Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Constitutional Law (57)
- Environmental Law (24)
- Tax Law (22)
- First Amendment (20)
- Supreme Court of the United States (13)
-
- Physical Sciences and Mathematics (12)
- Social and Behavioral Sciences (12)
- Civil Rights and Discrimination (10)
- Environmental Sciences (10)
- Fourth Amendment (10)
- Privacy Law (10)
- Criminal Law (9)
- Intellectual Property Law (9)
- Law and Gender (9)
- Immigration Law (8)
- Securities Law (8)
- Banking and Finance Law (7)
- Business Organizations Law (7)
- Courts (7)
- Criminal Procedure (7)
- Legal Education (7)
- Law Enforcement and Corrections (6)
- National Security Law (6)
- Public Affairs, Public Policy and Public Administration (6)
- Administrative Law (5)
- Contracts (5)
- Energy and Utilities Law (5)
- Family Law (5)
- International Law (5)
- Keyword
-
- United States (23)
- Freedom of Speech (16)
- United States Constitution 1st Amendment (12)
- Constitutional Interpretation (11)
- Judicial Power (9)
-
- Commercial Speech Doctrine (8)
- United States Constitution 4th Amendment (7)
- Due Process of Law (5)
- Environmental Justice (5)
- United States Supreme Court (5)
- Air Pollution Control (4)
- Burden of Proof (4)
- Criminal Law (4)
- Criminal Procedure (4)
- Environmental policy (4)
- Equal Protection (4)
- Immigration Law (4)
- International Law (4)
- Law (4)
- Privacy (4)
- States (4)
- United States Constitution (4)
- Abortion (3)
- Antonin Scalia (3)
- Contracts (3)
- Corporate Governance (3)
- Electronic Surveillance (3)
- Fiduciary Duties (3)
- Immigration Policy (3)
- International (3)
- Publication
-
- William & Mary Law Review (38)
- William & Mary Bill of Rights Journal (36)
- Faculty Publications (34)
- William & Mary Environmental Law and Policy Review (24)
- Popular Media (22)
-
- William & Mary Journal of Race, Gender, and Social Justice (20)
- William & Mary Annual Tax Conference (16)
- William & Mary Business Law Review (15)
- Supreme Court Preview (8)
- Library Staff Publications (4)
- William & Mary Law Review Online (4)
- Briefs (3)
- Virginia Coastal Policy Center (3)
- Brigham-Kanner Property Rights Journal (1)
- Law School Conferences: Ephemera (1)
- Publication Type
Articles 1 - 30 of 229
Full-Text Articles in Law
The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey Kahn
The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey Kahn
William & Mary Bill of Rights Journal
Terry v. Ohio’s “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism. …
Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison
Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison
William & Mary Bill of Rights Journal
When the government investigates a crime, do citizens have a duty to assist? This question was raised in the struggle between Apple and the FBI over whether the agency could compel Apple to defeat its own password protections on the iPhone of one of the San Bernardino shooters. That case was voluntarily dismissed as moot when the government found a way of accessing the data on the phone, but the issue remains unresolved.
Because of advances in technology, software providers and device makers have been able to develop almost impenetrable protection for their customers’ information, effectively locking law enforcement out …
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
William & Mary Bill of Rights Journal
We finally have a federal ‘test case.’ In Carpenter v. United States, the Supreme Court is poised to set the direction of the Fourth Amendment in the digital age. The case squarely presents how the twentieth-century third party doctrine will fare in contemporary times, and the stakes could not be higher. This Article reviews the Carpenter case and how it fits within the greater discussion of the Fourth Amendment third party doctrine and location surveillance, and I express a hope that the Court will be both a bit ambitious and a good measure cautious.
As for ambition, the Court …
The Fourth Amendment Disclosure Doctrines, Monu Bedi
The Fourth Amendment Disclosure Doctrines, Monu Bedi
William & Mary Bill of Rights Journal
The third party and public disclosure doctrines (together the “disclosure doctrines”) are long-standing hurdles to Fourth Amendment protection. These doctrines have become increasingly relevant to assessing the government’s use of recent technologies such as data mining, drone surveillance, and cell site location data. It is surprising then that both the Supreme Court and scholars, at times, have associated them together as expressing one principle. It turns out that each relies on unique foundational triggers and does not stand or fall with the other. This Article tackles this issue and provides a comprehensive topology for analyzing the respective contours of each …
Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary
Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary
William & Mary Bill of Rights Journal
This Article addresses touch DNA, chemical analysis of skin traces, and the implications for crime scene investigation, arguing that changes in how trace evidence is analyzed require alterations in the law’s approach to its use. Part I discusses the history of traditional DNA analysis. Part II examines the emergence of touch DNA and related technologies and how they differ from traditional DNA analysis. Part III outlines the specific risks created by the collection and storing of results under the current outdated jurisprudence. Part IV focuses on specific risks to suspects and victims of crime. Part V proposes a legal framework …
Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh
Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh
William & Mary Bill of Rights Journal
No abstract provided.
The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm
The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm
William & Mary Bill of Rights Journal
The police have started to use malware—and other forms of government hacking—to solve crimes. Some fear coming abuses—the widespread use of malware when traditional investigative techniques would work just as well or to investigate political opponents or dissident speakers. This Article argues that these abuses will be checked, at least in part, by the very nature of malware and the way it must be controlled. This analysis utilizes a previously unformalized research methodology called “investigative dynamics” to come to these conclusions. Because every use of malware risks spoiling the tool—by revealing a software vulnerability that can be patched—the police will …
Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn
Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn
William & Mary Bill of Rights Journal
No abstract provided.
Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu
Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu
William & Mary Bill of Rights Journal
This Essay describes emerging big data technologies that facilitate horizontal cybersurveillance. Horizontal cybersurveillance makes possible what has been termed as “sentiment analysis.” Sentiment analysis can be described as opinion mining and social movement forecasting. Through sentiment analysis, mass cybersurveillance technologies can be deployed to detect potential terrorism and state conflict, predict protest and civil unrest, and gauge the mood of populations and subpopulations. Horizontal cybersurveillance through sentiment analysis has the likely result of chilling expressive and associational freedoms, while at the same time risking mass data seizures and searches. These programs, therefore, must be assessed as adversely impacting a combination …
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
William & Mary Bill of Rights Journal
In at least two recent cases, courts have rejected service providers’ capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular third-party litigant could not. In the situations presented by the recent cases, by …
Incarcerated And Unrepresented: Prison-Based Gerrymandering And Why Evenwel’S Approval Of “Total Population” As A Population Base Shouldn’T Include Incarcerated Populations, Emily J. Heltzel
William & Mary Bill of Rights Journal
No abstract provided.
Protecting The Silence Of Speech: Academic Safe Spaces, The Free Speech Critique, And The Solution Of Free Association, Trevor N. Ward
Protecting The Silence Of Speech: Academic Safe Spaces, The Free Speech Critique, And The Solution Of Free Association, Trevor N. Ward
William & Mary Bill of Rights Journal
No abstract provided.
It's Still Too Easy To Push Blacks, Minorities Off Of Juries, Jeffrey Bellin
It's Still Too Easy To Push Blacks, Minorities Off Of Juries, Jeffrey Bellin
Popular Media
No abstract provided.
Were The 1982 Merger Guidelines Old News?, Alan J. Meese, Sarah L. Stafford
Were The 1982 Merger Guidelines Old News?, Alan J. Meese, Sarah L. Stafford
Faculty Publications
This paper examines the impact of the 1982 Department of Justice Merger Guidelines on the stock market prices of publicly traded firms in the United States. We argue that those Guidelines were perceived by the market as a real change in enforcement policy that would result in substantial deregulation of mergers throughout the economy. We conduct an event study of S&P 500 firms to test this hypothesis and find evidence of a significant positive effect on the stock prices of firms in moderately concentrated industries subject to antitrust regulation, the firms for which the 1982 Guidelines articulate a substantially less …
One Good Plaintiff Is Not Enough, Aaron-Andrew P. Bruhl
One Good Plaintiff Is Not Enough, Aaron-Andrew P. Bruhl
Faculty Publications
This Article concerns an aspect of Article III standing that has played a role in many of the highest-profile controversies of recent years, including litigation over the Affordable Care Act, immigration policy, and climate change. Although the federal courts constantly emphasize the importance of ensuring that only proper plaintiffs invoke the federal judicial power, the Supreme Court and other federal courts have developed a significant exception to the usual requirement of standing. This exception holds that a court entertaining a multiple-plaintiff case may dispense with inquiring into the standing of each plaintiff as long as the court finds that one …
Justice Scalia's Other Standing Legacy, Tara Leigh Grove
Justice Scalia's Other Standing Legacy, Tara Leigh Grove
Faculty Publications
No abstract provided.
Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu
Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu
Faculty Publications
This Article describes a cybersurveillance nonintrusion test under the Fourth Amendment that is grounded in evolving customary law to replace the reasonable expectation of privacy test formulated in Katz v. United States. To illustrate how customary law norms are shaping modern Fourth Amendment jurisprudence, this Article examines the recurrence of judicial references to George Orwell’s novel, 1984, within the Fourth Amendment context when federal courts have assessed the constitutionality of modern surveillance methods. The Supreme Court has indicated that the Fourth Amendment privacy doctrine must now evolve to impose meaningful limitations on the intrusiveness of new surveillance technologies. …
Report To The Governor And The Chairmen Of The House Committee On Agriculture, Chesapeake And Natural Resources And The Senate Committee On Agriculture, Conservation And Natural Resources, Pursuant To House Bill 1774, Commonwealth Center For Recurrent Flooding Resiliency
Report To The Governor And The Chairmen Of The House Committee On Agriculture, Chesapeake And Natural Resources And The Senate Committee On Agriculture, Conservation And Natural Resources, Pursuant To House Bill 1774, Commonwealth Center For Recurrent Flooding Resiliency
Virginia Coastal Policy Center
This report was required by House Bill 1774 (2017), in which the General Assembly requested that the Commonwealth Center for Recurrent Flooding Resiliency convene a workgroup to study the administration of the Commonwealth’s current stormwater management program, as well as the potential treatment and use of water in roadside ditches in rural, Tidewater Virginia localities.
Under the Virginia Stormwater Management Act, the Department of Environmental Quality administers stormwater management requirements for any localities that opt out of becoming a Virginia Stormwater Management Program authority, but only for land disturbances of one acre or more that are covered by the Virginia …
Crowdfunding Signals, Darian M. Ibrahim
Protests In Peril, Timothy Zick
Walking While Trans: Profiling Of Transgender Women By Law Enforcement, And The Problem Of Proof, Leonore F. Carpenter, R. Barrett Marshall
Walking While Trans: Profiling Of Transgender Women By Law Enforcement, And The Problem Of Proof, Leonore F. Carpenter, R. Barrett Marshall
William & Mary Journal of Race, Gender, and Social Justice
No abstract provided.
The Violent State: Black Women's Invisible Struggle Against Police Violence, Michelle S. Jacobs
The Violent State: Black Women's Invisible Struggle Against Police Violence, Michelle S. Jacobs
William & Mary Journal of Race, Gender, and Social Justice
No abstract provided.
There And Back Again? Police Reforms Through The Prism Of The Recruitment Decisions In The High Court And The Court Of Appeal, Festus M. Kinoti
There And Back Again? Police Reforms Through The Prism Of The Recruitment Decisions In The High Court And The Court Of Appeal, Festus M. Kinoti
William & Mary Journal of Race, Gender, and Social Justice
No abstract provided.
Nevertheless She Persisted: From Mrs. Bradwell To Annalise Keating, Gender Bias In The Courtroom, Chris Chambers Goodman
Nevertheless She Persisted: From Mrs. Bradwell To Annalise Keating, Gender Bias In The Courtroom, Chris Chambers Goodman
William & Mary Journal of Race, Gender, and Social Justice
No abstract provided.
When Fame Takes Away The Right To Privacy In One's Body: Revenge Porn And Tort Remedies For Public Figures, Caroline Drinnon
When Fame Takes Away The Right To Privacy In One's Body: Revenge Porn And Tort Remedies For Public Figures, Caroline Drinnon
William & Mary Journal of Race, Gender, and Social Justice
No abstract provided.
Reforming Prison Policy To Improve Women-Specific Health And Sanitary Care Conditions Of Prisons In Ethiopia, Behailu T. Weldeyohannes
Reforming Prison Policy To Improve Women-Specific Health And Sanitary Care Conditions Of Prisons In Ethiopia, Behailu T. Weldeyohannes
William & Mary Journal of Race, Gender, and Social Justice
No abstract provided.
Pink Hats And Black Fists: The Role Of Women In The Black Lives Matter Movement, Jessica Watters
Pink Hats And Black Fists: The Role Of Women In The Black Lives Matter Movement, Jessica Watters
William & Mary Journal of Race, Gender, and Social Justice
No abstract provided.
Maximizing Ponzi Loss Deductions For Estate And Income Tax Purposes: Are Taxpayers Better Off Dead?, Valrie Chambers, Brian Elzweig
Maximizing Ponzi Loss Deductions For Estate And Income Tax Purposes: Are Taxpayers Better Off Dead?, Valrie Chambers, Brian Elzweig
William & Mary Business Law Review
There is a long history of cases interpreting whether a theft loss deduction for securities fraud is allowable for personal income taxes. The cases require that for a theft loss to be actionable as such, it would have to meet the requirements of the common law definition of theft in the U.S. state in which it occurred. This generally requires direct privity between the person claiming the loss and the person who committed the theft. Because most securities transactions are brokered, the direct privity is lost and a theft loss deduction is denied in favor a capital loss. Recently, in …
How Much Is “Substantial Evidence” And How Big Is A “Significant Gap”?: The Telecommunications Attorney Full Employment Act, Susan Lorde Martin
How Much Is “Substantial Evidence” And How Big Is A “Significant Gap”?: The Telecommunications Attorney Full Employment Act, Susan Lorde Martin
William & Mary Business Law Review
The late U.S. Supreme Court Justice Antonin Scalia described the Telecommunications Act of 1996 as “a model of ambiguity or indeed even self-contradiction.” Legal wags have also described the Act as the Telecommunications Attorney Full Employment Act. Twenty years after the Act became law, it is still being interpreted by courts all over the country and costing taxpayers millions of dollars as local governments defend their telecom decisions in lawsuits. The Act’s basic notion was to allow local zoning authorities to maintain their control over their territories with a few new limitations that would encourage cell phone service companies to …
Can Taxes Mitigate Corporate Governance Inefficiencies?, Noam Noked
Can Taxes Mitigate Corporate Governance Inefficiencies?, Noam Noked
William & Mary Business Law Review
Policymakers have long viewed tax policy as an instrument to influence and change corporate governance practices. Certain tax rules were enacted to discourage pyramidal business structures and large golden parachutes, and to encourage performance-based compensation. Other proposals, such as imposing higher taxes on excessive executive compensation, have also attracted increasing attention.
Contrary to this view, this Article contends that the ability to effectively mitigate corporate governance inefficiencies through the use of corrective taxes is very limited, and that these taxes may cause more harm than benefit. There are a few reasons for the limited effectiveness of corrective taxes. Importantly, the …