Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Cleveland State University

2009

Criminal Procedure

Search

Articles 1 - 1 of 1

Full-Text Articles in Law

Dangerously Sidestepping The Fourth Amendment: How Courts Are Allowing Third-Party Consent To Bypass Warrants For Searching Password-Protected Computer, David D. Thomas Jan 2009

Dangerously Sidestepping The Fourth Amendment: How Courts Are Allowing Third-Party Consent To Bypass Warrants For Searching Password-Protected Computer, David D. Thomas

Cleveland State Law Review

This Note sets forth that it is unacceptable for law enforcement to ignore the presence of passwords simply because they may not be immediately visible. Furthermore, it is contrary to the Fourth Amendment for law enforcement to rely on third parties who grant access to search the data without knowledge of the password to unlock the data. Principles hammered out over time for searches and seizures of physically locked objects can easily be transposed and extended to fit the virtual world while still providing people the protections of the Fourth Amendment.