Open Access. Powered by Scholars. Published by Universities.®
- File Type
Articles 1 - 3 of 3
Full-Text Articles in Law
Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman
Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman
Timothy A Wiseman
Encryption is commonly used to protect private information, for both legitimate and illegitimate reasons. Courts have been struggling to determine when, within the bounds of the Fourth and Fifth Amendments, the Courts may compel a defendant in a criminal case to decrypt their data.
This article argues that a broad use of the Forgone Conclusion doctrine would permit the Courts to order a defendant to decrypt their data when the prosecution can show with reasonable particularity the existence and location of the encrypted documents, that they are likely to be incriminating, and that the government can authenticate them without the …
Social Media And Legal Ethics, Jonathan I. Ezor
Social Media And Legal Ethics, Jonathan I. Ezor
Jonathan I. Ezor
A presentation on the legal issues arising out of attorney use of social media services, including for electronic discovery
Admissibility Of Electronic Documents, Curtis E.A. Karnow
Admissibility Of Electronic Documents, Curtis E.A. Karnow
Curtis E.A. Karnow
A comprehensive inventory of issues involved in the introduction of electronic evidence, including practical alerts