Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff Jan 2020

The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Police and federal agents generally must obtain a warrant to search the tens of thousands of devices they seize each year. But once they have a warrant, courts afford these officers broad leeway to search the entire device, every file and folder, all metadata and deleted data, even if in search of only one incriminating file. Courts avow great reverence for the privacy of personal information under the Fourth Amendment but then claim there is no way to limit where an officer might find the target files, or know where the suspect may have hidden them.

These courts have a …


How Evidence Of Subsequent Remedial Measures Matters, Bernard Chao, Kylie Santos Jan 2019

How Evidence Of Subsequent Remedial Measures Matters, Bernard Chao, Kylie Santos

Sturm College of Law: Faculty Scholarship

Federal Rule of Evidence 407 prohibits plaintiffs from introducing evidence of subsequent remedial measures to show that the defendant is to blame. Among its purported justifications, the rule prevents hindsight bias from unduly influencing jury decisions. Nonetheless, plaintiffs often take advantage of the rule’s numerous exceptions to introduce evidence of remedial measures for other purposes (e.g. to prove feasibility). Fearing that the exceptions could swallow the rule, some courts will even exclude evidence that fits into one of these exceptions because it is ostensibly too prejudicial. Alternatively, other courts instruct juries that they should only use the evidence for the …


What Am I Really Saying When I Open My Smartphone: A Response To Prof. Kerr, Laurent Sacharoff Jan 2019

What Am I Really Saying When I Open My Smartphone: A Response To Prof. Kerr, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

In his forthcoming article in the Texas Law Review, Compelled Decryption and the Privilege Against Self-Incrimination, Orin S. Kerr addresses a common question confronting courts. If a court orders a suspect or defendant to enter her password to open a smartphone or other device as part of a law enforcement investigation, does that order violate the Fifth Amendment right against self-incrimination?

To answer this question, Kerr appropriately looks by analogy to existing Fifth Amendment case law as applied to document subpoenas, the “act of production” doctrine, and its mysterious cousin, the “foregone conclusion” doctrine. From these materials, he gleans a …


Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Bernard Chao, Catherine Durso, Ian Farrell, Christopher Robertson Jan 2018

Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Bernard Chao, Catherine Durso, Ian Farrell, Christopher Robertson

Sturm College of Law: Faculty Scholarship

The Fourth Amendment protects against unreasonable “searches and seizures,” but in the digital age of stingray devices and IP tracking, what constitutes a search or seizure? The Supreme Court has held that the threshold question depends on and reflects the “reasonable expectations” of ordinary members of the public concerning their own privacy. For example, the police now exploit the “third party” doctrine to access data held by email and cell phone providers, without securing a warrant, on the Supreme Court’s intuition that the public has no expectation of privacy in that information. Is that assumption correct? If judges’ intuitions about …


Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff Jan 2018

Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Each year, law enforcement seizes thousands of electronic devices — smartphones, laptops, and notebooks — that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password?

This Article considers the Fifth Amendment protection against compelled disclosures of passwords — a question that has split and …


Skills & Values: Discovery Practice, David I.C. Thomson Jan 2017

Skills & Values: Discovery Practice, David I.C. Thomson

Sturm College of Law: Faculty Scholarship

Skills & Values: Discovery Practice, Third Edition, is designed to serve as an introduction to the practical application of the discovery rules. The book introduces each discovery topic briefly and then provides a context and structure for exercises and self-study. Skills & Values: Discovery Practice can be used by a professor teaching a full pre-trial course, or one focused just on discovery law. It can be used alone or in conjunction with another pre-trial text, and it can be used with the problem set provided in the appendix or with a professor's own problem set. It also can be …


Who Should Own Police Body Camera Videos?, Laurent Sacharoff, Sarah Lustbader Jan 2017

Who Should Own Police Body Camera Videos?, Laurent Sacharoff, Sarah Lustbader

Sturm College of Law: Faculty Scholarship

Numerous cities, states, and localities have adopted police body camera programs to enhance police accountability in the wake of repeated instances of police misconduct, as well as recent reports of more deep-seated police problems. These body camera programs hold great promise to achieve accountability, often backed by millions of dollars of federal grants.

But so far, this promise of accountability has gone largely unrealized, in part because police departments exercise near-total control over body camera programs and the videos themselves. In fact, the police view these programs chiefly as a tool of ordinary law enforcement rather than accountability — as …


E-Discovery's Threat To Civil Litigation: Reevaluating Rule 26 For The Digital Age, Robert M. Hardaway, Dustin D. Berger, Andrea Defield Jan 2011

E-Discovery's Threat To Civil Litigation: Reevaluating Rule 26 For The Digital Age, Robert M. Hardaway, Dustin D. Berger, Andrea Defield

Sturm College of Law: Faculty Scholarship

The Federal Rules of Civil Procedure, even though they were amended in 2006 specifically to address the costs and scale of ediscovery, not only fail to contain the cost or scope of discovery, but, in fact, encourage expensive litigation ancillary to the merits of civil litigants' cases. This Article proposes that the solution to this dilemma is to eliminate the presumption that the producing party should pay for the cost of discovery. This rule should be abandoned in favor of a rule that would equally distribute the costs of discovery between the requesting and producing parties.


Equivalent Deterrence: A Proposed Alternative To The Exclusionary Rule In Criminal Proceedings, Robert M. Hardaway Jan 1989

Equivalent Deterrence: A Proposed Alternative To The Exclusionary Rule In Criminal Proceedings, Robert M. Hardaway

Sturm College of Law: Faculty Scholarship

Perhaps no other area of American jurisprudence is as controversial as the exclusionary rule. Rejected by all other civilized countries2 and held in contempt by much of the American public, the rule reached its zenith during the Warren Court, only to be chipped away a little at a time by the Burger Court. Indeed, if the rule is ever to die, it seems destined to go out with a whimper rather than a bang. . .