Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

Series

Privacy

Institution
Publication Year
Publication

Articles 31 - 60 of 106

Full-Text Articles in Law

Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele Jan 2017

Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele

Faculty Publications

Fall 2017 saw a major privacy case with international implications reach the U.S. Supreme Court this term, Carpenter v. United States. Now a second such case pits the Government against Big Tech in United States v. Microsoft. Carpenter is a criminal case involving federal seizure of cell phone location data from service providers. Arising under the “reasonable grounds” provision of the Stored Communications Act (SCA), the case accentuates Americans’ lack of constitutional protection for personal data in third-party hands, in contrast with emerging global privacy norms. The second major privacy case headed for Supreme Court decision in 2018 also arises …


The Fourth Amendment In A Digital World, Laura K. Donohue Jan 2017

The Fourth Amendment In A Digital World, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Fourth Amendment doctrines created in the 1970s and 1980s no longer reflect how the world works. The formal legal distinctions on which they rely—(a) private versus public space, (b) personal information versus third party data, (c) content versus non-content, and (d) domestic versus international—are failing to protect the privacy interests at stake. Simultaneously, reduced resource constraints are accelerating the loss of rights. The doctrine has yet to catch up with the world in which we live. A necessary first step for the Court is to reconsider the theoretical underpinning of the Fourth Amendment, to allow for the evolution of a …


Newsroom: Goldstein On Drug Databases 6-27-2016, Sheri Qualters, Roger Williams University School Of Law Jun 2016

Newsroom: Goldstein On Drug Databases 6-27-2016, Sheri Qualters, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern May 2016

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

Faculty Publications

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law Apr 2016

13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Unilateral Invasions Of Privacy, Roger Allan Ford Apr 2016

Unilateral Invasions Of Privacy, Roger Allan Ford

Law Faculty Scholarship

Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …


The History, Means, And Effects Of Structural Surveillance, Jeffrey L. Vagle Feb 2016

The History, Means, And Effects Of Structural Surveillance, Jeffrey L. Vagle

All Faculty Scholarship

The focus on the technology of surveillance, while important, has had the unfortunate side effect of obscuring the study of surveillance generally, and tends to minimize the exploration of other, less technical means of surveillance that are both ubiquitous and self-reinforcing—what I refer to as structural surveillance— and their effects on marginalized and disenfranchised populations. This Article proposes a theoretical framework for the study of structural surveillance which will act as a foundation for follow-on research in its effects on political participation.


Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson Jan 2016

Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

What is the constitutional significance of the proverbial "keep off the grass" sign? This question — asked by curmudgeonly neighbors everywhere — has been given new currency in a recent decision by the United States Supreme Court. Indeed, Florida v. Jardines might have bestowed constitutional curmudgeons with significant new Fourth Amendment protections. By expressing expectations regarding — and control over — access to property, "the people" may be able to claim greater Fourth Amendment protections not only for their homes, but also for their persons, papers, and effects. This article launches a constitutionally grounded, but lighthearted campaign of citizen education …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner Mar 2015

The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Librarians in the United States have many professional guideposts to inform their work. A patron's right to privacy is one tenet that tends to be upheld tenaciously, and is informed first by the 4th Amendment to the U.S. Constitution, among other Amendments, as well as Article III of the American Library Association Code of Ethics. Section 215 of the USA PATRIOT Act, the so-called "library provision," contradicts both the 4th Amendment and Article III of the ALA Code of Ethics, making it a weak third leg of a triangle of guideposts. The speaker explains how Section 215 allows for confiscation …


The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens Jan 2015

The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens

Faculty Scholarship

Technology has transformed government surveillance and opened traditionally private information to official scrutiny. The current privacy-based approach to the Fourth Amendment is unable to cope with the changes. This Article offers a solution to the problems that technological surveillance techniques present. Starting with the introduction of the approach in Katz, the Article reviews the development of privacy-based approach. It then looks at three 21st century Supreme Court cases that grappled with applying the Katz test to advanced technological surveillance techniques: Kyllo, Quon, and Jones. These cases demonstrate the problems that the privacy-based approach creates and the …


The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele Jan 2015

The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele

Faculty Publications

This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …


Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell Jan 2015

Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell

Scholarly Articles

Since joining the United States Supreme Court in 1986, Justice Scalia has been a prominent voice on the Fourth Amendment, having written twenty majority opinions, twelve concurrences, and six dissents on the topic. Under his pen, the Court has altered its test for determining when the Fourth Amendment should apply; provided a vision to address technology's encroachment on privacy; and articulated the standard for determining whether government officials are entitled to qualified immunity in civil suits involving alleged Fourth Amendment violations. In most of Justice Scalia's opinions, he has championed an originalist/textualist theory of constitutional interpretation. Based on that theory, …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski Jan 2015

Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski

Publications

A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …


The Dawn Of Social Intelligence (Socint), Laura K. Donohue Jan 2015

The Dawn Of Social Intelligence (Socint), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/‌11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.

The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …


Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski Oct 2014

Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski

Faculty Publications

For several years, states have grappled with the problem of cyberbullying and its sometimes devastating effects. Because cyberbullying often occurs between students, most states have understandably looked to schools to help address the problem. To that end, schools in forty-six states have the authority to intervene when students engage in cyberbullying. This solution seems all to the good unless a close examination of the cyberbullying laws and their implications is made. This Article explores some of the problematic implications of the cyberbullying laws. More specifically, it focuses on how the cyberbullying laws allow schools unprecedented surveillance authority over students. This …


Personal Curtilage: Fourth Amendment Security In Public, Andrew Ferguson Jan 2014

Personal Curtilage: Fourth Amendment Security In Public, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Do citizens have any Fourth Amendment protection from sense-enhancing surveillance technologies in public? This article engages a timely question as new surveillance technologies have redefined expectations of privacy in public spaces.This article proposes a new theory of Fourth Amendment security based on the ancient theory of curtilage protection for private property. Curtilage has long been understood as a legal fiction that expands the protection of the home beyond the formal structures of the house. Curtilage recognizes a buffer zone beyond the four corners of the home that deserves protection, even in public, even if accessible to public view. Based on …


When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck Jan 2014

When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck

Faculty Scholarship

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” …


Public Assistance, Drug Testing, And The Law: The Limits Of Population-Based Legal Analysis, Candice T. Player Jan 2014

Public Assistance, Drug Testing, And The Law: The Limits Of Population-Based Legal Analysis, Candice T. Player

All Faculty Scholarship

In Populations, Public Health and the Law, legal scholar Wendy Parmet urges courts to embrace population-based legal analysis, a public health inspired approach to legal reasoning. Parmet contends that population-based legal analysis offers a way to analyze legal issues—not unlike law and economics—as well as a set of values from which to critique contemporary legal discourse. Population-based analysis has been warmly embraced by the health law community as a bold new way of analyzing legal issues. Still, population-based analysis is not without its problems. At times, Parmet claims too much territory for the population perspective. Moreover, Parmet urges courts …


Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain Jan 2014

Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain

Faculty Scholarship

Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …


The New American Privacy, Richard J. Peltz-Steele Jan 2013

The New American Privacy, Richard J. Peltz-Steele

Faculty Publications

Conventional wisdom paints U.S. and European approaches to privacy at irreconcilable odds. But that portrayal overlooks a more nuanced reality of privacy in American law. The free speech imperative of U.S. constitutional law since the civil rights movement shows signs of tarnish. And in areas of law that have escaped constitutionalization, such as fair-use copyright and the freedom of information, developing personality norms resemble European-style balancing. Recent academic and political initiatives on privacy in the United States emphasize subject control and contextual analysis, reflecting popular thinking not so different after all from that which animates Europe’s 1995 directive and 2012 …


Eyes In The Sky: Constitutional And Regulatory Approaches To Domestic Drone Deployment, Hillary B. Farber Jan 2013

Eyes In The Sky: Constitutional And Regulatory Approaches To Domestic Drone Deployment, Hillary B. Farber

Faculty Publications

This article begins with a current look at the deployment of drones domestically, both in terms of their use and the procedure for attaining approval for flight. Part II examines the capabilities of drones. Part III considers the Supreme Court's current Fourth Amendment jurisprudence and its application to law enforcement's use of drones. Part IV reviews existing and proposed federal and state regulation of drones. Part V offers constitutional and legislative prescriptions for regulating drones.


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Jan 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …


Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna Jan 2013

Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna

Journal Articles

No abstract provided.


The Fight To Frame Privacy, Woodrow Hartzog Jan 2013

The Fight To Frame Privacy, Woodrow Hartzog

Faculty Scholarship

The resolution of a debate often hinges on how the problem being debated is presented. In psychology and related disciplines, this method of issue presentation is known as framing. Framing theory holds that even small changes in the presentation of an issue or event can produce significant changes of opinion. Framing has become increasingly important in discussions about privacy and security. In his new book, "Nothing to Hide: The False Tradeoff Between Privacy and Security," Daniel Solove argues that if we continue to view privacy and security as diametrically opposed to each other, privacy will always lose. Solove argues that …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Jan 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Faculty Scholarship

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


The Fourth Amendment In The Information Age, Ricardo J. Bascuas Jan 2013

The Fourth Amendment In The Information Age, Ricardo J. Bascuas

Articles

In 2013, the Supreme Court tacitly conceded that the expectations-of-privacy test used since 1967 to assess claims of Fourth Amendment violations was inadequate. It asserted that the previous property-based test for Fourth Amendment violations had never despite widespread agreement to the contrary been overruled. The Court compounded its artfulness by applying a new, significantly weaker trespass test that, like the expectations-of-privacy test, enjoys no legal pedigree. This new trespass test, which is to be applied together with the expectations-of-privacy test, suffers from the same defect as the test it purportedly supplements. It does not require the government to respect private …


Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman Jan 2013

Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman

Articles & Chapters

While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.

I argue that the myth of the online anonym is not only false as a …


Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole Jan 2013

Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole

Georgetown Law Faculty Publications and Other Works

In the modern age, we increasingly live our lives through, and accompanied by, digital media. Virtually every transaction or communication that uses such media, as well as every move of mobile phone owners, is recorded. Computers are able to store, transmit, and analyze the data as never before, drawing on multiple sources to construct an intimate picture of our interests, contacts, travels and desires. Private data-mining services, most often used for commercial advertising purposes, can determine: what we read, listen to, and look at; where we travel to, shop, and dine; and with whom we speak or associate. Meanwhile, social …