Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Law
Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti
Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti
Articles by Maurer Faculty
The Supreme Court’s “reasonable expectation of privacy” test under the Fourth Amendment has often been criticized as circular, and hence subjective and unpredictable. The Court is presumed to base its decisions on society’s expectations of privacy, while society’s expectations of privacy are themselves presumed to be based on the Court’s judgements. As a solution to this problem, property law has been repeatedly propounded as an allegedly independent, autonomous area of law from which the Supreme Court can glean reasonable expectations of privacy without falling back into tautological reasoning.
Such an approach presupposes that property law is not itself circular. If …
The Fourth Amendment At Home, Thomas P. Crocker
The Fourth Amendment At Home, Thomas P. Crocker
Indiana Law Journal
A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …
Younger Generations Are Infected By Continuous Socialization To Accept Diminished Privacy: A Global Analysis Of How The United States' Constitutional Doctrine Is A Main Contributor To Eroded Privacy, Tiffany Kim
Indiana Journal of Global Legal Studies
Since the nineteenth century, privacy concerns have increased with the growth of technology. The invention of instantaneous photography, coupled with the enlarged presence of press, was met with concerns of degraded privacy. Society has formed expectations of privacy, but as time passes, those expectations continue to diminish. Younger generations have been socialized to accept lessened levels of privacy in this digitalized world of mass data and connectivity.
Individual privacy expectations vary globally. The construction of China's government and culture produces a lesser expectation of individual privacy than that of the United States. As outlined in the U.S. Constitution, U.S. citizens …
The Boundaries Of Privacy Harm, M. Ryan Calo
The Boundaries Of Privacy Harm, M. Ryan Calo
Indiana Law Journal
Just as a burn is an injury caused by heat, so is privacy harm a unique injury with specific boundaries and characteristics. This Essay describes privacy harm as falling into two related categories. The subjective category of privacy harm is the perception of unwanted observation. This category describes unwelcome mental states—anxiety, embarrassment, fear—that stem from the belief that one is being watched or monitored. Examples of subjective privacy harms include everything from a landlord eavesdropping on his tenants to generalized government surveillance.
The objective category of privacy harm is the unanticipated or coerced use of information concerning a person against …
Judicial Activism And Fourteenth Amendment Privacy Claims: The Allure Of Originalism And The Unappreciated Promise Of Constrained Nonoriginalism, Daniel O. Conkle
Judicial Activism And Fourteenth Amendment Privacy Claims: The Allure Of Originalism And The Unappreciated Promise Of Constrained Nonoriginalism, Daniel O. Conkle
Articles by Maurer Faculty
Among other meanings, "judicial activism" can be defined as judicial decisionmaking that frustrates majoritarian self-government and that is unconstrained by law. So understood, judicial activism is presumptively problematic, because it frustrates customary democratic and judicial norms.
In this essay, I address originalist and nonoriginalist responses to the presumptive problem of judicial activism in the context of Fourteenth Amendment privacy claims, including claims relating to abortion, sexual conduct, and same-sex marriage. I argue that originalism is an overrated solution, largely because current understandings of originalism, despite claims to the contrary, do not provide standards of decision that are sufficiently clear to …
Leave Me Alone! The Delicate Balance Of Privacy And Commercial Speech In The Evolving Do-Not-Call Registry, Andrew L. Sullivant
Leave Me Alone! The Delicate Balance Of Privacy And Commercial Speech In The Evolving Do-Not-Call Registry, Andrew L. Sullivant
Federal Communications Law Journal
In 2004, the Tenth Circuit held that although the newly enacted do-not-call registry restricted commercial speech, the restriction was narrowly tailored and thus fell within the bounds of the Constitution. Since that decision, the Federal Trade Commission has amended the do-not-call registry to abolish the provision that required individuals to re-register every five years, and in 2008, Congress passed the amendment. This Note argues that the five-year reregistration requirement is a substantial factor in the registry's narrow tailoring. By removing the requirement, questions as to the restriction's constitutionality reemerge.
Government Data Mining: The Need For A Legal Framework, Fred H. Cate
Government Data Mining: The Need For A Legal Framework, Fred H. Cate
Articles by Maurer Faculty
The article examines the government's growing appetite for collecting personal data. Often justified on the basis of protecting national security, government data mining programs sweep up data collected through hundreds of regulatory and administrative programs, and combine them with huge datasets obtained from industry. The result is an aggregation of personal data - the "digital footprints" of individual lives - never before seen. These data warehouses are then used to determine who can work and participate in Social Security programs, who can board airplanes and enter government buildings, and who is likely to pose a threat in the future, even …
Three Theories Of Substantive Due Process, Daniel O. Conkle
Three Theories Of Substantive Due Process, Daniel O. Conkle
Articles by Maurer Faculty
Substantive due process is in serious disarray, with the Supreme Court simultaneously embracing two, and perhaps three, competing and inconsistent theories of decisionmaking. The first two theories, historical tradition and reasoned judgment, have explicit and continuing support in the Court's decisions. Under the theory of historical tradition, substantive due process affords presumptive constitutional protection only to liberties that are "deeply rooted in this Nation's history and tradition." By contrast, the theory of reasoned judgment is far more expansive, permitting the Court to identify rights independently, through a process that amounts to philosophical analysis or political-moral reasoning. The third theory, evolving …
Some Queries About Privacy And Constitutional Rights, Michael Grossberg
Some Queries About Privacy And Constitutional Rights, Michael Grossberg
Articles by Maurer Faculty
No abstract provided.
High Technology, The Human Image, And Constitutional Value, Patrick L. Baude
High Technology, The Human Image, And Constitutional Value, Patrick L. Baude
Articles by Maurer Faculty
No abstract provided.