Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Criminal procedure (2)
- & social neuroscience (1)
- Affective (1)
- Apple (1)
- Attorney-client privilege; full and frank conversations; hack; hackers; hacktivism; whistleblowing; technology; cybersecurity; ethics; bar associations; evidence; Federal Rules of Evidence; Federal Rules of Civil Procedure; claw back agreements; quick peek agreements; litigation; waiver; express waiver; implicit waiver; privileged communications; inadvertent disclosure; unintentional disclosure; unauthorized disclosure; purloined communications; stolen documents; technology; email; Wikileaks; Panama papers; Ashley Madison; Clinton Foundation; Teneo; John Podesta; Sony Entertainment; public domain; duty of confidentiality (1)
-
- Ballot initiative (1)
- Brain imaging (1)
- California law (1)
- Civil Liberties (1)
- Cognitive (1)
- Competence (1)
- Constitutional Law (1)
- Criminal law (1)
- DNA (1)
- DNA Evidence (1)
- DNA Identification (1)
- DNA collection (1)
- DNA database (1)
- DNA sample (1)
- Daubert (1)
- Electronic evidence (1)
- Electronic records--Law and legislation (1)
- Encryption (1)
- Evidence (Law) (1)
- Expert (1)
- Expert witnesses (1)
- FMRI (1)
- Felony (1)
- Folk psychology (1)
- Forensic (1)
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Evidence
Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary
Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary
William & Mary Bill of Rights Journal
This Article addresses touch DNA, chemical analysis of skin traces, and the implications for crime scene investigation, arguing that changes in how trace evidence is analyzed require alterations in the law’s approach to its use. Part I discusses the history of traditional DNA analysis. Part II examines the emergence of touch DNA and related technologies and how they differ from traditional DNA analysis. Part III outlines the specific risks created by the collection and storing of results under the current outdated jurisprudence. Part IV focuses on specific risks to suspects and victims of crime. Part V proposes a legal framework …
The Unintended Consequences Of California Proposition 47: Reducing Law Enforcement’S Ability To Solve Serious, Violent Crimes, Shelby Kail
Pepperdine Law Review
For many years, DNA databases have helped solve countless serious, violent crimes by connecting low-level offenders to unsolved crimes. Because the passage of Proposition 47 reduced several low-level crimes to misdemeanors, which do not qualify for DNA sample collection, Proposition 47 has severely limited law enforcement’s ability to solve serious, violent crimes through California’s DNA database and reliable DNA evidence. This powerful law enforcement tool must be preserved to prevent additional crimes from being committed, to exonerate the innocent, and to provide victims with closure through conviction of their assailants or offenders. Proposition 47’s unintended consequences have led to devastating …
The Forensic Community Can Educate Lawyers, Judges, Robert M. Sanger
The Forensic Community Can Educate Lawyers, Judges, Robert M. Sanger
Robert M. Sanger
Small Cells, Big Problems: The Increasing Precision Of Cell Site Location Information And The Need For Fourth Amendment Protections, Robert M. Bloom, William T. Clark
Small Cells, Big Problems: The Increasing Precision Of Cell Site Location Information And The Need For Fourth Amendment Protections, Robert M. Bloom, William T. Clark
Robert M. Bloom
The past fifty years has witnessed an evolution in technology advancement in police surveillance. Today, one of the essential tools of police surveillance is something most Americans carry with them in their pockets every day, the cell phone. Cell phones not only contain a huge repository of personal data, they also provide continuous surveillance of a person’s movement known as cell site location information (CSLI). In 1986, Congress sought to provide some privacy protections to CSLI in the Stored Communication Act. Although this solution may have struck the proper balance in an age when cell phones were a mere novelty …
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Georgia State University Law Review
On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.
Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …
Neuroscience In Forensic Contexts: Ethical Concerns, Stephen J. Morse
Neuroscience In Forensic Contexts: Ethical Concerns, Stephen J. Morse
All Faculty Scholarship
This is a chapter in a volume, Ethics Challenges in Forensic Psychiatry and Psychology Practice, edited by Ezra E. H. Griffith, M.D. and to be published by Columbia University Press. The chapter addresses whether the use of new neuroscience techniques, especially non-invasive functional magnetic resonance imaging (fMRI) and the data from studies employing them raise new ethical issues for forensic psychiatrists and psychologists. The implicit thesis throughout is that if the legal questions, the limits of the new techniques and the relevance of neuroscience to law are properly understood, no new ethical issues are raised. A major ethical lapse …
Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy
Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy
Brooklyn Law Review
The news story is now familiar: hackers breach a security system and post internal, confidential information online for anyone with an Internet connection to comb through. This digital version of whistleblowing, called “hacktivism,” is attractive to the media, which has leaned on broad First Amendment protections to widely cover the confidential communications revealed by hackers. These hacks also provide attorneys with enticing opportunities to look through previously confidential files. But as ethics and evidentiary rules stand, it is not clear if an attorney may view the files, let alone use them as evidence in litigation. That companies are hacked is …
Authenticating Digital Evidence, Paul W. Grimm, Daniel J. Capra, Gregory P. Joseph
Authenticating Digital Evidence, Paul W. Grimm, Daniel J. Capra, Gregory P. Joseph
Faculty Scholarship
No abstract provided.
Problems With Using Statistics To Justify Institutional Policies, Justin Shin
Problems With Using Statistics To Justify Institutional Policies, Justin Shin
Senior Projects Spring 2017
It is becoming increasingly common for institutions to use statistics to inform policy decisions. We should be prepared to ask ourselves what regulatory principles should be imposed on institutions that seek to justify certain policies through deference to a statistical analysis. This paper will examine the difficulties that come with using statistics to justify actions, and argue that certain standards of transparency and verifiability should be expected from any institution that seeks to involve a statistical analysis in the formation of policies. I will first use Market Share Liability, an established use of statistics, to draw out what responsibilities an …