Open Access. Powered by Scholars. Published by Universities.®

Criminal Procedure Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Privacy

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 54

Full-Text Articles in Criminal Procedure

The Modern Border: The Government Can Search . . . Anything?, Abigail Nusbaum Jan 2024

The Modern Border: The Government Can Search . . . Anything?, Abigail Nusbaum

FIU Law Review

The evolution of modern technology has introduced new obstacles in interpreting the Fourth Amendment’s application to searches of peoples’ effects. Specifically, the longstanding exception to the Fourth Amendment permitting searches at the international border in the absence of probable cause does not so neatly apply to forensic searches of cell phones. Consequently, a circuit split has emerged on two aspects of the issue: the scope of the border exception and the requisite level of suspicion within that exception. The Supreme Court should find that forensic cell phone searches at the international border implicate Fourth Amendment privacy interests, requiring the border …


Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang Oct 2023

Privacy And National Politics: Fingerprint And Dna Litigation In Japan And The United States Compared, Dongsheng Zang

Pace Law Review

No abstract provided.


Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti Jan 2023

Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti

"Dharmasisya” Jurnal Program Magister Hukum FHUI

The significant increase in online activities cannot be separated from the many active internet users who use mobile internet connections to carry out their daily activities, one of which is for the convenience of making ticket reservations at PT. Indonesian Railways (KAI). The purpose of this research is to find out the study of the business law of protecting consumer privacy in the online ticketing service of PT. KAI. Data collection was carried out by means of a literature study of the relationship between laws and regulations in consumer protection and the position of PT. KAI as business actors and …


Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley Jan 2023

Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley

Catholic University Journal of Law and Technology

No abstract provided.


Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson Jan 2023

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson

Seattle University Law Review

Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.


A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan Jan 2022

A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan

Dickinson Law Review (2017-Present)

Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.

Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …


Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski Jan 2022

Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski

Catholic University Journal of Law and Technology

No abstract provided.


Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez Apr 2021

Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez

St. Mary's Law Journal

Abstract forthcoming.


Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango Mar 2021

Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango

Catholic University Law Review

Technology may be created by humans, but we are dependent on it. Look around you: what technology is near you as you read this abstract? An iPhone? A laptop? Perhaps even an Amazon Echo. What do all these devices have in common? They store data in the cloud. And this data can contain some of our most sensitive information, such as business records or medical documents.

Even if you manage this cloud storage account, the government may be able to search your data without a warrant. Federal law provides little protection for cloud stored data. And the Fourth Amendment may …


Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger Dec 2020

Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger

Washington Law Review Online

Video doorbells have proliferated across the United States and Amazon owns one of the most popular video doorbell companies on the market—Ring. While many view the Ring video doorbell as useful technology that protects the home and promotes safer neighborhoods, the product reduces consumer privacy without much recourse. For example, Ring partners with cities and law enforcement agencies across the United States thereby creating a mass surveillance network in which law enforcement agencies can watch neighborhoods and access Ring data without the user’s knowledge or consent. Because Amazon is not a state actor, it is able to circumvent the due …


Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter Oct 2020

Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter

Washington and Lee Journal of Civil Rights and Social Justice

You may not have heard of a botnet. If you have, you may have linked it to election shenanigans and nothing else. But if you are reading this on a computer or smartphone, there is a good chance you are in contact with a botnet right now.

Botnets, sometimes called “Zombie Armies,” are networks of devices linked by a computer virus and controlled by cybercriminals. Botnets operate on everyday devices owned by millions of Americans, and thus pose a substantial threat to individual device owners as well as the nation’s institutions and economy.

Accordingly, the United States government has been …


Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi Mar 2020

Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi

St. John's Law Review

(Excerpt)

Part I of this Note discusses the fundamental science behind DNA and defines and explains the process of familial DNA searching. Part I also discusses how Carpenter v. United States provides a framework to begin thinking about the unique nature of DNA and privacy implications for its use, and why the revealing nature of this type of data warrants protection. Part II of this Note delves into the lack of constitutional and statutory protections for DNA in recreational DNA databases. First, Part II explains that traditional Fourth Amendment concepts, like search warrants, probable cause, reasonable expectation of privacy, third-party …


United States V. Touset, Katelyn James Jan 2020

United States V. Touset, Katelyn James

NYLS Law Review

No abstract provided.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.


Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr. Mar 2019

Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.

Journal of Civil Rights and Economic Development

(Excerpt)

Part I of this Note will briefly discuss the key components of a Connected Car, identify who collects the data from the Car, and examine the various uses for the data. Part I also explores whether Car owners consent to the collection of their Car’s data. Part II-A will trace the historical development of the automobile exception to the Fourth Amendment, which generally permits law-enforcement officers to conduct a warrantless search of a vehicle. Part II-B will discuss how the Supreme Court has applied the Fourth Amendment to pre-Internet technologies. Part II-C will discuss two recent Fourth Amendment Supreme …


When A Tent Is Your Castle: Constitutional Protection Against Unreasonable Searches Of Makeshift Dwellings Of Unhoused Persons, Evanie Parr Feb 2019

When A Tent Is Your Castle: Constitutional Protection Against Unreasonable Searches Of Makeshift Dwellings Of Unhoused Persons, Evanie Parr

Seattle University Law Review

This Note will argue that all jurisdictions should follow the Washington State Court of Appeals, Division II in validating makeshift dwellings used by people experiencing homelessness as spaces protected from unwarranted police intrusions by shifting evaluations of “reasonable expectations of privacy” to a more equitable standard that appreciates the realities of economic disparity. This approach to constitutional protections against unreasonable searches and seizures is imperative to protect the rights of people experiencing homelessness, given that such individuals are regularly subjected to invasions of privacy and heightened exposure to the criminal justice system.


Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller Nov 2018

Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller

Loyola of Los Angeles Law Review

During a fairly routine traffic stop of a motorist driving a rental car, two State Troopers in Harrisburg, Pennsylvania, discovered that the driver, Terrence Byrd, was not the listed renter. The Court ruled that Byrd nonetheless retained a Fourth Amendment right to object to the search. The Court did not address, however, why the Troopers stopped Byrd in the first place. A close examination of the case filings reveal suggests that Byrd was stopped on the basis of his race. The racial feature ofthe stop is obscured by the Court’s current property-basedinterpretation of the Fourth Amendment’s right to privacy.

Although …


A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle Jun 2018

A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle

St. Mary's Law Journal

The Internet provides trial attorneys an additional tool to investigate the backgrounds of prospective jurors during voir dire. Online searches of a person’s name and social media accounts can reveal information that could be used as grounds for a challenge for cause or to facilitate intelligent use of peremptory strikes. Texas lawmakers have not yet provided any official guidance as to whether attorneys can investigate prospective jurors online or how they might do so, should it be allowed. Texas’s current voir dire structure, judicial opinions, and ethics opinions, together, support the notion that Texas trial attorneys should be given opportunities …


Being Forced To Code In The Technology Era As A Violation Of The First Amendment Protection Against Compelled Speech, Adrianna Oddo Mar 2018

Being Forced To Code In The Technology Era As A Violation Of The First Amendment Protection Against Compelled Speech, Adrianna Oddo

Catholic University Law Review

Over the past several decades, technological advancements led several courts to hold that computer code is protected as speech under the First Amendment of the Constitution. However, after fourteen people were killed in the 2015 San Bernardino massacre the U.S. Government sought to ignore those findings when it ordered Apple, Inc. to write a computer code to bypass the encryption software on the shooter’s cell phone. To access this particular phone Apple would need to write a code that could potentially compromise its customers’ data and personal information. Apple vehemently opposed the Government’s order and claimed that compelling it to …


The Fourth Amendment Disclosure Doctrines, Monu Bedi Dec 2017

The Fourth Amendment Disclosure Doctrines, Monu Bedi

William & Mary Bill of Rights Journal

The third party and public disclosure doctrines (together the “disclosure doctrines”) are long-standing hurdles to Fourth Amendment protection. These doctrines have become increasingly relevant to assessing the government’s use of recent technologies such as data mining, drone surveillance, and cell site location data. It is surprising then that both the Supreme Court and scholars, at times, have associated them together as expressing one principle. It turns out that each relies on unique foundational triggers and does not stand or fall with the other. This Article tackles this issue and provides a comprehensive topology for analyzing the respective contours of each …


The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins Jul 2017

The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman Feb 2017

Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman

Northwestern University Law Review

In light of the privacy concerns inherent to personal technological devices, the Supreme Court handed down a unanimous decision in 2014 recognizing the need for categorical heightened protection of cell phones during searches incident to arrest in Riley v. California. This Note argues for expansion of heightened protections for cell phones in the context of abandoned evidence because the same privacy concerns apply. This argument matters because state and federal courts have not provided the needed protection to abandoned cell phones pre- or post-Riley.


Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen Jan 2017

Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen

Touro Law Review

No abstract provided.


Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu Nov 2015

Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu

Seattle University Law Review

A vehicle on a public thoroughfare is observed driving erratically and careening across the roadway. After the vehicle strikes another passenger car and comes to a stop, the responding officer notices in the driver the telltale symptoms of intoxication—bloodshot eyes, slurred speech, and a distinct odor of intoxicants. On these facts, a lawfully-procured warrant authorizing the extraction of the driver’s blood is obtained. However, the document fails to circumscribe the manner and variety of testing that may be performed on the sample. Does this lack of particularity render the warrant constitutionally infirm as a mandate for chemical analysis of the …


A Picture Says A Thousand Words: Applying Foia's Exemption 7(C) To Mug Shots, Rebecca Rosedale Oct 2015

A Picture Says A Thousand Words: Applying Foia's Exemption 7(C) To Mug Shots, Rebecca Rosedale

St. John's Law Review

(Excerpt)

This Note argues that Exemption 7(C) of the Freedom of Information Act ("FOIA"), which exempts from disclosure information compiled for law enforcement purposes that "could reasonably be expected to constitute an unwarranted invasion of personal privacy," should be categorically applied to mug shots. Part I of this Note explores the recognition of a privacy right and the regulation of public records in the United States, with a focus on FOIA. Part II discusses the conflicting viewpoints held by the circuit courts that have decided whether or not Exemption 7(C) applies to mug shots. Each court analyzed whether a personal …


Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz Dec 2014

Lawrence V. Texas: The Decision And Its Implications For The Future, Martin A. Schwartz

Touro Law Review

No abstract provided.


State V. Brossart: Adapting The Fourth Amendment For A Future With Drones, Thomas Bryan Jun 2014

State V. Brossart: Adapting The Fourth Amendment For A Future With Drones, Thomas Bryan

Catholic University Law Review

No abstract provided.


Criminal Procedure Decisions In The October 2005 Term, Susan N. Herman Jun 2014

Criminal Procedure Decisions In The October 2005 Term, Susan N. Herman

Touro Law Review

No abstract provided.


Court Of Appeals Of New York, People V. Burton, Diane Matero May 2014

Court Of Appeals Of New York, People V. Burton, Diane Matero

Touro Law Review

No abstract provided.