Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu Nov 2015

Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu

Seattle University Law Review

A vehicle on a public thoroughfare is observed driving erratically and careening across the roadway. After the vehicle strikes another passenger car and comes to a stop, the responding officer notices in the driver the telltale symptoms of intoxication—bloodshot eyes, slurred speech, and a distinct odor of intoxicants. On these facts, a lawfully-procured warrant authorizing the extraction of the driver’s blood is obtained. However, the document fails to circumscribe the manner and variety of testing that may be performed on the sample. Does this lack of particularity render the warrant constitutionally infirm as a mandate for chemical analysis of the …


Administrative Inspections: The Loophole In The Fourth Amendment, Ryan Nasim Aug 2015

Administrative Inspections: The Loophole In The Fourth Amendment, Ryan Nasim

Touro Law Review

No abstract provided.


Fourth Amendment Right To Privacy: When Is It Reasonable To Search A Minor?, Ashley Moruzzi Aug 2015

Fourth Amendment Right To Privacy: When Is It Reasonable To Search A Minor?, Ashley Moruzzi

Touro Law Review

No abstract provided.


Wilson V. Arkansas: Thirty Years After The Supreme Court Addresses The Knock And Announce Issue, Todd Witten Jul 2015

Wilson V. Arkansas: Thirty Years After The Supreme Court Addresses The Knock And Announce Issue, Todd Witten

Akron Law Review

This Note will initially discuss the historical background of the knock and announce principle and its evolution from the English common law. Next, the Note will address the facts and the holdings of Wilson, in the lower courts and the Supreme Court. Finally, the Note will analyze the Wilson decision and its precedential value.


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Jul 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Pepperdine Law Review

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Two Wrongs Don't Make A Fourth Amendment Right: Samson Court Errs In Choosing Proper Analytical Framework, Errs In Result, Parolees Lose Fourth Amendment Protection, Rachael A. Lynch Jul 2015

Two Wrongs Don't Make A Fourth Amendment Right: Samson Court Errs In Choosing Proper Analytical Framework, Errs In Result, Parolees Lose Fourth Amendment Protection, Rachael A. Lynch

Akron Law Review

This Note will follow the Fourth Amendment from its origins to its modern application to parolee rights, as evidenced by the Samson Court. Part II focuses on the Fourth Amendment, from the circumstances surrounding its adoption to modern court cases that have applied its tenets to prisoners, probationers, and, finally, parolees. Part III details the Supreme Court’s decision in Samson v. California, including a thorough discussion of the facts that gave rise to the case and lower court decisions. Part IV explores the problems with the Court’s framework and suggests other possible frameworks the Court could have used to come …


How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian M. Halliburton Jun 2015

How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian M. Halliburton

Akron Law Review

With each passing day, new technologies push the horizons of official government investigative and surveillance activity deeper and deeper into the mind and consciousness of the surveilled subject. While law enforcement agencies have always relied on observing the behavior and activity of suspicious targets, and there has been little judicial ink spent preserving the confidentiality of such observable activity, the law has been slow to respond to rapid increases in the capacity or scope of official observation that the advance of technologically sophisticated surveillance techniques helped facilitate. The sampling of techniques at the center of this Article allow the operators …


Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan Jun 2015

Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan

Chicago-Kent Law Review

Event Data Recorders are receiving more attention as owners of automobiles have begun to realize that their driving histories are recorded. Event Data Recorders are the “black boxes” in automobiles that are installed in the vast majority of vehicles currently on the road. In the majority of states, the restrictions on what information can be retrieved from Event Data Recorders and used by police officers, advertising firms, and insurance companies remains a gray area. State laws governing Event Data Recorder technology greatly fluctuates by jurisdiction. If Event Data Recorder information falls into the wrong hands, the possession of the data …


Reviving The Privacy Protection Act Of 1980, Elizabeth B. Uzelac Jan 2015

Reviving The Privacy Protection Act Of 1980, Elizabeth B. Uzelac

Northwestern University Law Review

The federal privacy legislative scheme is composed of a fragmented patchwork of aging sector-specific statutes—many enacted prior to the advent of the home computer—that supplement the Fourth Amendment to regulate government access to information. The Privacy Protection Act of 1980 is one such statute, though few understand or utilize its protections. The Act prohibits law enforcement officials from searching for or seizing information from people who disseminate information to the public, such as reporters. Where it applies, the Act requires law enforcement officials to instead rely on compliance with a subpoena or the target’s voluntary cooperation to gain access to …


Supreme Court Jurisprudence Of The Personal In City Of Los Angeles V. Patel, Brian L. Owsley Jan 2015

Supreme Court Jurisprudence Of The Personal In City Of Los Angeles V. Patel, Brian L. Owsley

Michigan Law Review First Impressions

Recently, the Supreme Court issued a 5-4 decision in City of Los Angeles v. Patel striking down a city ordinance that required hotel and motel owners to make their guest registries available to police officers whenever requested to do so. Although the Court’s opinion in Patel simply affirmed the Ninth Circuit’s finding that the ordinance was unconstitutional, the Court could have used Patel to readdress the third-party doctrine, which establishes that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Patel provided a vehicle for the Court to do so, particularly because …


Big Data And Predictive Reasonable Suspicion, Andrew Ferguson Jan 2015

Big Data And Predictive Reasonable Suspicion, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

The Fourth Amendment requires “reasonable suspicion” to seize a suspect. As a general matter, the suspicion derives from information a police officer observes or knows. It is individualized to a particular person at a particular place. Most reasonable suspicion cases involve police confronting unknown suspects engaged in observable suspicious activities. Essentially, the reasonable suspicion doctrine is based on “small data” – discrete facts involving limited information and little knowledge about the suspect.But what if this small data is replaced by “big data”? What if police can “know” about the suspect through new networked information sources? Or, what if predictive analytics …


The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele Jan 2015

The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele

Faculty Publications

This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …


The Un-Territoriality Of Data, Jennifer Daskal Jan 2015

The Un-Territoriality Of Data, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Territoriality looms large in our jurisprudence, particularly as it relates to the government’s authority to search and seize. Fourth Amendment rights turn on whether the search or seizure takes place territorially or extraterritorially; the government’s surveillance authorities depend on whether the target is located within the United States or without; and courts’ warrant jurisdiction extends, with limited exceptions, only to the borders’ edge. Yet the rise of electronic data challenges territoriality at its core. Territoriality, after all, depends on the ability to define the relevant “here” and “there,” and it presumes that the “here” and “there” have normative significance. The …


Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover Jan 2015

Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover

Faculty Publications

The current state of Fourth Amendment jurisprudence leaves it to technology corporations to challenge court orders, subpoenas, and requests by the government for individual users’ information. The third-party doctrine denies people a reasonable expectation of privacy in data they transmit through telecommunications and Internet service providers. Third-party corporations become, by default, the people’s corporate avatars. Corporate avatars, however, do a poor job of representing individuals’ interests. Moreover, vesting the Fourth Amendment’s government-oversight functions in corporations fails to cohere with the Bill of Rights’ populist history and the Framers’ distrust of corporations.

This article examines how the third-party doctrine proves unsupportable …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …