Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

An Exceptional Case: How Washington Should Amend Its Procedure For Imposing An Exceptional Sentence In Response To Blakely V. Washington, Jason Amala, Jason Laurine Jan 2005

An Exceptional Case: How Washington Should Amend Its Procedure For Imposing An Exceptional Sentence In Response To Blakely V. Washington, Jason Amala, Jason Laurine

Seattle University Law Review

This article reviews the Blakely decision and the Washington Legislature's response in S.B. 5477. Part II discusses the problem that Blakely created for Washington's sentencing guidelines system. Part III analyzes the judicial advisory and bifurcated trial proposals and explains why Washington wisely adopted the bifurcated trial approach. Part IV identifies key issues that are raised by using a bifurcated trial and analyzes how S.B. 5477 addresses, or fails to address, those issues. Finally, Part V concludes by suggesting that the legislature should have provided for the following in its bill responding to the Blakely decision: a provision allowing bifurcation for …


Voice Over Internet Protocol And The Wiretap Act: Is Your Conversation Protected?, Daniel B. Garrie, Matthew J. Armstrong, Donald P. Harris Jan 2005

Voice Over Internet Protocol And The Wiretap Act: Is Your Conversation Protected?, Daniel B. Garrie, Matthew J. Armstrong, Donald P. Harris

Seattle University Law Review

10101101: Is this sequence of digits voice or data? To a computer, voice is a sequence of digits and data is a sequence of digits. The law has defined 10101101 to be data, and 10101001 to be voice communications. Courts have constructed a distinction between data, 10101101, and voice, 10101001. However, that distinction is blurred when voice and data are simultaneously transmitted through the same medium. The courts forbid third parties to tap or monitor voice communications, yet permit data packets to be tracked, stored, and sold by third parties with the implied consent of either party engaged in the …