Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Constitutional Law (35)
- Fourth Amendment (30)
- Criminal Law (25)
- Privacy Law (15)
- State and Local Government Law (14)
-
- Evidence (13)
- Supreme Court of the United States (13)
- Law Enforcement and Corrections (12)
- Courts (11)
- Civil Rights and Discrimination (10)
- Law and Society (10)
- Internet Law (9)
- Computer Law (7)
- Legislation (7)
- Science and Technology Law (7)
- Civil Procedure (6)
- First Amendment (6)
- Human Rights Law (6)
- Other Law (6)
- Communications Law (5)
- Judges (5)
- Jurisdiction (5)
- Legal Remedies (5)
- Family Law (4)
- Fourteenth Amendment (4)
- Health Law and Policy (4)
- Jurisprudence (4)
- Litigation (4)
- Institution
-
- Touro University Jacob D. Fuchsberg Law Center (13)
- The Catholic University of America, Columbus School of Law (7)
- Pepperdine University (6)
- Seattle University School of Law (4)
- University of Michigan Law School (4)
-
- St. John's University School of Law (3)
- St. Mary's University (2)
- Cleveland State University (1)
- Florida International University College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Maurer School of Law: Indiana University (1)
- New York Law School (1)
- Northwestern Pritzker School of Law (1)
- Pace University (1)
- Penn State Dickinson Law (1)
- Universitas Indonesia (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Rhode Island (1)
- University of Washington School of Law (1)
- Washington and Lee University School of Law (1)
- William & Mary Law School (1)
- Publication Year
- Publication
-
- Touro Law Review (13)
- Pepperdine Law Review (6)
- Catholic University Journal of Law and Technology (4)
- Seattle University Law Review (4)
- Catholic University Law Review (3)
-
- Michigan Law Review (3)
- St. John's Law Review (2)
- St. Mary's Law Journal (2)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (1)
- Cleveland State Law Review (1)
- Dickinson Law Review (2017-Present) (1)
- Dignity: A Journal of Analysis of Exploitation and Violence (1)
- FIU Law Review (1)
- Indiana Law Journal (1)
- Journal of Civil Rights and Economic Development (1)
- Loyola of Los Angeles Law Review (1)
- Michigan Law Review First Impressions (1)
- NYLS Law Review (1)
- Nevada Law Journal (1)
- Northwestern University Law Review (1)
- Pace Law Review (1)
- University of Arkansas at Little Rock Law Review (1)
- Washington Law Review Online (1)
- Washington and Lee Journal of Civil Rights and Social Justice (1)
- William & Mary Bill of Rights Journal (1)
Articles 1 - 30 of 54
Full-Text Articles in Criminal Procedure
The Modern Border: The Government Can Search . . . Anything?, Abigail Nusbaum
The Modern Border: The Government Can Search . . . Anything?, Abigail Nusbaum
FIU Law Review
The evolution of modern technology has introduced new obstacles in interpreting the Fourth Amendment’s application to searches of peoples’ effects. Specifically, the longstanding exception to the Fourth Amendment permitting searches at the international border in the absence of probable cause does not so neatly apply to forensic searches of cell phones. Consequently, a circuit split has emerged on two aspects of the issue: the scope of the border exception and the requisite level of suspicion within that exception. The Supreme Court should find that forensic cell phone searches at the international border implicate Fourth Amendment privacy interests, requiring the border …
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang
Pace Law Review
No abstract provided.
Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti
Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti
"Dharmasisya” Jurnal Program Magister Hukum FHUI
The significant increase in online activities cannot be separated from the many active internet users who use mobile internet connections to carry out their daily activities, one of which is for the convenience of making ticket reservations at PT. Indonesian Railways (KAI). The purpose of this research is to find out the study of the business law of protecting consumer privacy in the online ticketing service of PT. KAI. Data collection was carried out by means of a literature study of the relationship between laws and regulations in consumer protection and the position of PT. KAI as business actors and …
Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley
Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley
Catholic University Journal of Law and Technology
No abstract provided.
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Seattle University Law Review
Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
Dickinson Law Review (2017-Present)
Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.
Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Catholic University Journal of Law and Technology
No abstract provided.
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
St. Mary's Law Journal
Abstract forthcoming.
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Catholic University Law Review
Technology may be created by humans, but we are dependent on it. Look around you: what technology is near you as you read this abstract? An iPhone? A laptop? Perhaps even an Amazon Echo. What do all these devices have in common? They store data in the cloud. And this data can contain some of our most sensitive information, such as business records or medical documents.
Even if you manage this cloud storage account, the government may be able to search your data without a warrant. Federal law provides little protection for cloud stored data. And the Fourth Amendment may …
Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger
Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger
Washington Law Review Online
Video doorbells have proliferated across the United States and Amazon owns one of the most popular video doorbell companies on the market—Ring. While many view the Ring video doorbell as useful technology that protects the home and promotes safer neighborhoods, the product reduces consumer privacy without much recourse. For example, Ring partners with cities and law enforcement agencies across the United States thereby creating a mass surveillance network in which law enforcement agencies can watch neighborhoods and access Ring data without the user’s knowledge or consent. Because Amazon is not a state actor, it is able to circumvent the due …
Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter
Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter
Washington and Lee Journal of Civil Rights and Social Justice
You may not have heard of a botnet. If you have, you may have linked it to election shenanigans and nothing else. But if you are reading this on a computer or smartphone, there is a good chance you are in contact with a botnet right now.
Botnets, sometimes called “Zombie Armies,” are networks of devices linked by a computer virus and controlled by cybercriminals. Botnets operate on everyday devices owned by millions of Americans, and thus pose a substantial threat to individual device owners as well as the nation’s institutions and economy.
Accordingly, the United States government has been …
Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi
Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi
St. John's Law Review
(Excerpt)
Part I of this Note discusses the fundamental science behind DNA and defines and explains the process of familial DNA searching. Part I also discusses how Carpenter v. United States provides a framework to begin thinking about the unique nature of DNA and privacy implications for its use, and why the revealing nature of this type of data warrants protection. Part II of this Note delves into the lack of constitutional and statutory protections for DNA in recreational DNA databases. First, Part II explains that traditional Fourth Amendment concepts, like search warrants, probable cause, reasonable expectation of privacy, third-party …
United States V. Touset, Katelyn James
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Catholic University Journal of Law and Technology
One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.
Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.
Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.
Journal of Civil Rights and Economic Development
(Excerpt)
Part I of this Note will briefly discuss the key components of a Connected Car, identify who collects the data from the Car, and examine the various uses for the data. Part I also explores whether Car owners consent to the collection of their Car’s data. Part II-A will trace the historical development of the automobile exception to the Fourth Amendment, which generally permits law-enforcement officers to conduct a warrantless search of a vehicle. Part II-B will discuss how the Supreme Court has applied the Fourth Amendment to pre-Internet technologies. Part II-C will discuss two recent Fourth Amendment Supreme …
When A Tent Is Your Castle: Constitutional Protection Against Unreasonable Searches Of Makeshift Dwellings Of Unhoused Persons, Evanie Parr
Seattle University Law Review
This Note will argue that all jurisdictions should follow the Washington State Court of Appeals, Division II in validating makeshift dwellings used by people experiencing homelessness as spaces protected from unwarranted police intrusions by shifting evaluations of “reasonable expectations of privacy” to a more equitable standard that appreciates the realities of economic disparity. This approach to constitutional protections against unreasonable searches and seizures is imperative to protect the rights of people experiencing homelessness, given that such individuals are regularly subjected to invasions of privacy and heightened exposure to the criminal justice system.
Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller
Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller
Loyola of Los Angeles Law Review
During a fairly routine traffic stop of a motorist driving a rental car, two State Troopers in Harrisburg, Pennsylvania, discovered that the driver, Terrence Byrd, was not the listed renter. The Court ruled that Byrd nonetheless retained a Fourth Amendment right to object to the search. The Court did not address, however, why the Troopers stopped Byrd in the first place. A close examination of the case filings reveal suggests that Byrd was stopped on the basis of his race. The racial feature ofthe stop is obscured by the Court’s current property-basedinterpretation of the Fourth Amendment’s right to privacy.
Although …
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
St. Mary's Law Journal
The Internet provides trial attorneys an additional tool to investigate the backgrounds of prospective jurors during voir dire. Online searches of a person’s name and social media accounts can reveal information that could be used as grounds for a challenge for cause or to facilitate intelligent use of peremptory strikes. Texas lawmakers have not yet provided any official guidance as to whether attorneys can investigate prospective jurors online or how they might do so, should it be allowed. Texas’s current voir dire structure, judicial opinions, and ethics opinions, together, support the notion that Texas trial attorneys should be given opportunities …
Being Forced To Code In The Technology Era As A Violation Of The First Amendment Protection Against Compelled Speech, Adrianna Oddo
Being Forced To Code In The Technology Era As A Violation Of The First Amendment Protection Against Compelled Speech, Adrianna Oddo
Catholic University Law Review
Over the past several decades, technological advancements led several courts to hold that computer code is protected as speech under the First Amendment of the Constitution. However, after fourteen people were killed in the 2015 San Bernardino massacre the U.S. Government sought to ignore those findings when it ordered Apple, Inc. to write a computer code to bypass the encryption software on the shooter’s cell phone. To access this particular phone Apple would need to write a code that could potentially compromise its customers’ data and personal information. Apple vehemently opposed the Government’s order and claimed that compelling it to …
The Fourth Amendment Disclosure Doctrines, Monu Bedi
The Fourth Amendment Disclosure Doctrines, Monu Bedi
William & Mary Bill of Rights Journal
The third party and public disclosure doctrines (together the “disclosure doctrines”) are long-standing hurdles to Fourth Amendment protection. These doctrines have become increasingly relevant to assessing the government’s use of recent technologies such as data mining, drone surveillance, and cell site location data. It is surprising then that both the Supreme Court and scholars, at times, have associated them together as expressing one principle. It turns out that each relies on unique foundational triggers and does not stand or fall with the other. This Article tackles this issue and provides a comprehensive topology for analyzing the respective contours of each …
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman
Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman
Northwestern University Law Review
In light of the privacy concerns inherent to personal technological devices, the Supreme Court handed down a unanimous decision in 2014 recognizing the need for categorical heightened protection of cell phones during searches incident to arrest in Riley v. California. This Note argues for expansion of heightened protections for cell phones in the context of abandoned evidence because the same privacy concerns apply. This argument matters because state and federal courts have not provided the needed protection to abandoned cell phones pre- or post-Riley.
Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen
Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen
Touro Law Review
No abstract provided.
Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu
Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu
Seattle University Law Review
A vehicle on a public thoroughfare is observed driving erratically and careening across the roadway. After the vehicle strikes another passenger car and comes to a stop, the responding officer notices in the driver the telltale symptoms of intoxication—bloodshot eyes, slurred speech, and a distinct odor of intoxicants. On these facts, a lawfully-procured warrant authorizing the extraction of the driver’s blood is obtained. However, the document fails to circumscribe the manner and variety of testing that may be performed on the sample. Does this lack of particularity render the warrant constitutionally infirm as a mandate for chemical analysis of the …
A Picture Says A Thousand Words: Applying Foia's Exemption 7(C) To Mug Shots, Rebecca Rosedale
A Picture Says A Thousand Words: Applying Foia's Exemption 7(C) To Mug Shots, Rebecca Rosedale
St. John's Law Review
(Excerpt)
This Note argues that Exemption 7(C) of the Freedom of Information Act ("FOIA"), which exempts from disclosure information compiled for law enforcement purposes that "could reasonably be expected to constitute an unwarranted invasion of personal privacy," should be categorically applied to mug shots. Part I of this Note explores the recognition of a privacy right and the regulation of public records in the United States, with a focus on FOIA. Part II discusses the conflicting viewpoints held by the circuit courts that have decided whether or not Exemption 7(C) applies to mug shots. Each court analyzed whether a personal …
Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz
Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz
Touro Law Review
No abstract provided.
State V. Brossart: Adapting The Fourth Amendment For A Future With Drones, Thomas Bryan
State V. Brossart: Adapting The Fourth Amendment For A Future With Drones, Thomas Bryan
Catholic University Law Review
No abstract provided.
Criminal Procedure Decisions In The October 2005 Term, Susan N. Herman
Criminal Procedure Decisions In The October 2005 Term, Susan N. Herman
Touro Law Review
No abstract provided.
Court Of Appeals Of New York, People V. Burton, Diane Matero
Court Of Appeals Of New York, People V. Burton, Diane Matero
Touro Law Review
No abstract provided.