Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Entire DC Network
Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin
Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin
Richmond Public Interest Law Review
In Part I, this article explores the challenges to privacy, personhood and probable cause raised by DNA collection as identification sanctioned in Maryland v. King. Part II considers the presumed infallibility of DNA testing that undergirds the Supreme Court's embracement of genetic identification. Lastly, in Part III, this article will try to decipher the Court's Fourth Amendment logic in denying privacy to the information in human cells but embracing them in cell phones in Riley v. California
Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, Mark Obesnshain
Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, Mark Obesnshain
Richmond Public Interest Law Review
This article examines Virginia’s Privacy Expectation Afterlife and Choices Act. Part I surveys federal legislation and proposed uniform legislation that attempts to protect digital assets and records. Part II examines opposition to proposed legislation and another proposed law: the Privacy Expectation Afterlife and Choices Act. Part III details Virginia’s final version of the Privacy Expectation Afterlife and Choices Act. Part V concludes the Article.
Protecting The Ivory Tower: Sensible Security Or Invasion Of Privacy, Stephen D. Lichtenstein
Protecting The Ivory Tower: Sensible Security Or Invasion Of Privacy, Stephen D. Lichtenstein
Richmond Public Interest Law Review
Our beginning point is a recognition that the modern American college is not an insurer of the safety of its students. Whatever may have been its responsibility in an earlier era, the authoritarian role of today's college administrations has been notably diluted in recent decades. Trustees, administrators, and faculties have been required to yield to the expanding rights and privileges of their students. By constitutional amendment, written and unwritten law, and through the evolution of new customs, rights formerly possessed by college administrations have been transferred to students. College students today are no longer ninors; they are now regarded as …
Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky
Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky
Richmond Public Interest Law Review
According to the Virginia Department of State Police, there has been a legislative effort in 2008 and 2009 over the past two years to ensure that essential data from protective orders1 is entered into the Virginia Criminal Information Network ("VCIN") immediately upon the order's issuance. While data entry may seem like a dull topic, the following story highlights the dire significance of this seemingly mundane task.
Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran
Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran
Richmond Public Interest Law Review
In sum, the Court has in recent years balanced the degree of government intrusion of the individual or place searched against the government's need for the search. This article addresses some of the questions posed by the evolution of the Fourth Amendment doctrine in light of terrorist concerns since 9/11. Part II will address the history of Fourth Amendment jurisprudence, from the Boyd Era of property protection and the use of general warrants to discover evidence of crime, to Olmstead and the development of the right of privacy under the Fourth Amendment. Part III will address the modern test under …