Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Privacy Law

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips Aug 2020

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips

Journal of Digital Forensics, Security and Law

Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …


Unlimited Data Search Plan: Warrantless Border Search Of Mobile Device Data Likely Unconstitutional For Violating The Fundamental Right To Informational Privacy, Atanu Das Jan 2020

Unlimited Data Search Plan: Warrantless Border Search Of Mobile Device Data Likely Unconstitutional For Violating The Fundamental Right To Informational Privacy, Atanu Das

St. John's Law Review

(Excerpt)

Part I of this Article discusses a case in which a United States citizen was subject to an unconstitutional warrantless border search of his mobile device data. Part II explains the history and current state of Supreme Court jurisprudence of the border search exception doctrine. Part III explains the way in which Supreme Court jurisprudence finds the right to informational privacy for mobile device data to be a fundamental right. Part IV discusses the reluctance of some legal commentators to find that a governmental intrusion on the right to informational privacy is subject to strict scrutiny. Part V finds …


United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko Mar 2018

United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko

Greg Sergienko

Five years ago, in a contribution to these pages, I suggested that the Supreme Court's oldest precedents and the original intent of the framers of the Constitution precluded the use of evidence produced under a grant of immunity against the producer, even though the material produced included documents that the producer had not been compelled to write. This implied that information concealed with a cryptographic key could not be used in a criminal prosecution against someone from whom the key had been obtained under a grant of immunity. The issue, however, was doubtful given the tendency of the Court to …


Self Incrimination And Cryptographic Keys, Gregory S. Sergienko Mar 2018

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


The Right To Silence As Protecting Mental Control, Dov Fox Jun 2015

The Right To Silence As Protecting Mental Control, Dov Fox

Akron Law Review

This Article examines the idea that individuals have a moral and constitutional right of control over the use of their thoughts vis-à-vis the state. As a point of departure, I consider the prospect of a forensic neuroimaging device that was capable of eliciting recall and recognition from a criminal suspect without the suspect’s having even to answer an interrogator’s question. Reflection on government access to this sort of interrogation technique suggests that the state should be prohibited from either extracting a person’s thoughts without her consent or making use of her compelled thoughts to lay criminal blame upon her. Though …


Response: The Problems With Privacy's Problem, Louis Michael Seidman Mar 1995

Response: The Problems With Privacy's Problem, Louis Michael Seidman

Michigan Law Review

A Response to William J. Stuntz's "Privacy's Problem and the Law of Criminal Procedure"


Reply, William J. Stuntz Mar 1995

Reply, William J. Stuntz

Michigan Law Review

A Reply to Louis Michael Seidman's Response


Privacy's Problem And The Law Of Criminal Procedure, William J. Stuntz Mar 1995

Privacy's Problem And The Law Of Criminal Procedure, William J. Stuntz

Michigan Law Review

Part I of this article addresses the connection between privacy-based limits on police authority and substantive limits on government power as a general matter. Part II briefly addresses the effects of that connection on Fourth and Fifth Amendment law, both past and present. Part ID suggests that privacy protection has a deeper problem: it tends to obscure more serious harms that attend police misconduct, harms that flow not from information disclosure but from the police use of force. The upshot is that criminal procedure would be better off with less attention to privacy, at least as privacy is defined in …