Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn Dec 2020

The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn

Arkansas Law Review

Each day that Houston drivers exit from Interstate 45 to drive to downtown Houston, they pass an odd sight. Nestled within some bushes is an encampment of tents. This encampment is very clearly located on public property adjacent to the interstate highway, and equally clearly populated by homeless individuals. While local police ostensibly tolerate this presence, at least temporarily, the sight frequently evokes an image in my mind of a police search of those tents. This thought is especially prominent on the days I am driving to my law school, South Texas College of Law Houston, to teach my federal …


Trading Privacy For Promotion? Fourth Amendment Implications Of Employers Using Wearable Sensors To Assess Worker Performance, George M. Dery Iii Dec 2020

Trading Privacy For Promotion? Fourth Amendment Implications Of Employers Using Wearable Sensors To Assess Worker Performance, George M. Dery Iii

Northwestern Journal of Law & Social Policy

This Article considers the Fourth Amendment implications of a study on a passive monitoring system where employees shared data from wearables, phone applications, and position beacons that provided private information such as weekend phone use, sleep patterns in the bedroom, and emotional states. The study’s authors hope to use the data collected to create a new system for objectively assessing employee performance that will replace the current system which is plagued by the inherent bias of self-reporting and peer-review and which is labor intensive and inefficient. The researchers were able to successfully link the data collected with the quality of …


Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter Oct 2020

Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter

Washington and Lee Journal of Civil Rights and Social Justice

You may not have heard of a botnet. If you have, you may have linked it to election shenanigans and nothing else. But if you are reading this on a computer or smartphone, there is a good chance you are in contact with a botnet right now.

Botnets, sometimes called “Zombie Armies,” are networks of devices linked by a computer virus and controlled by cybercriminals. Botnets operate on everyday devices owned by millions of Americans, and thus pose a substantial threat to individual device owners as well as the nation’s institutions and economy.

Accordingly, the United States government has been …


The Fourth Amendment At Home, Thomas P. Crocker Oct 2020

The Fourth Amendment At Home, Thomas P. Crocker

Indiana Law Journal

A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …


Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips Aug 2020

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips

Journal of Digital Forensics, Security and Law

Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …


Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore May 2020

Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore

Loyola of Los Angeles Law Review

No abstract provided.


Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D. Mar 2020

Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D.

National Training Aircraft Symposium (NTAS)

Unmanned Aerial Systems (UAS), Unmanned Aeronautical Vehicles (UAV), drones and Personal Aerial Vehicles (PAV) constitute the greatest technological advancement since the jet age. (Elaine Chao, Secretary of Transportation, October 26, 2017) This technological advancement has prompted significant public policy challenges and the need for new laws regarding navigable airspace. This proposal investigates how airspace used by drones will evolve given existing Constitutional and common law principals. These principals will influence the creation, development and modification of UAS airspace regulations by the Federal Aviation Administration (FAA).

Two critical but unanswered questions concerning the National Airspace System, are where does navigable airspace …


The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff Jan 2020

The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Police and federal agents generally must obtain a warrant to search the tens of thousands of devices they seize each year. But once they have a warrant, courts afford these officers broad leeway to search the entire device, every file and folder, all metadata and deleted data, even if in search of only one incriminating file. Courts avow great reverence for the privacy of personal information under the Fourth Amendment but then claim there is no way to limit where an officer might find the target files, or know where the suspect may have hidden them.

These courts have a …


United States V. Touset, Katelyn James Jan 2020

United States V. Touset, Katelyn James

NYLS Law Review

No abstract provided.


A New Era: Digital Curtilage And Alexa-Enabled Smart Home Devices, Johanna Sanchez Jan 2020

A New Era: Digital Curtilage And Alexa-Enabled Smart Home Devices, Johanna Sanchez

Touro Law Review

No abstract provided.


Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone Jan 2020

Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone

St. Mary's Law Journal

Privacy rights are under assault, but the Supreme Court’s judicial intervention into the issue, starting with Katz v. United States and leading to the Carpenter v. United States decision has created an inconsistent, piecemeal common law of privacy that forestalls a systematic public policy resolution by Congress and the states. In order to reach a satisfactory and longlasting resolution of the problem consistent with separation of powers principles, the states should consider a constitutional amendment that reduces the danger of pervasive technologyaided surveillance and monitoring, together with a series of statutes addressing each new issue posed by technological change as …


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.