Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Preservation Requests And The Fourth Amendment, Armin Tadayon Oct 2020

Preservation Requests And The Fourth Amendment, Armin Tadayon

Seattle University Law Review

Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …


Rethinking Standards Of Appellate Review, Adam Steinman Oct 2020

Rethinking Standards Of Appellate Review, Adam Steinman

Indiana Law Journal

Every appellate decision typically begins with the standard of appellate review. The Supreme Court has shown considerable interest in selecting the standard of appellate review for particular issues, frequently granting certiorari in order to decide whether de novo or deferential review governs certain trial court rulings. This Article critiques the Court's framework for making this choice and questions the desirability of assigning distinct standards of appellate review on an issue-by-issue basis. Rather, the core functions of appellate courts are better served by a single template for review that dispenses with the recurring uncertainty over which standard governs which trial court …


Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …


Scott V. Harris And The Future Of Summary Judgment, Tobias Barrington Wolff Jul 2015

Scott V. Harris And The Future Of Summary Judgment, Tobias Barrington Wolff

All Faculty Scholarship

The Supreme Court’s decision in Scott v. Harris has quickly become a staple in many Civil Procedure courses, and small wonder. The cinematic high-speed car chase complete with dash-cam video and the Court’s controversial treatment of that video evidence seem tailor-made for classroom discussion. As is often true with instant classics, however, splashy first impressions can mask a more complex state of affairs. At the heart of Scott v. Harris lies the potential for a radical doctrinal reformation: a shift in the core summary judgment standard undertaken to justify a massive expansion of interlocutory appellate jurisdiction in qualified immunity cases. …


Big Data And Predictive Reasonable Suspicion, Andrew Ferguson Jan 2015

Big Data And Predictive Reasonable Suspicion, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

The Fourth Amendment requires “reasonable suspicion” to seize a suspect. As a general matter, the suspicion derives from information a police officer observes or knows. It is individualized to a particular person at a particular place. Most reasonable suspicion cases involve police confronting unknown suspects engaged in observable suspicious activities. Essentially, the reasonable suspicion doctrine is based on “small data” – discrete facts involving limited information and little knowledge about the suspect.But what if this small data is replaced by “big data”? What if police can “know” about the suspect through new networked information sources? Or, what if predictive analytics …


Great (And Reasonable) Expectations: Fourth Amendment Protection For Attorney-Client Communications, Teri J. Dobbins Jan 2008

Great (And Reasonable) Expectations: Fourth Amendment Protection For Attorney-Client Communications, Teri J. Dobbins

Seattle University Law Review

Most motor vehicle crashes are traceable to “some failure of judgment that fully reveals its dangers only when it is too late. That is precisely why they are accidents.” For example, speeding is one of the most prevalent factors contributing to vehicular crashes. Although especially deadly when combined with driver intoxication, speeding is a significant contributing factor in fatal crashes involving sober drivers. Part II of this Article briefly discusses the development of accident insurance. It examines courts' struggles in determining whether an insured's death was an accident for purposes of awarding accidental death benefits, and approaches to resolving this …


A Thirteenth Amendment Framework For Combating Racial Profiling, William M. Carter Jr. Jan 2004

A Thirteenth Amendment Framework For Combating Racial Profiling, William M. Carter Jr.

Articles

Law enforcement officers’ use of race to single persons out for criminal suspicion (“racial profiling”) is the subject of much scrutiny and debate. This Article provides a new understanding of racial profiling. While scholars have correctly concluded that racial profiling should be considered a violation of the Fourth Amendment, the Fourteenth Amendment’s Equal Protection Clause, and existing federal statutes, this Article contends that the use of race as a proxy for criminality is also a badge and incident of slavery in violation of the Thirteenth Amendment.

Racial profiling is not only a denial of the right to equal treatment, but …


Special Needs And Special Deference: Suspicionless Civil Searches In The Modern Regulatory State, Fabio Arcila Jan 2004

Special Needs And Special Deference: Suspicionless Civil Searches In The Modern Regulatory State, Fabio Arcila

Scholarly Works

This Article examines the Supreme Court’s application of the "special needs" principle, which is part of its Fourth Amendment search and seizure jurisprudence, with an emphasis on suspicionless searches. It argues that both courts and commentators have insufficiently acknowledged the tension between the modern regulatory state, which is significantly dependent upon such searches, and adequately protecting liberty interests. The commentators who criticize the Court’s deference ignore that a deferential approach can be justified. Suspicionless civil searches, for example, are not necessarily incompatible with original intent. Moreover, the many proposals for reforming suspicionless civil search jurisprudence, such as reinvigorating the individualized …