Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Constitutional Law

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 25 of 25

Full-Text Articles in Privacy Law

Table Of Contents Jan 2022

Table Of Contents

Seattle University Law Review

Table of Contents


Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti Jan 2022

Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti

Articles by Maurer Faculty

The Supreme Court’s “reasonable expectation of privacy” test under the Fourth Amendment has often been criticized as circular, and hence subjective and unpredictable. The Court is presumed to base its decisions on society’s expectations of privacy, while society’s expectations of privacy are themselves presumed to be based on the Court’s judgements. As a solution to this problem, property law has been repeatedly propounded as an allegedly independent, autonomous area of law from which the Supreme Court can glean reasonable expectations of privacy without falling back into tautological reasoning.

Such an approach presupposes that property law is not itself circular. If …


Fitbit Data And The Fourth Amendment: Why The Collection Of Data From A Fitbit Constitutes A Search And Should Require A Warrant In Light Of Carpenter V. United States, Alxis Rodis Apr 2021

Fitbit Data And The Fourth Amendment: Why The Collection Of Data From A Fitbit Constitutes A Search And Should Require A Warrant In Light Of Carpenter V. United States, Alxis Rodis

William & Mary Bill of Rights Journal

No abstract provided.


Pure Privacy, Jeffrey Bellin Jan 2021

Pure Privacy, Jeffrey Bellin

Faculty Publications

n 1890, Samuel Warren and Louis Brandeis began a storied legal tradition of trying to conceptualize privacy. Since that time, privacy's appeal has grown beyond those authors' wildest expectations, but its essence remains elusive. One of the rare points of agreement in boisterous academic privacy debates is that there is no consensus on what privacy means.

The modern trend is to embrace the ambiguity. Unable to settle on boundaries, scholars welcome a broad array of interests into an expanding theoretical framework. As a result, privacy is invoked in debates about COVID-19 contact tracing, police body cameras, marriage equality, facial recognition, …


The Deliberative-Privacy Principle: Abortion, Free Speech, And Religious Freedom, B. Jessie Hill May 2020

The Deliberative-Privacy Principle: Abortion, Free Speech, And Religious Freedom, B. Jessie Hill

William & Mary Bill of Rights Journal

No abstract provided.


Private Law, Fundamental Rights, And The Rule Of Law, Hugh Collins Sep 2018

Private Law, Fundamental Rights, And The Rule Of Law, Hugh Collins

West Virginia Law Review

No abstract provided.


The Ecology Of Transparency Reloaded, Seth F. Kreimer Jan 2018

The Ecology Of Transparency Reloaded, Seth F. Kreimer

All Faculty Scholarship

As Justice Stewart famously observed, "[t]he Constitution itself is neither a Freedom of Information Act nor an Official Secrets Act." What the Constitution's text omits, the last two generations have embedded in "small c" constitutional law and practice in the form of the Freedom of Information Act and a series of overlapping governance reforms including Inspectors General, disclosure of political contributions, the State Department’s “Dissent Channel,” the National Archives Information Security Oversight Office, and the publication rights guaranteed by New York Times v. United States. These institutions constitute an ecology of transparency.

The late Justice Scalia argued that the …


The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman Jul 2017

The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman

Pepperdine Law Review

Recent advances in technology are posing new challenges for a legal system based on decades-old precedent. Nowhere is this more apparent than in law enforcement’s warrantless use of IMSI Catchers. These devices mimic a cell phone tower, and when the device is activated, cell phones will naturally connect to them. Law enforcement officers can use those intercepted cell phone signals to track a suspect’s movements in real time with startling accuracy. Scholarly commentary on these devices has largely concluded that their use requires a warrant. This Comment engages in a close examination of Fourth Amendment precedent and argues that, as …


When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck Feb 2014

When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck

Renée M. Hutchins

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped …


Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean Jan 2014

Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean

Adam Lamparello

The article explores the December 31, 2013 Abidor decision where the federal district court upheld the ongoing application of the border search exception as applied to deep, forensic searches of laptops and other digital devices. That exception allows suspicionless searches of any persons, effects, and “closed containers” crossing a border into the United States, and laptops and external hard drives are generally considered “closed containers” under the border search exception. We argue that the border search exception, grounded as it is in pre-digital age fact patterns, should no longer serve as precedent for border searches of the immense memories of …


Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello Jan 2014

Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello

Adam Lamparello

Warrantless searches of cell phone memory—after a suspect has been arrested, and after law enforcement has seized the phone—would have been unconstitutional at the time the Fourth Amendment was adopted, and are unconstitutional now. Simply stated, they are unreasonable. And reasonableness—not a categorical warrant requirement—is the “touchstone of Fourth Amendment analysis.”


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Aug 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

David C. Gray

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


Survey Of Washington Search And Seizure Law: 2013 Update, Justice Charles W. Johnson, Justice Debra L. Stephens Jul 2013

Survey Of Washington Search And Seizure Law: 2013 Update, Justice Charles W. Johnson, Justice Debra L. Stephens

Seattle University Law Review

This survey is intended to serve as a resource to which Washington lawyers, judges, law enforcement officers, and others can turn as an authoritative starting point for researching Washington search and seizure law. In order to be useful as a research tool, this Survey requires periodic updates to address new cases interpreting the Washington constitution and the U.S. Constitution and to reflect the current state of the law. Many of these cases involve the Washington State Supreme Court’s interpretation of the Washington constitution. Also, as the U.S. Supreme Court has continued to examine Fourth Amendment search and seizure jurisprudence, its …


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray Jun 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray

David C. Gray

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron Dec 2012

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron

David C. Gray

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Dec 2012

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Danielle Keats Citron

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …


First Amendment Privacy And The Battle For Progressively Liberal Social Change, Anita L. Allen Mar 2012

First Amendment Privacy And The Battle For Progressively Liberal Social Change, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Facebook Fallacies, Geoffrey C. Hazard Jr. Jan 2012

Facebook Fallacies, Geoffrey C. Hazard Jr.

All Faculty Scholarship

No abstract provided.


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins May 2010

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

For more than two months beginning in late December of 2005, police officers in New York State continuously monitored the location and movements of Scott Weaver's van using a surreptitiously attached global positioning system ("GPS") device, known as a "Qball."' The reason Weaver was targeted for police surveillance has never been disclosed. 2 In addition, law enforcement made no attempt to justify the heightened scrutiny of Weaver by seeking the pre-authorization of a warrant from a neutral magistrate.3 Rather, for sixty-five days, the police subjected Weaver to intense surveillance without oversight, interruption, or explanation. 4 More than a year after …


Orwell Was An Optimist: The Evolution Of Privacy In The United States And Its De-Evolution For American Employees, Robert Sprague Dec 2007

Orwell Was An Optimist: The Evolution Of Privacy In The United States And Its De-Evolution For American Employees, Robert Sprague

Robert Sprague

This Article argues that the difficulties associated with understanding and applying rights to privacy in modern America, and its near extinction, particularly for employees, are a direct result of the conceptual approach used to determine whether a legal right to privacy exists. This approach was formally adopted in the latter part of the twentieth century and it makes privacy protection dependent upon any given situation, determined by whether there is a reasonable expectation of privacy for that given situation. This makes the current right to privacy in the United States contextual, fluid, and easily subject to elimination. One of the …


Fired For Blogging: Are There Legal Protections For Employees Who Blog?, Robert Sprague Dec 2006

Fired For Blogging: Are There Legal Protections For Employees Who Blog?, Robert Sprague

Robert Sprague

No abstract provided.


Autonomy's Magic Wand: Abortion And Constitutional Interpretation, Anita L. Allen Jan 1992

Autonomy's Magic Wand: Abortion And Constitutional Interpretation, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Tribe's Judicious Feminism, Anita L. Allen Nov 1991

Tribe's Judicious Feminism, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Privacy, Surrogacy, And The Baby M Case, Anita L. Allen Jan 1988

Privacy, Surrogacy, And The Baby M Case, Anita L. Allen

All Faculty Scholarship

No abstract provided.