Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Fourth amendment (5)
- Search (4)
- Privacy (3)
- Expectation of privacy (2)
- Seizure (2)
-
- Technology (2)
- Body camera (1)
- Computer search (1)
- Criminal procedure (1)
- Earl Bradley (1)
- Facebook (1)
- Ganias (1)
- Inevitable discovery (1)
- Information privacy (1)
- Internet (1)
- Liability (1)
- Nsa (1)
- Patel (1)
- Riley (1)
- Search warrant (1)
- Security (1)
- Snowden (1)
- Social media (1)
- Third party doctrine (1)
- Warrant execution (1)
Articles 1 - 6 of 6
Full-Text Articles in Computer Law
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Stephen E Henderson
What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson
What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson
Stephen E Henderson
This paper tells two stories. One concerns the investigation of a Delaware physician named Earl B. Bradley that resulted in a conviction and sentence of fourteen consecutive life terms for the sexual abuse of children. The other concerns the computer problems, both judicial and extra-judicial, of Chief Judge Alex Kozinski of the United States Court of Appeals for the Ninth Circuit. Though in a sense unrelated, they share lessons about the practicalities of computers and their search that are worth telling. As courts continue to struggle with how to cabin the searches of computers in order to minimize privacy intrusion …
Expectations Of Privacy In Social Media, Stephen E. Henderson
Expectations Of Privacy In Social Media, Stephen E. Henderson
Stephen E Henderson
This article, which largely tracks my remarks at Mississippi College’s Social Media Symposium, examines expectations of privacy in social media such as weblogs (blogs), Facebook pages, and Twitter tweets. Social media is diverse and ever-diversifying, and while I address some of that complexity, I focus on the core functionality, which provides the groundwork for further conversation as the technology and related social norms develop. As one would expect, just as with our offline communications and other online communications, in some we have an expectation of privacy that is recognized by current law, in some we have an expectation of privacy …
The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
Stephen E Henderson
In what may be a slightly premature obituary, in this response to a forthcoming paper by Matthew Tokson I argue that the Fourth Amendment third party doctrine "has at least taken ill, and it can be hoped it is an illness from which it will never recover." It is increasingly unpopular as a matter of state constitutional law, has long been assailed in scholarship but now thoughtful alternatives are percolating, and it cannot – or at least should not – withstand the pressures which technology and social norms are placing upon it. Even the Supreme Court seems loath to defend …
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Stephen E Henderson
The Fourth Amendment to the United States Constitution prohibits unreasonable searches and seizures. Yet as interpreted by the United States Supreme Court, the Amendment places no restriction on police combing through financial records; telephone, e-mail and website transactional records; or garbage left for collection. Indeed there is no protection for any information knowingly provided to a third party, because the provider is said to retain no reasonable expectation of privacy in that information. As technology dictates that more and more of our personal lives are available to anyone equipped to receive them, and as social norms dictate that more and …
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Stephen E Henderson
The Internet, already of major significance throughout much of the globe, is expected to become increasingly pervasive in diverse arenas, from health care, to commerce, to entertainment, and is expected to become increasingly critical to essential infrastructures, including banking, power, and telecommunications. Yet the medium is both inherently and unnecessarily insecure. In particular, today’s Internet can be crippled by distributed denial-of-service attacks launched by relatively unsophisticated and judgment-proof parties. Not every computing system involved in such attacks, however, is necessarily without resources. Application of traditional negligence liability, coupled with other government incentives and support institutions, will encourage better security and …