Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (6)
- Science and Technology Law (6)
- First Amendment (5)
- Privacy Law (5)
- Criminal Procedure (4)
-
- Fourth Amendment (4)
- Communications Law (3)
- Civil Rights and Discrimination (2)
- Computer Law (2)
- Constitutional Law (2)
- Consumer Protection Law (2)
- Evidence (2)
- Intellectual Property Law (2)
- Law Enforcement and Corrections (2)
- National Security Law (2)
- Biology (1)
- Civil Procedure (1)
- Commercial Law (1)
- Courts (1)
- Entertainment, Arts, and Sports Law (1)
- Family Law (1)
- Health Law and Policy (1)
- Human Rights Law (1)
- International Law (1)
- International Trade Law (1)
- Law and Economics (1)
- Law and Gender (1)
- Life Sciences (1)
- Keyword
-
- Privacy (3)
- Criminal Law (2)
- First Amendment (2)
- 114th Congress (1)
- 4th Amendment (1)
-
- 5th Amendment (1)
- ACLU (1)
- All-party consent (1)
- Berkeley Protocol (1)
- Border (1)
- Border search (1)
- CBP (1)
- Cell phone (1)
- Child protection (1)
- Children (1)
- Confiscating (1)
- Constitutional Law (1)
- Criminal law (1)
- Criminal procedure (1)
- Crowdsourcing (1)
- DHS (1)
- Data (1)
- Discrimination (1)
- Doxing (1)
- Eavesdropping (1)
- Electronic devices (1)
- Fifth (1)
- Fourth Amendment (1)
- Fourth amendment (1)
- Freedom of speech (1)
Articles 1 - 8 of 8
Full-Text Articles in Criminal Law
Protecting The Innocent: How To Prevent The Consequences Of Misidentification And Doxing By Volunteers Helping With Open Source Investigations, Leigh M. Dannhauser
Protecting The Innocent: How To Prevent The Consequences Of Misidentification And Doxing By Volunteers Helping With Open Source Investigations, Leigh M. Dannhauser
Catholic University Journal of Law and Technology
Individuals performing open source investigations can misidentify alleged perpetrators and dox innocent parties online, which can subsequently lead to threats and harassment against innocent parties and their loved ones. For example, threats were made against Sunil Tripathi’s family after he was wrongly identified as one of the Boston Marathon bombers and doxed on Reddit and Twitter. In 2020, the Berkeley Protocol on Digital Open Source Investigations was published as a guide, and it includes a set of principles to govern open source investigations. However, the Berkeley Protocol is limited to open source investigations performed by those working for organizations. It …
Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley
Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley
Catholic University Journal of Law and Technology
No abstract provided.
Freedom To Morph? An Analysis Of Morphed Imagery, Child Pornography, And The First Amendment, Katie H. Jung
Freedom To Morph? An Analysis Of Morphed Imagery, Child Pornography, And The First Amendment, Katie H. Jung
Catholic University Journal of Law and Technology
This article examines the current law related to child pornography and how it leaves a gap for morphed imagery to flourish. The jurisprudence in this area is insufficient to keep up with the changing technology which allows children to be portrayed in morphed imagery and argues that this should not fall within First Amendment protection. The Supreme Court has made it clear that protecting children is an exceedingly important interest and that traditional child pornography falls outside of what was traditionally considered to be protected First Amendment speech. This article argues that the Circuit Split, should the Supreme Court take …
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Catholic University Journal of Law and Technology
No abstract provided.
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Catholic University Journal of Law and Technology
One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Catholic University Journal of Law and Technology
The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …
Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss
Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss
Catholic University Journal of Law and Technology
No abstract provided.
The Defend Trade Secrets Act Of 2015, S. 1890, H.R. 3326, 114th Congress (2015), Joseph K.C. Doukmetzian
The Defend Trade Secrets Act Of 2015, S. 1890, H.R. 3326, 114th Congress (2015), Joseph K.C. Doukmetzian
Catholic University Journal of Law and Technology
No abstract provided.