Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (6)
- Fourth Amendment (5)
- Surveillance (4)
- Carpenter (2)
- Katz (2)
-
- Supreme Court (2)
- Avoidability (1)
- Avoidable (1)
- Cell Phone (1)
- Contextual privacy (1)
- Data (1)
- Dating Apps (1)
- Disability (1)
- Email (1)
- Fences (1)
- Health Data (1)
- Inescapable (1)
- Internet (1)
- Miller (1)
- Pole Cameras (1)
- Policing (1)
- Ride Sharing (1)
- Searches (1)
- Secrecy (1)
- Smart meters (1)
- Smart utility meters (1)
- Smith (1)
- State and local government (1)
- Third-Party Doctrine (1)
- Transparency law (1)
Articles 1 - 7 of 7
Full-Text Articles in Law
Police Secrecy Exceptionalism, Christina Koningisor
Police Secrecy Exceptionalism, Christina Koningisor
Utah Law Faculty Scholarship
Every state has a set of transparency statutes that bind state and local governments. In theory, these statutes apply with equal force to every agency. Yet, in practice, law enforcement agencies enjoy a wide variety of unique secrecy protections denied to other government entities. Legislators write police-specific exemptions into public records laws. Judges develop procedural approaches that they apply exclusively to police and prosecutorial records. Police departments claim special secrecy protections from the bottom up.
This Article maps the legal infrastructure of police-records secrecy. It draws upon the text of the public records statutes in all fifty states, along with …
The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson
The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson
Utah Law Faculty Scholarship
For over fifty years, the Fourth Amendment’s scope has been largely dictated by the Katz test, which applies the Amendment’s protections only when the government has violated a person’s “reasonable expectation of privacy.” This vague standard is one of the most criticized doctrines in all of American law, and its lack of coherence has made Fourth Amendment search law notoriously confusing. Things have become even more complex following the Supreme Court’s landmark decision in Carpenter v. United States, which has spawned its own alternative test for determining the Fourth Amendment’s scope. The emerging Carpenter test looks to the revealing nature …
Smart Meters As A Catalyst For Privacy Law, Matthew Tokson
Smart Meters As A Catalyst For Privacy Law, Matthew Tokson
Utah Law Faculty Scholarship
Smart utility meters raise several puzzling legal questions—and answering them can help point the way toward the future of Fourth Amendment and civil privacy law. This forum essay addresses two such issues: use restrictions on collected data, and voluntary data disclosure.
First, more than any other current technology, smart meters compel the development of use restrictions on collected data. The benefits of smart meters are potentially enormous, such that categorically prohibiting public utilities from collecting smart meter data is likely beyond the pale. Yet allowing law enforcement agents to obtain detailed or intimate data about the home without a warrant …
Telephone Pole Cameras Under Fourth Amendment Law, Matthew Tokson
Telephone Pole Cameras Under Fourth Amendment Law, Matthew Tokson
Utah Law Faculty Scholarship
In a series of recent cases, police officers have mounted sophisticated surveillance cameras on telephone poles and pointed them at the homes of people suspected of a crime. These cameras often operate for months or even years without judicial oversight, collecting vast quantities of video footage on suspects and their activities near the home. Pole camera surveillance raises important Fourth Amendment questions that have divided courts and puzzled scholars.
These questions are complicated because Fourth Amendment law is complicated. This is especially the case today as Fourth Amendment law is in a transitional phase, caught between older and newer paradigms …
Inescapable Surveillance, Matthew Tokson
Inescapable Surveillance, Matthew Tokson
Utah Law Faculty Scholarship
Until recently, Supreme Court precedent dictated that a person waives their Fourth Amendment rights in information they disclose to another party. The Court reshaped this doctrine in Carpenter v. United States, establishing that the Fourth Amendment protects cell phone location data even though it is revealed to others. The Court emphasized that consumers had little choice but to disclose their data, because cell phone use is virtually inescapable in modern society.
In the wake of Carpenter, many scholars and lower courts have endorsed inescapability as an important factor for determining Fourth Amendment rights. Under this approach, surveillance that people cannot …
The Normative Fourth Amendment, Matthew Tokson
The Normative Fourth Amendment, Matthew Tokson
Utah Law Faculty Scholarship
For decades, courts have used a “reasonable expectation of privacy” standard to determine whether a government action is a Fourth Amendment search. Scholars have convincingly argued that this test is incoherent, arbitrary, and incapable of protecting privacy against modern forms of surveillance. Yet few alternatives have been proposed, and those alternatives pose many of the same problems as the current standard.
This Article offers a new theoretical approach for determining the scope of the Fourth Amendment. It develops a normative model of Fourth Amendment searches, one that explicitly addresses the balance between law enforcement effectiveness and citizens’ interests inherent in …
Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis
Data Re-Use And The Problem Of Group Identity, Leslie Francis, John G. Francis
Utah Law Faculty Scholarship
Reusing existing data sets of health information for public health or medical research has much to recommend it. Much data repurposing in medical or public health research or practice involves information that has been stripped of individual identifiers but some does not. In some cases, there may have been consent to the reuse but in other cases consent may be absent and people may be entirely unaware of how the data about them are being used. Data sets are also being combined and may contain information with very different sources, consent histories, and individual identifiers. Much of the ethical and …