Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

The Fourth Amendment’S Forgotten Free-Speech Dimensions, Aya Gruber Jan 2021

The Fourth Amendment’S Forgotten Free-Speech Dimensions, Aya Gruber

Publications

No abstract provided.


An Expressive Theory Of Privacy Intrusions, Craig Konnoth Jan 2017

An Expressive Theory Of Privacy Intrusions, Craig Konnoth

Publications

The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."

Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by …


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


The Need To Overrule Mapp V. Ohio, William T. Pizzi Jan 2011

The Need To Overrule Mapp V. Ohio, William T. Pizzi

Publications

This Article argues that it is time to overrule Mapp v. Ohio. It contends that the exclusionary rule is outdated because a tough deterrent sanction is difficult to reconcile with a criminal justice system where victims are increasingly seen to have a stake in criminal cases. The rule is also increasingly outdated in its epistemological assumption which insists officers act on "reasons" that they can articulate and which disparages actions based on "hunches" or "feelings." This assumption runs counter to a large body of neuroscience research suggesting that humans often "feel" or "sense" danger, sometimes even at a subconscious …


Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid Jan 2010

Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid

Publications

In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).

Citing the scholarship that has criticized the third-party …


The Exigent Circumstances Exception To The Warrant Requirement, H. Patrick Furman Jan 1991

The Exigent Circumstances Exception To The Warrant Requirement, H. Patrick Furman

Publications

No abstract provided.