Open Access. Powered by Scholars. Published by Universities.®

Judges Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Law

University of Denver

Articles 1 - 2 of 2

Full-Text Articles in Judges

Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Bernard Chao, Catherine Durso, Ian Farrell, Christopher Robertson Jan 2018

Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Bernard Chao, Catherine Durso, Ian Farrell, Christopher Robertson

Sturm College of Law: Faculty Scholarship

The Fourth Amendment protects against unreasonable “searches and seizures,” but in the digital age of stingray devices and IP tracking, what constitutes a search or seizure? The Supreme Court has held that the threshold question depends on and reflects the “reasonable expectations” of ordinary members of the public concerning their own privacy. For example, the police now exploit the “third party” doctrine to access data held by email and cell phone providers, without securing a warrant, on the Supreme Court’s intuition that the public has no expectation of privacy in that information. Is that assumption correct? If judges’ intuitions about …


No-Drop Civil Protection Orders: Exploring The Bounds Of Judicial Intervention In The Lives Of Domestic Violence Victims, Tamara L. Kuennen Jan 2007

No-Drop Civil Protection Orders: Exploring The Bounds Of Judicial Intervention In The Lives Of Domestic Violence Victims, Tamara L. Kuennen

Sturm College of Law: Faculty Scholarship

Whatever approach a judge takes to a victim's motion to vacate, there will be a risk. Women who are victims of domestic violence will be threatened or hurt or even killed, and the danger of this happening may increase or decrease based in part on the judge's decision. In the face of such risk, this article argues that on balance, the cost of sacrificing victim autonomy in these cases is too great, and that courts should defer to the victim's decision to vacate, except in the limited circumstance in which doing so is detrimental to an identifiable third party - …