Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll Oct 2022

Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll

Washington and Lee Journal of Civil Rights and Social Justice

The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …


Preservation Requests And The Fourth Amendment, Armin Tadayon Oct 2020

Preservation Requests And The Fourth Amendment, Armin Tadayon

Seattle University Law Review

Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill Mar 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill

University of Richmond Law Review

No abstract provided.


The Fourth Amendment's New Frontier: Judicial Reasoning Applying The Fourth Amendment To Electronic Communications, Amanda Yellon Jan 2009

The Fourth Amendment's New Frontier: Judicial Reasoning Applying The Fourth Amendment To Electronic Communications, Amanda Yellon

Journal of Business & Technology Law

No abstract provided.


Say Cheese: The Constitutionality Of State-Mandated Airtime On Public Broadcasting Stations In Wisconsin, Andrew D. Cotlar Dec 2003

Say Cheese: The Constitutionality Of State-Mandated Airtime On Public Broadcasting Stations In Wisconsin, Andrew D. Cotlar

Federal Communications Law Journal

Last year, the State of Wisconsin passed legislation which would require statechartered public broadcasting television networks to carry political advertising for candidates free of charge. In this article, Andrew Cotlar raises many concerns about the wisdom of such legislation and the impact this trend may have on public broadcasters throughout the nation. The author begins by analyzing the current position of the law on political access requirements, at both federal and state levels, and then argues that the public television stations should continue to be free to exercise substantial editorial discretion. The Article proceeds to critique the Wisconsin statute as …


Applying Pen Register And Trap And Trace Devices To Internet Communications, Rich Haglund Jan 2003

Applying Pen Register And Trap And Trace Devices To Internet Communications, Rich Haglund

Vanderbilt Journal of Entertainment & Technology Law

This note will explain how the different surveillance methods work: wire taps, pen register and trap and trace devices. It will outline the development of case law and legislation defining what constitutes unlawful searches and seizures involving electronic communications. After explaining how email and internet addresses are collected (and whether the FBI's tool for collection works within the bounds set by the law), this note will discuss the provisions of the Patriot Act that regulate collection of that information. This note will show, using the application of pen register and trap and trace devices to the Internet as an example, …


An Examination Of The Naming Requirement Of Tittle Iii In Light Of United States V. Donovan - A Case For Suppression, William D. Goldberg Jan 1978

An Examination Of The Naming Requirement Of Tittle Iii In Light Of United States V. Donovan - A Case For Suppression, William D. Goldberg

Villanova Law Review

No abstract provided.