Open Access. Powered by Scholars. Published by Universities.®

Evidence Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Privacy Law

Institution
Keyword
Publication
Publication Type

Articles 1 - 6 of 6

Full-Text Articles in Evidence

Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary Dec 2017

Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary

William & Mary Bill of Rights Journal

This Article addresses touch DNA, chemical analysis of skin traces, and the implications for crime scene investigation, arguing that changes in how trace evidence is analyzed require alterations in the law’s approach to its use. Part I discusses the history of traditional DNA analysis. Part II examines the emergence of touch DNA and related technologies and how they differ from traditional DNA analysis. Part III outlines the specific risks created by the collection and storing of results under the current outdated jurisprudence. Part IV focuses on specific risks to suspects and victims of crime. Part V proposes a legal ...


Contemplating The Use Of Classified Or State Secret Information Obtained Ex Parte On The Merits In Civil Litigation: Bl(A)Ck Tea Society V. City Of Boston, Brian M. Tomney Nov 2017

Contemplating The Use Of Classified Or State Secret Information Obtained Ex Parte On The Merits In Civil Litigation: Bl(A)Ck Tea Society V. City Of Boston, Brian M. Tomney

Maine Law Review

In Bl(a)ck Tea Society v. City of Boston, the First Circuit Court of Appeals affirmed, without dissent, a district court's ruling denying protesters at the 2004 Democratic National Convention a preliminary injunction designed to force the City of Boston to modify its designated demonstration zone (DZ) and remove some of the draconian security measures surrounding the zone. The injunction was denied by Judge Woodlock after he personally inspected the DZ and determined that, given “constraints of time, geography, and safety,” there were no viable alternatives—to site location or construction of the DZ itself—that could reasonably ...


Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg May 2017

Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg

Law Faculty Scholarship

[Excerpt] “Recent research indicates that New Hampshire has some of the highest rates of sexual assault in the nation; nearly one in four New Hampshire women and one in 20 New Hampshire men will experience sexual assault. Although reporting a crime can be hard for anyone, sexual assault victims have particular reasons for not reporting. After an assault, a rape victim typically feels embarrassment, shame and fears reprisal (most of these crimes are committed by an acquaintance). The deeply personal nature of rape makes it uniquely traumatizing and confusing.”


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started ...


Hotline Ping: Harmonizing Contemporary Cell Phone Technology With Traditional Fourth Amendment Protections, Brianne M. Chevalier Jan 2017

Hotline Ping: Harmonizing Contemporary Cell Phone Technology With Traditional Fourth Amendment Protections, Brianne M. Chevalier

Roger Williams University Law Review

No abstract provided.


Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy Jan 2017

Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy

Brooklyn Law Review

The news story is now familiar: hackers breach a security system and post internal, confidential information online for anyone with an Internet connection to comb through. This digital version of whistleblowing, called “hacktivism,” is attractive to the media, which has leaned on broad First Amendment protections to widely cover the confidential communications revealed by hackers. These hacks also provide attorneys with enticing opportunities to look through previously confidential files. But as ethics and evidentiary rules stand, it is not clear if an attorney may view the files, let alone use them as evidence in litigation. That companies are hacked is ...