ORDER
Thе petition for panel rehearing is GRANTED. The opinion filed on August 8, 2006, is withdrawn. The superseding opinion will be filed concurrently with this order. Further petitions for rehearing or rehearing en banc may be filed.
OPINION
We must determine whether an employee has an expectation of privacy in his workplace computer sufficient to suppress images of child pornography sought to be admitted into evidence in a criminal prosecution. If there is such an expectation, we must determine whether the search in this сase was reasonable under the narrow exceptions to the Fourth Amendment’s warrant requirement.
I
A
Frontline Processing (“Frontline”), a company that services Internet merchants by processing on-line electronic payments, is located in Bozeman, Montana. 1 On January 30, 2001, Anthony Cochenour, the owner of Frontline’s Internet-service provider and the fiancé of a Frontline employee, contacted Special Agent James A. Kennedy, Jr. of the FBI with, a tip that a *1186 Frontline employee had acсessed child-pornographic websites from a workplace computer.
Agent Kennedy pursued the report that day, first contacting Frontline’s Internet Technology (“IT”) Administrator, John Softich. One of Softich’s duties at Front-line was to monitor employee use of the workplace computers including their Internet access. He informed Kennedy that the company had in place a firewall, which permitted constant monitoring of the employees’ Internet activities. 2
During the interview, Softich confirmed Cochenour’s report that a Frontline employee had accessed child pornography via the Internet. Softich also reported that he had personally viewed the sites and confirmed that they depicted “very, very young girls in various states of undress.” Softich further informed Kennedy that, according to the Internet Protocol address and log-in information, the offending sites were accessed from a computer in the office of Appellant Jeffrey Brian Ziegler, who had been employed by Frontline as director of operations since August 2000. Softich also informed Kennedy that the IT department had already placed a monitor on Ziegler’s computer to record its Internet traffic by copying its cache files. 3
Agent Kennedy next interviewed William Schneider, Softich’s subordinate in Frontline’s IT department. Schneider confirmed that the IT department had placed a device in Ziegler’s computer that would record his Internet activity. He reported that he had “spot checked” Ziegler’s cache files and uncovered several images of child pornography. A review of Ziegler’s “search engine cache information” also disclosed that he had searched for “things like ‘preteen girls’ and ‘underage girls.’ ” Furthermore, according to Schneider, Frontline owned and routinely monitored all workplace computers. The employees were aware of the IT department’s monitoring capabilities.
B
The parties dispute what happened next. According to testimony that Softich and Schnеider provided to a federal grand jury, Agent Kennedy instructed them to make a copy of Ziegler’s hard drive because he feared it might be tampered with before the FBI could make an arrest. Agent Kennedy, however, denied that he directed the Frontline employees to do anything. According to his testimony, his understanding was that the IT department had already made a backup copy of Ziegler’s hard drive. As the government points out, his notes from the Softich interview say, “IT Dept has backed up JZ’s hard drive to prоtect info.” Thinking that the copy had already been made, Kennedy testified that he instructed Softich only to *1187 ensure that no one could tamper with the backup copy.
Whatever Agent Kennedy’s actual instructions, the Frontline IT employees’ subjective understanding of that conversation seems evident from their actions during the late evening of January 30, 2001. Around 10:00 p.m., Softich and Schneider obtained a key to Ziegler’s private office from Ronald Reavis, the chief financial officer of Frontline, entered Ziegler’s office, opened his computer’s outer casing, and mаde two copies of the hard drive.
Shortly thereafter, Michael Freeman, Frontline’s corporate counsel, contacted Agent Kennedy and informed him that Frontline would cooperate fully in the investigation. Freeman indicated that the company would voluntarily turn over Ziegler’s computer to the FBI and thus explicitly suggested that a search warrant would be unnecessary. 4 On February 5, 2001, Reavis delivered to Agent Kennedy Ziegler’s computer tower (containing the original hard drive) and one of the hard drive copies made by Schneider and Sof-tich. Schneider delivered the second copy sometime later. Forensic examiners at the FBI discovered many images of child pornography.
C
On May 23, 2003, a federal grand jury handed down a three-count indictment charging Ziegler with receipt of child pornography, in violation of 18 U.S.C. § 2252A(a)(2); possession of child pornography, in violation of 18 U.S.C. § 2252A(a)(5)(B); and receipt of obscene material, in violation of 18 U.S.C. § 1462. 5 At arraignment, Ziegler entered a plea of not guilty. ’'
Ziegler filed several pretrial motions. At issue here is Ziegler’s Aрril 23, 2004, motion to suppress the evidence obtained from the search of Ziegler’s workplace computer. Ziegler argued that Agent Kennedy, lacking a warrant, violated the Fourth Amendment by directing the Frontline employees to enter his private office and to search his computer. The government argued that the search was voluntary and therefore private in nature.
On August 10, 2004, the district court held a suppression hearing at which Agent Kennedy and Schneider testified. 6 Agent Kennedy, several times, denied that hе instructed Softich and Schneider to make a copy of Ziegler’s hard drive or to undertake any search in addition to what the employees had already done. Schneider, however, again testified that Kennedy directed him to make a copy, of the hard drive. Schneider’s account was also reflected in a time-line he had prepared for Kennedy. 7
*1188
On September 8, 2004, the district court entered a written order denying Ziegler’s motion to suppress. Importantly, the court made the factual finding that “Agent Kennedy contacted Softich and Schneider on January 30, 2001 and
directed them to make a back-up of Defendant’s computer files.”
(emphasis added). However, citing
United States v. Simons,
Ziegler subsequently entered into a written plea agreement with the government. Pursuant to the agreement, the government agreed to dismiss the child pornography counts in exchange for Ziеgler’s agreement to plead guilty to the receipt of obscene material. The parties conditioned the plea agreement on Ziegler’s ability to appeal the district court’s denial of the pretrial motions, including the motion to suppress. A change of plea hearing occurred on September 24, 2004.
On March 4, 2005, the district court sentenced Ziegler to a two-year term of probation and imposed a fine of $1,000. Ziegler timely filed a notice of appeal.
II
Ziegler’s sole сontention on appeal is that the January 30, 2001, entry into his private office to search his workplace computer violated the Fourth Amendment and, as such, the evidence contained on the computer’s hard drive must be suppressed. 8
A
Ziegler argues that “[t]he district court erred in its finding that Ziegler did not have a legitimate expectation of privacy in his office and computer.” He likens the workplace computer to the desk drawer or file cabinet given Fourth Amendment protection in сases such as
O’Connor v. Ortega,
The government, of course, views the matter quite differently. It contends that the district court’s ruling was correct— Ziegler did not have an objectively reasonable expectation of privacy in his workplаce computer. The government argues in its brief:
Society could not deem objectively reasonable that privacy interest where an employee uses a computer paid for by the company; [sic] Internet access paid for by the company, in the company office where the company pays the rent.... This is certainly even more so true where the company has installed a *1189 firewall and a whole department of people whose job it was to monitor their employee’s Internet activity.
As we know, the Fourth Amendment protects people, not places.
Katz v. United States,
In that vein, a criminal defendant may invоke the protections of the Fourth Amendment only if he can show that he had a
legitimate
expectation of privacy in the place searched or the item seized.
Smith v. Maryland,
The threshold question then is whether Ziegler had a legitimate expectation of privacy in the arеa searched or the object seized. If he had no such expectation, we need not consider whether the search was reasonable.
1
The government does not contest Ziegler’s claim that he had a subjective expectation of privacy in his office and the computer. The use of a password on his computer and the lock on his private office door are sufficient evidence of such expectation.
See United States v. Bailey,
2
But Ziegler’s expectation of privacy in his office and workplace computer must also have been objectively reasonable. The seminal case addressing the reasonable expectations of private employees in the workplace is
Mancusi v. DeFOrte,
Mancusi
compels us to recognize that in the private employer context, employees retain at least some expectation of privacy in their offices.
Id.See also O’Con-nor v. Ortega,
Furthermore, Ziegler’s expectation of privacy in his office was reasonable on the facts of this case. His office was not shared by co-workers, and kept locked.
See Schowengerdt v. United States,
Because Ziegler had a reasonable expectation of privacy in his office, any search of that space and the items located therein must comply with the Fourth Amendment. 9
Ill
The next step is to inquire whether there was a search or seizure by the government. We need not dwell upon this matter too long. Given the district court’s factual findings, we treat Softich and Schneider as de factо government agents.
See United States v. Reed,
IV
A
The remaining question is whether the search of Ziegler’s office and the copying of his hard drive were “unreasonable” within the meaning of the Fourth Amendment. As in
Mancusi,
the government does not deny that the search and seizure were without a warrant, and “it is settled for purposes of the Amendment that ‘except in certain carefully defined classes of cases, a search of private property without proper cоnsent is ‘unreasonable’ unless it has been authorized by a valid search warrant.’ ”
Mancusi,
*1191
One well-settled exception is where valid consent is obtained by the government.
Davis v. United States,
B
We first consider whether Front-line exercised common authority over the office and the workplace computer such that it could validly consent to a search.
Mancusi
is again instructive. In
Mancu-si,
the Supreme Court recognized that in his office, DeForte retained an expectation “that records would not be taken [by the police] except with his permission or that of his union superiors.”
We are also convinced that Frontline could give valid consent to a search of the contents of the hard drive of Ziegler’s workplace computer because the computer is the type of workplace property that remains within the control of the employer “even if the employee has placed personal items in [it].”
Ortega,
The workplace computer, however, is quite different from the piece of personal luggage which the Court described in Ortega. Although use of each Frontline computer was subject to an individual log-in, Schneider and other IT-department employees “had complete administrative access to anybody’s machine.” The company had also installed a firewall, which, according to Schneider, is “a program that monitors Internet traffic ... from within the organization to make sure nobody is visiting any sites that might be unprofession *1192 al.” Monitoring was routine, and the IT department reviewed the log .created by the firewall “[o]n a regular basis,” sometimes daily if Internet traffic was. high enough to warrant it. Finally, upon their hiring, Frontline employees were apprised of the company’s monitoring efforts through training and an employment manual, and they were told that the computers were company-owned and not to be used for activities of a personal nature.
In this context, Ziegler could not reasonably have expected that the computer was his personal property, free from any type of control by his employer. The contents of his hard drive, like the files in
Mancusi,
C
The remaining question is, given Frontline’s ability to consent to a search, did it consent to a search of the office and the computer. We conclude that it did. The exact type of employer consent that was absent in Mancusi clearly exists in this case. While the district court found that Softich and Schneider actеd at the direction of Agent Kennedy, the record shows that Softich and Schneider received consent to search the office and the keys to the office from the Chief Financial Officer of Frontline Ronald Reavis. Schneider testified:
[W]hen I returned from the meeting with Agent Kennedy, I spoke to John Softich, and then we, in turn, both went up and spoke to Ronald Reavis. Explained the situation to him. Said that, you know, [the FBI] wanted a backup made of this information, that we were going to do it sometime at night to make sure that wе were undisturbed. And he said that as an officer of the company, he was okay with that, and he said that we could go forward and do that. He gave me his-a key to the building and to the offices, and then I came in sometime after 10 o’clock and did the copy.
In addition, Softich testified that Reavis had authorized them to make the copy of the hard drive. Softich was asked, “So Ron [Reavis] gave [Schneider] the key and said, Go do this?” Softich answered in the affirmative.
This testimony makes clear that Ziegler’s superiors at Frontline, in particular Reavis, an officer of the company, gave consent to a search of the property that the company owned and which was not of a personal nature.
10
See United States v. Gargiso,
V
Although Ziegler retained a legitimate expectation of privacy in his workplace office, Frontline retained the ability to con *1193 sent to a search of Ziegler’s office and his business computer. And because valid third party consent to search the office and computer located therein was given by his employer, the district court’s order denying suppression of the evidence of child pornography existing on Ziegler’s computer is
AFFIRMED.
Notes
. Although the district court referred to the company as "Front Line,” we use the single-word formulation which more frequently appears in the record.
. A firewall is a piece of "computer hardware or software that prevents unauthorizеd access to private data (as on a company’s local area network or intranet) by outsider computer users (as of the Internet).” MERRIAM-WEBSTER’S COLLEGIATE DICTIONARY 471 (11th ed.2003). It can also be "programmed to analyze the network traffic flowing between [a] computer and the Internet”; it then "compares the information it monitors with a set of rules in its database,” and "[i]f it sees something not allowed ... the firewall can block and prevent the action.” NEWTON’S TELECOM DICTIONARY 392 (22nd ed.2006). Further, "[m]ost firewall programs let you adjust the rules to allow certain types of data to flow freely back and forth without interference.” Id.
. A cache is "a computer memory with very short access time used for storage of frequently or recently used instructions or data.” MERRIAM-WEBSTER’S COLLEGIATE DICTIONARY 171 (11th ed.2003). "[I]nformation is cached by placing it closer to the user or user application in order to make it more readily and speedily available....” NEWTON’S TELECOM DICTIONARY 189 (22nd ed.2006).
. Agent Kennedy explained that this cooperation was the reason he did not pursue a search warrant. He testified, "At this point, counselor, evеrybody at Frontline Processing is telling me they’re going to cooperate, so I’m not going to go in and start serving search warrants on a company if they're going to cooperate. I have no desire to do that.”
. No explanation appears in the record for the two year, three month interval between delivery of the computer to the FBI and issuance of the indictment. In any event, Ziegler does not raise any issue regarding such delay.
. The defense also offered the testimony of a cоmputer forensics expert, but that testimony was not relevant to the motion to suppress.
. On appeal, the government attempts to reconcile the contradictory accounts of the January 30, 2001, interview as a case of simple miscommunication. It explains that confusion ensued when Schneider told Agent Kennedy that they were Copying Ziegler's cache files onto a second hard drive. Kennedy, whom the government characterizes as not particularly tech-sawy, allegedly understood Schneider to mean that the IT department had already made a copy of Ziegler’s entire *1188 hard drive. Thus, it suggests that Agent Kennedy's instructions were only that the IT employees should secure the copy he thought had already been made.
There is, in short, a factual dispute concerning the extent of the government's involvement in the search and a corresponding legal dispute as to whether that involvement implicates the Fourth Amendment.
See United States v. Miller,
. We review de novo the district court's denial of Ziegler's motion to suppress.
United States v. Noushfar,
. Had the company computer assigned to Ziegler for his business-use only been physically located outside a private office, we might have had to consider whether Ziegler had reasonable expectation of privacy in the device itself, in the face of a corporate policy of monitoring the corporate computers. See
Muick v. Glenayre Electronics,
. Here, the Frontline employees may have felt under some pressure to cooperate with Agent Kennedy, but "this alone does not render [the employees’] behavior involuntary.”
United States v. Black,
