Open Access. Powered by Scholars. Published by Universities.®

Evidence Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Evidence

Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman Mar 2014

Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman

Timothy A Wiseman

Encryption is commonly used to protect private information, for both legitimate and illegitimate reasons. Courts have been struggling to determine when, within the bounds of the Fourth and Fifth Amendments, the Courts may compel a defendant in a criminal case to decrypt their data.

This article argues that a broad use of the Forgone Conclusion doctrine would permit the Courts to order a defendant to decrypt their data when the prosecution can show with reasonable particularity the existence and location of the encrypted documents, that they are likely to be incriminating, and that the government can authenticate them without the …


Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean Feb 2014

Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.

When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


Understanding And Contextualizing Precedents In E-Discovery: The Illusion Of Stare Decisis And Best Practices To Avoid Reliance On Outdated Guidance, Jonathan M. Redgrave, Keltie Hays Peay, Mathea K.E. Bulander Jan 2014

Understanding And Contextualizing Precedents In E-Discovery: The Illusion Of Stare Decisis And Best Practices To Avoid Reliance On Outdated Guidance, Jonathan M. Redgrave, Keltie Hays Peay, Mathea K.E. Bulander

Richmond Journal of Law & Technology

But as precedents survive like the clavicle in the cat, long after the use they once served is at an end, and the reason for them has been forgotten, the result of following them must often be failure and confusion from the merely logical point of view.


Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson Jan 2014

Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

This Article presents a theory of judicial notice for the information age. It argues that the ease of accessing factual data on the Internet allows judges and litigants to expand the use of judicial notice in ways that raise significant concerns about admissibility, reliability, and fair process. State and federal courts are already applying the surprisingly pliant judicial notice rules to bring websites ranging from Google Maps to Wikipedia into the courtroom, and these decisions will only increase in frequency in coming years. This rapidly emerging judicial phenomenon is notable for its ad hoc and conclusory nature – attributes that …


Comments: Trending: Proportionality In Electronic Discovery In Common Law Countries And The United States' Federal And State Courts, Laura Hunt Jan 2014

Comments: Trending: Proportionality In Electronic Discovery In Common Law Countries And The United States' Federal And State Courts, Laura Hunt

University of Baltimore Law Review

No abstract provided.


Setting The Tipping Point For Disclosing The Identity Of Anonymous Online Speakers: Lessons From Other Disclosure Contexts, Helen Norton Jan 2014

Setting The Tipping Point For Disclosing The Identity Of Anonymous Online Speakers: Lessons From Other Disclosure Contexts, Helen Norton

Publications

At what point should anonymous online speakers alleged to have engaged in defamatory, threatening, or other unprotected and illegal speech be required to “unmask” themselves – i.e., to disclose their identities? Courts confronted with such questions have proposed a variety of tests that seek to determine the point – I’ll call this the tipping point – at which they become sufficiently confident that disclosure’s accountability gains justify the unmasking of an anonymous online speaker. This essay suggests that an intradisciplinary approach may be helpful when choosing among these alternative tests. To this end, it recalls parallel disclosure challenges in campaign, …