Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Publication
Articles 1 - 3 of 3
Full-Text Articles in Law
Symposium: Pandemics And The Constitution: Pandemic Surveillance - The New Predictive Policing, Michael Gentithes, Harold J. Krent
Symposium: Pandemics And The Constitution: Pandemic Surveillance - The New Predictive Policing, Michael Gentithes, Harold J. Krent
ConLawNOW
As the fight against the coronavirus pandemic continues, state governments are considering more invasive surveillance to determine who has been exposed to the virus and who is most likely to catch the virus in the future. Widespread efforts to test temperatures have been initiated; calls for contact tracing have increased; and plans have been revealed to allow only those testing positive for the virus’s antibodies (who presumably now are immune) to return to work and travel. Such fundamental liberties may now hinge on the mere probabilities that one may catch the disease or be immune from it.
To assess the …
Symposium: Pandemics And The Constitution: Why The Special Needs Doctrine Is The Most Appropriate Fourth Amendment Theory For Justifying Police Stops To Enforce Covid-19 Stay-At-Home Orders, Henry F. Fradella
ConLawNOW
Despite the fact that the steps the federal and state governments take to curtail the spread of the viral infection are presumably taken in the best interest of public health, governmental actions and actors must comply with the U.S. Constitution even during a pandemic. Some public health measures, such as stay-at-home orders, restrict the exercise of personal freedoms ranging from the rights to travel and freely associate to the ability to gather in places of worship for religious services. This Essay explores several completing doctrines that might justify the authority of law enforcement to stop people who are out of …
Hash It Out: Fourth Amendment Protection Of Electronically Stored Child Exploitation, Rebekah A. Branham
Hash It Out: Fourth Amendment Protection Of Electronically Stored Child Exploitation, Rebekah A. Branham
Akron Law Review
Few courts have addressed whether ISP’s use of hash-based evaluation violates an individual’s Fourth Amendment rights. In 2018, the Fifth Circuit was presented with this issue in United States v. Reddick. The defendant is Reddick uploaded files to the cloud-sharing server Microsoft SkyDrive. Thereafter PhotoDNA, a computer software program that uses hashing, automatically reviewed the hash values of those files and compared them against its database of known child pornography hash values. PhotoDNA detected a hash value match between the defendant’s photos and the database. It then created a “CyberTip,” sending the files and users information to the NCMEC. …