panel majority has disregarded the plain language of the controlling statute by imputing a notice requirement into the ordinary course of business and law enforcement tests of the federal wiretapping laws. Because I am persuaded that the officers of the City of Battle Creek Police Department monitored David Adams’s use of his alphanumeric pager in the ordinary course of its business, see 18 U.S.C. § 2510(5)(a)(i), and in the ordinary course of exercising their law enforcement duties, see 18 U.S.C. § 2510(5)(a)(ii), I respectfully dissent.
Plaintiff-Appellant David Adams (“Adams”) has served as a law enforcement officer
In 1995, Sgt. Patrick Alspaugh (“Als-paugh”), head of the Special Investigations Unit,
Alspaugh had assigned Officer Kathy Klomparens (“Klomparens”), a member of the Special Investigations Unit, to these cases. Alspaugh subsequently learned that Adams and Klomparens had had frequent contacts outside of the workplace. Alspaugh also learned that Adams may have been a close confidant of one of the targets of the unsuccessful narcotics investigations. Recalling the earlier allegations against Adams, Alspaugh requested of Jeffrey Kruithoff (“Kruithoff’), then-Deputy Chief of Police, that Adams’ official pager be cloned in order to determine if Klom-parens was informing Adams of the status of the active investigations. The parties have disputed whether Kruithoff authorized the use of the cloned pager.
As Adams was paged" by unidentified third parties, Alspaugh wrote down the numbers. He then attempted to determine if any of the numbers matched any of Klomparens’s personal phone or pager numbers. Alspaugh intercepted one text message which informed Adams of the time and place of a police funeral. Because the cloned pager had not provided any incriminating information, Alspaugh destroyed the list after four or five days and discontinued monitoring the cloned pager. Alspaugh then contacted a member of the Federal Bureau of Investigation, who informed him that Alspaugh’s surreptitious monitoring of Adams’ pager may have been illegal. Alspaugh promptly re-" turned the cloned pager to the telecommunications concern.
In 1996, Michael Lind, an intelligence officer,
On March 9, 1998, Adams filed the instant complaint,
The sensitive nature of information relating to drag trafficking investigations is obvious; maintenance of its confidentiality essential to the success of the mission and safety of law enforcement officers. Suspicion that plaintiff may have been involved in leaking drug raid information to drug traffickers was understandably a matter of grave concern to Detective Sergeant Patrick Als-paugh, Supervisor of the Special Investigations Unit, whose concern prompted the cloning of plaintiffs pager. It was also a matter of much greater significance to the police department’s “business” than an employee’s improper use • of a telephone for personal purposes. Moreover, the extent of the intrusion was minimal. The monitoring was based on particularized suspicion of wrongdoing, lasted only 10-14 days, and yielded, with the exception of one verbal message concerning a police memorial service, merely a listing of telephone numbers from which plaintiff was called. No monitoring of conversations took place. The recorded telephone numbers were found not to be incriminating and the monitoring was voluntarily discontinued.
Under these circumstances, as to which there is no genuine issue of material fact, the Court holds the subject monitoring of plaintiffs pager, limited in duration and minimally intrusive, was justified by a valid business purpose.
Adams v. City of Battle Creek, et al., No. 98cv233, slip op. at 8-9, 1999 WL 425885 (W.D. Mich. April 28, 1999). The district court further held that Adams’ Fourth Amendment rights were not violated by the defendants’ surreptitious monitoring as he had no reasonable expectation of privacy in the use of his departmentally-provided pager.
Summary judgment should “be rendered ... if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to a judgment as a matter of law.” Federal Rule of Civil Procedure 56(c); Celotex Corp. v. Catrett, 477 U.S. 317, 322, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986). “[Sjummary judgment will not lie if the dispute about a material fact is ‘genuine,’ that is, if the evidence is such that a reasonable jury could return a verdict for the nonmoving party.” See Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 252, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986); Ezzo’s Investments, Inc. v. Royal Beauty Supply, Inc., 243 F.3d 980, 985 (6th Cir.2001). Courts presented with motions for summary judgment must eonsid
Wiretapping or monitoring electronic communications has been illegalized and is subject to civil and criminal penalties. See 18 U.S.C. § 2511(l)(a) (“Except as otherwise specifically provided in this chapter any person who-(a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication [is subject to penalties described in 18 U.S.C. § 2511(4)(a).]”). In defining the term “electronic, mechanical, or other device,”
“electronic, mechanical, or other device” means any device or apparatus which can be used to intercept a wire, oral, or electronic communication other than—
(a) any telephone or telegraph instrument, equipment or facility, or any component thereof, (i) furnished to the subscriber or user by a provider of wire or electronic communication service in the ordinary course of its business and being used by the subscriber or user in the ordinary course of its business or furnished by such subscriber or user for connection to the facilities of such service and used in the ordinary course of its business;13 or (ii) being used by a provider of wire or electronic communication service in the ordinary course of its business, or by an investigative or law enforcement officer in the ordinary course of his duties[.]14
18 U.S.C. § 2510(5).
The panel majority has determined that those exceptions apply only when a legitimate purpose supports the monitoring, the monitoring is routine, and the monitoring officials have given actual notice to those being monitored.
Courts have required notice of the possibility of monitoring in cases where the quantum of the asserted business or law enforcement interest is low. See, e.g., Sanders v. Robert Bosch Corp., 38 F.3d 736, 741-42 (4th Cir.1994) (“In short, there is no business reason asserted for the decision not to notify all the Guards-mark employees of the use of the voice logger.”). However, when confronted with more substantial justifications, courts have permitted businesses to monitor without advance notice. See, e.g., Briggs v. American Air Filter Co., Inc., 630 F.2d 414, 420 n.9 (5th Cir.1980) (“Since the specific justification advanced here is so closely tied to a legitimate business purpose, we have no hesitation holding that there is nothing extraordinary about McClure’s act of listening in. Were the business justification less compelling, the absence of any company policy or prior warnings concerning use of company telephones might be more significant.”); Arias v. Mutual Central Alarm, Service, Inc., 202 F.3d 553, 559 (2d Cir.2000) (“Whether notice is required depends on the nature of the asserted business justification, and here, where the recording is at least in part intended to deter criminal activity, the absence of notice may more effectively further this interest.”); Berry v. Funk, 146 F.3d 1003, 1009 (“[If] covert monitoring is to take place it must itself be justified by a valid business purpose, or, perhaps, at least must be shown to be undertaken normally”).
Moreover, the panel majority has ignored an express provision of the Wiretapping Act in holding that actual notice is required: the Wiretapping Act does not prohibit electronic eavesdropping where one of the parties has consented to the monitoring. See 18 U.S.C. § 2511(l)(c) (“It shall not be unlawful under this chapter for a person acting under color of law to intercept a wire, oral, or electronic communication, where such person is a party to the communication or one of the parties
Given the fact that the ordinary course exclusions require the reviewing court to engage in a reasonableness analysis as to the nature, scope, and justification of the monitoring, it is important to note the circumstances surrounding the instant monitoring. In order to maintain the integrity of their drug investigations,
. Until 1993, Adams served as a patrolman. In 1993, Adams was promoted to the position of detective.
. The police department had given Adams a copy of departmental policy which indicated "Department issued equipment, supplies and uniforms, will at no time be converted [to] personal use.” The police department had notified Adams that "[it was] the policy of the Police Department to perform regular audits and inspections of all department issued equipment. These inspections ensure proper maintenance and use of all department equipment and supplies.”
. The Special Investigations Unit of the City of Battle Creek Police Department is primarily responsible for narcotics investigations.
. The police department would station officers outside these residences. These officers would then monitor the residences in the hours preceding any given search.
. Kruithoff has claimed that then-Chief of Police Thomas Pope authorized the use of the cloned pager. As this matter has come before this court on an appeal of the district court's order granting defendants' motion for summary judgment, it will be assumed for the purposes of this opinion that Kruithoff authorized the use of the cloned pager.
. Lind had applied to law school in 1996 and had disclosed on his law school application that he may have criminally violated the federal wiretapping laws. Lind felt it necessary to apprise Adams of his possibly felonious conduct.
. In addition to learning of the monitoring, Adams discovered that Kruithoff had had an affair with Adams' wife in 1990. Adams has contended that this affair prompted the monitoring of Adams' cloned pager.
. All claims against Pope were voluntarily dismissed on February 23, 1999.
. See 18 U.S.C. § 2511(a) (“Except as otherwise specifically provided in this chapter any person who-(a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication [is subject to penalties described in 18 U.S.C. § 2511(4)(a).]”).
. This claim was voluntarily dismissed on September 8, 1998.
. The district court dismissed Adams’ other claims without prejudice as the district court declined to exercise supplemental jurisdiction over them in the absence of any federal claims. See 28 U.S.C. § 1367(c).
. " '[Ijntercept' means the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device." 18 U.S.C. § 2510(4).
. This provision is normally referred to as the "business use exception” or the "extension phone exception.”
. This provision is normally referred to as the "law enforcement exception” or the "prison phone exception.”
. Law enforcement is the "business” of the City of Battle Creek Police Department. But see Amati, 176 F.3d at 955 ("[The business use exception] is intended for situations in which a business or other entity, presumably one not involved in law enforcement (for otherwise this exclusion would duplicate the one for eavesdropping in the ordinary course of law enforcement), records calls to or from its premises in order to monitor performance by its employees.”). The panel majority has imputed to the law enforcement section a solitary purpose-that of excluding from the act’s coverage the law enforcement practice of monitoring inmate phone calls — without any evidence that Congress intended that the exception be so limited. The cases which it has cited in support of that proposition have merely ruled that the law enforcement exception applies to inmate phone calls. None of the cases have limited the purview of the law enforcement exception to those circumstances.
.While the law enforcement exception has no such requirement, the business use exception requires that the electronic monitoring device be provided in the course of the pro
. The panel majority cites Amati v. City of Woodstock, 176 F.3d 952 (7th Cir.1999), and Sanders v. Robert Bosch Corp., 38 F.3d 736 (4th Cir.1994), as support for their mandate that notice is required. Neither case supports requiring notice as a sine qua non element of the ordinary course test. In fact, Amati expressly held otherwise: "The plaintiffs argue that wiretapping cannot be 'in the ordinary course of law enforcement' unless there is express notice to the people whose conversations are being listened to. The statute does not say this, and it cannot be right." Amati, 176 F.3d at 955. The Sanders court’s analysis makes clear that the court was balancing the asserted business interest against the employee’s interest in advance notice:
"Covert use of a surveillance device must be justified by' a valid business purpose. Here, the justification advanced for the ongoing interception of telephone calls, i.e., the fear of bomb threats, does not in any way explain the fact that Bosch failed to inform any Guardsmark personnel, other than the supervisors, of the use of the voice logger. In short, there is no business reason asserted for the decision not to notify all the Guardsmark employees of the use of the voice logger.”
Sanders, 38 F.3d at 741-42 (footnotes omitted). The panel majority has also cited a district court case, Bohach v. City of Reno, 932 F.Supp. 1232 (D.Nev.1996), which did not deal with the exclusions at issue here, but instead focused on 18 U.S.C. § 2701 which permits internet service providers to store and retrieve electronic messages. See Bohach, 932 F.Supp. at 1236-1237.
. The panel majority places talismanic reliance on the notion that the monitoring must be routine. However, that would encourage businesses to record all phone calls when the asserted business justification required only limited monitoring. Such a result would be an unnecessary infringement on the privacy of any “innocent bystanders.” See Briggs, 630 F.2d at 420 n. 9 ("A general practice of surreptitious monitoring would be more intrusive on employees' privacy than monitoring limited to specific occasions.”).
. The department has provided numerous reports of allegations of Adams' involvement in drug activity. The fact that none of these allegations have been proven is not disposi-tive. Rather, the issue is whether, given the seriousness of these allegations and the harm which could occur to narcotics investigators if these allegations were true, defendants acted in the ordinary course of their duties.
. Adams has contended that the true motive for the cloning of the pager was far more involved than the purpose proffered by the appellees. Adams has alleged that Kruithoff monitored his activity because he had had an affair with Adams' wife a few years earlier. Indeed, Kruithoff has admitted having an affair with Adams’ wife. And, for the purpose of reviewing the instant motion for summary judgment, it is reasonable to infer that Krui-thoff indeed authorized the use of the cloned pager. However, it is undisputed that Als-paugh, not Kruithoff, raised concerns about Adams’ possible role in sabotaging the drug investigations. It is undisputed that Als-paugh, not Kruithoff, maintained control of the cloned pager. Moreover, it is undisputed that Alspaugh did not provide Kruithoff (or anyone else) with a copy of the list he created during the course of the monitoring.
. The circumstances in Briggs provide a commercial analog to those in this case: the
. Because I find that the implicated activity is within the exceptions provided by the act, I do not reach the issue as to whether the act contemplates holding police departments liable for the malfeasance of their employees. In addition, because I find that the district court properly awarded summary judgment in favor of the defendants, I would affirm the lower court’s consequent denial of the plaintiff’s motion for summary judgment.
. I concur in the majority’s disposition of the Fourth Amendment claim and the qualified immunity issue.