Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Law

Privacy

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 49

Full-Text Articles in Privacy Law

The Automated Fourth Amendment, Maneka Sinha Jan 2024

The Automated Fourth Amendment, Maneka Sinha

Faculty Scholarship

Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …


Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti Jan 2023

Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti

"Dharmasisya” Jurnal Program Magister Hukum FHUI

The significant increase in online activities cannot be separated from the many active internet users who use mobile internet connections to carry out their daily activities, one of which is for the convenience of making ticket reservations at PT. Indonesian Railways (KAI). The purpose of this research is to find out the study of the business law of protecting consumer privacy in the online ticketing service of PT. KAI. Data collection was carried out by means of a literature study of the relationship between laws and regulations in consumer protection and the position of PT. KAI as business actors and …


Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson Jan 2023

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson

Seattle University Law Review

Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.


24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General Jun 2022

24th Annual Open Government Summit 2022, Roger Williams University School Of Law, Rhode Island Office Of The Attorney General

School of Law Conferences, Lectures & Events

No abstract provided.


Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski Jan 2022

Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski

Catholic University Journal of Law and Technology

No abstract provided.


Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace Nov 2021

Deepfake Privacy: Attitudes And Regulation, Matthew B. Kugler, Carly Pace

Northwestern University Law Review

Using only a series of images of a person’s face and publicly available software, it is now possible to insert the person’s likeness into a video and show them saying or doing almost anything. This “deepfake” technology has permitted an explosion of political satire and, especially, fake pornography. Several states have already passed laws regulating deepfakes, and more are poised to do so. This Article presents three novel empirical studies that assess public attitudes toward this new technology. In our main study, a representative sample of the U.S. adult population perceived nonconsensually created pornographic deepfake videos as extremely harmful and …


Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez Apr 2021

Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez

St. Mary's Law Journal

Abstract forthcoming.


Whose Rights Matter More—Police Privacy Or A Defendant’S Right To A Fair Trial?, Laurie L. Levenson Feb 2021

Whose Rights Matter More—Police Privacy Or A Defendant’S Right To A Fair Trial?, Laurie L. Levenson

Loyola of Los Angeles Law Review

The function of the prosecutor under the federal Constitution is not to tack as many skins of victims as possible to the wall. His function is to vindicate the right of the people as expressed in the laws and give those accused of crime a fair trial.

– William O. Douglas


Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2021

Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons Jan 2021

Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons

Reports & Public Policy Documents

We write as a group of experts in the legal regulation of artificial intelligence (AI), technology-facilitated violence, equality, and the use of AI systems by law enforcement in Canada. We have experience working within academia and legal practice, and are affiliated with LEAF and the Citizen Lab who support this letter.

We reviewed the Toronto Police Services Board Use of New Artificial Intelligence Technologies Policy and provide comments and recommendations focused on the following key observations:

1. Police use of AI technologies must not be seen as inevitable
2. A commitment to protecting equality and human rights must be integrated …


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.


Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones May 2019

Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones

Cleveland State Law Review

Courts are divided as to whether law enforcement can collect cell phone location information in real-time without a warrant under the Fourth Amendment. This Article argues that Carpenter v. United States requires a warrant under the Fourth Amendment prior to law enforcement’s collection of real-time cell phone location information. Courts that have required a warrant prior to the government’s collection of real-time cell phone location information have considered the length of surveillance. This should not be a factor. The growing prevalence and usage of cell phones and cell phone technology, the original intent of the Fourth Amendment, and United States …


Privacy And Security Across Borders, Jennifer Daskal Jan 2019

Privacy And Security Across Borders, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in what will likely be an ongoing and critically important debate about law enforcement access to data, the jurisdictional limits to such access, and the rules that apply. Each of these developments addresses a common set of challenges posed by the increased digitalization of information, the rising power of private companies delimiting access to that information, and the cross-border nature of investigations that involve digital evidence. And each has profound implications for privacy, security, and the possibility of meaningful democratic accountability and control. This Essay analyzes the …


The Left's Law-And-Order Agenda, Aya Gruber Jan 2019

The Left's Law-And-Order Agenda, Aya Gruber

Publications

No abstract provided.


Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal Nov 2018

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal

Life of the Law School (1993- )

No abstract provided.


Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan Jun 2018

Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan

Law School Blogs

No abstract provided.


Self Incrimination And Cryptographic Keys, Gregory S. Sergienko Mar 2018

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Criminal Employment Law, Benjamin Levin Jan 2018

Criminal Employment Law, Benjamin Levin

Publications

This Article diagnoses a phenomenon, “criminal employment law,” which exists at the nexus of employment law and the criminal justice system. Courts and legislatures discourage employers from hiring workers with criminal records and encourage employers to discipline workers for non-work-related criminal misconduct. In analyzing this phenomenon, my goals are threefold: (1) to examine how criminal employment law works; (2) to hypothesize why criminal employment law has proliferated; and (3) to assess what is wrong with criminal employment law. This Article examines the ways in which the laws that govern the workplace create incentives for employers not to hire individuals with …


Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal Jan 2018

Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

On March 23, President Trump signed the CLOUD Act, 1 thereby mooting one of the most closely watched Supreme Court cases this term: the Microsoft Ireland case. 2 This essay examines these extraordinary and fast-moving developments, explaining how the Act resolves the Supreme Court case and addresses the complicated questions of jurisdiction over data in the cloud. The developments represent a classic case of international lawmaking via domestic regulation, as mediated by major multinational corporations that manage so much of the world's data.


The Criminal Justice Black Box, Samuel R. Wiseman Jan 2017

The Criminal Justice Black Box, Samuel R. Wiseman

Scholarly Publications

"Big data "-- the collection and statistical analysis of numerous digital data points -- has transformed the commercial and policy realms, changing firms' understanding of consumer behavior and improving problems ranging from traffic congestion to drug interactions. In the criminal justice field, police now use data from widely dispersed monitoring equipment, crime databases, and statistical analysis to predict where and when crimes will occur, and police body cameras have the potential to both provide key evidence and reduce misconduct. But in many jurisdictions, digital access to basic criminal court records remains surprisingly limited, and, in contrast to the civil context, …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury Nov 2016

Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury

Notre Dame Law Review

Body camera implementation remains in its infancy stage. As such,

there is a dearth of legal scholarship analyzing the policy considerations associated

with body cameras. Instead of raising the issues involved and assessing

arguments for and against implementation, this Note assumes body cameras

are a force for good and are here to stay for the long haul. Consequently, the

goal of this Note is to analyze various issues involved in administering body

cameras against a backdrop of recently enacted state legislation—focusing

specifically on the tension between protecting privacy interests while also

ensuring public access to recordings. This Note examines these …


Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden Oct 2016

Recording A New Frontier In Evidence-Gathering: Police Body-Worn Cameras And Privacy Doctrines In Washington State, Katie Farden

Seattle University Law Review

This Note contributes to a growing body of work that weighs the gains that communities stand to make from police body-worn cameras against the tangle of concerns about how cameras may infringe on individual liberties and tread on existing privacy laws. While police departments have quickly implemented cameras over the past few years, laws governing the use of the footage body-worn cameras capture still trail behind. Notably, admissibility rules for footage from an officer’s camera, and evidence obtained with the help of that footage, remain on the horizon. This Note focuses exclusively on Washington State’s laws. It takes a clinical …


Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson Sep 2016

Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson

Stephen E Henderson

Chairman Barrington, Vice Chair Brooks, members of the Committee on Public Safety, Senators, and distinguished guests, I am grateful for the opportunity to speak to you today about unmanned aerial systems, or drones, and more particularly about their federal constitutional implications and what might be the constitutional restrictions on any legislation you might like to enact. I am the Judge Haskell A. Holloman Professor of Law at the University of Oklahoma, where my teaching and research focus on criminal law and procedure and privacy, including the constitutional rights pertaining thereto.

My topic is not an easy one. The constitutional law …


Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie Jan 2016

Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie

Articles, Book Chapters, & Popular Press

Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry. Using a pending border case …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu Nov 2015

Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu

Seattle University Law Review

A vehicle on a public thoroughfare is observed driving erratically and careening across the roadway. After the vehicle strikes another passenger car and comes to a stop, the responding officer notices in the driver the telltale symptoms of intoxication—bloodshot eyes, slurred speech, and a distinct odor of intoxicants. On these facts, a lawfully-procured warrant authorizing the extraction of the driver’s blood is obtained. However, the document fails to circumscribe the manner and variety of testing that may be performed on the sample. Does this lack of particularity render the warrant constitutionally infirm as a mandate for chemical analysis of the …


Bad News: Privacy Ruling To Increase Press Litigation, The Florida Star V. B.J.F., Mary Ellen Hockwalt Jul 2015

Bad News: Privacy Ruling To Increase Press Litigation, The Florida Star V. B.J.F., Mary Ellen Hockwalt

Akron Law Review

This note analyzes the history and precedent upon which the Court relied in reaching Florida Star's "harsh outcome." Next, the note discusses how the Court, by refusing to extend its holding beyond the facts of the case and give broad Constitutional protection to publications of truth, failed to provide lower courts with any guidance in deciding future invasion of privacy actions. Finally, the note examines the Court's balancing test: weighing the privacy interests of a crime victim against the newspaper's freedom to print truthful information.


Wilson V. Arkansas: Thirty Years After The Supreme Court Addresses The Knock And Announce Issue, Todd Witten Jul 2015

Wilson V. Arkansas: Thirty Years After The Supreme Court Addresses The Knock And Announce Issue, Todd Witten

Akron Law Review

This Note will initially discuss the historical background of the knock and announce principle and its evolution from the English common law. Next, the Note will address the facts and the holdings of Wilson, in the lower courts and the Supreme Court. Finally, the Note will analyze the Wilson decision and its precedential value.


Two Wrongs Don't Make A Fourth Amendment Right: Samson Court Errs In Choosing Proper Analytical Framework, Errs In Result, Parolees Lose Fourth Amendment Protection, Rachael A. Lynch Jul 2015

Two Wrongs Don't Make A Fourth Amendment Right: Samson Court Errs In Choosing Proper Analytical Framework, Errs In Result, Parolees Lose Fourth Amendment Protection, Rachael A. Lynch

Akron Law Review

This Note will follow the Fourth Amendment from its origins to its modern application to parolee rights, as evidenced by the Samson Court. Part II focuses on the Fourth Amendment, from the circumstances surrounding its adoption to modern court cases that have applied its tenets to prisoners, probationers, and, finally, parolees. Part III details the Supreme Court’s decision in Samson v. California, including a thorough discussion of the facts that gave rise to the case and lower court decisions. Part IV explores the problems with the Court’s framework and suggests other possible frameworks the Court could have used to come …