Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Michigan Telecommunications & Technology Law Review
The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …
Rethinking Reasonable Expectations Of Privacy In Online Social Networks, Bryce Clayton Newell
Rethinking Reasonable Expectations Of Privacy In Online Social Networks, Bryce Clayton Newell
Richmond Journal of Law & Technology
In 1890, Warren and Brandeis “invented” the common law right to privacy in the United States. They declared the need for a right to privacy – “to be let alone” – because technological advancements (photography) and business methods (yellow journalism) enabled the media to bring previously private details to the attention of a much larger audience. Warren and Brandeis declared, “[i]nstantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that ‘what is whispered in the closet shall be proclaimed from the house-tops.’” Because of …
Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina M. Mulligan
Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina M. Mulligan
Richmond Journal of Law & Technology
Road safety cameras can photograph your car running red lights. Some bars record information on driver’s licenses to establish that their patrons are old enough to drink. The Recording Industry Association of America (RIAA) uses automated web crawlers to try to find illegal copies of mp3s, and iTunes embeds personal identifying information in the tracks of every song you buy.
Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett
Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett
Richmond Journal of Law & Technology
Last year, the Federal Bureau of Investigation (“FBI”) acknowledged that it used an Internet electronic surveillance system called Carnivore to investigate and prosecute criminal suspects in more than two dozen cases. Carnivore is a software program developed by the FBI that can be installed on the network of an Internet Service Provider (“ISP”), such as America Online, to monitor, intercept and collect e-mail messages and other Internet activity made and received by individuals suspected of criminal activity. To date, the full capability of Carnivore remains a secret—the FBI refuses to disclose the source code (computer language) that would reveal how …