Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Substance And Method In The Year 2000, Akhil Reed Amar Oct 2012

Substance And Method In The Year 2000, Akhil Reed Amar

Pepperdine Law Review

No abstract provided.


Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky Oct 2012

Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky

Pepperdine Law Review

No abstract provided.


Breaking The Seal On White-Collar Criminal Search Warrant Materials , David Horan Jul 2012

Breaking The Seal On White-Collar Criminal Search Warrant Materials , David Horan

Pepperdine Law Review

No abstract provided.


Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright Jul 2012

Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright

Pepperdine Law Review

No abstract provided.


Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson Mar 2012

Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson

Pepperdine Law Review

For at least thirty years the Supreme Court has adhered to its third-party doctrine in interpreting the Fourth Amendment, meaning that so far as a disclosing party is concerned, information in the hands of a third party receives no Fourth Amendment protection. The doctrine was controversial when adopted, has been the target of sustained criticism, and is the predominant reason that the Katz revolution has not been the revolution many hoped it would be. Some forty years after Katz the Court's search jurisprudence largely remains tied to property conceptions. As I have demonstrated elsewhere, however, the doctrine is not the …


Getting Back To The Fourth Amendment: Warrantless Cell Phone Searches, Mireille Dee Jan 2012

Getting Back To The Fourth Amendment: Warrantless Cell Phone Searches, Mireille Dee

NYLS Law Review

No abstract provided.


The Missed Opportunity Of United States V. Jones: Commercial Erosion Of Fourth Amendment Protection In A Post Google Earth World, Mary Graw Leary Jan 2012

The Missed Opportunity Of United States V. Jones: Commercial Erosion Of Fourth Amendment Protection In A Post Google Earth World, Mary Graw Leary

Scholarly Articles

The Fourth Amendment protects people from unreasonable searches and seizures by the government. These protections, therefore, are only triggered when the government engages is a “search” or “seizure.” For decades, the Court defined “search” as a government examination of an area where one has a “reasonable expectation of privacy.” Such an expectation requires both that the individual demonstrate a subjective expectation of privacy and that the expectation is one society finds reasonable. In 1974, Anthony Amsterdam prophesized the unworkability of this test, warning of a day that the government would circumvent it my merely announcing 24 hour surveillance. Similarly, the …


Electronic Evidence In Canada, Robert Currie, Steve Coughlan Jan 2012

Electronic Evidence In Canada, Robert Currie, Steve Coughlan

Articles, Book Chapters, & Popular Press

This chapter discusses the issues surrounding electronic evidence in Canada. Topics discussed include the best evidence rule, electronic signatures, web-based evidence, and video-tape and security camera evidence. In addition rules around protection of privacy, discovery, and confidentiality are pursued. Finally the chapter also considers the many issues which arise around gathering electronic evidence in the criminal context, including wiretaps, general warrants, and searches of computers and cell phones.


Expectations Of Privacy In Social Media, Stephen E. Henderson Dec 2011

Expectations Of Privacy In Social Media, Stephen E. Henderson

Stephen E Henderson

This article, which largely tracks my remarks at Mississippi College’s Social Media Symposium, examines expectations of privacy in social media such as weblogs (blogs), Facebook pages, and Twitter tweets. Social media is diverse and ever-diversifying, and while I address some of that complexity, I focus on the core functionality, which provides the groundwork for further conversation as the technology and related social norms develop. As one would expect, just as with our offline communications and other online communications, in some we have an expectation of privacy that is recognized by current law, in some we have an expectation of privacy …