Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Cell Phone Location Data And The Fourth Amendment: A Question Of Law, Not Fact, Susan Freiwald Dec 2010

Cell Phone Location Data And The Fourth Amendment: A Question Of Law, Not Fact, Susan Freiwald

Susan Freiwald

In a significant ruling in the fall of 2010, the Third Circuit Court of Appeals rejected the government’s claim that it could compel cell phone service providers to disclose customer records that indicate the cell towers with which a cell phone has communicated (cell phone location information or CSLI) without obtaining a warrant based on probable cause. In a break with past decisions, the court rejected application of a “third party rule,” under which cell phone users are seen to assume the risk that their providers will disclose location data without the protections of a warrant requirement. The court, however, …


Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia Dec 2007

Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia

Susan Freiwald

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Electronic Surveillance At The Virtual Border, Susan Freiwald Dec 2007

Electronic Surveillance At The Virtual Border, Susan Freiwald

Susan Freiwald

A virtual border divides people into two groups: those subject to the Fourth Amendment’s protections when the U.S. government conducts surveillance of their communications and those who are not. The distinction derives from a separation in powers: inside the virtual border, U.S. citizens and others enjoy the extensive oversight of the judiciary of executive branch surveillance. Judges review such surveillance before, during, and after it transpires. Foreign persons subject to surveillance in foreign countries fall within the executive branch’s’ foreign affairs function. However, the virtual border does not exactly match the physical border of the United States. Some people inside …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Dec 2006

The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Susan Freiwald

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …


A First Principles Approach To Communications' Privacy, Susan Freiwald Dec 2006

A First Principles Approach To Communications' Privacy, Susan Freiwald

Susan Freiwald

Under current doctrines, parties to a communication enjoy robust constitutional protection against government surveillance only when they have a reasonable expectation of privacy in those communications. This paper suggests that the surprising dearth of case law applying the reasonable expectations of privacy test to modern electronic communications reflects courts' discomfort with the test's necessarily normative analysis. That discomfort also likely explains courts' use of shortcuts based on Miller v. United States and Smith v. Maryland in those few cases that have considered online surveillance practices. In particular, the government has argued that a broad third party rule deprives electronic mail …


Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald Dec 2003

Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald

Susan Freiwald

This Article explores those features of electronic surveillance that have made it challenging to regulate effectively. In balancing interests, lawmakers must create a workable law for an exceedingly complex topic, rein in law enforcement agents without crippling them, and draw a line between prohibited and permitted conduct despite society's ambivalence about surveillance. This Article demonstrates that lawmakers met those challenges when they regulated traditional wiretapping, but they have failed to meet them in the online context. It argues that the law should extend the significant restrictions on wiretapping to online surveillance, just as judges did in the case of video …


Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald Dec 2000

Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald

Susan Freiwald

Almost every day brings reports that Congress is considering new cyberspace-targeted laws and the courts are deciding novel cyberspace legal questions. These developments lend urgency to the question of whether a particular cyberspace legal change should come through operation of new statutes, judicial decisions, or the free market. If we can develop sophisticated analytical methods to evaluate institutional competence in cyberspace, we can vastly improve the development of cyberspace law and public policy.

Comparative Institutional Analysis in Cyberspace: The Case of Intermediary Liability for Defamation promotes just such an approach. By describing and extending a recently proposed model of comparative …


Uncertain Privacy: Communication Attributes After The Digital Telephony Act, Susan Freiwald Dec 1995

Uncertain Privacy: Communication Attributes After The Digital Telephony Act, Susan Freiwald

Susan Freiwald

This article argues that the coming tide of electronic Federal law protects the privacy of transmitted communications under a two-tiered system. The actual contents of communications occupy the first tier, where they enjoy fairly effective protection against disclosure. Communication attributes encompass all of the other information that can be learned about a communication, such as when and where it occurred, to whom and from whom it was sent and how long it lasted. They occupy a lowly second tier, where the protections against disclosure are weak, ambiguous and in some cases non-existent. This bifurcated system becomes increasingly untenable as advances …