Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (6)
- Penn State Law (4)
- The Catholic University of America, Columbus School of Law (3)
- SelectedWorks (2)
- American University Washington College of Law (1)
-
- Cleveland State University (1)
- Georgetown University Law Center (1)
- Lincoln Memorial University - Duncan School of Law (1)
- Notre Dame Law School (1)
- Schulich School of Law, Dalhousie University (1)
- Seattle University School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Michigan Law School (1)
- University of Pittsburgh School of Law (1)
- Publication Year
- Publication
-
- Journal Articles (4)
- Catholic University Journal of Law and Technology (3)
- David Kaye (2)
- Susan Freiwald (2)
- Articles (1)
-
- Articles in Law Reviews & Other Academic Journals (1)
- Charles E. MacLean (1)
- Cleveland State Law Review (1)
- Faculty Scholarship (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Michigan Law Review (1)
- Notre Dame Journal on Emerging Technologies (1)
- Orin Kerr (1)
- Reports & Public Policy Documents (1)
- Seattle University Law Review (1)
- Shaun Spencer (1)
- Stephen E Henderson (1)
- Tonja Jacobi (1)
- Publication Type
- File Type
Articles 1 - 25 of 25
Full-Text Articles in Science and Technology Law
The Automated Fourth Amendment, Maneka Sinha
The Automated Fourth Amendment, Maneka Sinha
Faculty Scholarship
Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …
Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley
Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley
Catholic University Journal of Law and Technology
No abstract provided.
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Seattle University Law Review
Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.
Ethical Ai In American Policing, Elizabeth E. Joh
Ethical Ai In American Policing, Elizabeth E. Joh
Notre Dame Journal on Emerging Technologies
We know there are problems in the use of artificial intelligence in policing, but we don’t quite know what to do about them. One can also find many reports and white papers today offering principles for the responsible use of AI systems by the government, civil society organizations, and the private sector. Yet, largely missing from the current debate in the United States is a shared framework for thinking about the ethical and responsible use of AI that is specific to policing. There are many AI policy guidance documents now, but their value to the police is limited. Simply repeating …
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Catholic University Journal of Law and Technology
No abstract provided.
Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons
Submission To The Toronto Police Services Board’S Use Of New Artificial Intelligence Technologies Policy- Leaf And The Citizen Lab, Suzie Dunn, Kristen Mj Thomasen, Kate Robertson, Pam Hrick, Cynthia Khoo, Rosel Kim, Ngozi Okidegbe, Christopher Parsons
Reports & Public Policy Documents
We write as a group of experts in the legal regulation of artificial intelligence (AI), technology-facilitated violence, equality, and the use of AI systems by law enforcement in Canada. We have experience working within academia and legal practice, and are affiliated with LEAF and the Citizen Lab who support this letter.
We reviewed the Toronto Police Services Board Use of New Artificial Intelligence Technologies Policy and provide comments and recommendations focused on the following key observations:
1. Police use of AI technologies must not be seen as inevitable
2. A commitment to protecting equality and human rights must be integrated …
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Catholic University Journal of Law and Technology
One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.
The Case For The Third-Party Doctrine, Orin S. Kerr
The Case For The Third-Party Doctrine, Orin S. Kerr
Orin Kerr
This Article offers a defense of the Fourth Amendment's third party doctrine, the controversial rule that information loses Fourth Amendment protection when it is knowingly revealed to a third party. Fourth Amendment scholars have repeatedly attacked the rule on the ground that it is unpersuasive on its face and gives the government too much power This Article responds that critics have overlooked the benefits of the rule and have overstated its weaknesses. The third-party doctrine serves two critical functions. First, the doctrine ensures the technological neutrality of the Fourth Amendment. It corrects for the substitution effect of third parties that …
Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones
Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones
Cleveland State Law Review
Courts are divided as to whether law enforcement can collect cell phone location information in real-time without a warrant under the Fourth Amendment. This Article argues that Carpenter v. United States requires a warrant under the Fourth Amendment prior to law enforcement’s collection of real-time cell phone location information. Courts that have required a warrant prior to the government’s collection of real-time cell phone location information have considered the length of surveillance. This should not be a factor. The growing prevalence and usage of cell phones and cell phone technology, the original intent of the Fourth Amendment, and United States …
Privacy And Security Across Borders, Jennifer Daskal
Privacy And Security Across Borders, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in what will likely be an ongoing and critically important debate about law enforcement access to data, the jurisdictional limits to such access, and the rules that apply. Each of these developments addresses a common set of challenges posed by the increased digitalization of information, the rising power of private companies delimiting access to that information, and the cross-border nature of investigations that involve digital evidence. And each has profound implications for privacy, security, and the possibility of meaningful democratic accountability and control. This Essay analyzes the …
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Stephen E Henderson
Please, Let's Bury The Junk: The Codis Loci And The Revelation Of Private Information, David H. Kaye
Please, Let's Bury The Junk: The Codis Loci And The Revelation Of Private Information, David H. Kaye
David Kaye
This Northwestern University Law Review Colloquy paper describes the four possible ways in which genetic loci could possess predictive or diagnostic value with regard to diseases and explains why these mechanisms have not led, and probably cannot lead, to useful screening tests with the Convicted Offender DNA Index System (CODIS) profiles in national, state, and local databases. It then considers the phenotypes and familial relationships that the CODIS STRs can be used to identify. The profiles carry limited information about an individual's race and familial relationships, and the article places the resulting privacy issues in perspective. Finally, the paper comments …
A Fourth Amendment Theory For Arrestee Dna And Other Biometric Databases, David H. Kaye
A Fourth Amendment Theory For Arrestee Dna And Other Biometric Databases, David H. Kaye
David Kaye
Routine DNA sampling following a custodial arrest process is now the norm in many jurisdictions, but is it consistent with the Fourth Amendment? The few courts that have addressed the question have disagreed on the answer, but all of them seem to agree on two points: (1) the reasonableness of the practice turns on a direct form of balancing of individual and governmental interests; and (2) individuals who are convicted — and even those who are merely arrested — have a greatly diminished expectation of privacy in their identities. This Article disputes these propositions and offers an improved framework for …
Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris
Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris
Articles
In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …
Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind
Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind
Tonja Jacobi
It is routinely assumed that there is a trade-off between police efficiency and the warrant requirement. But existing analysis ignores the interaction between police investigative practices and criminal innovation. Narrowing the definition of a search or otherwise limiting the requirement for a warrant gives criminals greater incentive to innovate to avoid detection. With limited police resources to develop countermeasures, police will often be just as effective at capturing criminals when facing higher Fourth Amendment hurdles. We provide a game theoretic model that shows that when police investigation and criminal innovation are considered in a dynamic context, the police efficiency rationale …
Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean
Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean
Charles E. MacLean
The Katz reasonable expectation of privacy doctrine has lasting relevance in the digital age, but that relevance must be carefully and clearly guided in great detail by Congressional and state legislative enactments continually resetting the privacy bar as technology advances. In that way, the Katz “reasonableness” requirements are actually set by the legislative branch, thereby precluding courts from applying inapposite analogies to phone booths, cigarette packs, and business records. Once legislation provides the new contours of digital privacy, those legislative contours become the new “reasonable.”
This article calls upon Congress, and to a lesser extent, state legislatures, to control that …
The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer
The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer
Shaun Spencer
This article examines a question that has become increasingly important in the emerging surveillance society: should the law treat information as private even though others know about it? This is the third-party privacy problem. Part I explores two competing conceptions of privacy: the binary and contextual conceptions. Part II describes two features of the emerging surveillance society that should change the way we address the third-party privacy problem. One feature, “surveillance on demand,” results from exponential increases in data collection and aggregation. The other feature, “uploaded lives,” reflects a revolution in the type and amount of information that we share …
A Fourth Amendment Theory For Arrestee Dna And Other Biometric Databases, David H. Kaye
A Fourth Amendment Theory For Arrestee Dna And Other Biometric Databases, David H. Kaye
Journal Articles
Routine DNA sampling following a custodial arrest process is now the norm in many jurisdictions, but is it consistent with the Fourth Amendment? The few courts that have addressed the question have disagreed on the answer, but all of them seem to agree on two points: (1) the reasonableness of the practice turns on a direct form of balancing of individual and governmental interests; and (2) individuals who are convicted — and even those who are merely arrested — have a greatly diminished expectation of privacy in their identities. This Article disputes these propositions and offers an improved framework for …
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …
The Case For The Third-Party Doctrine, Orin S. Kerr
The Case For The Third-Party Doctrine, Orin S. Kerr
Michigan Law Review
This Article offers a defense of the Fourth Amendment's third party doctrine, the controversial rule that information loses Fourth Amendment protection when it is knowingly revealed to a third party. Fourth Amendment scholars have repeatedly attacked the rule on the ground that it is unpersuasive on its face and gives the government too much power This Article responds that critics have overlooked the benefits of the rule and have overstated its weaknesses. The third-party doctrine serves two critical functions. First, the doctrine ensures the technological neutrality of the Fourth Amendment. It corrects for the substitution effect of third parties that …
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Susan Freiwald
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
Please, Let's Bury The Junk: The Codis Loci And The Revelation Of Private Information, David H. Kaye
Please, Let's Bury The Junk: The Codis Loci And The Revelation Of Private Information, David H. Kaye
Journal Articles
This Northwestern University Law Review Colloquy paper describes the four possible ways in which genetic loci could possess predictive or diagnostic value with regard to diseases and explains why these mechanisms have not led, and probably cannot lead, to useful screening tests with the Convicted Offender DNA Index System (CODIS) profiles in national, state, and local databases. It then considers the phenotypes and familial relationships that the CODIS STRs can be used to identify. The profiles carry limited information about an individual's race and familial relationships, and the article places the resulting privacy issues in perspective. Finally, the paper comments …
A First Principles Approach To Communications' Privacy, Susan Freiwald
A First Principles Approach To Communications' Privacy, Susan Freiwald
Susan Freiwald
Two Fallacies About Dna Data Banks For Law Enforcement, David H. Kaye
Two Fallacies About Dna Data Banks For Law Enforcement, David H. Kaye
Journal Articles
This commentary on the article Legal and Policy Issues in Expanding the Scope of Law Enforcement DNA Data Banks, 67 Brook. L. Rev. 127 (2001), by Mark Rothstein and Sandra Carnahan, argues that the case for confining law enforcement DNA databases to noncoding loci and to samples from individuals convicted of violent crimes is quite weak.
It describes alternative approaches, including the possibility of a population-wide database; the privacy implications of the loci now used in forensic identification; the law governing DNA dragnets; and the limits on DNA databases imposed by recent cases on searches and seizures. It notes the …
The Constitutionality Of Dna Sampling On Arrest, David H. Kaye
The Constitutionality Of Dna Sampling On Arrest, David H. Kaye
Journal Articles
Every state now collects DNA from people convicted of certain offenses. Law enforcement authorities promote offender DNA databanking on the theory that it will identify offenders who commit additional crimes while or probation or parole, or after they have finished serving their sentences. Even relatively small databases have yielded such dividends. As these database searches uncover the perpetrators of rapes, murders, and other offenses, the pressure builds to expand the coverage of the databases.
Recent proposals call for extending not merely the scope of crimes for which DNA databanking would be used, but also the point at which the samples …