Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Evidence
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
Calling In The Dogs: Suspicionless Sniff Searches And Reasonable Expectations Of Privacy, 56 Case W. Res. L. Rev. 285 (2005), Cecil J. Hunt Ii
Calling In The Dogs: Suspicionless Sniff Searches And Reasonable Expectations Of Privacy, 56 Case W. Res. L. Rev. 285 (2005), Cecil J. Hunt Ii
Cecil J. Hunt II
No abstract provided.
Beyond Privacy, Beyond Probable Cause, Beyond The Fourth Amendment: New Strategies For Fighting Pretext Arrests, 69 U. Colo. L. Rev. 693 (1998), Timothy P. O'Neill
Beyond Privacy, Beyond Probable Cause, Beyond The Fourth Amendment: New Strategies For Fighting Pretext Arrests, 69 U. Colo. L. Rev. 693 (1998), Timothy P. O'Neill
Timothy P. O'Neill
No abstract provided.
Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague
Workplace Data: Law & Litigation (With 2014 Supplement), Robert Sprague
Robert Sprague
Workplace Data: Law and Litigation provides an overview of legal issues associated with employment-related electronically stored information (ESI), focusing on discovery issues in particular. Written for employment and labor law practitioners, this new treatise offers a comprehensive overview of today’s discovery challenges, a detailed statute-by-statute analysis of data retention requirements in federal workplace-related laws, a summary of emerging workplace social media and other technology-related issues and a guide to data protection privacy laws in North America, Europe, Asia and Oceania.