Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Law
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Oklahoma Journal of Law and Technology
No abstract provided.
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Oklahoma Journal of Law and Technology
No abstract provided.
The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams
The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams
University of Richmond Law Review
No abstract provided.
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill
University of Richmond Law Review
No abstract provided.
An Expressive Theory Of Privacy Intrusions, Craig Konnoth
An Expressive Theory Of Privacy Intrusions, Craig Konnoth
Publications
The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."
Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by …
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Publications
Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …