Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal Dec 2017

Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal

William & Mary Bill of Rights Journal

In at least two recent cases, courts have rejected service providers’ capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular third-party litigant could not. In the situations presented by the recent cases, by …


Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe Sep 2017

Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe

Oklahoma Journal of Law and Technology

No abstract provided.


No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst Jan 2015

No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst

Michigan Telecommunications & Technology Law Review

In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …


Privacy In Social Media: To Tweet Or Not To Tweet?, Tara M. Breslawski Mar 2014

Privacy In Social Media: To Tweet Or Not To Tweet?, Tara M. Breslawski

Touro Law Review

No abstract provided.


Light In The Darkness: How The Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald Jan 2014

Light In The Darkness: How The Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald

Oklahoma Law Review

No abstract provided.


Reforming Surveillance Law: The Swiss Model., Susan Freiwald, Sylvain Méille Dec 2012

Reforming Surveillance Law: The Swiss Model., Susan Freiwald, Sylvain Méille

Susan Freiwald

As implemented over the past twenty-seven years, the Electronic Communications Privacy Act (“ECPA”), which regulates electronic surveillance by law enforcement agents, has become incomplete, confusing, and ineffective. In contrast, a new Swiss law, CrimPC, regulates law enforcement surveillance in a more comprehensive, uniform, and effective manner. This Article compares the two approaches and argues that recent proposals to reform ECPA in a piecemeal fashion will not suffice. Instead, Swiss CrimPC presents a model for more fundamental reform of U.S. law.

This Article is the first to analyze the Swiss law with international eyes and demonstrate its advantages over the U.S. …


The Content/Envelope Distinction In Internet Law, Matthew J. Tokson May 2009

The Content/Envelope Distinction In Internet Law, Matthew J. Tokson

William & Mary Law Review

Whether a component of an Internet communication is classified as "content" or "envelope" information determines in large part the privacy protection it receives under constitutional and statutory law. Courts and Internet law scholars have yet to offer a means of determining the content/envelope status of unique aspects of Internet communications-from email subject lines to website URLs. As a result, data with the potential to expose every website, every Internet file downloaded, and every email sent by an Internet user may be unprotected under current law.

This Article develops a legal framework for distinguishing content from envelope information in unique areas …


The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky Oct 2003

The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky

Michigan Telecommunications & Technology Law Review

I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …