Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Apple (1)
- Attorney-client privilege; full and frank conversations; hack; hackers; hacktivism; whistleblowing; technology; cybersecurity; ethics; bar associations; evidence; Federal Rules of Evidence; Federal Rules of Civil Procedure; claw back agreements; quick peek agreements; litigation; waiver; express waiver; implicit waiver; privileged communications; inadvertent disclosure; unintentional disclosure; unauthorized disclosure; purloined communications; stolen documents; technology; email; Wikileaks; Panama papers; Ashley Madison; Clinton Foundation; Teneo; John Podesta; Sony Entertainment; public domain; duty of confidentiality (1)
- Ballot initiative (1)
- California law (1)
- Civil Liberties (1)
-
- Constitutional Law (1)
- Criminal law (1)
- Criminal procedure (1)
- DNA (1)
- DNA Evidence (1)
- DNA Identification (1)
- DNA collection (1)
- DNA database (1)
- DNA sample (1)
- Encryption (1)
- Felony (1)
- Fourth Amendment (1)
- Fourth amendment (1)
- Hack (1)
- Hacking (1)
- IPhone (1)
- Law Enforcement (1)
- Misdemeanor (1)
- National Security (1)
- Passwords (1)
- Proposition 47 (1)
- Scientific Evidence (1)
- Search (1)
- Search and Seizure (1)
- Security (1)
Articles 1 - 4 of 4
Full-Text Articles in Evidence
Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary
Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary
William & Mary Bill of Rights Journal
This Article addresses touch DNA, chemical analysis of skin traces, and the implications for crime scene investigation, arguing that changes in how trace evidence is analyzed require alterations in the law’s approach to its use. Part I discusses the history of traditional DNA analysis. Part II examines the emergence of touch DNA and related technologies and how they differ from traditional DNA analysis. Part III outlines the specific risks created by the collection and storing of results under the current outdated jurisprudence. Part IV focuses on specific risks to suspects and victims of crime. Part V proposes a legal framework …
The Unintended Consequences Of California Proposition 47: Reducing Law Enforcement’S Ability To Solve Serious, Violent Crimes, Shelby Kail
Pepperdine Law Review
For many years, DNA databases have helped solve countless serious, violent crimes by connecting low-level offenders to unsolved crimes. Because the passage of Proposition 47 reduced several low-level crimes to misdemeanors, which do not qualify for DNA sample collection, Proposition 47 has severely limited law enforcement’s ability to solve serious, violent crimes through California’s DNA database and reliable DNA evidence. This powerful law enforcement tool must be preserved to prevent additional crimes from being committed, to exonerate the innocent, and to provide victims with closure through conviction of their assailants or offenders. Proposition 47’s unintended consequences have led to devastating …
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Georgia State University Law Review
On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.
Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …
Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy
Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy
Brooklyn Law Review
The news story is now familiar: hackers breach a security system and post internal, confidential information online for anyone with an Internet connection to comb through. This digital version of whistleblowing, called “hacktivism,” is attractive to the media, which has leaned on broad First Amendment protections to widely cover the confidential communications revealed by hackers. These hacks also provide attorneys with enticing opportunities to look through previously confidential files. But as ethics and evidentiary rules stand, it is not clear if an attorney may view the files, let alone use them as evidence in litigation. That companies are hacked is …