Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Rethinking Reasonable Expectations Of Privacy In Online Social Networks, Bryce Clayton Newell Jan 2011

Rethinking Reasonable Expectations Of Privacy In Online Social Networks, Bryce Clayton Newell

Richmond Journal of Law & Technology

In 1890, Warren and Brandeis “invented” the common law right to privacy in the United States. They declared the need for a right to privacy – “to be let alone” – because technological advancements (photography) and business methods (yellow journalism) enabled the media to bring previously private details to the attention of a much larger audience. Warren and Brandeis declared, “[i]nstantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that ‘what is whispered in the closet shall be proclaimed from the house-tops.’” Because of …


Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina M. Mulligan Jan 2008

Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina M. Mulligan

Richmond Journal of Law & Technology

Road safety cameras can photograph your car running red lights. Some bars record information on driver’s licenses to establish that their patrons are old enough to drink. The Recording Industry Association of America (RIAA) uses automated web crawlers to try to find illegal copies of mp3s, and iTunes embeds personal identifying information in the tracks of every song you buy.


Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett Jan 2002

Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett

Richmond Journal of Law & Technology

Last year, the Federal Bureau of Investigation (“FBI”) acknowledged that it used an Internet electronic surveillance system called Carnivore to investigate and prosecute criminal suspects in more than two dozen cases. Carnivore is a software program developed by the FBI that can be installed on the network of an Internet Service Provider (“ISP”), such as America Online, to monitor, intercept and collect e-mail messages and other Internet activity made and received by individuals suspected of criminal activity. To date, the full capability of Carnivore remains a secret—the FBI refuses to disclose the source code (computer language) that would reveal how …