Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Science and Technology Law

The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi Jan 2012

The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi

University of Michigan Journal of Law Reform Caveat

Wired is reporting renewed hubbub regarding statutory and Fourth Amendment protections of individuals’ privacy in the digital age. This time, it comes in the form of federal officers using a fake cellphone tower (called a “stingray”) to locate their suspect, Mr. Rigmaiden, by tracking the location of his cellphone. According to an affidavit submitted to the court, the stingray only captures the equivalent of header information – such as the phone or account number assigned to the aircard as well as dialing, routing and address information involved in the communication.


Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue Jan 2012

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …


Expectations Of Privacy In Social Media, Stephen E. Henderson Dec 2011

Expectations Of Privacy In Social Media, Stephen E. Henderson

Stephen E Henderson

This article, which largely tracks my remarks at Mississippi College’s Social Media Symposium, examines expectations of privacy in social media such as weblogs (blogs), Facebook pages, and Twitter tweets. Social media is diverse and ever-diversifying, and while I address some of that complexity, I focus on the core functionality, which provides the groundwork for further conversation as the technology and related social norms develop. As one would expect, just as with our offline communications and other online communications, in some we have an expectation of privacy that is recognized by current law, in some we have an expectation of privacy …