Does the investigator read the contents of private ‘chat’ history, email messages, and other such private, one-on-one communications that are not posted to a public ‘wall’ in any way? What about email- are applicants required to provide all email accounts and log-in so that the investigator can review all received and sent email as well as contact names? How about the cell phone- does the investigator require the applicant to hand over their cell phone so that they can review all text messages, call logs, applications installed and browser history?
Does the investigator read the contents of private ‘chat’ history, email messages, and other such private, one-on-one communications that are not posted to a public ‘wall’ in any way? What about email- are applicants required to provide all email accounts and log-in so that the investigator can review all received and sent email as well as contact names? How about the cell phone- does the investigator require the applicant to hand over their cell phone so that they can review all text messages, call logs, applications installed and browser history?