Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Law School News: Appeals Court Hears Labor Arguments At Roger Williams University School Of Law 10-2-2018, Katie Mulvaney, Roger Williams University School Of Law
Law School News: Appeals Court Hears Labor Arguments At Roger Williams University School Of Law 10-2-2018, Katie Mulvaney, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
A Reflection On The Ethics Of Movement Lawyering, Susan Carle, Scott L. Cummings
A Reflection On The Ethics Of Movement Lawyering, Susan Carle, Scott L. Cummings
Articles in Law Reviews & Other Academic Journals
This essay takes a new look at legal ethics issues salient to "movement lawyers" who maintain a sustained commitment to social movement goals and collaborate with social movement organizations over time to achieve them. The essay provides a historical overview of movement lawyering, tracing its development to current practice in which movement lawyers work in collaboration with mobilized social movement groups, though not always in traditional lawyer-client relationships. As this analysis reveals, contemporary movements employ a sophisticated array of strategies, which may pull lawyers away from traditional representation paradigms. We argue that the legal ethics literature on movement lawyering must …
Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso
Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso
Faculty Scholarship
The Fourth Amendment protects against unreasonable “searches and seizures,” but in the digital age of stingray devices and IP tracking, what constitutes a search or seizure? The Supreme Court has held that the threshold question is supposed to depend on and reflect the “reasonable expectations” of ordinary members of the public concerning their own privacy. For example, the police now exploit the “third party” doctrine to access data held by email and cell phone providers, without securing a warrant, on the Supreme Court’s intuition that the public has no expectation of privacy in that information. Is that assumption correct? If …