Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Psychotherapist And Patient In The California Supreme Court: Ground Lost And Ground Regained, Stanley Mosk Nov 2012

Psychotherapist And Patient In The California Supreme Court: Ground Lost And Ground Regained, Stanley Mosk

Pepperdine Law Review

No abstract provided.


Substance And Method In The Year 2000, Akhil Reed Amar Oct 2012

Substance And Method In The Year 2000, Akhil Reed Amar

Pepperdine Law Review

No abstract provided.


The Fourth Amendment And The Stored Communications Act: Why The Warrantless Gathering Of Historical Cell Site Location Information Poses No Threat To Privacy , Kyle Malone Sep 2012

The Fourth Amendment And The Stored Communications Act: Why The Warrantless Gathering Of Historical Cell Site Location Information Poses No Threat To Privacy , Kyle Malone

Pepperdine Law Review

No abstract provided.


Do Automobile Passengers Have A Legitimate Expectation Of Privacy? An Analysis Of Reasonable Expectation Under The Fourth Amendment - People V. Howard, Lisa Belrose Aug 2012

Do Automobile Passengers Have A Legitimate Expectation Of Privacy? An Analysis Of Reasonable Expectation Under The Fourth Amendment - People V. Howard, Lisa Belrose

Touro Law Review

No abstract provided.


Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright Jul 2012

Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright

Pepperdine Law Review

No abstract provided.


Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson Mar 2012

Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson

Pepperdine Law Review

For at least thirty years the Supreme Court has adhered to its third-party doctrine in interpreting the Fourth Amendment, meaning that so far as a disclosing party is concerned, information in the hands of a third party receives no Fourth Amendment protection. The doctrine was controversial when adopted, has been the target of sustained criticism, and is the predominant reason that the Katz revolution has not been the revolution many hoped it would be. Some forty years after Katz the Court's search jurisprudence largely remains tied to property conceptions. As I have demonstrated elsewhere, however, the doctrine is not the …


International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon Feb 2012

International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon

Pepperdine Law Review

No abstract provided.


The Missed Opportunity Of United States V. Jones: Commercial Erosion Of Fourth Amendment Protection In A Post Google Earth World, Mary Graw Leary Jan 2012

The Missed Opportunity Of United States V. Jones: Commercial Erosion Of Fourth Amendment Protection In A Post Google Earth World, Mary Graw Leary

Scholarly Articles

The Fourth Amendment protects people from unreasonable searches and seizures by the government. These protections, therefore, are only triggered when the government engages is a “search” or “seizure.” For decades, the Court defined “search” as a government examination of an area where one has a “reasonable expectation of privacy.” Such an expectation requires both that the individual demonstrate a subjective expectation of privacy and that the expectation is one society finds reasonable. In 1974, Anthony Amsterdam prophesized the unworkability of this test, warning of a day that the government would circumvent it my merely announcing 24 hour surveillance. Similarly, the …


Expectations Of Privacy In Social Media, Stephen E. Henderson Dec 2011

Expectations Of Privacy In Social Media, Stephen E. Henderson

Stephen E Henderson

This article, which largely tracks my remarks at Mississippi College’s Social Media Symposium, examines expectations of privacy in social media such as weblogs (blogs), Facebook pages, and Twitter tweets. Social media is diverse and ever-diversifying, and while I address some of that complexity, I focus on the core functionality, which provides the groundwork for further conversation as the technology and related social norms develop. As one would expect, just as with our offline communications and other online communications, in some we have an expectation of privacy that is recognized by current law, in some we have an expectation of privacy …