Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Evidence
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins
University of Richmond Law Review
In this essay, I contend that when evaluating the constitutionality of enhanced surveillance devices, the existing test for assessing the occurrence of a Fourth Amendment search should be modified. Specifically, I suggest that intrusiveness should be unambiguously adopted by the Court as the benchmark for assessing and defining the existence of a search under the Fourth Amendment. Moreover, intrusiveness should be clearly defined to require an examination of two factors: the functionality of a challenged form of surveillance and the potential for disclosure created by the device.
Photo Enforcement Programs: Are They Permissible Under The United States Constitution?, 43 J. Marshall L. Rev. 463 (2010), Paul Mcnaughton
Photo Enforcement Programs: Are They Permissible Under The United States Constitution?, 43 J. Marshall L. Rev. 463 (2010), Paul Mcnaughton
UIC Law Review
No abstract provided.
Picture This: Body Worn Video Devices ('Head Cams') As Tools For Ensuring Fourth Amendment Compliance By Police, David A. Harris
Picture This: Body Worn Video Devices ('Head Cams') As Tools For Ensuring Fourth Amendment Compliance By Police, David A. Harris
Articles
A new technology has emerged with the potential to increase police compliance with the law and to increase officers’ accountability for their conduct. Called “body worn video” (BWV) or “head cams,” these devices are smaller, lighter versions of the video and audio recording systems mounted on the dash boards of police cars. These systems are small enough that they consist of something the size and shape of a cellular telephone earpiece, and are worn by police officers the same way. Recordings are downloaded directly from the device into a central computer system for storage and indexing, which protects them from …