Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti Jan 2022

Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti

Articles by Maurer Faculty

The Supreme Court’s “reasonable expectation of privacy” test under the Fourth Amendment has often been criticized as circular, and hence subjective and unpredictable. The Court is presumed to base its decisions on society’s expectations of privacy, while society’s expectations of privacy are themselves presumed to be based on the Court’s judgements. As a solution to this problem, property law has been repeatedly propounded as an allegedly independent, autonomous area of law from which the Supreme Court can glean reasonable expectations of privacy without falling back into tautological reasoning.

Such an approach presupposes that property law is not itself circular. If …


The Fourth Amendment At Home, Thomas P. Crocker Oct 2020

The Fourth Amendment At Home, Thomas P. Crocker

Indiana Law Journal

A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …


Younger Generations Are Infected By Continuous Socialization To Accept Diminished Privacy: A Global Analysis Of How The United States' Constitutional Doctrine Is A Main Contributor To Eroded Privacy, Tiffany Kim Feb 2019

Younger Generations Are Infected By Continuous Socialization To Accept Diminished Privacy: A Global Analysis Of How The United States' Constitutional Doctrine Is A Main Contributor To Eroded Privacy, Tiffany Kim

Indiana Journal of Global Legal Studies

Since the nineteenth century, privacy concerns have increased with the growth of technology. The invention of instantaneous photography, coupled with the enlarged presence of press, was met with concerns of degraded privacy. Society has formed expectations of privacy, but as time passes, those expectations continue to diminish. Younger generations have been socialized to accept lessened levels of privacy in this digitalized world of mass data and connectivity.

Individual privacy expectations vary globally. The construction of China's government and culture produces a lesser expectation of individual privacy than that of the United States. As outlined in the U.S. Constitution, U.S. citizens …


The Boundaries Of Privacy Harm, M. Ryan Calo Jul 2011

The Boundaries Of Privacy Harm, M. Ryan Calo

Indiana Law Journal

Just as a burn is an injury caused by heat, so is privacy harm a unique injury with specific boundaries and characteristics. This Essay describes privacy harm as falling into two related categories. The subjective category of privacy harm is the perception of unwanted observation. This category describes unwelcome mental states—anxiety, embarrassment, fear—that stem from the belief that one is being watched or monitored. Examples of subjective privacy harms include everything from a landlord eavesdropping on his tenants to generalized government surveillance.

The objective category of privacy harm is the unanticipated or coerced use of information concerning a person against …


Judicial Activism And Fourteenth Amendment Privacy Claims: The Allure Of Originalism And The Unappreciated Promise Of Constrained Nonoriginalism, Daniel O. Conkle Jan 2009

Judicial Activism And Fourteenth Amendment Privacy Claims: The Allure Of Originalism And The Unappreciated Promise Of Constrained Nonoriginalism, Daniel O. Conkle

Articles by Maurer Faculty

Among other meanings, "judicial activism" can be defined as judicial decisionmaking that frustrates majoritarian self-government and that is unconstrained by law. So understood, judicial activism is presumptively problematic, because it frustrates customary democratic and judicial norms.

In this essay, I address originalist and nonoriginalist responses to the presumptive problem of judicial activism in the context of Fourteenth Amendment privacy claims, including claims relating to abortion, sexual conduct, and same-sex marriage. I argue that originalism is an overrated solution, largely because current understandings of originalism, despite claims to the contrary, do not provide standards of decision that are sufficiently clear to …


Leave Me Alone! The Delicate Balance Of Privacy And Commercial Speech In The Evolving Do-Not-Call Registry, Andrew L. Sullivant Dec 2008

Leave Me Alone! The Delicate Balance Of Privacy And Commercial Speech In The Evolving Do-Not-Call Registry, Andrew L. Sullivant

Federal Communications Law Journal

In 2004, the Tenth Circuit held that although the newly enacted do-not-call registry restricted commercial speech, the restriction was narrowly tailored and thus fell within the bounds of the Constitution. Since that decision, the Federal Trade Commission has amended the do-not-call registry to abolish the provision that required individuals to re-register every five years, and in 2008, Congress passed the amendment. This Note argues that the five-year reregistration requirement is a substantial factor in the registry's narrow tailoring. By removing the requirement, questions as to the restriction's constitutionality reemerge.


Government Data Mining: The Need For A Legal Framework, Fred H. Cate Jan 2008

Government Data Mining: The Need For A Legal Framework, Fred H. Cate

Articles by Maurer Faculty

The article examines the government's growing appetite for collecting personal data. Often justified on the basis of protecting national security, government data mining programs sweep up data collected through hundreds of regulatory and administrative programs, and combine them with huge datasets obtained from industry. The result is an aggregation of personal data - the "digital footprints" of individual lives - never before seen. These data warehouses are then used to determine who can work and participate in Social Security programs, who can board airplanes and enter government buildings, and who is likely to pose a threat in the future, even …


Three Theories Of Substantive Due Process, Daniel O. Conkle Jan 2006

Three Theories Of Substantive Due Process, Daniel O. Conkle

Articles by Maurer Faculty

Substantive due process is in serious disarray, with the Supreme Court simultaneously embracing two, and perhaps three, competing and inconsistent theories of decisionmaking. The first two theories, historical tradition and reasoned judgment, have explicit and continuing support in the Court's decisions. Under the theory of historical tradition, substantive due process affords presumptive constitutional protection only to liberties that are "deeply rooted in this Nation's history and tradition." By contrast, the theory of reasoned judgment is far more expansive, permitting the Court to identify rights independently, through a process that amounts to philosophical analysis or political-moral reasoning. The third theory, evolving …


Some Queries About Privacy And Constitutional Rights, Michael Grossberg Jan 1991

Some Queries About Privacy And Constitutional Rights, Michael Grossberg

Articles by Maurer Faculty

No abstract provided.


High Technology, The Human Image, And Constitutional Value, Patrick L. Baude Jan 1985

High Technology, The Human Image, And Constitutional Value, Patrick L. Baude

Articles by Maurer Faculty

No abstract provided.