Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Journal

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 42

Full-Text Articles in Privacy Law

Ministerial Misfeasance: R. V. Morris And A Unique Early Privacy Breach, Barry Cahill Oct 2009

Ministerial Misfeasance: R. V. Morris And A Unique Early Privacy Breach, Barry Cahill

Dalhousie Law Journal

According to Klein &Kratchanov (Government Information: The Right to Information and Protection of Privacy in Canada, 2nd ed., 2009), "there is one reported case of a successful private prosecution for violation of an access statute through the unauthorized release of personal information. The matter arose under a former Nova Scotia Act and resulted in a modest fine being imposed against a Minister of the Crown who had disclosed information about the complainant." What follows is a close, contextual study of a case unique in the short history of privacy law in Canada, from the perspective of the thirty-year development of …


Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin Jul 2009

Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin

University of Michigan Journal of Law Reform

Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone-Privacy 1.0. As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as …


Best Practices And The State Of Information Security, Kevin Cronin Jun 2009

Best Practices And The State Of Information Security, Kevin Cronin

Chicago-Kent Law Review

The forces of globalization, together with widely available industry standards and best practices, and heightened state legislative activity, are driving the U.S. towards a more unified approach to data security. But the success of this unified approach requires more than free market efficiency and innovation. In order to maintain a state of evolutionary equilibrium in the global information economy, the U.S. must move from a fragmented approach towards data security and privacy standards, towards a more comprehensive set of standards with new penalties and effective enforcement, to better reflect the inherent value of personal data in today's global marketplace.


Returning To A Principled Basis For Data Protection, Gus Hosein Jun 2009

Returning To A Principled Basis For Data Protection, Gus Hosein

Chicago-Kent Law Review

Society must remain conscious of both pragmatic and principle-based rationales for information security rules. The identity card debate in the United Kingdom provides an example of exactly why a governmental information security approach that is sensitive to civil liberties would be the best approach to data protection. In contrast, we should be cautious of a balancing test that places security in parity with civil liberties and, therefore, erroneously allows pragmatism to triumph over principle.


Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce Jun 2009

Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce

Chicago-Kent Law Review

Threats to consumer privacy are many, and varied. Some threats come from corporate entities such as data aggregators and social networking sites; while others come from panoptics government surveillance systems such as Secure Flight. Not only can the data be compromised, but consumers may be adversely affected by incorrect information in their files. The time may be right to explicitly protect privacy via a constitutional amendment to the U.S. Constitution.


Coding Privacy, Lilian Edwards Jun 2009

Coding Privacy, Lilian Edwards

Chicago-Kent Law Review

Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …


Privacy, Accountability, And The Cooperating Defendant: Towards A New Role For Internet Access To Court Records, Caren M. Morrison Apr 2009

Privacy, Accountability, And The Cooperating Defendant: Towards A New Role For Internet Access To Court Records, Caren M. Morrison

Vanderbilt Law Review

Now that federal court records are available online, anyone can obtain criminal case files instantly over the Internet. But this unfettered flow of information is in fundamental tension with many goals of the criminal justice system, including the integrity of criminal investigations, the accountability of prosecutors, and the security of witnesses. It has also altered the behavior of prosecutors intent on protecting the identity of cooperating defendants who assist them in investigating other targets. As prosecutors and courts collaborate to obscure the process by which cooperators are recruited and rewarded, Internet availability risks degrading the value of the information obtained …


Do We Need A New Fourth Amendment?, Orin S. Kerr Apr 2009

Do We Need A New Fourth Amendment?, Orin S. Kerr

Michigan Law Review

Slobogin's book offers a new conceptualization of the Fourth Amendment rooted in what he calls the proportionality principle: An investigative technique should be permitted under the Constitution only if the strength of the government's justification for the technique is roughly proportionate to the level of intrusion it causes . Slobogin roots this principle in Terry v. Ohio and its pragmatic balancing of law-enforcement and privacy interests. To determine how much justification the Fourth Amendment requires, Slobogin argues, courts should assess the intrusiveness of the investigatory technique and then set a proportionate threshold of proof that the government must show. The …


Internet User Anonymity, First Amendment Protections And Mobilisa: Changing The Cahill Test, Kristina Ringland Mar 2009

Internet User Anonymity, First Amendment Protections And Mobilisa: Changing The Cahill Test, Kristina Ringland

Washington Journal of Law, Technology & Arts

The Arizona Court of Appeals recently developed a new test to determine whether an anonymous Internet poster’s identity should be revealed through a subpoena. While the First Amendment protects anonymous speech, this protection does not extend to defamation and other illegal behavior. Courts have balanced these two competing interests—protection of anonymous speech and revelation of a person’s identity via subpoena—by applying varying tests regarding the disclosure of an anonymous poster’s identity. The Arizona Court of Appeals, in Mobilisa, Inc. v. Doe, recently adopted a three-part test that incorporates elements from two, previously distinct lines of cases. This Article explores …


Enterprise Systems And Corporate Governance: Parallel And Interconnected Evolution, 26 J. Marshall J. Computer & Info. L. 359 (2009), Themistokles Lazarides, Maria Argyropoulou, Dimitrios N. Koufopoulos Jan 2009

Enterprise Systems And Corporate Governance: Parallel And Interconnected Evolution, 26 J. Marshall J. Computer & Info. L. 359 (2009), Themistokles Lazarides, Maria Argyropoulou, Dimitrios N. Koufopoulos

UIC John Marshall Journal of Information Technology & Privacy Law

Today's business requirements have moved Enterprise Systems ("ES") governance into the focus of attention as they are necessary in supporting business processes in many organizations. Corporate Governance ("CG") and ES constitute two seemingly dissimilar research areas that attract the interest of completely different academics as practitioners. However, at a time when there is an increasing focus on CG practices and the impact of ES on corporate performance, these topics are tightly connected and complimentary. Given the fact that ES can contribute positively in achieving business objectives, it is imperative to discuss the relationship of CG and information technology ("IT"). Moreover, …


Portable Learning For The 21st Century Law School: Designing A New Pedagogy For The Modern Global Context, 26 J. Marshall J. Computer & Info. L. 371 (2009), Catherine Dunham, Steven I. Friedland Jan 2009

Portable Learning For The 21st Century Law School: Designing A New Pedagogy For The Modern Global Context, 26 J. Marshall J. Computer & Info. L. 371 (2009), Catherine Dunham, Steven I. Friedland

UIC John Marshall Journal of Information Technology & Privacy Law

The authors argue that teaching can and should occur even after the fixed-location class has ended. The article suggests that a more portable learning environment would better match the changing world and make legal education more effective. While this notion is not revolutionary in many other educational contexts, it has not had much impact in legal education to date. Yet, with 21st century students ready and willing to receive portable education and the metacognition of learning supporting such venues, portability in legal education is primed for its moment. Additionally, the article points out that accepting portability merely as a part …


Social Networking As A Communications Weapon To Harm Victims: Facebook, Myspace, And Twitter Demonstrate A Need To Amend Section 230 Of The Communications Decency Act, 26 J. Marshall J. Computer & Info. L. 415 (2009), Joshua N. Azriel Jan 2009

Social Networking As A Communications Weapon To Harm Victims: Facebook, Myspace, And Twitter Demonstrate A Need To Amend Section 230 Of The Communications Decency Act, 26 J. Marshall J. Computer & Info. L. 415 (2009), Joshua N. Azriel

UIC John Marshall Journal of Information Technology & Privacy Law

The article discusses how social networking sites can pose a danger to victims of online offensive content. Part II provides an overall analysis of the dangers the Internet, especially social networking, poses to victims. Part III reviews Section 230 of the CDA, including the “Good Samaritan” provisions for social networking websites such as Twitter and Facebook. Part IV analyzes three recent court cases that demonstrate how these social networking tools are used as weapons to harm victims. Part V concludes with a discussion of how the growing number of online incidents stem from social networking sites. It recommends that Congress …


When Contract Negotiations No Longer Protect Your Business Interests: The Strange World Of Third Party Business Interests Under Freedom Of Information Legislation, 26 J. Marshall J. Computer & Info. L. 455 (2009), Emir Aly Crowne-Mohammed Jan 2009

When Contract Negotiations No Longer Protect Your Business Interests: The Strange World Of Third Party Business Interests Under Freedom Of Information Legislation, 26 J. Marshall J. Computer & Info. L. 455 (2009), Emir Aly Crowne-Mohammed

UIC John Marshall Journal of Information Technology & Privacy Law

Freedom of information legislation is designed to promote access to governmental information. The Freedom of Information and Protection of Privacy Act of British Columbia (“BC Act”) is no different. The BC Act views access to governmental information as promoting democracy, transparency, and citizenry, thereby making “public bodies more accountable to the public and…protect[ing] personal privacy by…giving the public a right of access to records” inter alia. The right to access governmental information, however, is not unfettered. There are certain protected instances where the public good may actually be harmed by undue access to governmental information such as policy recommendations developed …


The Challenge Of Internet Anonymity: Protecting John Doe On The Internet, 26 J. Marshall J. Computer & Info. L. 469 (2009), Susanna Moore Jan 2009

The Challenge Of Internet Anonymity: Protecting John Doe On The Internet, 26 J. Marshall J. Computer & Info. L. 469 (2009), Susanna Moore

UIC John Marshall Journal of Information Technology & Privacy Law

The article notes that the question of what tests courts should use in deciding whether to reveal the identities of anonymous Internet users is unsettled. Part II of the Article discusses the various tests courts have applied in determining whether the identity of an anonymous Internet user should be revealed—including a good-faith test, a summary judgment standard, and a balancing test. Part III analyzes the merits of each test. Finally, Part IV concludes by recommending the appropriate test courts should use in deciding whether to reveal the identities of anonymous Internet users.


Reflection On The Finality Of Panel's Decisions In Domain Name Dispute Resolution Process, With Reference To China's Practice, 26 J. Marshall J. Computer & Info. L. 395 (2009), Yun Zhao Jan 2009

Reflection On The Finality Of Panel's Decisions In Domain Name Dispute Resolution Process, With Reference To China's Practice, 26 J. Marshall J. Computer & Info. L. 395 (2009), Yun Zhao

UIC John Marshall Journal of Information Technology & Privacy Law

The article notes the importance of looking into the position of Chinese federal courts to deal with cases brought by losing parties against the panel decisions in the administrative arbitration procedure. The author notes that federal courts do not give much consideration to panel decisions. Other problems also tend to arise as to the legal effect of panel decisions. The paper examines these problems, with reference to China’s current court practice. Part II of the paper offers an overview of the Uniform Domain Name Dispute Resolution Policy (“UDRP”) process, and its rules regarding possible court proceedings. Part III examines China’s …


Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez Jan 2009

Average Teenager Or Sex Offender? Solutions To The Legal Dilemma Caused By Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009), Shannon Shafron-Perez

UIC John Marshall Journal of Information Technology & Privacy Law

The Comment broadly considers the failure of the law to adapt to developments in technology and communication, untangles the different approaches taken by a sample of states, and considers which legal remedy is most appropriate. This discussion primarily focuses on the criminal aspects of: (1) minors who voluntarily create and disseminate nude text messages of themselves; and (2) minors who receive nude photographs of other minors. Part II traces the development of sexting. Part III describes the history and rationale behind prohibiting child pornography. In Part IV, the article examines the application of child pornography laws to sexting cases in …


The Black Box Canon Of Statutory Interpretation: Why The Courts Should Treat Technology Like A Black Box In Interpreting Computer Crime Statutes, 26 J. Marshall J. Computer & Info. L. 487 (2009), Peter V. Roman Jan 2009

The Black Box Canon Of Statutory Interpretation: Why The Courts Should Treat Technology Like A Black Box In Interpreting Computer Crime Statutes, 26 J. Marshall J. Computer & Info. L. 487 (2009), Peter V. Roman

UIC John Marshall Journal of Information Technology & Privacy Law

The author points out that when reading computer crime statutes, federal courts sometimes study the minutiae of technology at the expense of congressional intent, plain language, and fair warning to criminal defendants. The author asserts that by focusing on the actual, but transient and morally irrelevant, design of information systems, the courts are undermining criminal law in the digital world. The author explains how traditional tools of statutory interpretation have failed to stop this approach to the interpretation of computer crime statutes. To solve this dilemma, the author points out that courts need a new tool to help them apply …


University Research Under Siege: How The War On Terror Has Placed Academic Freedom Under Fire, 26 J. Marshall J. Computer & Info. L. 547 (2009), James Templin Jan 2009

University Research Under Siege: How The War On Terror Has Placed Academic Freedom Under Fire, 26 J. Marshall J. Computer & Info. L. 547 (2009), James Templin

UIC John Marshall Journal of Information Technology & Privacy Law

The Comment analyzes the proposed revisions to United States export regulations contained in the Deemed Export Advisory Committee’s 2007 report. While the Advisory Committee’s work was much needed and its recommendations laudable, this comment discusses why its recommendations must be narrowly tailored in order to preserve the competitiveness of U.S. businesses and universities in the globalizing world and to advance national security. Part II explains the regulations that govern U.S. exports, including the deemed export regulatory regime and how those rules implement a range of national obligations and interests. This Part also discusses the events that threatened to significantly burden …


Virtual Venues: Improving Online Dispute Resolution As An Alternative To Cost Intensive Litigation, 27 J. Marshall J. Computer & Info. L. 81 (2009), Shekhar Kumar Jan 2009

Virtual Venues: Improving Online Dispute Resolution As An Alternative To Cost Intensive Litigation, 27 J. Marshall J. Computer & Info. L. 81 (2009), Shekhar Kumar

UIC John Marshall Journal of Information Technology & Privacy Law

This paper looks at the growing presence of online alternative dispute resolution in the commercial setting, with the eventual goal of making suggestions to improve current online systems. While out-of-court dispute resolutions such as arbitration and mediation have been a long-time alternative to lengthy litigation, the development of the internet and other advanced forms of communication has lead to an increased presence of, and increased possibilities for, online dispute resolution. The first section of this paper provides a succinct review of the history of online dispute resolution. The focus of the section is two-pronged. The first prong discusses how technological …


May An Employer Require Employees To Wear “Genes” In The Workplace? An Exploration Of Title Ii Of The Genetic Information Nondiscrimination Act Of 2008, 26 J. Marshall J. Computer & Info. L. 501 (2009), Erin Murphy Hillstrom Jan 2009

May An Employer Require Employees To Wear “Genes” In The Workplace? An Exploration Of Title Ii Of The Genetic Information Nondiscrimination Act Of 2008, 26 J. Marshall J. Computer & Info. L. 501 (2009), Erin Murphy Hillstrom

UIC John Marshall Journal of Information Technology & Privacy Law

The comment first provides a brief discussion of genetics and genetic testing. Section II provides a basic introduction to genetics, genetic testing, and genetic discrimination. Additionally, Section II provides a brief overview of current federal laws that address genetic discrimination in the workplace. Finally, Section II also examines the major employment provisions of the Genetic Information Nondiscrimination Act of 2008 ("GINA"). Section III of the comment examines whether there was a need for GINA, and argues that GINA will not have the full effect intended by Congress. The major sources of litigation under GINA are then reviewed based on the …


2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 27 J. Marshall J. Computer & Info. L. 131 (2009), Megan Peterson, Tyler Rench Jan 2009

2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 27 J. Marshall J. Computer & Info. L. 131 (2009), Megan Peterson, Tyler Rench

UIC John Marshall Journal of Information Technology & Privacy Law

SUMMARY OF THE ARGUMENT: As encroaching technologies shrink the realm of privacy and expose intimate details of the home, courts must craft a solution that will provide a remedy to the injured. When Marshoogle’s prying cameras took photographs of Nevilson seated inside his home, they invaded his privacy by intruding into his private area of seclusion and this court should give Nevilson the opportunity to seek a remedy. Because Nevilson was inside his home when the images were captured, he had a reasonable expectation of privacy, which cannot be lost simply by leaving his curtains open. Marshoogle’s cameras were intentionally …


2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 27 J. Marshall J. Computer & Info. L. 169 (2009), Michael Jones, Stuart Ladner, Sabrina Stone Jan 2009

2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 27 J. Marshall J. Computer & Info. L. 169 (2009), Michael Jones, Stuart Ladner, Sabrina Stone

UIC John Marshall Journal of Information Technology & Privacy Law

SUMMARY OF THE ARGUMENT: Nevilson has not raised a genuine issue of material fact on his intrusion upon seclusion claim. First, Nevilson cannot show Marshoogle intentionally invaded Nevilson’s privacy. When Marshoogle captured the images for its Marshall Avenue Perspective feature, no one physically entered Nevilson’s property or used sensory enhancements or telephoto lenses to pry into his private space. Second, Marshoogle’s actions were not highly offensive to a reasonable person because the photographs were not captured in an effort to exploit or defame Nevilson, but rather were captured in an effort to produce a free and effective virtual map for …


2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 27 J. Marshall J. Computer & Info. L. 95 (2009), Sarah M. Knight, William S. Weltman, Andrew T. Call, Panagiota Kelali Jan 2009

2009 John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 27 J. Marshall J. Computer & Info. L. 95 (2009), Sarah M. Knight, William S. Weltman, Andrew T. Call, Panagiota Kelali

UIC John Marshall Journal of Information Technology & Privacy Law

Petitioner, Phillip Nevilson, appeals to the Marshall Supreme Court from a decision affirming the granting of summary judgment in favor of Respondent, Marshoogle, Inc., on his claims of intrusion upon seclusion, publication of private facts, and tortious interference with business expectancy claims. The issues in this case concern whether an individual can state a claim for invasion of privacy against an Internet search engine provider where liability is based on taking a photograph of an individual in his home and the publication of such photograph on a website. The final issue concerns whether the act of publication of the photograph …


Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz Jan 2009

Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz

UIC John Marshall Journal of Information Technology & Privacy Law

Unlike traditional markets, Information Technology (“IT”) markets are characterized by special and unique features that shall be discussed in this paper. Competition in IT markets is dynamic; nonmarket based information production models (‘peer production’) play a significant role in IT markets; and IT market are usually data market rather than product market. The combination of the legal rule prohibiting circumvention of technological measure under the DMCA and the use of DRMs, created a new regime, the DRM/DMCA regime, which bestows the entertainment industry with a new and strong right to control the access to and use of the copyrighted work. …


Tort Liability For Software Developers: A Law & Economics Perspective, 27 J. Marshall J. Computer & Info. L. 199 (2009), T. Randolph Beard, George S. Ford, Thomas M. Koutsky, Lawrence J. Spiwak Jan 2009

Tort Liability For Software Developers: A Law & Economics Perspective, 27 J. Marshall J. Computer & Info. L. 199 (2009), T. Randolph Beard, George S. Ford, Thomas M. Koutsky, Lawrence J. Spiwak

UIC John Marshall Journal of Information Technology & Privacy Law

This article explores the economic rationale for applying product liability law to computer software. As demonstrated in the article, a well-designed liability regime must place liability upon all parties who economically control the risks of accidents. Accordingly, this article finds that strict liability may be appropriate for certain types of “intrinsic” software, but not for other types of software requiring that the customer be actively involved in the selection, operation and maintenance thereof. The authors show that for this type of “extrinsic” software, a strict liability rule is unlikely to be economically optimal and, therefore, choosing a generic liability regime …


Yes, I Destroyed The Evidence - Sue Me? Intentional Spoliation Of Evidence In Illinois, 27 J. Marshall J. Computer & Info. L. 235 (2009), Michael A. Zuckerman Jan 2009

Yes, I Destroyed The Evidence - Sue Me? Intentional Spoliation Of Evidence In Illinois, 27 J. Marshall J. Computer & Info. L. 235 (2009), Michael A. Zuckerman

UIC John Marshall Journal of Information Technology & Privacy Law

Many Illinois litigators have encountered spoliation of evidence, which is the loss, destruction, or alteration of evidence. Examples of spoliation are seemingly endless and include the failure to preserve the scene of a train derailment, the accidental destruction of evidence on a lawyer’s desk by a janitor, the loss of a heater that exploded, the removal of wires from a car that caught on fire, the loss and alteration of medical equipment, and the intentional erasing of a computer image relevant to a copyright lawsuit. To combat spoliation, Illinois and many other states have developed common law and statutory methods …


Extending The Exclusionary Rule: Enforcing Data Quality In National Security Databases And Watch Lists, 27 J. Marshall J. Computer & Info. L. 257 (2009), Christine M. Whalley Jan 2009

Extending The Exclusionary Rule: Enforcing Data Quality In National Security Databases And Watch Lists, 27 J. Marshall J. Computer & Info. L. 257 (2009), Christine M. Whalley

UIC John Marshall Journal of Information Technology & Privacy Law

Since its inception, the exclusionary rule has been aimed at deterring misconduct by police officers and law enforcement agents. It is widely believed to deter deliberate, reckless, grossly, or systemic negligent conduct by law enforcement agents. Increased reliance by law enforcement agencies and their agents on expansive, interconnected information suggests that the exclusionary rule needs to be expanded beyond just the acts of the officers and agents and be applied to the agency itself where there is evidence that poor data quality standards produced the reckless or negligent conduct. When so much of our liberty rests on the quality of …


The Computer Fraud And Abuse Act: Reassessing The Damage Requirement, 27 J. Marshall J. Computer & Info. L. 279 (2009), Matthew Andris Jan 2009

The Computer Fraud And Abuse Act: Reassessing The Damage Requirement, 27 J. Marshall J. Computer & Info. L. 279 (2009), Matthew Andris

UIC John Marshall Journal of Information Technology & Privacy Law

This comment explores whether a civil plaintiff needs to claim actual damage to a protected computer to recover against a defendant under the CFAA. Several courts have noted that there is little case law regarding damages, and the case law that exists does not help define the reach of damages. Currently, courts are split as to whether a computer system needs to have actual physical damage in order for recovery under the CFAA. Additionally, courts have not adequately addressed how to assess damages, including whether damages may be aggregated across multiple computer systems. The Third, Fifth, and Ninth Circuit Courts …


Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran Jan 2009

Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran

Richmond Journal of Law and the Public Interest

In sum, the Court has in recent years balanced the degree of government intrusion of the individual or place searched against the government's need for the search. This article addresses some of the questions posed by the evolution of the Fourth Amendment doctrine in light of terrorist concerns since 9/11. Part II will address the history of Fourth Amendment jurisprudence, from the Boyd Era of property protection and the use of general warrants to discover evidence of crime, to Olmstead and the development of the right of privacy under the Fourth Amendment. Part III will address the modern test under …


Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky Jan 2009

Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky

Richmond Public Interest Law Review

According to the Virginia Department of State Police, there has been a legislative effort in 2008 and 2009 over the past two years to ensure that essential data from protective orders1 is entered into the Virginia Criminal Information Network ("VCIN") immediately upon the order's issuance. While data entry may seem like a dull topic, the following story highlights the dire significance of this seemingly mundane task.