Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Apple (1)
- Attorney-client privilege; full and frank conversations; hack; hackers; hacktivism; whistleblowing; technology; cybersecurity; ethics; bar associations; evidence; Federal Rules of Evidence; Federal Rules of Civil Procedure; claw back agreements; quick peek agreements; litigation; waiver; express waiver; implicit waiver; privileged communications; inadvertent disclosure; unintentional disclosure; unauthorized disclosure; purloined communications; stolen documents; technology; email; Wikileaks; Panama papers; Ashley Madison; Clinton Foundation; Teneo; John Podesta; Sony Entertainment; public domain; duty of confidentiality (1)
- Cell site location information (1)
- Civil Liberties (1)
- Civil litigation (1)
-
- Classified (1)
- Confidentiality (1)
- DNA Evidence (1)
- DNA Identification (1)
- Demonstration zone (1)
- Encryption (1)
- Ex parte (1)
- Fourth Amendment (1)
- Hack (1)
- Hacking (1)
- Historical CSLI (1)
- IPhone (1)
- Injunction (1)
- National Security (1)
- Passwords (1)
- Privacy (1)
- Privacy of cell phone records (1)
- Probable cause (1)
- Scientific Evidence (1)
- Search and Seizure (1)
- Security (1)
- Sexual assault (1)
- Sexual history (1)
- Smarthphone (1)
- State secret information (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Evidence
Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary
Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary
William & Mary Bill of Rights Journal
This Article addresses touch DNA, chemical analysis of skin traces, and the implications for crime scene investigation, arguing that changes in how trace evidence is analyzed require alterations in the law’s approach to its use. Part I discusses the history of traditional DNA analysis. Part II examines the emergence of touch DNA and related technologies and how they differ from traditional DNA analysis. Part III outlines the specific risks created by the collection and storing of results under the current outdated jurisprudence. Part IV focuses on specific risks to suspects and victims of crime. Part V proposes a legal framework …
Contemplating The Use Of Classified Or State Secret Information Obtained Ex Parte On The Merits In Civil Litigation: Bl(A)Ck Tea Society V. City Of Boston, Brian M. Tomney
Maine Law Review
In Bl(a)ck Tea Society v. City of Boston, the First Circuit Court of Appeals affirmed, without dissent, a district court's ruling denying protesters at the 2004 Democratic National Convention a preliminary injunction designed to force the City of Boston to modify its designated demonstration zone (DZ) and remove some of the draconian security measures surrounding the zone. The injunction was denied by Judge Woodlock after he personally inspected the DZ and determined that, given “constraints of time, geography, and safety,” there were no viable alternatives—to site location or construction of the DZ itself—that could reasonably occur before the convention started. …
Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg
Why New Hampshire Must Update Rape Shield Laws, Amy Vorenberg
Law Faculty Scholarship
[Excerpt] “Recent research indicates that New Hampshire has some of the highest rates of sexual assault in the nation; nearly one in four New Hampshire women and one in 20 New Hampshire men will experience sexual assault. Although reporting a crime can be hard for anyone, sexual assault victims have particular reasons for not reporting. After an assault, a rape victim typically feels embarrassment, shame and fears reprisal (most of these crimes are committed by an acquaintance). The deeply personal nature of rape makes it uniquely traumatizing and confusing.”
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Georgia State University Law Review
On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.
Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …
Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy
Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy
Brooklyn Law Review
The news story is now familiar: hackers breach a security system and post internal, confidential information online for anyone with an Internet connection to comb through. This digital version of whistleblowing, called “hacktivism,” is attractive to the media, which has leaned on broad First Amendment protections to widely cover the confidential communications revealed by hackers. These hacks also provide attorneys with enticing opportunities to look through previously confidential files. But as ethics and evidentiary rules stand, it is not clear if an attorney may view the files, let alone use them as evidence in litigation. That companies are hacked is …
Hotline Ping: Harmonizing Contemporary Cell Phone Technology With Traditional Fourth Amendment Protections, Brianne M. Chevalier
Hotline Ping: Harmonizing Contemporary Cell Phone Technology With Traditional Fourth Amendment Protections, Brianne M. Chevalier
Roger Williams University Law Review
No abstract provided.