Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
- File Type
Articles 1 - 8 of 8
Full-Text Articles in Law
Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski
Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski
Faculty Publications
For several years, states have grappled with the problem of cyberbullying and its sometimes devastating effects. Because cyberbullying often occurs between students, most states have understandably looked to schools to help address the problem. To that end, schools in forty-six states have the authority to intervene when students engage in cyberbullying. This solution seems all to the good unless a close examination of the cyberbullying laws and their implications is made. This Article explores some of the problematic implications of the cyberbullying laws. More specifically, it focuses on how the cyberbullying laws allow schools unprecedented surveillance authority over students. This …
Redefining The Right To Be Let Alone: Privacy Rights And The Constitutionality Of Technical Surveillance Measures In Germany And The United States, Nicole Jacoby
Georgia Journal of International & Comparative Law
No abstract provided.
Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies
Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Cause To Believe What? The Importance Of Defining A Search's Object--Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin
Cause To Believe What? The Importance Of Defining A Search's Object--Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin
Vanderbilt Law School Faculty Publications
Courts and scholars have devoted considerable attention to the definition of probable cause and reasonable suspicion. Since the demise of the mere evidence rule in the 1960s, however, they have rarely examined how these central Fourth Amendment concepts interact with the object of the search. That is unfortunate, because this interaction can have significant consequences. For instance, probable cause to believe that a search might lead to evidence of wrongdoing triggers a very different inquiry than probable cause to believe that a search will produce evidence of criminal activity. The failure to address the constraints that should be imposed on …
Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue
Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s intent in enacting the 1978 Foreign Intelligence Surveillance Act. The program also violates the statute in three ways: the requirement that records sought be “relevant to an authorized investigation;” the requirement that information could be obtained via subpoena duces tecum; and the steps required for use of pen registers and trap and trace devices. Additionally, the program gives rise to serious constitutional concerns. Efforts by the government to save the program on grounds of third party doctrine are unpersuasive in light of the unique circumstances of …
Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald
Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald
Susan Freiwald
Despite Intelligence Community leaders’ assurances, the detailed knowledge of the NSA metadata program (the 215 program) that flowed from the Snowden revelations did not assuage concerns about the program. Three groups, the American Civil Liberties Union, the Electronic Frontier Foundation, and the Electronic Privacy Information Center, brought immediate legal challenges with mixed results in the lower courts. The conflict, in the courts, Congress, and the press, has revealed that the proponents and opponents of Section 215 view the program in diametrically opposed ways. Program proponents see a vital intelligence program operating within legal limits, which has suffered a few compliance …
Orwellian Surveillance Of Vehicular Travels, Sam Hanna
Orwellian Surveillance Of Vehicular Travels, Sam Hanna
Sam Hanna
What would someone learn about you if all your automobile travels were ubiquitously tracked beginning today? Creating an indefinite database of a person’s previous automobile travels to formulate deductions on intimate details of people's lives is precisely what law enforcement agencies are currently able to accomplish with automatic license plate recognition (“ALPR”). With the ubiquity of ALPR cameras, continuous government surveillance of automobile travels is no longer a figment of the imagination. Consequently, the judicial and legislative branches of government must embark on balancing the private and public interests implicated by this technology. Failure to set suitable boundaries around the …
Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson
Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson
Stephen E Henderson
"Secrets are lies. Sharing is caring. Privacy is theft." So concludes the main character in Dave Egger’s novel The Circle, in which a single company that unites Google, Facebook, and Twitter – and on steroids – has the ambition not only to know, but also to share, all of the world's information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented …