Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Constitutional Law

PDF

The University of Akron

2020

Fourth Amendment

Articles 1 - 3 of 3

Full-Text Articles in Law

Symposium: Pandemics And The Constitution: Pandemic Surveillance - The New Predictive Policing, Michael Gentithes, Harold J. Krent May 2020

Symposium: Pandemics And The Constitution: Pandemic Surveillance - The New Predictive Policing, Michael Gentithes, Harold J. Krent

ConLawNOW

As the fight against the coronavirus pandemic continues, state governments are considering more invasive surveillance to determine who has been exposed to the virus and who is most likely to catch the virus in the future. Widespread efforts to test temperatures have been initiated; calls for contact tracing have increased; and plans have been revealed to allow only those testing positive for the virus’s antibodies (who presumably now are immune) to return to work and travel. Such fundamental liberties may now hinge on the mere probabilities that one may catch the disease or be immune from it.

To assess the …


Symposium: Pandemics And The Constitution: Why The Special Needs Doctrine Is The Most Appropriate Fourth Amendment Theory For Justifying Police Stops To Enforce Covid-19 Stay-At-Home Orders, Henry F. Fradella May 2020

Symposium: Pandemics And The Constitution: Why The Special Needs Doctrine Is The Most Appropriate Fourth Amendment Theory For Justifying Police Stops To Enforce Covid-19 Stay-At-Home Orders, Henry F. Fradella

ConLawNOW

Despite the fact that the steps the federal and state governments take to curtail the spread of the viral infection are presumably taken in the best interest of public health, governmental actions and actors must comply with the U.S. Constitution even during a pandemic. Some public health measures, such as stay-at-home orders, restrict the exercise of personal freedoms ranging from the rights to travel and freely associate to the ability to gather in places of worship for religious services. This Essay explores several completing doctrines that might justify the authority of law enforcement to stop people who are out of …


Hash It Out: Fourth Amendment Protection Of Electronically Stored Child Exploitation, Rebekah A. Branham Mar 2020

Hash It Out: Fourth Amendment Protection Of Electronically Stored Child Exploitation, Rebekah A. Branham

Akron Law Review

Few courts have addressed whether ISP’s use of hash-based evaluation violates an individual’s Fourth Amendment rights. In 2018, the Fifth Circuit was presented with this issue in United States v. Reddick. The defendant is Reddick uploaded files to the cloud-sharing server Microsoft SkyDrive. Thereafter PhotoDNA, a computer software program that uses hashing, automatically reviewed the hash values of those files and compared them against its database of known child pornography hash values. PhotoDNA detected a hash value match between the defendant’s photos and the database. It then created a “CyberTip,” sending the files and users information to the NCMEC. …