X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

HERVEY, J., delivered the opinion of the Court in which KELLER, P.J., KEASLER, RICHARDSON, NEWELL, and WALKER, JJ., joined. YEARY, J., filed a dissenting and concurring opinion. KEEL, J., concurred. SLAUGHTER, J., dissented. O P I N I O N The Stored Communications Act (the SCA) is a federal statute through which the State can obtain historical cell site location information (CSLI) showing the location of a cell phone dozens of times a day up to five years in the past. A court can order such records disclosed if the government shows “specific and articulable facts . . . that there are reasonable grounds to believe that the . . . records or other information sought, are relevant and material to an ongoing criminal investigation.” 18 U.S.C. § 2703(d). Christopher James Holder, Appellant, was charged with capital murder. During the course of the investigation, police accessed 23 days of his CSLI to corroborate his alibi that he was out of town when the victim was killed. But Appellant lied. The records showed that he was near the victim’s house at the time of the murder. After he was arrested and charged, Appellant filed two motions to suppress. In one[1] of them, he alleged that the “specific and articulable” statutory standard was not met and that the records should have been suppressed because accessing the CSLI violated Article I, Section 9 of the Texas Constitution.[2] The trial court denied the motion. On direct appeal, the court of appeals affirmed the trial court’s rulings. Holder v. State, No. 05-15-00818-CR, 2016 WL 4421362 (Tex. App.—Dallas Aug. 19, 2016) (not designated for publication). On discretionary review, Appellant argues that the court of appeals was wrong on both accounts. We agreed to review his SCA claim, but not his Article I, Section 9 claim. Due to intervening legal developments, however, we retrospectively granted Appellant’s Article I, Section 9 claim and ordered briefing from the parties. Holder v. State, PD-1269-16, 2019 WL 5445198 (Tex. Crim. App. Oct. 23, 2019) (per curiam) (ordering briefing on Appellant’s Article I, Section 9 issue). FACTUAL BACKGROUND[3] In the summer of 2012, Appellant and his girlfriend, Casey James, moved into Billy Tanner’s home with James’s two children. Tanner was James’s ex-stepfather.[4] By October, Appellant’s and James’s relationship soured, and Tanner asked Appellant to move out. Appellant moved into his tattoo shop in Irving, but James and her daughters continued to live in Tanner’s home. In early November, James spoke to Appellant and told him that one of her daughters, C.J., told her that Tanner was “nasty” and that he slept without his underwear. James asked Appellant if he had ever seen Tanner act inappropriately around C.J., and he said that he had. According to Appellant, he never said anything to James though because James was in the room when it happened. James concluded that Tanner had not been inappropriate after she and a friend of hers spoke to C.J. The next time James spoke to Appellant, she told him that she would be out of town between November 9 and November 11 and that her kids were going to stay with one of her friends while she was gone.[5] When James returned to Tanner’s home on November 11 at about 8:00 p.m., she thought that something was wrong. The garage-door opener did not work, and Tanner’s truck was not at the house, which was surprising because he was normally home at 8:00 p.m. on a Sunday. She entered the house through a sliding glass door in the back, and when she walked in, it was pitch black, which was unusual, and there was a horrible smell. She also noticed that someone had hung a blanket over the sliding glass door that had partially fallen and that there was “liquid running down the hallway.” Investigators later discovered that someone had tried to burn the house down. James[6] was afraid and went back to her vehicle where her two children were sleeping. She called her mother, who told her to call the police. James called the police, and they responded to the possible burglary. Police found Tanner’s body in the house. According to one officer, it looked like the body had “been there awhile . . . .” He had suffered blunt-force trauma to the head and was stabbed twenty times. A stab wound to Tanner’s neck was inflicted post-mortem, and Tanner had defensive-type wounds on his hands. There was blood all over his body and around it. Police concluded that the murder was a crime of passion, not a burglary gone wrong, even though Tanner’s wallet had been stolen.[7] They also found two black latex gloves on the kitchen table, which James said were not there when she left for the weekend. James had never seen black latex gloves at the house or seen Tanner with black latex gloves. But on Facebook there was a picture of Appellant wearing similar black latex gloves while he was tattooing someone, and DNA testing showed that “it would be extremely unlikely that anyone other than [Appellant] was a major contributor from [the] three glove swabs.” The morning of November 12, police obtained a court order directing AT&T Wireless (AT&T) to disclose call log and CSLI records showing the location of Appellant’s cell phone between October 20 and November 12, but an AT&T representative declined to produce them because, according to them, the court order had to be based on probable cause. After changing the phrase “reasonable [8] suspicion” to “probable cause,” the petitioning officer took the new order to a judge, who signed it.[9] According to the officer, “[i]t was simpler for [him] to just change the wording[,] have it re-signed[,] and bother the judge one more time . . . .” The second petition stated that, Pursuant to the authority of article 18.21, Section 5, Texas Code of Criminal Procedure, Petitioner hereby makes written application for a Court Order to obtain the below-listed records or information pertaining to a subscriber or customer of the below-listed electronic communication service. The following records or information are sought: Any and all records regarding the identification of a AT&T Wireless user with the assigned telephone number of: . . . to include subscriber’s name, address, date of birth, status of account, account history, call detail records, including tower information for calls made or received, for the period of October 20, 2012 through November 12, 2012, service address and billing address, ANI, method of payment and information on any and all other numbers assigned to this account or this user in the past or present. Affiant also requests that this order allow for the precision location/GPS location of the cellular handset to be provided for a period of 20 days beginning November 12, 2012. * * * Petitioner has probable cause that the above records or information are relevant to a current, on-going police investigation of the following offense or incident: Death Investigation — Texas PC 19.03 The cellular telephone was used by a possible suspect to communicate with unknown persons and obtaining the locations of the handset will allow investigators to identify if this suspect was in the area at the time of the offense and will provide investigators leads in this case. AT&T then emailed Plano police 23 days of Appellant’s call log and historical CSLI records from between October 20 and November 12. That same day, police interviewed Appellant and asked him where he was the weekend of November 9 and whether he had his cell phone with him. Appellant responded that he was in Irving and that he had his cell phone with him. Police then confronted Appellant with the CSLI showing that he was in Tanner’s coverage area multiple times that weekend, which contradicted his story that he was out of town. Suddenly, Appellant remembered that he was near Tanner’s house that weekend, but he was only there to buy drugs and never went to Tanner’s house. The police asked Appellant about Tanner and C.J., and Appellant told them that “children shouldn’t be molested.” The call log records showed that Tanner was alive until at least 2:35 p.m. on November 10 because that is when he ended a phone call with his parents.[10] The records also showed that, between 3:28 p.m. and 4:16 p.m. the same day, Appellant’s cell phone connected to the tower that “best served” Tanner’s home. (According to the State, this is when Tanner was killed.) By 4:16 p.m., Appellant’s cell phone had left the area, but it reentered the area at 12:41 a.m. on November 11. Appellant’s phone was pinging in Tanner’s coverage area until 12:44 a.m. From 12:44 a.m. to 2:11 a.m., there was no activity on Appellant’s phone. At 2:11 a.m., the phone pinged a tower near the parking garage where police found Tanner’s abandoned truck. In January, a Tarrant County fire investigator told Plano detectives that an inmate named Thomas Uselton (Uselton) had information about the murder. Uselton told the detectives that he had known Appellant for a few years and that Appellant called him on November 10 around 2:00 p.m. or 3:00 p.m. because he wanted to buy drugs. According to Uselton, Appellant sounded “real hysterical, like real hyper.” Uselton said that Appellant called him back later that day and asked him to help with “something” and that he agreed. Appellant rode with his ex-girlfriend to Fort Worth to pick up Uselton.[11] After they picked him up, she drove them to Appellant’s tattoo parlor, where Appellant picked up some bleach and black latex gloves, then to Tanner’s house. According to Uselton, when they entered Tanner’s house, Appellant hugged him and told him that “[h]e’s dead. We ain’t got to worry about it.” Uselton asked who was dead, but then he saw Tanner’s body around the corner. Appellant said, “[T]hink about our family, bro. You know what it is if you say anything.” Uselton asked what Tanner did, and Appellant responded that “He molested a little girl.” Uselton understood Appellant’s comment as an admission that he killed Tanner. Uselton said that Appellant’s ex-girlfriend picked them up at the parking garage in Irving where police found Tanner’s abandoned truck. While Appellant and Uselton waited, Uselton “spray[ed] everything down with bleach.” When Appellant’s ex-girlfriend arrived, they went back to Appellant’s tattoo shop. Uselton went to a nearby convenience store to buy some cigarettes and a drink. When he returned, he overheard Appellant’s ex-girlfriend ask Appellant in another room, “Why did you do it?” He replied that he “had to.” Uselton also told police other details about the crime that were not public. For example, he told police that Appellant unplugged the garage-door opener at Tanner’s house, that he helped Appellant cover up windows and the sliding glass door with blankets, and that he helped Appellant pour gas around the house. THE STORED COMMUNICATIONS ACT We recently decided that suppression is not an available remedy for nonconstitutional violations of the Stored Communications Act. Sims v.[12] State, 569 S.W.3d 634, 642 (Tex. Crim. App. 2019). Consequently, even if the State did not meet the SCA’s “specific and articulable facts” statutory standard, as Appellant claims, the CSLI should not be suppressed on that basis. Id. We overrule Appellant’s statutory ground for review and turn to his constitutional claim. ARTICLE I, SECTION 9 a. Law Article I, Section 9 states that “the people shall be secure in their persons, houses, papers and possessions, from all unreasonable seizures or searches” and that “no warrant to search any place, or to seize any person or thing, shall issue without describing them as near as may be, nor without probable cause, supported by oath or affirmation.” TEX. CONST. art. I, § 9. It also protects certain expectations of privacy. Hankston v. State, 517 S.W.3d 112, 117 (Tex. Crim. App. 2017). A person has an expectation of privacy under Article I, Section 9 if he has a subjective privacy interest that society recognizes as objectively reasonable. Id. Article I, Section 9 and the Fourth Amendment are almost identically worded, but this Court interprets the Texas Constitution by “our own lights.” [13] Olson v. State, 484 S.W.2d 756, 762 (Tex. Crim. App. 1969). For example, we have held that there is no implicit warrant requirement in Article I, Section 9.[14] Hulit, 982 S.W.3d at 436. When determining whether to apply Fourth Amendment precedent to Article I, Section 9, we have often noted the striking similarities between the two provisions and that they protect the same right to the same degree, but the touchstone of our analysis is whether the Supreme Court’s reasoning makes more sense than the alternatives. Crittenden[15] v. State, 899 S.W.2d 668, 673 (Tex. Crim. App. 1995). We faced that situation in Crittenden. There, we had to decide the standard to apply to pretextual stops under Article I, Section 9. We discussed three alternatives: the Fourth Amendment objective approach, the subjective approach, and the modified-objective approach. Ultimately, we decided to adopt the Fourth Amendment objective approach because “the objective approach clearly makes more sense” than the alternatives. Id. Recently, when faced with deciding whether a person has a protected privacy interest in his CSLI, we said that it made more sense to apply the Fourth Amendment third-party doctrine to CSLI under Article I, Section 9 than the alternative, which was to apply our precedent, holding that a person has greater privacy rights under Article I, Section 9 than the federal Constitution when it comes to pen registers. Richardson, 865 S.W.2d at 951. (A pen register captures numbers dialed on a landline telephone.) We decided to apply the third-party doctrine to CSLI because we concluded in Ford v. State, 477 S.W.3d 321 (Tex. Crim. App. 2015) that the Supreme Court would apply the doctrine to historical CSLI under the Fourth Amendment. Hankston, 517 S.W.3d at 120 (“[I]f we are not going to find that the acquisition of cell phone records is a search under the Fourth Amendment [in Ford], then we are not going to find that the acquisition of cell phone records is a search under [Article I, Section 9].”) (footnote omitted) (relying on Ford, 477 S.W.3d at 321). b. Review on Our Own Motion After we decided in Hankston that a person does not have an expectation of privacy in his CSLI because of the third-party doctrine, Hankston successfully petitioned the United States Supreme Court to vacate our judgment. The Court did so in light of its decision in Carpenter v. United States, 138 S. Ct. 2206 (2018), in which it held that the Fourth Amendment third-party doctrine does not apply to CSLI.[16] In light of those developments, we retrospectively granted review of Appellant’s constitutional claim on our own motion and ordered briefing to clarify whether the third-party doctrine should apply to CSLI under Article I, Section 9. We begin by reviewing Carpenter. c. Carpenter 1. CSLI Background The Supreme Court began its decision with a discussion of the nature of CSLI records. Because that discussion is critical to our resolution of this case, we quote it in its entirety, There are 396 million cell phone service accounts in the United States—for a Nation of 326 million people. Cell phones perform their wide and growing variety of functions by connecting to a set of radio antennas called “cell sites.” Although cell sites are usually mounted on a tower, they can also be found on light posts, flagpoles, church steeples, or the sides of buildings. Cell sites typically have several directional antennas that divide the covered area into sectors. Cell phones continuously scan their environment looking for the best signal, which generally comes from the closest cell site. Most modern devices, such as smartphones, tap into the wireless network several times a minute whenever their signal is on, even if the owner is not using one of the phone’s features. Each time the phone connects to a cell site, it generates a time-stamped record known as cell-site location information (CSLI). The precision of this information depends on the size of the geographic area covered by the cell site. The greater the concentration of cell sites, the smaller the coverage area. As data usage from cell phones has increased, wireless carriers have installed more cell sites to handle the traffic. That has led to increasingly compact coverage areas, especially in urban areas. Wireless carriers collect and store CSLI for their own business purposes, including finding weak spots in their network and applying “roaming” charges when another carrier routes data through their cell sites. In addition, wireless carriers often sell aggregated location records to data brokers, without individual identifying information of the sort at issue here. While carriers have long retained CSLI for the start and end of incoming calls, in recent years phone companies have also collected location information from the transmission of text messages and routine data connections. Accordingly, modern cell phones generate increasingly vast amounts of increasingly precise CSLI. Carpenter, 138 S. Ct. at 2211–12. The Court noted that, whether a person has a recognized expectation of privacy in his CSLI records “lie[s] at the intersection of two lines of cases . . . ,” the first dealing with a person’s physical movements and location, and the second dealing with people who voluntarily turn over their records to a third party. Id. at 2214–15. 2. Physical Movements and Location In the first set of cases, the Court examined its decisions in United States v. Knotts, 460 U.S. 276 (1983) and United States v. Jones, 565 U.S. 400 (2012). In Knotts, the Supreme Court held that monitoring a person’s location through the use of a surreptitiously planted radio transmitter (a beeper) to track a person’s movements and location was not a Fourth Amendment search if the transmitter was in a public place. Knotts, 468 U.S. at 285. But it noted that using a transmitter in a private place to track a person’s movements and location might constitute a Fourth Amendment search. Id. at 283–84. It said that its holding was based on “the ‘limited use which the government made of the signals from this particular beeper’ during a discrete ‘automotive journey’” and that different constitutional principles might be applicable if “twenty-four hour surveillance of any citizen of this country [were] possible.” Carpenter, 138 S Ct. at 2215 (punctuation in original) (citing Knotts, 468 U.S. at 283–84). In United States v. Jones, 565 U.S. 400 (2012), the Court addressed whether police violated the Fourth Amendment when they attached a GPS device onto Jones’s vehicle without a warrant, then monitored the vehicle’s movements twenty-four hours a day for 28 days. Id. at 404-005. The Court found in favor of Jones, but its holding was not based on the Katz expectation-of-privacytest; it was based on the Fourth Amendment physical-trespass theory—the police violated Jones’s Fourth Amendment rights when they attached a GPS device to his vehicle, his private property. Id. The Carpenter Court noted, however, that five justices also agreed that “‘longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy’—regardless of whether those movements were disclosed to the public at large.’” Id. at 2215. 3. Third-Party Doctrine In the second line of cases, the Supreme Court discussed United States v. Miller, 425 U.S. 435 (1976) and Smith v. Maryland, 442 U.S. 735 (1979). In Miller, the Court held that it was not a Fourth Amendment search when the Government, during a tax evasion investigation, subpoenaed copies of canceled checks, deposit slips, and monthly statements. Miller, 425 U.S. at 446. The Court reasoned that Miller did not own or possess the records; rather, they were third-party business records. Id. at 442. It also said that the records at issue “were ‘not confidential communications but negotiable instruments to be used in commercial transactions’” and that “the bank statements contained information ‘exposed to [bank] employees in the ordinary course of business.’” Id. In Smith, the Supreme Court applied the third-party doctrine to the Government’s use of a pen register. Smith, 442 U.S. at 742. The Court held that a person does not have an expectation of privacy in dialed phone numbers because the person “realize[s] that they must ‘convey’ phone numbers to the telephone company, since it is through the telephone company switching equipment that their calls are completed.” Id. 4. CSLI is Different The Court found all the cases to be distinguishable. It reasoned that CSLI presents even greater privacy concerns than following people through public thoroughfares or attaching a GPS tracker to a vehicle because cell phones are “almost a ‘feature of human anatomy” that “track[] nearly exactly with the movements of its owner,” and, “[w]hile individuals regularly leave their vehicles, they compulsively carry cell phones with them all the time. A cell phone faithfully follows its owner beyond public thoroughfares and into private residences, doctor’s offices, political headquarters, and other potentially revealing locales.” Carpenter, 138 S. Ct. at 2218. It continued that, “when the Government tracks the location of a cell phone[,] it achieves near perfect surveillance, as if it had attached an ankle monitor to the phone’s user,” and it concluded that giving the Government access to such records contravenes society’s expectation “that law enforcement agents and others would not—and indeed, in the main, simply could not—secretly monitor and catalogue every single movement of an individual’s car for a very long period.” Id. at 2217–18. Not only does CSLI “hold for many Americans the ‘privacies of life,’” the Supreme Court explained, accessing CSLI is  ”easy, cheap, . . . efficient compared to traditional investigative tools,” and it can be accessed at practically no expense. Id. Further, unlike GPS location information, historical CSLI is retrospective up to five years and “runs against everyone,” meaning that the “police need not even know in advance whether they want to follow a particular individual, or when. Whoever the suspect turns out to be, he has effectively been tailed every moment of every day for five years . . . . Only the few without cell phones could escape this tireless and absolute surveillance.” Id. The Supreme Court also said that CSLI records are an “entirely different species of business record” that “implicate[] basic Fourth Amendment concerns about arbitrary government power much more directly than corporate tax or payroll ledgers” and that “[c]ell phone location information is not truly ‘shared’ as one normally understands the term.” Id. at 2222. Unlike the records at issue in Miller and Smith, it reasoned, CSLI records are created “without any affirmative act on the part of the user beyond powering up” and that, “[a]part from disconnecting the phone from the network, there is no way to avoid leaving behind a trail of location data. As a result, in no meaningful sense does the user voluntarily ‘assume[ ] the risk’ of turning over a comprehensive dossier of his physical movements.” Id. at 2220. Lastly, it was concerned that, if the third-party doctrine was applied to CSLI, the Government could access that information “by subpoena for no reason other than ‘official curiosity.’” Id. at 2222. Ultimately, the Supreme Court declined to apply the third-party doctrine to CSLI and held that the Government undertook a Fourth Amendment search when it accessed Carpenter’s CSLI. Id. at 2221. d. Analysis The question we must answer now is whether the Supreme Court’s analysis in Carpenter is persuasive, or whether we should take the position that Texas citizens have less privacy rights under the Texas Constitution than the United States Constitution based on a Supreme Court doctrine that even it has declined to apply to CSLI. We think that it makes more sense to adopt the Supreme Court’s reasoning in Carpenter and to no longer apply the third-party doctrine to CSLI records under Article I, Section 9.[17] Generally, “[a]bsent some significant difference in the text of the two provisions, or some historically documented difference in attitude between the respective drafters,” “[w]e will not read Article I, [Section] 9 differently than the Fourth Amendment in a particular context simply because we can.” Hankston, 517 S.[18] W.3d at 115 (quoting Crittenden, 899 S.W.2d at 673 n.8). But there is no significant difference in the text of Article I, Section 9 and the Fourth Amendment, and we are unaware [19] of any historically documented difference in which the Framers of the 1876 Texas Constitution (or the framers of prior Texas constitutions for that matter) thought that Texas citizens should enjoy less protection from unreasonable searches and seizures under the Texas Constitution than the United States Constitution. Our research shows that our framers shared the same concerns as the Framers of the United States Constitution, including their disdain for general warrants.[20] In fact, the first Texas prohibition on unreasonable searches and seizures, unlike the Fourth Amendment, specifically cited general warrants, which were widely condemned as dangerous to liberty because they permitted authorities to search wherever and seize whomever they desired without evidence of criminal activity.[21] CONST. OR FORM OF GOV’T OF THE STATE OF TEX. art. V (1833). The framers of later Texas constitutions incrementally changed the language of that prohibition until it was almost identical to the Fourth Amendment. We also note that the Framers of the 1845 Texas Constitution moved the prohibition from the Declaration of Rights to the new Bill of Rights (Article I, Section 9), which was modeled after the first eight amendments of the federal Bill of Rights. J.E. Ericson, Origins of the Texas Bill of Rights, 62 SW. HIST. Q. 457, 458 (Apr. 1959); compare U.S. CONST. amends. I–VIII, with TEX. CONST. art. I. If it was logical in our original Hankston opinion to apply the Fourth Amendment third-party doctrine to CSLI because of the similarities of the Fourth Amendment and Article I, Section 9, and because we predicted that the Supreme Court would do so when it decided Carpenter, it would be illogical to abandon that reasoning[22] today if the only difference was that the Supreme Court decided Carpenter in a way that we did not expect. But that is not the only difference. The Supreme Court exhaustively analyzed the privacy issues implicated by CSLI, which we did not do in our original Hankston opinion, and we share the Court’s grave concerns about the Government’s ability to use a continuous, surreptitious, precise, and permeating form of surveillance to continually track its citizens’ every move retrospectively for up to five years. The same privacy concerns are implicated regardless of whether CSLI is accessed under the Fourth Amendment or Article I, Section 9. Further, we have reviewed the constitutional debates in Texas, which we did not previously do, and they show no intention on the part of our framers for Texas citizens to have less protection from unreasonable searches and seizure under the Texas Constitution than the United States Constitution.[23] Despite all of this, we could continue to apply the Fourth Amendment third-party doctrine, but we think that doing so would, at best, amount to us being different just because we can. See Crittenden, 899 S.W.2d at 673 n.8 (declining to interpret Article I, Section 9 differently than the Fourth Amendment “simply because we can“) (emphasis in original). So we decline to do so. We hold that the third-party doctrine alone cannot defeat a person’s expectation of privacy in at least 23 days of historical CSLI under Article I, Section 9. Having decided that Appellant had a protected privacy interest in his CSLI, the next question is whether the search was nonetheless reasonable. TEX. CONST. art. I, § 9. As we have previously noted, post-Carpenter, a warrant is generally needed under the Fourth Amendment to access seven or more days CSLI information,[24] but there is no implied warrant requirement in Article I, Section 9. Hulit, 982 S.W.2d at 436. The pertinent inquiry is simply whether the search was reasonable under the totality of the circumstances “after considering the public and private interests that are at stake . . . .”[25] Id. The private interest at stake here is Appellant’s right to be free from unreasonable searches of his historical CSLI records. The public interest at stake is the State’s conventional interest in investigating and prosecuting crimes. Generally, an Article I, Section 9 search is unreasonable absent probable cause, exigent circumstances, or some other recognized law-enforcement need. Here, because the State was acting in its traditional crime-fighting role, and it did not allege exigent circumstances or some other recognized law-enforcement need, the search had to be supported by probable cause to be reasonable. However, the State concedes that the petition does not support a probablecause finding.[26] We agree.[27] HARM Having concluded that the seizure of Appellant’s historical CSLI was unreasonable under Article I, Section 9 and that the trial court should have granted Appellant’s motion to suppress, the next question is whether Appellant was harmed when the trial court failed to suppress the records under Article 38.23(a). We do not reach that issue, however. Instead, we remand this cause to the court of appeals for it to address the issue in the first instance. CONCLUSION Because we conclude that Appellant had a reasonable expectation of privacy under Article I, Section 9 in the 23 days of his CSLI accessed by the State, we reverse the judgment of the court of appeals, but we remand the cause for the lower court to determine whether Appellant was harmed by the erroneous admission of the CSLI records.[28] Delivered: March 11, 2020 Publish

 
Reprints & Licensing
Mentioned in a Law.com story?

License our industry-leading legal content to extend your thought leadership and build your brand.

More From ALM

With this subscription you will receive unlimited access to high quality, online, on-demand premium content from well-respected faculty in the legal industry. This is perfect for attorneys licensed in multiple jurisdictions or for attorneys that have fulfilled their CLE requirement but need to access resourceful information for their practice areas.
View Now
Our Team Account subscription service is for legal teams of four or more attorneys. Each attorney is granted unlimited access to high quality, on-demand premium content from well-respected faculty in the legal industry along with administrative access to easily manage CLE for the entire team.
View Now
Gain access to some of the most knowledgeable and experienced attorneys with our 2 bundle options! Our Compliance bundles are curated by CLE Counselors and include current legal topics and challenges within the industry. Our second option allows you to build your bundle and strategically select the content that pertains to your needs. Both options are priced the same.
View Now
September 18, 2024 - September 19, 2024
Dallas, TX

Join General Counsel and Senior Legal Leaders at the Premier Forum Designed For and by General Counsel from Fortune 1000 Companies


Learn More
October 15, 2024
Dallas, TX

The Texas Lawyer honors attorneys and judges who have made a remarkable difference in the legal profession in Texas.


Learn More
April 29, 2024 - May 01, 2024
Aurora, CO

The premier educational and networking event for employee benefits brokers and agents.


Learn More

Atlanta s John Marshall Law School is seeking to hire one or more full-time, visiting Legal WritingInstructors to teach Legal Research, Anal...


Apply Now ›

Shipman is seeking an associate to join our Labor & Employment practice in our Hartford, New Haven, or Stamford office. Candidates shou...


Apply Now ›

Evergreen Trading is a media investment firm headquartered in NYC. We help brands achieve their goals by leveraging their unwanted assets to...


Apply Now ›
04/15/2024
Connecticut Law Tribune

MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS


View Announcement ›
04/11/2024
New Jersey Law Journal

Professional Announcement


View Announcement ›
04/08/2024
Daily Report

Daily Report 1/2 Page Professional Announcement 60 Days


View Announcement ›