Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

PDF

University of Michigan Law School

Journal

2013

Privacy

Articles 1 - 2 of 2

Full-Text Articles in Law

The Court Loses Its Way With The Global Positioning System: United States V. Jones Retreats To The “Classic Trespassory Search”, George M. Dery Iii, Ryan Evaro Dec 2013

The Court Loses Its Way With The Global Positioning System: United States V. Jones Retreats To The “Classic Trespassory Search”, George M. Dery Iii, Ryan Evaro

Michigan Journal of Race and Law

This Article analyzes United States v. Jones, in which the Supreme Court considered whether government placement of a global positioning system (GPS) device on a vehicle to follow a person’s movements constituted a Fourth Amendment “search.” The Jones Court ruled that two distinct definitions existed for a Fourth Amendment “search.” In addition to Katz v. United States’s reasonable-expectation-of-privacy standard, which the Court had used exclusively for over four decades, the Court recognized a second kind of search that it called a “classic trespassory search.” The second kind of search occurs when officials physically trespass or intrude upon a constitutionally protected …


The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin Murphy Feb 2013

The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin Murphy

Michigan Law Review

When criminal justice scholars think of privacy, they think of the Fourth Amendment. But lately its domain has become far less absolute. The United States Code currently contains over twenty separate statutes that restrict both the acquisition and release of covered information. Largely enacted in the latter part of the twentieth century, these statutes address matters vital to modern existence. They control police access to driver's licenses, educational records, health histories, telephone calls, email messages, and even video rentals. They conform to no common template, but rather enlist a variety of procedural tools to serve as safeguards - ranging from …