Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Procedure

PDF

2020

Institution
Keyword
Publication
Publication Type

Articles 1 - 19 of 19

Full-Text Articles in Privacy Law

Law Enforcement’S Use Of Facial Recognition Software In United States Cities, Samantha Jean Wunschel Dec 2020

Law Enforcement’S Use Of Facial Recognition Software In United States Cities, Samantha Jean Wunschel

Honors Program Theses and Projects

Facial recognition software is something we use every day, whether it’s a suggested tag on our Facebook post or a faster way to unlock our phones. As technology becomes increasingly pervasive in our lives, law enforcement has adapted to utilize the new tools available in accessory to their investigations and the legal process.


Dispute Settlement Under The African Continental Free Trade Area Agreement: A Preliminary Assessment, Olabisi D. Akinkugbe Nov 2020

Dispute Settlement Under The African Continental Free Trade Area Agreement: A Preliminary Assessment, Olabisi D. Akinkugbe

Articles, Book Chapters, & Popular Press

The African Continental Free Trade Area Agreement (AfCFTA) will add a new dispute settlement system to the plethora of judicial mechanisms designed to resolve trade disputes in Africa. Against the discontent of Member States and limited impact the existing highly legalized trade dispute settlement mechanisms have had on regional economic integration in Africa, this paper undertakes a preliminary assessment of the AfCFTA Dispute Settlement Mechanism (DSM). In particular, the paper situates the AfCFTA-DSM in the overall discontent and unsupportive practices of African States with highly legalized dispute settlement systems and similar WTO-Styled DSMs among other shortcomings. Notwithstanding the transplantation of …


Enough Is As Good As A Feast, Noah C. Chauvin Oct 2020

Enough Is As Good As A Feast, Noah C. Chauvin

Seattle University Law Review

Ipse Dixit, the podcast on legal scholarship, provides a valuable service to the legal community and particularly to the legal academy. The podcast’s hosts skillfully interview guests about their legal and law-related scholarship, helping those guests communicate their ideas clearly and concisely. In this review essay, I argue that Ipse Dixit has made a major contribution to legal scholarship by demonstrating in its interview episodes that law review articles are neither the only nor the best way of communicating scholarly ideas. This contribution should be considered “scholarship,” because one of the primary goals of scholarship is to communicate new ideas.


The Sacred Fourth Amendment Text, Christopher Slobogin Oct 2020

The Sacred Fourth Amendment Text, Christopher Slobogin

Michigan Law Review Online

The Supreme Court’s jurisprudence governing the Fourth Amendment’s “threshold”—a word meant to refer to the types of police actions that trigger the amendment’s warrant and reasonableness requirements—has confounded scholars and students alike since Katz v. United States. Before that 1967 decision, the Court’s decisions on the topic were fairly straightforward, based primarily on whether the police trespassed on the target’s property or property over which the target had control. After that decision—which has come to stand for the proposition that a Fourth Amendment search occurs if police infringe an expectation of privacy that society is prepared to recognize as …


How Definitive Is Fourth Amendment Textualism?, Evan H. Caminker Oct 2020

How Definitive Is Fourth Amendment Textualism?, Evan H. Caminker

Michigan Law Review Online

Professor Jeffrey Bellin’s excellent article advances a comprehensive and straightforward textual approach to determining what policing activities constitute “searches” triggering the protections of the Fourth Amendment. Bellin’s thesis is that a text-based approach to interpreting the Amendment is superior to the Supreme Court’s current approach, which ever since Katz v. United States has defined “search” primarily by reference to a non-textual “reasonable expectation of privacy” standard. After soundly criticizing the ungrounded and highly subjective nature of the Katz test, Bellin declares that the Court should instead simply follow where the text leads: the Amendment protects people from a search, meaning …


Table Of Contents, Seattle University Law Review Sep 2020

Table Of Contents, Seattle University Law Review

Seattle University Law Review

Table of Contents


Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk Apr 2020

Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk

Northwestern Journal of Law & Social Policy

Having an eviction record “blacklists” tenants from finding future housing. Even renters with mere eviction filings—not eviction orders—on their records face the harsh collateral consequences of eviction. This Note argues that eviction records should be sealed at filing and only released into the public record if a landlord prevails in court. Juvenile record expungement mechanisms in Illinois serve as a model for one way to protect people with eviction records. Recent updates to the Illinois juvenile expungement process provided for the automatic expungement of certain records and strengthened the confidentiality protections of juvenile records. Illinois protects juvenile records because it …


A Third-Party Doctrine For Digital Metadata, H. Brian Holland Apr 2020

A Third-Party Doctrine For Digital Metadata, H. Brian Holland

Faculty Scholarship

For more than four decades, the third-party doctrine was understood as a bright-line, categorical rule: there is no legitimate privacy interest in any data that is voluntarily disclosed or conveyed to a third party. But this simple rule has dramatic effects in a world of ubiquitous networked computing, mobile technologies, and the commodification of information. The digital devices that facilitate our daily participation in modern society are connected through automated infrastructures that are designed to generate vast quantities of data, nearly all of which is captured, utilized, and stored by third-party service providers. Under a plain reading of the third-party …


Law In The Time Of Covid-19, Katharina Pistor Apr 2020

Law In The Time Of Covid-19, Katharina Pistor

Faculty Books

The COVID-19 crisis has ended and upended lives around the globe. In addition to killing over 160,000 people, more than 35,000 in the United States alone, its secondary effects have been as devastating. These secondary effects pose fundamental challenges to the rules that govern our social, political, and economic lives. These rules are the domain of lawyers. Law in the Time of COVID-19 is the product of a joint effort by members of the faculty of Columbia Law School and several law professors from other schools.

This volume offers guidance for thinking about some the most pressing legal issues the …


Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi Mar 2020

Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi

St. John's Law Review

(Excerpt)

Part I of this Note discusses the fundamental science behind DNA and defines and explains the process of familial DNA searching. Part I also discusses how Carpenter v. United States provides a framework to begin thinking about the unique nature of DNA and privacy implications for its use, and why the revealing nature of this type of data warrants protection. Part II of this Note delves into the lack of constitutional and statutory protections for DNA in recreational DNA databases. First, Part II explains that traditional Fourth Amendment concepts, like search warrants, probable cause, reasonable expectation of privacy, third-party …


Terms Of Service: The Use And Protection Of Genomic Information By Companies, Databases, And Law Enforcement, Sophia Kallas Mar 2020

Terms Of Service: The Use And Protection Of Genomic Information By Companies, Databases, And Law Enforcement, Sophia Kallas

Honors Theses

Private genomic companies have become a popular trend in the last two decades by providing customers with information regarding their ancestry and health risks. However, the profiles received from these companies can also be uploaded to public databases for various purposes, including locating other family members. Both testing companies and public databases have private interests, and both are at risk of law enforcement intervention for the purpose of forensic familial searching. There is little federal legislation protecting the privacy of an individual’s genetic profile. Consequently, it has been up to federal agencies, state laws, and judicial precedents to prevent the …


Republican Attorneys General Association V. Las Vegas Metropolitan Police Department, 136 Nev. Adv. Op. 3 (Feb. 20, 2020), Nicholas Hagenkord Feb 2020

Republican Attorneys General Association V. Las Vegas Metropolitan Police Department, 136 Nev. Adv. Op. 3 (Feb. 20, 2020), Nicholas Hagenkord

Nevada Supreme Court Summaries

The Court determined that (1) the district court did not err in denying appellant Republican Attorneys General Association’s (RAGA) petition for a writ of mandamus under the Nevada Public Records Act (NPRA) seeking bodycam footage regarding juveniles and former State Senator Aaron Ford’s interactions with police; and (2) the district court abused its discretion in denying RAGA’s request for other requested records by not assessing whether these records contain any nonconfidential material.


Stingray Cell-Site Simulator Surveillance And The Fourth Amendment In The Twenty-First Century: A Review Of The Fourth Amendment In An Age Of Surveillance, And Unwarranted, Harvey Gee Jan 2020

Stingray Cell-Site Simulator Surveillance And The Fourth Amendment In The Twenty-First Century: A Review Of The Fourth Amendment In An Age Of Surveillance, And Unwarranted, Harvey Gee

St. John's Law Review

(Excerpt)

This Review discusses two timely and insightful books examining the changing relationship between privacy and the Fourth Amendment in the digital era. Part I discusses the tensions between the need to protect privacy rights and the slowly evolving legal landscape during a time of rapidly changing technology, to introduce David Gray’s The Fourth Amendment in an Age of Surveillance. His book explains how the Fourth Amendment, though embattled, can have a prominent role in twenty-first century discussions of privacy, technology, and surveillance. Gray’s analysis is engaged to broaden the conversation about Stingray technology. This section analyzes a sampling of …


From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia Jan 2020

From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


United States V. Touset, Katelyn James Jan 2020

United States V. Touset, Katelyn James

NYLS Law Review

No abstract provided.


Table Of Contents, Seattle University Law Review Jan 2020

Table Of Contents, Seattle University Law Review

Seattle University Law Review

Table of Contents


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.


In Memory Of Professor James E. Bond, Janet Ainsworth Jan 2020

In Memory Of Professor James E. Bond, Janet Ainsworth

Seattle University Law Review

Janet Ainsworth, Professor of Law at Seattle University School of Law: In Memory of Professor James E. Bond.