Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Fourth Amendment

Critical Look At The So-Called Locker Room Mentality As A Means To Rationalize The Drug Testing Of Student Athletes, Walter Champion Jul 2015

Critical Look At The So-Called Locker Room Mentality As A Means To Rationalize The Drug Testing Of Student Athletes, Walter Champion

Walter T Champion Jr.

No abstract provided.


Whatever Happened To The Fourth Amendment: Undocumented Immigrants' Rights After Ins V. Lopenz-Mendoza And United States V. Verdugo-Urquidez, Victor Romero May 2015

Whatever Happened To The Fourth Amendment: Undocumented Immigrants' Rights After Ins V. Lopenz-Mendoza And United States V. Verdugo-Urquidez, Victor Romero

Victor C. Romero

This Note rejects the Court's approach to the Fourth Amendment in Lopez and Verdugo and attempts to redefine the boundaries of Fourth Amendment protections for undocumented immigrants. Part I examines the impact of the Lopez and Verdugo decisions upon undocumented immigrants' Fourth Amendment rights. Part II evaluates the arguments for extending Fourth Amendment protections to undocumented immigrants. Viewing the Fourth Amendment as a restriction on government intrusion, Part III examines the constitutional remedies available to undocumented immigrants. This part rejects the Lopez restrictions on the applicability of the exclusionary rule and concludes that the Fourth Amendment neither draws distinctions among …


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Apr 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing …


Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald Jun 2014

Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald

Susan Freiwald

This article measures the new ABA Standards for Criminal Justice: Law Enforcement Access to Third Party Records (LEATPR Standards) success by assessing the guidance they provide legislators interested in updating pertinent law regarding one specific type of data. Scholars should not expect the Standards to yield the same conclusions they would have furnished had they been able to draft a set of standards by themselves. The Standards emerged after years of painstaking consensus building and compromise no individual committee member got entirely what he wanted. Nonetheless, not every product of a committee turns out to have been worth the effort, …


Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald Dec 2013

Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald

Susan Freiwald

Despite Intelligence Community leaders’ assurances, the detailed knowledge of the NSA metadata program (the 215 program) that flowed from the Snowden revelations did not assuage concerns about the program. Three groups, the American Civil Liberties Union, the Electronic Frontier Foundation, and the Electronic Privacy Information Center, brought immediate legal challenges with mixed results in the lower courts. The conflict, in the courts, Congress, and the press, has revealed that the proponents and opponents of Section 215 view the program in diametrically opposed ways. Program proponents see a vital intelligence program operating within legal limits, which has suffered a few compliance …


Down To The Wire: Assessing The Constitutionality Of The National Security Agency's Warrantless Wiretapping Program: Exit The Rule Of Law, Fletcher Baldwin, Robert Shaw Jul 2013

Down To The Wire: Assessing The Constitutionality Of The National Security Agency's Warrantless Wiretapping Program: Exit The Rule Of Law, Fletcher Baldwin, Robert Shaw

Fletcher N. Baldwin

The article discusses the constitutionality of warrantless wiretapping surveillance by the National Security Agency (NSA) on U.S. citizens. The wiretapping program existed weeks after the September 11, 2001 attacks, on the justification that Congress authorized the president to wiretap U.S. citizens without a warrant, and that the president had inherent authority as commander-in-chief. But it is argued that Congress did not expressly authorize the president to conduct warrantless wiretapping and that he does not have such inherent authority.

We intend this Article to be a commentary on the constitutionality of the NSA wiretapping program solely as it relates to the …


The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald Dec 2012

The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald

Susan Freiwald

The Supreme Court’s decision in United States v. Jones clearly established that use of GPS tracking surveillance constitutes a search under the Fourth Amendment. But the Court left many other questions unanswered about the nature and scope of the constitutional privacy right in location data. A review of lower court decisions in the wake of Jones reveals that, rather than begin to answer the questions that Jones left open, courts are largely avoiding substantive Fourth Amendment analysis of location data privacy. Instead, they are finding that officers who engaged in GPS tracking and related surveillance operated in good faith, based …


Reforming Surveillance Law: The Swiss Model., Susan Freiwald, Sylvain Méille Dec 2012

Reforming Surveillance Law: The Swiss Model., Susan Freiwald, Sylvain Méille

Susan Freiwald

As implemented over the past twenty-seven years, the Electronic Communications Privacy Act (“ECPA”), which regulates electronic surveillance by law enforcement agents, has become incomplete, confusing, and ineffective. In contrast, a new Swiss law, CrimPC, regulates law enforcement surveillance in a more comprehensive, uniform, and effective manner. This Article compares the two approaches and argues that recent proposals to reform ECPA in a piecemeal fashion will not suffice. Instead, Swiss CrimPC presents a model for more fundamental reform of U.S. law.

This Article is the first to analyze the Swiss law with international eyes and demonstrate its advantages over the U.S. …


Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague Dec 2010

Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague

Robert Sprague

This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …