Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Fourth Amendment

Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones Apr 2023

Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones

Honors Projects

DNA dragnets have attracted both public and scholarly criticisms that have yet to be resolved by the Courts. This review will introduce a modern understanding of DNA analysis, a complete introduction to past and present Fourth and Fourteenth Amendment jurisprudence, and existing suggestions concerning similar issues in legal scholarship. Considering these contexts, this review concludes that a focus on privacy and property at once, with a particular sensitivity to the inseverable relationship between the two interests, is Constitutionally consistent with precedent and the most workable means of answering the question at hand.


Rwu Law News: The Newsletter Of Roger Williams University School Of Law 12-2020, Barry Bridges, Michael M. Bowden, Nicole Dyszlewski, Louisa Fredey Dec 2020

Rwu Law News: The Newsletter Of Roger Williams University School Of Law 12-2020, Barry Bridges, Michael M. Bowden, Nicole Dyszlewski, Louisa Fredey

Life of the Law School (1993- )

No abstract provided.


Extraterritorial Rights In Border Enforcement, Fatma Marouf Mar 2020

Extraterritorial Rights In Border Enforcement, Fatma Marouf

Faculty Scholarship

Recent shifts in border enforcement policies raise pressing new questions about the extraterritorial reach of constitutional rights. Policies that keep asylum seekers in Mexico, expand the use of expedited removal, and encourage the cross-border use of force require courts to determine whether noncitizens who are physically outside the United States, or who are treated for legal purposes as being outside even if they have entered the country, can claim constitutional protections. This Article examines a small but growing body of cases addressing these extraterritoriality issues in the border enforcement context, focusing on disparities in judicial analyses that have resulted in …


Brief Of The National Association For Public Defense As Amici Curiae Supporting Petitioner, Byrd V. U.S. (U.S. June 12, 2017) (No. 16- 1371)., Janet Moore Jun 2017

Brief Of The National Association For Public Defense As Amici Curiae Supporting Petitioner, Byrd V. U.S. (U.S. June 12, 2017) (No. 16- 1371)., Janet Moore

Faculty Articles and Other Publications

More than two centuries after it was ratified, the Fourth Amendment continues to protect the “right of the people to be secure” from “unreasonable searches.” U.S. Const. amend. IV. Modern technological advances and social developments do not render our rights “any less worthy of the protection for which the Founders fought.” Riley v. California, 134 S. Ct. 2473, 2494–95 (2014). This Court plays an essential role in ensuring that the Fourth Amendment retains its vitality as an indispensable safeguard of liberty, even as Americans dramatically change the ways they organize their everyday affairs. This case calls for the Court to …


Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele Jan 2017

Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele

Faculty Publications

Fall 2017 saw a major privacy case with international implications reach the U.S. Supreme Court this term, Carpenter v. United States. Now a second such case pits the Government against Big Tech in United States v. Microsoft. Carpenter is a criminal case involving federal seizure of cell phone location data from service providers. Arising under the “reasonable grounds” provision of the Stored Communications Act (SCA), the case accentuates Americans’ lack of constitutional protection for personal data in third-party hands, in contrast with emerging global privacy norms. The second major privacy case headed for Supreme Court decision in 2018 also arises …


13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law Apr 2016

13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Newsroom: A True Original(Ist) 02-15-2016, Michael M. Bowden Feb 2016

Newsroom: A True Original(Ist) 02-15-2016, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski Oct 2014

Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski

Faculty Publications

For several years, states have grappled with the problem of cyberbullying and its sometimes devastating effects. Because cyberbullying often occurs between students, most states have understandably looked to schools to help address the problem. To that end, schools in forty-six states have the authority to intervene when students engage in cyberbullying. This solution seems all to the good unless a close examination of the cyberbullying laws and their implications is made. This Article explores some of the problematic implications of the cyberbullying laws. More specifically, it focuses on how the cyberbullying laws allow schools unprecedented surveillance authority over students. This …


Spillover Across Remedies, Michael Coenen Jan 2014

Spillover Across Remedies, Michael Coenen

Journal Articles

Remedies influence rights, and rights apply across remedies. Combined together, these two phenomena produce the problem of spillover across remedies. The spillover problem occurs when considerations specific to one remedy affect the definition of a substantive rule that governs in other remedial settings. For example, the severe remedial consequences of suppressing incriminating evidence might generate substantive Fourth Amendment precedents that make other Fourth Amendment remedies (such as damage awards, injunctions, or ex ante denials of search warrants) more difficult to obtain. Or, the rule of lenity might yield a narrowed reading of a statutory rule in a criminal case, which …


Eyes In The Sky: Constitutional And Regulatory Approaches To Domestic Drone Deployment, Hillary B. Farber Jan 2013

Eyes In The Sky: Constitutional And Regulatory Approaches To Domestic Drone Deployment, Hillary B. Farber

Faculty Publications

This article begins with a current look at the deployment of drones domestically, both in terms of their use and the procedure for attaining approval for flight. Part II examines the capabilities of drones. Part III considers the Supreme Court's current Fourth Amendment jurisprudence and its application to law enforcement's use of drones. Part IV reviews existing and proposed federal and state regulation of drones. Part V offers constitutional and legislative prescriptions for regulating drones.


The Fourth Amendment, Ethan Payne Jan 2012

The Fourth Amendment, Ethan Payne

A with Honors Projects

This projects explains the fourth amendment using skits and a PowerPoint presentation.


The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Jan 2007

The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Journal Articles

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …


The Constitutional Theory Of The Fourth Amendment, Gerard V. Bradley Jan 1989

The Constitutional Theory Of The Fourth Amendment, Gerard V. Bradley

Journal Articles

This Article will, in large part, present its thesis regarding fourth amendment doctrine by employing, as an illustration, a recent application of the current approach by the Seventh Circuit Court of Appeals. In United States v. Torres, the Seventh Circuit held video surveillance constitutional and further found that the judiciary had the authority to issue warrants for such a technique. Although welcomed by prosecutors and law enforcement officials, this decision highlights the absurdity of the current interpretation of the reasonableness clause. Moreover, Torres provides a vehicle through which this Article's historical interpretation can be brought into focus under the cold …