Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Law Enforcement and Corrections

University of Michigan Law School

University of Michigan Journal of Law Reform

1974

Articles 1 - 2 of 2

Full-Text Articles in Law

Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill Jan 1974

Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill

University of Michigan Journal of Law Reform

The purpose of this article is to describe the social benefits and costs of the NCIC and to indicate the need for a program of operational controls to temper the system's impact on the balance between individual privacy and law enforcement needs. Various approaches which could be incorporated into a program of safeguards are introduced and briefly analyzed. Finally, the article discusses several overall design issues which should be considered in the construction of an adequate program of safeguards. Particular emphasis is placed on the NCCH file since it is the major source of the tensions underlying the issues addressed.


Elevation Of Entrapment To A Constitutional Defense, Robert H. Thomson Iii Jan 1974

Elevation Of Entrapment To A Constitutional Defense, Robert H. Thomson Iii

University of Michigan Journal of Law Reform

The issue of entrapment arises initially as a defense when a person is accused of committing a criminal act in which government agents solicited, and perhaps actively participated in, the conduct for which the defendant stands accused. Classic entrapment situations occur when law enforcement officers, through agents or informers, solicit an illegal transaction, such as the sale of contraband. The evidence thereby obtained is used to support the prosecution of the individual accepting the solicitation. Solicitation is an important technique of law enforcement because evidence of illegal transactions is often impossible to obtain by other methods. Certain uses of solicitation …