Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Entire DC Network
On Bargaining For Development, Timothy M. Mulvaney
On Bargaining For Development, Timothy M. Mulvaney
Timothy M. Mulvaney
In his recent article, Bargaining for Development Post-Koontz, Professor Sean Nolon concludes that the Supreme Court’s recent ill-defined expansion of the circumstances in which land use permit conditions might give rise to takings liability in Koontz v. St. John’s River Water Management District will chill the state’s willingness to communicate with permit applicants about mitigation measures. He sets out five courses that government entities might take in this confusing and chilling post-Koontz world, each of which leaves something to be desired from the perspective of both developers and the public more generally.
This responsive essay proceeds in two parts. First, …
Legislative Exactions And Progressive Property, Timothy M. Mulvaney
Legislative Exactions And Progressive Property, Timothy M. Mulvaney
Timothy M. Mulvaney
Exactions — a term used to describe certain conditions that are attached to land-use permits issued at the government’s discretion — ostensibly oblige property owners to internalize the costs of the expected infrastructural, environmental, and social harms resulting from development. This Article explores how proponents of progressive conceptions of property might respond to the open question of whether legislative exactions should be subject to the same level of judicial scrutiny to which administrative exactions are subject in constitutional takings cases. It identifies several first-order reasons to support the idea of immunizing legislative exactions from heightened takings scrutiny. However, it suggests …
United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko
United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko
Greg Sergienko
Five years ago, in a contribution to these pages, I suggested that the Supreme Court's oldest precedents and the original intent of the framers of the Constitution precluded the use of evidence produced under a grant of immunity against the producer, even though the material produced included documents that the producer had not been compelled to write. This implied that information concealed with a cryptographic key could not be used in a criminal prosecution against someone from whom the key had been obtained under a grant of immunity. The issue, however, was doubtful given the tendency of the Court to …
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
The [̶T̶A̶K̶I̶N̶G̶S̶] Keepings Clause: An Analysis Of Framing Effects From Labeling Constitutional Rights, Donald J. Kochan
The [̶T̶A̶K̶I̶N̶G̶S̶] Keepings Clause: An Analysis Of Framing Effects From Labeling Constitutional Rights, Donald J. Kochan
Donald J. Kochan