Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
Articles 1 - 2 of 2
Full-Text Articles in Law
Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson
Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson
John W. Nelson
Our laptops are capable of containing large amounts of personal, private, intimate, and confidential information. At the same time, the power of the government to search us and our possessions is at its zenith during a border crossing. How should our laptops be treated during these border crossings?
This Note examines the background of the border search exception and the privacy interests we each have in our laptop computers. This Note argues that searches of our laptop computers should be viewed as highly intrusive in nature because of the ability to quickly sort through vast amounts of intimate and private …
Symposium Introduction -- Miranda At 40: Applications In A Post-Enron, Post-9/11 World, Donald J. Kochan
Symposium Introduction -- Miranda At 40: Applications In A Post-Enron, Post-9/11 World, Donald J. Kochan
Donald J. Kochan
The groundbreaking case of Miranda v. Arizona raise[d] questions which go to the roots of our concepts of American criminal jurisprudence: the restraints society must observe consistent with the Federal Constitution in prosecuting individuals for crime. This Introduction to the 2007 Chapman Law Review Symposium summarizes the contemporary examination of Miranda's influence, past and present, along with the continuing debate today. The experiences and precedents that have evolved in the past 40 years helps to explore the evolution of the criminal law and procedural dictates set forth in Miranda. Complications with custodial interrogation - and the impulses and incentives involved …