Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Law
United States V. Jones: Changing Expectations Of Privacy In The Digital Age, Daniel W. Edwards
United States V. Jones: Changing Expectations Of Privacy In The Digital Age, Daniel W. Edwards
University of Denver Criminal Law Review
No abstract provided.
Combatendo A Corrupção Nos Estados Unidos, Paul Marcus
Combatendo A Corrupção Nos Estados Unidos, Paul Marcus
Paul Marcus
The article discusses the problematic of the fight against the corruption by the criminal justice system of the United States, mainly the white-collar crimes. It is emphasized, first, that in most of the cases does not result in trial, but in plea bargains, and, second, in many cases the encouragement from an undercover agent has served as an effective defense instrument. Finally, it is discussed the problematic of the use of information obtained from the technological devices and its probable violation to the right privacy.
This article is in Portuguese.
The Case For The Third-Party Doctrine, Orin S. Kerr
The Case For The Third-Party Doctrine, Orin S. Kerr
Orin Kerr
This Article offers a defense of the Fourth Amendment's third party doctrine, the controversial rule that information loses Fourth Amendment protection when it is knowingly revealed to a third party. Fourth Amendment scholars have repeatedly attacked the rule on the ground that it is unpersuasive on its face and gives the government too much power This Article responds that critics have overlooked the benefits of the rule and have overstated its weaknesses. The third-party doctrine serves two critical functions. First, the doctrine ensures the technological neutrality of the Fourth Amendment. It corrects for the substitution effect of third parties that …
Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones
Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones
Cleveland State Law Review
Courts are divided as to whether law enforcement can collect cell phone location information in real-time without a warrant under the Fourth Amendment. This Article argues that Carpenter v. United States requires a warrant under the Fourth Amendment prior to law enforcement’s collection of real-time cell phone location information. Courts that have required a warrant prior to the government’s collection of real-time cell phone location information have considered the length of surveillance. This should not be a factor. The growing prevalence and usage of cell phones and cell phone technology, the original intent of the Fourth Amendment, and United States …
When A Tent Is Your Castle: Constitutional Protection Against Unreasonable Searches Of Makeshift Dwellings Of Unhoused Persons, Evanie Parr
Seattle University Law Review
This Note will argue that all jurisdictions should follow the Washington State Court of Appeals, Division II in validating makeshift dwellings used by people experiencing homelessness as spaces protected from unwarranted police intrusions by shifting evaluations of “reasonable expectations of privacy” to a more equitable standard that appreciates the realities of economic disparity. This approach to constitutional protections against unreasonable searches and seizures is imperative to protect the rights of people experiencing homelessness, given that such individuals are regularly subjected to invasions of privacy and heightened exposure to the criminal justice system.
The Left's Law-And-Order Agenda, Aya Gruber
How To Get Away With Murder: The “Gay Panic” Defense, Omar T. Russo
How To Get Away With Murder: The “Gay Panic” Defense, Omar T. Russo
Touro Law Review
No abstract provided.
Privacy And Security Across Borders, Jennifer Daskal
Privacy And Security Across Borders, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in what will likely be an ongoing and critically important debate about law enforcement access to data, the jurisdictional limits to such access, and the rules that apply. Each of these developments addresses a common set of challenges posed by the increased digitalization of information, the rising power of private companies delimiting access to that information, and the cross-border nature of investigations that involve digital evidence. And each has profound implications for privacy, security, and the possibility of meaningful democratic accountability and control. This Essay analyzes the …
Taking Data, Michael C. Pollack
Taking Data, Michael C. Pollack
Articles
Technological development has created new forms of information, altered expectations of privacy, and given law enforcement more tools to examine that information and intrude on that privacy. One crucial facet of these changes involves internet service providers (ISPs): as people expose more of their lives to their ISPs—all the websites they visit, people they communicate with, emails they send, files they store, and more—law enforcement efforts to access that data become more and more common. But scholars and policymakers alike recognize that the existing statutory frameworks governing those efforts are based on obsolete technology and strike balances that are difficult …
Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue
Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The Carpenter Court held that warrantless access to seven or more days of cell site location information (CSLI) constitutes a violation of the reasonable expectation of privacy that individuals have in the whole of their physical movements. But the grounds on which the Court drew a line characterize all sorts of digital records—including those at issue in Miller and Smith, belying the majority’s claim that the decision leaves third-party doctrine intact. Instead of avoiding Katz’s pitfalls, moreover, the Court emphasized voluntary assumption of risk, doubling down on the subjective nature of judicial determination. The decision will likely lead to …