Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- American University Washington College of Law (3)
- University of Pittsburgh School of Law (2)
- Boston University School of Law (1)
- Georgia State University College of Law (1)
- Maurer School of Law: Indiana University (1)
-
- Seattle University School of Law (1)
- Selected Works (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Pennsylvania Carey Law School (1)
- University of Richmond (1)
- Vanderbilt University Law School (1)
- Villanova University Charles Widger School of Law (1)
- Washington and Lee University School of Law (1)
- Publication Year
- Publication
-
- Articles in Law Reviews & Other Academic Journals (3)
- Articles (2)
- All Faculty Scholarship (1)
- Catholic University Journal of Law and Technology (1)
- Faculty Scholarship (1)
-
- Federal Communications Law Journal (1)
- Georgia State University Law Review (1)
- Jason Forcier (1)
- Journal of Business & Technology Law (1)
- Seattle University Law Review (1)
- University of Richmond Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Villanova Law Review (1)
- Washington and Lee Journal of Civil Rights and Social Justice (1)
- Publication Type
Articles 1 - 17 of 17
Full-Text Articles in Law
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Washington and Lee Journal of Civil Rights and Social Justice
The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …
Preservation Requests And The Fourth Amendment, Armin Tadayon
Preservation Requests And The Fourth Amendment, Armin Tadayon
Seattle University Law Review
Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …
Transnational Government Hacking, Jennifer Daskal
Transnational Government Hacking, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso
Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso
Faculty Scholarship
The Fourth Amendment protects against unreasonable “searches and seizures,” but in the digital age of stingray devices and IP tracking, what constitutes a search or seizure? The Supreme Court has held that the threshold question is supposed to depend on and reflect the “reasonable expectations” of ordinary members of the public concerning their own privacy. For example, the police now exploit the “third party” doctrine to access data held by email and cell phone providers, without securing a warrant, on the Supreme Court’s intuition that the public has no expectation of privacy in that information. Is that assumption correct? If …
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Georgia State University Law Review
On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.
Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill
University of Richmond Law Review
No abstract provided.
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
In at least two recent cases, courts have rejected service providers' capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular thirdparty litigant could not. In the situations presented by the recent cases, by …
The Un-Territoriality Of Data, Jennifer Daskal
The Un-Territoriality Of Data, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
Territoriality looms large in our jurisprudence, particularly as it relates to the government’s authority to search and seize. Fourth Amendment rights turn on whether the search or seizure takes place territorially or extraterritorially; the government’s surveillance authorities depend on whether the target is located within the United States or without; and courts’ warrant jurisdiction extends, with limited exceptions, only to the borders’ edge. Yet the rise of electronic data challenges territoriality at its core. Territoriality, after all, depends on the ability to define the relevant “here” and “there,” and it presumes that the “here” and “there” have normative significance. The …
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier
Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier
Jason Forcier
The right to privacy has and will remain a hotly contested debate about American liberties. In 2012, a 3-0 decision by the Sixth Circuit Court of Appeals, in United States v. Melvin Skinner, the court held that there is no “reasonable expectation of privacy in the data given off by. . . cellphone[s].” Given today’s explosion of cellular technology and use of smart phones, is it unreasonable to believe a person should remain secure in their "person" and “effects," as guaranteed under the Fourth Amendment, from unreasonable searches and seizures? Furthermore, with police requiring only a subpoena to a obtain …
New Technologies And Constitutional Law, Thomas Fetzer, Christopher S. Yoo
New Technologies And Constitutional Law, Thomas Fetzer, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.
The Fourth Amendment's New Frontier: Judicial Reasoning Applying The Fourth Amendment To Electronic Communications, Amanda Yellon
The Fourth Amendment's New Frontier: Judicial Reasoning Applying The Fourth Amendment To Electronic Communications, Amanda Yellon
Journal of Business & Technology Law
No abstract provided.
Say Cheese: The Constitutionality Of State-Mandated Airtime On Public Broadcasting Stations In Wisconsin, Andrew D. Cotlar
Say Cheese: The Constitutionality Of State-Mandated Airtime On Public Broadcasting Stations In Wisconsin, Andrew D. Cotlar
Federal Communications Law Journal
Last year, the State of Wisconsin passed legislation which would require statechartered public broadcasting television networks to carry political advertising for candidates free of charge. In this article, Andrew Cotlar raises many concerns about the wisdom of such legislation and the impact this trend may have on public broadcasters throughout the nation. The author begins by analyzing the current position of the law on political access requirements, at both federal and state levels, and then argues that the public television stations should continue to be free to exercise substantial editorial discretion. The Article proceeds to critique the Wisconsin statute as …
Applying Pen Register And Trap And Trace Devices To Internet Communications, Rich Haglund
Applying Pen Register And Trap And Trace Devices To Internet Communications, Rich Haglund
Vanderbilt Journal of Entertainment & Technology Law
This note will explain how the different surveillance methods work: wire taps, pen register and trap and trace devices. It will outline the development of case law and legislation defining what constitutes unlawful searches and seizures involving electronic communications. After explaining how email and internet addresses are collected (and whether the FBI's tool for collection works within the bounds set by the law), this note will discuss the provisions of the Patriot Act that regulate collection of that information. This note will show, using the application of pen register and trap and trace devices to the Internet as an example, …
'Suitable Targets'? Parallels And Connections Between 'Hate Crimes' And 'Driving While Black', Lu-In Wang
'Suitable Targets'? Parallels And Connections Between 'Hate Crimes' And 'Driving While Black', Lu-In Wang
Articles
While hate crimes may tend to be less routine and more violent than discriminatory traffic stops, closer examination of each shows the need to complicate our understanding of both. The work of social scientists who have studied racial profiling reveals striking similarities and connections between these two practices. In particular, both hate crimes and racial profiling tend to be condemned only at extremes, in situations where they appear to be irrational and excessive, but overlooked in cases where they seem logical or are expected. The tendency to see only the most extreme cases as problematic, however, fails to recognize that …
An Examination Of The Naming Requirement Of Tittle Iii In Light Of United States V. Donovan - A Case For Suppression, William D. Goldberg
An Examination Of The Naming Requirement Of Tittle Iii In Light Of United States V. Donovan - A Case For Suppression, William D. Goldberg
Villanova Law Review
No abstract provided.