Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Constitutional Law

Selected Works

Stephen E Henderson

Technology

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Learning From All Fifty States: How To Apply The Fourth Amendment And Its State Analogs To Protect Third Party Information From Unreasonable Search, Stephen E. Henderson Dec 2005

Learning From All Fifty States: How To Apply The Fourth Amendment And Its State Analogs To Protect Third Party Information From Unreasonable Search, Stephen E. Henderson

Stephen E Henderson

We are all aware of, and many commentators are critical of, the Supreme Court's third-party doctrine, under which information provided to third parties receives no Fourth Amendment protection. This constitutional void becomes increasingly important as technology and social norms dictate that increasing amounts of disparate information are available to third parties. But we are not solely dependent upon the Federal Constitution. We may have more constitutional protection as citizens of states, each of which has a constitutional cognate or analog to the Federal Fourth Amendment. As Justice Brennan urged in a famous 1977 article, those provisions should be interpreted to …


Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson Dec 2004

Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson

Stephen E Henderson

The Fourth Amendment to the United States Constitution prohibits unreasonable searches and seizures. Yet as interpreted by the United States Supreme Court, the Amendment places no restriction on police combing through financial records; telephone, e-mail and website transactional records; or garbage left for collection. Indeed there is no protection for any information knowingly provided to a third party, because the provider is said to retain no reasonable expectation of privacy in that information. As technology dictates that more and more of our personal lives are available to anyone equipped to receive them, and as social norms dictate that more and …