Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Richmond Public Interest Law Review

Publication Year

Articles 1 - 5 of 5

Full-Text Articles in Law

Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin Jan 2015

Dna Without Warrant: Decoding Privacy, Probable Cause And Personhood, Ken Strutin

Richmond Public Interest Law Review

In Part I, this article explores the challenges to privacy, personhood and probable cause raised by DNA collection as identification sanctioned in Maryland v. King. Part II considers the presumed infallibility of DNA testing that undergirds the Supreme Court's embracement of genetic identification. Lastly, in Part III, this article will try to decipher the Court's Fourth Amendment logic in denying privacy to the information in human cells but embracing them in cell phones in Riley v. California


Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, Mark Obesnshain Jan 2015

Protecting The Digital Afterlife: Virginia's Privacy Expectation Afterlife And Choices Act, Mark Obesnshain

Richmond Public Interest Law Review

This article examines Virginia’s Privacy Expectation Afterlife and Choices Act. Part I surveys federal legislation and proposed uniform legislation that attempts to protect digital assets and records. Part II examines opposition to proposed legislation and another proposed law: the Privacy Expectation Afterlife and Choices Act. Part III details Virginia’s final version of the Privacy Expectation Afterlife and Choices Act. Part V concludes the Article.


Protecting The Ivory Tower: Sensible Security Or Invasion Of Privacy, Stephen D. Lichtenstein Jan 2011

Protecting The Ivory Tower: Sensible Security Or Invasion Of Privacy, Stephen D. Lichtenstein

Richmond Public Interest Law Review

Our beginning point is a recognition that the modern American college is not an insurer of the safety of its students. Whatever may have been its responsibility in an earlier era, the authoritarian role of today's college administrations has been notably diluted in recent decades. Trustees, administrators, and faculties have been required to yield to the expanding rights and privileges of their students. By constitutional amendment, written and unwritten law, and through the evolution of new customs, rights formerly possessed by college administrations have been transferred to students. College students today are no longer ninors; they are now regarded as …


Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky Jan 2009

Entry And Service Of Protective Orders In Virginia: Are You Really Protected, Susheela Varky

Richmond Public Interest Law Review

According to the Virginia Department of State Police, there has been a legislative effort in 2008 and 2009 over the past two years to ensure that essential data from protective orders1 is entered into the Virginia Criminal Information Network ("VCIN") immediately upon the order's issuance. While data entry may seem like a dull topic, the following story highlights the dire significance of this seemingly mundane task.


Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran Jan 2009

Changing Tides: A Lesser Expectation Of Privacy In A Post 9/11 World, Derek M. Alphran

Richmond Public Interest Law Review

In sum, the Court has in recent years balanced the degree of government intrusion of the individual or place searched against the government's need for the search. This article addresses some of the questions posed by the evolution of the Fourth Amendment doctrine in light of terrorist concerns since 9/11. Part II will address the history of Fourth Amendment jurisprudence, from the Boyd Era of property protection and the use of general warrants to discover evidence of crime, to Olmstead and the development of the right of privacy under the Fourth Amendment. Part III will address the modern test under …