Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 9 of 9
Full-Text Articles in Law
Can Dna Be Speech?, Jorge R. Roig
Can Dna Be Speech?, Jorge R. Roig
Jorge R Roig
Iq, Intelligence Testing, Ethnic Adjustments And Atkins, Robert M. Sanger
Iq, Intelligence Testing, Ethnic Adjustments And Atkins, Robert M. Sanger
Robert M. Sanger
The "Progress Clause": An Empirical Analysis Based On The Constitutional Foundation Of Patent Law, Lori Andrews
The "Progress Clause": An Empirical Analysis Based On The Constitutional Foundation Of Patent Law, Lori Andrews
Lori B. Andrews
When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck
When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck
Renée M. Hutchins
Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped …
The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn
The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn
Robert Bloom
In recent months, there have been many revelations about the tactics used by the Bush Administration to prosecute their war on terrorism. These stories involve the exploitation of technologies that allow the government, with the cooperation of phone companies and financial institutions, to access phone and financial records. This paper focuses on the revelation and widespread criticism of the Bush Administration’s operation of a warrantless electronic surveillance program to monitor international phone calls and emails that originate or terminate with a United States party. The powerful and secret National Security Agency heads the program and leverages its significant intelligence collection …
Regulating Choice: A Constitutional Law Response To Professor John A. Robertson's Children Of Choice, Ann Maclean Massie
Regulating Choice: A Constitutional Law Response To Professor John A. Robertson's Children Of Choice, Ann Maclean Massie
Ann MacLean Massie
No abstract provided.
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron
David C. Gray
On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
Danielle Keats Citron
On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …
Somebody's Watching Me: Protecting Patient Privacy In De-Identified Prescription Health Information, Christopher R. Smith
Somebody's Watching Me: Protecting Patient Privacy In De-Identified Prescription Health Information, Christopher R. Smith
Christopher R Smith
Increasingly, legal scholars, state legislatures and the federal courts are examining patient privacy concerns that arise in the context of the dissemination, distribution and use of patient prescription information. However, less attention has been paid to the sharing of de-identified or encrypted patient prescription information versus identifiable patient prescription information. Though many patients may not realize it, identifiable, de-identified and encrypted patient prescription information is being used for a host of purposes other than insurance reimbursement and treatment, most notably for pharmaceutical marketing purposes. Existing state and federal laws and ethical guidelines provide some protection for the privacy of patient …