Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Supreme Court of the United States

PDF

Privacy

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 36

Full-Text Articles in Privacy Law

Justice David Hackett Souter And The Right To Privacy, Scott P. Johnson Jan 2024

Justice David Hackett Souter And The Right To Privacy, Scott P. Johnson

Mitchell Hamline Law Review

No abstract provided.


Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti Jan 2023

Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti

"Dharmasisya” Jurnal Program Magister Hukum FHUI

The significant increase in online activities cannot be separated from the many active internet users who use mobile internet connections to carry out their daily activities, one of which is for the convenience of making ticket reservations at PT. Indonesian Railways (KAI). The purpose of this research is to find out the study of the business law of protecting consumer privacy in the online ticketing service of PT. KAI. Data collection was carried out by means of a literature study of the relationship between laws and regulations in consumer protection and the position of PT. KAI as business actors and …


Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson Jan 2023

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson

Seattle University Law Review

Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.


The Tesla Meets The Fourth Amendment, Adam M. Gershowitz Jan 2023

The Tesla Meets The Fourth Amendment, Adam M. Gershowitz

Faculty Publications

Can police search a smart car’s computer without a warrant? Although the Supreme Court banned warrantless searches of cell phones incident to arrest in Riley v. California, the Court left the door open for warrantless searches under other exceptions to the warrant requirement. This is the first article to argue that the Fourth Amendment’s automobile exception currently permits the police to warrantlessly dig into a vehicle’s computer system and extract vast amounts of cell phone data. Just as the police can rip open seats or slash tires to search for drugs under the automobile exception, the police can warrantlessly …


The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson Jan 2023

The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson

Utah Law Faculty Scholarship

For over fifty years, the Fourth Amendment’s scope has been largely dictated by the Katz test, which applies the Amendment’s protections only when the government has violated a person’s “reasonable expectation of privacy.” This vague standard is one of the most criticized doctrines in all of American law, and its lack of coherence has made Fourth Amendment search law notoriously confusing. Things have become even more complex following the Supreme Court’s landmark decision in Carpenter v. United States, which has spawned its own alternative test for determining the Fourth Amendment’s scope. The emerging Carpenter test looks to the revealing nature …


Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, William A. Ballentine Apr 2021

Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, William A. Ballentine

Chicago-Kent Law Review

No abstract provided.


Two Constitutional Rights, Two Constitutional Controversies, Michael J. Perry Jan 2021

Two Constitutional Rights, Two Constitutional Controversies, Michael J. Perry

Faculty Articles

My overarching aim in the Article is to defend a particular understanding of two constitutional rights and, relatedly, a particular resolution of two constitutional controversies. The two rights I discuss are among the most important rights protected by the constitutional law of the United States: the right to equal protection and the right of privacy. As I explain in the Article, the constitutional right to equal protection is, at its core, the human right to moral equality, and the constitutional right to privacy is best understood as a version of the human right to moral freedom. The two controversies I …


The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn Dec 2020

The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn

Arkansas Law Review

Each day that Houston drivers exit from Interstate 45 to drive to downtown Houston, they pass an odd sight. Nestled within some bushes is an encampment of tents. This encampment is very clearly located on public property adjacent to the interstate highway, and equally clearly populated by homeless individuals. While local police ostensibly tolerate this presence, at least temporarily, the sight frequently evokes an image in my mind of a police search of those tents. This thought is especially prominent on the days I am driving to my law school, South Texas College of Law Houston, to teach my federal …


The Fourth Amendment At Home, Thomas P. Crocker Oct 2020

The Fourth Amendment At Home, Thomas P. Crocker

Indiana Law Journal

A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …


Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone Jan 2020

Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone

St. Mary's Law Journal

Privacy rights are under assault, but the Supreme Court’s judicial intervention into the issue, starting with Katz v. United States and leading to the Carpenter v. United States decision has created an inconsistent, piecemeal common law of privacy that forestalls a systematic public policy resolution by Congress and the states. In order to reach a satisfactory and longlasting resolution of the problem consistent with separation of powers principles, the states should consider a constitutional amendment that reduces the danger of pervasive technologyaided surveillance and monitoring, together with a series of statutes addressing each new issue posed by technological change as …


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones May 2019

Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones

Cleveland State Law Review

Courts are divided as to whether law enforcement can collect cell phone location information in real-time without a warrant under the Fourth Amendment. This Article argues that Carpenter v. United States requires a warrant under the Fourth Amendment prior to law enforcement’s collection of real-time cell phone location information. Courts that have required a warrant prior to the government’s collection of real-time cell phone location information have considered the length of surveillance. This should not be a factor. The growing prevalence and usage of cell phones and cell phone technology, the original intent of the Fourth Amendment, and United States …


Keep Your Friends Close And Your Medical Records Closer: Defining The Extent To Which A Constitutional Right To Informational Privacy Protects Medical Records, Lauren Newman May 2019

Keep Your Friends Close And Your Medical Records Closer: Defining The Extent To Which A Constitutional Right To Informational Privacy Protects Medical Records, Lauren Newman

Journal of Law and Health

The following Article discusses the extent to which the constitutional right to informational privacy protects medical data from improper acquisition or dissemination by state agents. Part I provides background on Whalen v. Roe, the Supreme Court case that has been understood to establish the right to informational privacy. Part I also discusses the variations across the circuit courts as to what medical information is afforded protection by the right. Part II analyzes the well-established approaches adopted by the Second and Third Circuits as they present opposing interpretations of Whalen, one wholly protecting medical information and the other protecting …


Justice Blackmun And Individual Rights, Diane P. Wood Oct 2017

Justice Blackmun And Individual Rights, Diane P. Wood

Dickinson Law Review (2017-Present)

Of the many contributions Justice Blackmun has made to American jurisprudence, surely his record in the area of individual rights stands out for its importance. Throughout his career on the Supreme Court, he has displayed concern for a wide variety of individual and civil rights. He has rendered decisions on matters ranging from the most personal interests in autonomy and freedom from interference from government in life’s private realms, to the increasingly complex problems posed by discrimination based upon race, sex, national origin, alienage, illegitimacy, sexual orientation, and other characteristics. As his views have become well known to the public, …


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


Knowledge And Fourth Amendment Privacy, Matthew Tokson Dec 2016

Knowledge And Fourth Amendment Privacy, Matthew Tokson

Northwestern University Law Review

This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.

This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …


Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank Jan 2016

Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank

Faculty Articles and Other Publications

In data breach cases, the lower federal courts have split on the question of whether the plaintiffs meet Article III standing requirements for injury and causation. In its 2013 decision Clapper v. Amnesty International USA, the Supreme Court, in a case involving alleged electronic surveillance by the U.S. government’s National Security Agency, declared that a plaintiff alleging that it will suffer future injuries from a defendant’s allegedly improper conduct must show that such injuries are “certainly impending.” Since the Clapper decision, a majority of the lower federal courts addressing “lost data” or potential identity theft cases in which there is …


Two Wrongs Don't Make A Fourth Amendment Right: Samson Court Errs In Choosing Proper Analytical Framework, Errs In Result, Parolees Lose Fourth Amendment Protection, Rachael A. Lynch Jul 2015

Two Wrongs Don't Make A Fourth Amendment Right: Samson Court Errs In Choosing Proper Analytical Framework, Errs In Result, Parolees Lose Fourth Amendment Protection, Rachael A. Lynch

Akron Law Review

This Note will follow the Fourth Amendment from its origins to its modern application to parolee rights, as evidenced by the Samson Court. Part II focuses on the Fourth Amendment, from the circumstances surrounding its adoption to modern court cases that have applied its tenets to prisoners, probationers, and, finally, parolees. Part III details the Supreme Court’s decision in Samson v. California, including a thorough discussion of the facts that gave rise to the case and lower court decisions. Part IV explores the problems with the Court’s framework and suggests other possible frameworks the Court could have used to come …


Supreme Court Jurisprudence Of The Personal In City Of Los Angeles V. Patel, Brian L. Owsley Jan 2015

Supreme Court Jurisprudence Of The Personal In City Of Los Angeles V. Patel, Brian L. Owsley

Michigan Law Review First Impressions

Recently, the Supreme Court issued a 5-4 decision in City of Los Angeles v. Patel striking down a city ordinance that required hotel and motel owners to make their guest registries available to police officers whenever requested to do so. Although the Court’s opinion in Patel simply affirmed the Ninth Circuit’s finding that the ordinance was unconstitutional, the Court could have used Patel to readdress the third-party doctrine, which establishes that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Patel provided a vehicle for the Court to do so, particularly because …


Outing Privacy, Scott Skinner-Thompson Jan 2015

Outing Privacy, Scott Skinner-Thompson

Publications

The government regularly outs information concerning people's sexuality, gender identity, and HIV status. Notwithstanding the implications of such outings, the Supreme Court has yet to resolve whether the Constitution contains a right to informational privacy - a right to limit the government's ability to collect and disseminate personal information.

This Article probes informational privacy theory and jurisprudence to better understand the judiciary's reluctance to fully embrace a constitutional right to informational privacy. The Article argues that while existing scholarly theories of informational privacy encourage us to broadly imagine the right and its possibilities, often focusing on informational privacy's ability to …


Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski Jan 2015

Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski

Publications

A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …


A Corporate Right To Privacy, Elizabeth Pollman Jan 2014

A Corporate Right To Privacy, Elizabeth Pollman

All Faculty Scholarship

The debate over the scope of constitutional protections for corporations has exploded with commentary on recent or pending Supreme Court cases, but scholars have left unexplored some of the hardest questions for the future, and the ones that offer the greatest potential for better understanding the nature of corporate rights. This Article analyzes one of those questions — whether corporations have, or should have, a constitutional right to privacy. First, the Article examines the contours of the question in Supreme Court jurisprudence and provides the first scholarly treatment of the growing body of conflicting law in the lower courts on …


The Court Loses Its Way With The Global Positioning System: United States V. Jones Retreats To The “Classic Trespassory Search”, George M. Dery Iii, Ryan Evaro Dec 2013

The Court Loses Its Way With The Global Positioning System: United States V. Jones Retreats To The “Classic Trespassory Search”, George M. Dery Iii, Ryan Evaro

Michigan Journal of Race and Law

This Article analyzes United States v. Jones, in which the Supreme Court considered whether government placement of a global positioning system (GPS) device on a vehicle to follow a person’s movements constituted a Fourth Amendment “search.” The Jones Court ruled that two distinct definitions existed for a Fourth Amendment “search.” In addition to Katz v. United States’s reasonable-expectation-of-privacy standard, which the Court had used exclusively for over four decades, the Court recognized a second kind of search that it called a “classic trespassory search.” The second kind of search occurs when officials physically trespass or intrude upon a constitutionally protected …


Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus Jan 2012

Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus

Articles

Anyone who has been stopped at a sobriety checkpoint, screened at an international border, scanned by a metal detector at an airport or government building, or drug tested for public employment has been subjected to an administrative search or seizure. Searches of public school students, government employees, and probationers are characterized as administrative, as are business inspections and-increasingly-wiretaps and other searches used in the gathering of national security intelligence. In other words, the government conducts thousands of administrative searches every day. None of these searches requires either probable cause or a search warrant. Instead, courts evaluating administrative searches need only …


Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane Jul 2011

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane

University of Michigan Journal of Law Reform

This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …


Disentangling Administrative Searches, Eve Brensike Primus Jan 2011

Disentangling Administrative Searches, Eve Brensike Primus

Articles

Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins May 2010

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

For more than two months beginning in late December of 2005, police officers in New York State continuously monitored the location and movements of Scott Weaver's van using a surreptitiously attached global positioning system ("GPS") device, known as a "Qball."' The reason Weaver was targeted for police surveillance has never been disclosed. 2 In addition, law enforcement made no attempt to justify the heightened scrutiny of Weaver by seeking the pre-authorization of a warrant from a neutral magistrate.3 Rather, for sixty-five days, the police subjected Weaver to intense surveillance without oversight, interruption, or explanation. 4 More than a year after …


Garbage Pails And Puppy Dog Tails: Is That What Katz Is Made Of?, Aya Gruber Jan 2008

Garbage Pails And Puppy Dog Tails: Is That What Katz Is Made Of?, Aya Gruber

Publications

This Article takes the opportunity of the fortieth anniversary of Katz v. U.S. to assess whether the revolutionary case's potential to provide broad and flexible privacy protection to individuals has been realized. Answering this question in a circumspect way, the Article pinpoints the language in Katz that was its eventual undoing and demonstrates how the Katz test has been plagued by two principle problems that have often rendered it more harmful to than protective of privacy. The manipulation problem describes the tendency of conservative courts to define reasonable expectations of privacy as lower than the expectations society actually entertains. The …


Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins Jan 2007

Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …


Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont Jun 2001

Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont

Michigan Telecommunications & Technology Law Review

The question of whether a state or the federal government can create a narrowly tailored restriction on cyberspace anonymity without violating the First Amendment remains unresolved[...]The Supreme Court has not directly addressed the issue, but it may soon consider the constitutionality of criminalizing certain kinds of cyber-anonymity in light of the unique nature of cyberspace. This comment explores the various forms of anonymity, examines the First Amendment status of anonymity in and outside of cyberspace, analyzes relevant scholarly commentary, and concludes that a narrowly tailored legislative restriction on "true" anonymity in cyberspace would not violate the First Amendment.