Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Fourth Amendment (4)
- Privacy (3)
- CSLI (2)
- Carpenter v. United States (2)
- Surveillance (2)
-
- Warrant (2)
- 389 U.S. 347 (1967) (1)
- 494 U.S. 259 (1990) (1)
- 4th Amendment (1)
- ACLU (1)
- All-party consent (1)
- Anonymity Technologies (1)
- Auto (1)
- Autonomous (1)
- Autonomous cars (1)
- Border (1)
- Border search (1)
- CBP (1)
- Carpenter (1)
- Cell phone (1)
- Cell-site location information (1)
- Cloud storage (1)
- Confiscating (1)
- Cybersecurity (1)
- DHS (1)
- Data (1)
- Data privacy (1)
- Decrypted communications (1)
- Discrimination (1)
- Eavesdropping (1)
- Publication
- Publication Type
Articles 1 - 14 of 14
Full-Text Articles in Privacy Law
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Catholic University Law Review
Technology may be created by humans, but we are dependent on it. Look around you: what technology is near you as you read this abstract? An iPhone? A laptop? Perhaps even an Amazon Echo. What do all these devices have in common? They store data in the cloud. And this data can contain some of our most sensitive information, such as business records or medical documents.
Even if you manage this cloud storage account, the government may be able to search your data without a warrant. Federal law provides little protection for cloud stored data. And the Fourth Amendment may …
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Catholic University Law Review
Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.
This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase …
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Catholic University Journal of Law and Technology
One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Catholic University Journal of Law and Technology
The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …
Privacy Vs. Protection: Why Tracking Mobile-Device Location Data Without A Warrant Requires A Fourth Amendment Exception, Andrew Stover
Privacy Vs. Protection: Why Tracking Mobile-Device Location Data Without A Warrant Requires A Fourth Amendment Exception, Andrew Stover
Catholic University Journal of Law and Technology
No abstract provided.
International Comity And The Non-State Actor, Microsoft: Why Law Enforcement Access To Data Stored Abroad Act (Leads Act) Promotes International Comity, Sabah Siddiqui
Catholic University Journal of Law and Technology
Currently large email service providers, such as Google, Microsoft and Yahoo are refusing to comply with warrants issued under the Secured Communications Act (“SCA”) because in many instances, the requested information may be stored in servers located abroad. In the dismissed Supreme Court case, In re Warrant to Search a Certain E-Mail Account Controlled & Maintained by Microsoft Corporation, the Supreme Court should have addressed whether an internet service provider must comply with a warrant issued under the SCA when the requested information is stored in a foreign country and whether enforcement of these warrants would be an impermissible …
Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin
Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin
Catholic University Journal of Law and Technology
No abstract provided.
Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones
Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones
Catholic University Journal of Law and Technology
No abstract provided.
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
Catholic University Journal of Law and Technology
No abstract provided.
Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal
Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal
Catholic University Journal of Law and Technology
No abstract provided.
Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa
Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa
Catholic University Journal of Law and Technology
No abstract provided.
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Catholic University Journal of Law and Technology
No abstract provided.
The Interception Of Communications Without A Court Order: Title Iii, Consent, And The Expectation Of Privacy, Clifford S. Fishman
The Interception Of Communications Without A Court Order: Title Iii, Consent, And The Expectation Of Privacy, Clifford S. Fishman
Scholarly Articles
No abstract provided.