Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Fourth Amendment (303)
- Constitutional Law (240)
- Criminal Procedure (141)
- Criminal Law (113)
- Privacy Law (71)
-
- Law Enforcement and Corrections (65)
- Supreme Court of the United States (47)
- Civil Rights and Discrimination (44)
- Evidence (43)
- Courts (37)
- Jurisprudence (37)
- State and Local Government Law (37)
- Science and Technology Law (34)
- Law and Society (32)
- Computer Law (18)
- Health Law and Policy (16)
- Fourteenth Amendment (15)
- Internet Law (15)
- First Amendment (14)
- Legislation (13)
- National Security Law (13)
- Human Rights Law (12)
- Immigration Law (12)
- Law and Race (12)
- Legal Remedies (12)
- Legal Ethics and Professional Responsibility (11)
- Judges (10)
- Communications Law (9)
- Military, War, and Peace (9)
- Institution
-
- Touro University Jacob D. Fuchsberg Law Center (81)
- Fordham Law School (40)
- Maurer School of Law: Indiana University (22)
- The University of Akron (21)
- Vanderbilt University Law School (21)
-
- Pepperdine University (18)
- Seattle University School of Law (17)
- St. Mary's University (17)
- Cleveland State University (16)
- Northern Illinois University (16)
- University of Oklahoma College of Law (15)
- New York Law School (12)
- Chicago-Kent College of Law (11)
- Washington and Lee University School of Law (11)
- Loyola Marymount University and Loyola Law School (10)
- Northwestern Pritzker School of Law (10)
- The Catholic University of America, Columbus School of Law (10)
- University of Richmond (10)
- University of Arkansas at Little Rock William H. Bowen School of Law (9)
- American University Washington College of Law (8)
- University of South Carolina (8)
- Mitchell Hamline School of Law (7)
- Saint Louis University School of Law (7)
- St. John's University School of Law (7)
- University of Georgia School of Law (7)
- University of Miami Law School (7)
- University of Washington School of Law (7)
- University of Maryland Francis King Carey School of Law (6)
- University of Michigan Law School (6)
- Georgia State University College of Law (5)
- Publication Year
- Publication
-
- Touro Law Review (81)
- Fordham Law Review (29)
- Indiana Law Journal (20)
- Akron Law Review (18)
- Northern Illinois University Law Review (16)
-
- Pepperdine Law Review (16)
- Seattle University Law Review (16)
- St. Mary's Law Journal (14)
- Vanderbilt Law Review (14)
- NYLS Law Review (12)
- Chicago-Kent Law Review (11)
- Cleveland State Law Review (11)
- Oklahoma Law Review (11)
- Fordham Urban Law Journal (9)
- Loyola of Los Angeles Law Review (9)
- Northwestern University Law Review (9)
- University of Arkansas at Little Rock Law Review (9)
- Catholic University Law Review (8)
- South Carolina Law Review (8)
- University of Richmond Law Review (8)
- Washington and Lee Journal of Civil Rights and Social Justice (7)
- Saint Louis University Law Journal (6)
- St. John's Law Review (6)
- American University Law Review (5)
- Georgia Law Review (5)
- Georgia State University Law Review (5)
- Journal of Law and Health (5)
- Nevada Law Journal (5)
- Vanderbilt Journal of Entertainment & Technology Law (5)
- Villanova Law Review (5)
Articles 31 - 60 of 528
Full-Text Articles in Law
The Fourth Amendment And The Problem Of Social Cost, Thomas P. Crocker
The Fourth Amendment And The Problem Of Social Cost, Thomas P. Crocker
Northwestern University Law Review
The Supreme Court has made social cost a core concept relevant to the calculation of Fourth Amendment remedies but has never explained the concept’s meaning. The Court limits the availability of both the exclusionary rule and civil damages because of their “substantial social costs.” According to the Court, these costs primarily consist of letting the lawbreaker go free by excluding evidence or deterring effective police practices that would lead to more criminal apprehension and prosecution. But recent calls for systemic police reform by social movements have a different view of social cost. So too do calls for reforming qualified immunity. …
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Washington and Lee Journal of Civil Rights and Social Justice
The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …
Constitutional Law—Fourth Amendment—Warrantless Key-Test Searches In Residential Door Locks, Jacob Hill
Constitutional Law—Fourth Amendment—Warrantless Key-Test Searches In Residential Door Locks, Jacob Hill
University of Arkansas at Little Rock Law Review
No abstract provided.
Legal Implications Of A Ubiquitous Metaverse And A Web3 Future, Jon M. Garon
Legal Implications Of A Ubiquitous Metaverse And A Web3 Future, Jon M. Garon
Marquette Law Review
The metaverse is understood to be an immersive virtual world serving as the locus for all forms of work, education, and entertainment experiences. Depicted in books, movies, and games, the metaverse has the potential not just to supplement real-world experiences but to substantially supplant them. This Article explores the rapid emergence and evolution of the Web3 technologies at the heart of the metaverse movement. Web3 itself is a paradigmatic shift in internet commerce.
Criminal Procedure—Technology In The Modern Era: The Implications Of Carpenter V. United States And The Limits Of The Third-Party Doctrine As To Cell Phone Data Gathered Through Real-Time Tracking, Stingrays, And Cell Tower Dumps, Deepali Lal
University of Arkansas at Little Rock Law Review
No abstract provided.
Policing, Masculinities, And Judicial Acknowledgment, Nicholas J. Prendergast
Policing, Masculinities, And Judicial Acknowledgment, Nicholas J. Prendergast
Vanderbilt Law Review
In the 1980s, the Supreme Court held that courts must consider the “totality of the circumstances” when deciding the reasonableness of a police officer’s conduct in an excessive force suit. To this day, the precise meaning of “reasonableness” remains elusive. For years, courts around the country have struggled to articulate what police conduct should and—equally as saliently— should not be considered during reasonableness determinations. Thus far, the Supreme Court has been unwilling to substantively clarify its reasonableness doctrine. This lack of clarity has led to an untenable patchwork of differing legal frameworks throughout the United States.
This issue exists in …
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
Notre Dame Law Review
Today, information is shared almost constantly. People share their DNA to track their ancestry or for individualized health information; they instruct Alexa to purchase products or provide directions; and, now more than ever, they use videoconferencing technology in their homes. According to the third-party doctrine, the government can access all such information without a warrant or without infringing on Fourth Amendment privacy protections. This exposure of vast amounts of highly personal data to government intrusion is permissible because the Supreme Court has interpreted the third-party doctrine as a per se rule. However, that interpretation rests on an improper understanding of …
The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict
The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict
Washington and Lee Law Review
Facial recognition technology (FRT) is a popular tool among police, who use it to identify suspects using photographs or still-images from videos. The technology is far from perfect. Recent studies highlight that many FRT systems are less effective at identifying people of color, women, older people, and children. These race, gender, and age biases arise because FRT is often “trained” using non-diverse faces. As a result, police have wrongfully arrested Black men based on mistaken FRT identifications. This Note explores the intersection of facial recognition technology and probable cause to arrest.
Courts rarely, if ever, examine FRT’s role in establishing …
The Problem Of Qualified Immunity In K-12 Schools, Sarah Smith
The Problem Of Qualified Immunity In K-12 Schools, Sarah Smith
Arkansas Law Review
When thirteen-year-old Savana Redding arrived at school one autumn day in 2003, she was not expecting to be pulled out of her math class and strip searched. But, that is exactly what happened after the assistant principal suspected her of possessing and distributing “prescription-strength ibuprofen” and “over-the-counter. . .naproxen” after receiving information from another student. After Savana consented to a search of her backpack and other belongings—a search which turned up no evidence of drug possession—the assistant principal asked the school nurse and administrative assistant to search Savana’s clothes. To do this, the school officials asked Savana “to remove her …
Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary
Seattle Journal of Technology, Environmental & Innovation Law
The aim of this article is to analyze and compare current events in the People's Republic of China and the United States to discuss the moral dilemmas that arise when establishing the boundary between national security interests and individual privacy rights. As we continue to intertwine our lives with technology, it has become increasingly important to establish clear privacy rights. The question then becomes: at what point should individuals sacrifice their rights for what the government considers the "greater good" of the country?
Further, this article analyzes the development of U.S. privacy law and its relationship to national security, technology, …
Girls, Assaulted, I. India Thusi
Girls, Assaulted, I. India Thusi
Northwestern University Law Review
Girls who are incarcerated share a common trait: They have often experienced multiple forms of sexual assault, at the hands of those close to them and at the hands of the state. The #MeToo movement has exposed how powerful people and institutions have facilitated pervasive sexual violence. However, there has been little attention paid to the ways that incarceration perpetuates sexual exploitation. This Article focuses on incarcerated girls and argues that the state routinely sexually assaults girls by mandating invasive, nonconsensual searches. Unwanted touching and display of private parts are common features of life before and after incarceration—from the sexual …
Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll
Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll
Georgia Law Review
The Fourth Amendment of the U.S. Constitution protects people “against unreasonable searches and seizures.” The private search doctrine provides a notable exception to the Fourth Amendment, providing that the government may reconstruct a search previously performed by a private party without first obtaining a warrant. The U.S. Supreme Court developed the private search doctrine prior to the advent of the internet; however, modern technology has changed the way that individuals live. What was once done entirely in private is now done alongside ever-present third parties, such as cell phones and virtual assistants.
Facebook and other social media sites complicate Fourth …
Preservation Letters And Fourth Amendment Seizures: A Response To Professor Kerr, Michael L. Levy
Preservation Letters And Fourth Amendment Seizures: A Response To Professor Kerr, Michael L. Levy
Saint Louis University Law Journal
The Stored Communications Act (18 U.S.C. § 2701 et seq.) requires an Internet Service Provider to preserve the contents of a user account upon receiving a request from a government agency. The maximum period of preservation is 180 days. However, the government agency cannot get access to the copy, unless it presents proper legal process, usually a search warrant. During this time, the user has complete access to their account. In a recent article, Professor Orin Kerr has advanced a thesis that copying pursuant to the government’s preservation requests under the Stored Communications Act is a Fourth Amendment seizure. This …
Regulatory Constitutional Law: Protecting Immigrant Free Speech Without Relying On The First Amendment, Michael Kagan
Regulatory Constitutional Law: Protecting Immigrant Free Speech Without Relying On The First Amendment, Michael Kagan
Georgia Law Review
The Supreme Court has long deprived immigrants of the full protection of substantive constitutional rights, including the right to free speech, leaving undocumented immigrants exposed to detention and deportation if they earn the government’s ire through political speech. The best remedy for this would be for the Supreme Court to reconsider its approach. This Essay offers an interim alternative borrowed from an analogous problem that arises under the Fourth Amendment. Under the Constitution, the Supreme Court has indicated that illegally obtained evidence may be suppressed in a removal proceeding only if the Fourth Amendment violation was “egregious.” Yet, some circuit …
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
St. Mary's Law Journal
Abstract forthcoming.
Constitutional Law—Fourth Amendment Search And Seizure—Online Schools During A Pandemic: Fourth Amendment Implications When The State Requires Your Child To Turn On The Camera And Microphone Inside Your Home, Conan N. Becknell
University of Arkansas at Little Rock Law Review
No abstract provided.
Restoring Causality In Attenuation: Establishing The Breadth Of A Fourth Amendment Violation, Bryan H. Ward
Restoring Causality In Attenuation: Establishing The Breadth Of A Fourth Amendment Violation, Bryan H. Ward
West Virginia Law Review
When the police violate a suspect’s Fourth Amendment rights, what often follows is the discovery of incriminating evidence. Sometimes the evidence is discovered directly after the Fourth Amendment violation. In other situations, the evidence comes by a more indirect route and may occur long after the original Fourth Amendment violation. Courts struggle when trying to decide if the discovery of this indirectly obtained evidence was caused by the police misconduct. This causal question is important because causality acts as a limiting principle when deciding when to apply the exclusionary rule. A basic view of the exclusionary rule suggests that evidence …
The Second Amendment In A Carceral State, Alice Ristroph
The Second Amendment In A Carceral State, Alice Ristroph
Northwestern University Law Review
No abstract provided.
Note: Home-Sharing, Ride-Sharing, And Data-Sharing: Fourth Amendment Hurdles For Local Governance Of The Sharing Economy, Matthew J. Disler
Note: Home-Sharing, Ride-Sharing, And Data-Sharing: Fourth Amendment Hurdles For Local Governance Of The Sharing Economy, Matthew J. Disler
Notre Dame Journal on Emerging Technologies
Cities’ attempts to regulate the sharing economy reveal a conflict between local governance interests and Fourth Amendment doctrine. Although sharing economy industries present local problems, from housing affordability and land-use regulations to traffic congestion and sidewalk safety, cities attempt to effectuate their policies through data reporting requirements that are vulnerable to Fourth Amendment challenge. Businesses have successfully argued that cities’ reporting requirements are unconstitutional searches because they have an unreasonably broad scope and lack an opportunity for pre-compliance review. This Article argues that this impasse results from recent developments that have lent additional confusion to the Fourth Amendment’s administrative search …
Note: The "Border" Of Constitutional Electronic Privacy Rights: Electronic Searches And Seizures At The United States' Territorial Limits, Ryan Garippo
Notre Dame Journal on Emerging Technologies
In the recent challenge brought before the First Circuit, the court was not required to directly answer what level of particularized suspicion is required for a forensic search. Although, its holding is consistent with the jurisprudence set forth by both the Fourth and Eleventh Circuits. Furthermore, it is important to note that there have been legal challenges brought on this issue in the Fifth, Seventh, and Tenth Circuits. However, in each of these cases, the court chose not to decide the constitutional question because it was not outcome determinative for the litigants in question. This disagreement between the federal circuit …
The Current State Of Students’ Fourth Amendment Rights: How Implicit Bias Goes Unchecked In A Subjective Framework, Christian Williams
The Current State Of Students’ Fourth Amendment Rights: How Implicit Bias Goes Unchecked In A Subjective Framework, Christian Williams
Child and Family Law Journal
No abstract provided.
Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, William A. Ballentine
Discussing Privacy In Sec Subpoena Practice After Carpenter V. United States, William A. Ballentine
Chicago-Kent Law Review
No abstract provided.
The Fourth Amendment Stripped Bare: Substantiating Prisoners' Reasonable Right To Bodily Privacy, Meher Babbar
The Fourth Amendment Stripped Bare: Substantiating Prisoners' Reasonable Right To Bodily Privacy, Meher Babbar
Northwestern University Law Review
Prisoners’ rights to bodily privacy under the Fourth Amendment are limited, allowing detention officials to strip-search them for contraband. The extent to which the Fourth Amendment protects prisoners, however, is uncertain. Questions regarding whether strip searches require reasonable suspicion and the manner in which officials may conduct strip searches have troubled courts for decades. In the absence of clear guidance from the Supreme Court, courts have reached inconsistent conclusions, imperiling the human rights and dignity of prisoners. This Note argues that courts should define and apply prisoners’ rights to bodily privacy with reference to international human-rights law, specifically the United …
Police Perceptions, Knowledge, And Performance: Traffic Stops And The Use Of K-9 Units, Christopher D. Totten, Gang Lee, Daniel Ozment
Police Perceptions, Knowledge, And Performance: Traffic Stops And The Use Of K-9 Units, Christopher D. Totten, Gang Lee, Daniel Ozment
Catholic University Law Review
This empirical (survey) study of law enforcement officers aims to shed light on police conduct and knowledge concerning traffic stops, vehicle searches and the use of canine (K-9) units. This context is particularly relevant in light of a recent United States Supreme Court case in this area, Rodriguez v. United States, which held that when the mission of a routine traffic stop has been or reasonably should have been completed (i.e., the officer has issued a traffic ticket or a warning after having checked license, registration, insurance, and/ or warrants), the officer may not in general detain the vehicle …
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
St. Mary's Law Journal
Abstract forthcoming.
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Catholic University Law Review
Technology may be created by humans, but we are dependent on it. Look around you: what technology is near you as you read this abstract? An iPhone? A laptop? Perhaps even an Amazon Echo. What do all these devices have in common? They store data in the cloud. And this data can contain some of our most sensitive information, such as business records or medical documents.
Even if you manage this cloud storage account, the government may be able to search your data without a warrant. Federal law provides little protection for cloud stored data. And the Fourth Amendment may …
Preview—United States V. Cooley: What Will Happen To The Thinnest Blue Line?, Jo J. Phippin
Preview—United States V. Cooley: What Will Happen To The Thinnest Blue Line?, Jo J. Phippin
Public Land & Resources Law Review
The Supreme Court of the United States ("Supreme Court") will hear oral arguments in this matter on Tuesday, March 23, 2021. This case presents the narrow issue of whether a tribal police officer has the authority to investigate and detain a non-Indian on a public right-of-way within a reservation for a suspected violation of state or federal law. The lower courts, holding that tribes have no such authority, granted James Cooley’s motion to suppress evidence. The Supreme Court must decide whether the lower courts erred in so deciding. While the issue before the Supreme Court is itself narrow, it has …
The War On Drugs: Moral Panic And Excessive Sentences, Michael Vitiello
The War On Drugs: Moral Panic And Excessive Sentences, Michael Vitiello
Cleveland State Law Review
The United States’ War on Drugs has not been pretty. Moral panic has repeatedly driven policy when states and the federal government have regulated drugs. Responding to that panic, legislators have authorized severe sentences for drug offenses.
By design, Article III gives federal judges independence, in part, to protect fundamental rights against mob rule. Unfortunately, the Supreme Court has often failed to protect fundamental rights in times of moral panic. For example, it eroded Fourth Amendment protections during the War on Drugs. Similarly, it failed to protect drug offenders from excessive prison sentences during the War on Drugs. This Article …
New Technology And The Right To Privacy: Do E-Scooters Implicate The Fourth Amendment?, Alexander P. Carroll
New Technology And The Right To Privacy: Do E-Scooters Implicate The Fourth Amendment?, Alexander P. Carroll
Journal of the National Association of Administrative Law Judiciary
The Fourth Amendment protects individual’s right to privacy from unwarranted searches and seizures, but the analysis for when the Fourth Amendment applies has become more complicated as new technology is developed. E-scooters are a new piece of technology which may implicate the Fourth Amendment. Cities across the country are beginning to require the mobility companies which provide e-scooter services to turn over location data in order to receive an operating permit. This article first provides a background of the Fourth Amendment, then provides details regarding the new city regulations. The article includes a discussion of the privacy concerns as well …
Learning From The Past: Using Korematsu And Other Japanese Internment Cases To Provide Protections Against Immigration Detentions, Caleb Ward
Arkansas Law Review
One of the darkest periods in modern United States history is reoccurring with mixed public approval. During World War II, the United States government enacted executive orders creating a curfew, proscribing living areas, and forcing the exclusion and detention of all Japanese descendants from the West Coast. The United States justified these grievous freedom and equality violations through an increased need for national security “because we [were] at war with [Japan].” However, this perceived increased need for national security came from a fraudulent assessment showing any Japanese-American could be planning espionage or sabotage of the United States. After the war, …