Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Fourth Amendment (596)
- Constitutional Law (464)
- Criminal Procedure (276)
- Criminal Law (261)
- Privacy Law (143)
-
- Law Enforcement and Corrections (122)
- Civil Rights and Discrimination (85)
- Supreme Court of the United States (85)
- Evidence (84)
- Science and Technology Law (75)
- Courts (66)
- Law and Society (57)
- Jurisprudence (51)
- State and Local Government Law (46)
- Internet Law (41)
- National Security Law (32)
- Law and Race (31)
- First Amendment (29)
- Social and Behavioral Sciences (28)
- Computer Law (25)
- Fourteenth Amendment (23)
- Judges (22)
- Legal History (22)
- Health Law and Policy (20)
- Legislation (18)
- Litigation (18)
- Communications Law (17)
- Education Law (16)
- Immigration Law (14)
- Institution
-
- Touro University Jacob D. Fuchsberg Law Center (91)
- Selected Works (84)
- Cleveland State University (59)
- Vanderbilt University Law School (44)
- Fordham Law School (43)
-
- Maurer School of Law: Indiana University (38)
- SelectedWorks (33)
- American University Washington College of Law (30)
- Boston University School of Law (24)
- St. Mary's University (24)
- The University of Akron (22)
- University of South Carolina (19)
- Northern Illinois University (18)
- Pepperdine University (18)
- University of Maryland Francis King Carey School of Law (18)
- Washington and Lee University School of Law (18)
- Seattle University School of Law (17)
- University of Richmond (17)
- Florida State University College of Law (16)
- George Washington University Law School (16)
- Penn State Law (15)
- University of Oklahoma College of Law (15)
- New York Law School (14)
- University of Florida Levin College of Law (14)
- University of Washington School of Law (14)
- Northwestern Pritzker School of Law (13)
- University of Michigan Law School (13)
- University of Pittsburgh School of Law (13)
- Chicago-Kent College of Law (12)
- The Catholic University of America, Columbus School of Law (12)
- Publication Year
- Publication
-
- Touro Law Review (81)
- Faculty Scholarship (52)
- Articles (30)
- Journal Articles (30)
- Fordham Law Review (29)
-
- Vanderbilt Law School Faculty Publications (23)
- Articles in Law Reviews & Other Academic Journals (20)
- Faculty Publications (20)
- Indiana Law Journal (20)
- Akron Law Review (18)
- Articles by Maurer Faculty (16)
- GW Law Faculty Publications & Other Works (16)
- Northern Illinois University Law Review (16)
- Pepperdine Law Review (16)
- Seattle University Law Review (16)
- All Faculty Scholarship (15)
- St. Mary's Law Journal (14)
- UF Law Faculty Publications (14)
- Vanderbilt Law Review (14)
- Faculty Articles (13)
- Scholarly Publications (13)
- Scholarly Works (13)
- NYLS Law Review (12)
- United States Supreme Court (12)
- Chicago-Kent Law Review (11)
- Cleveland State Law Review (11)
- Newspaper Coverage (11)
- Oklahoma Law Review (11)
- ExpressO (9)
- Fordham Urban Law Journal (9)
Articles 61 - 90 of 1088
Full-Text Articles in Law
Policing, Masculinities, And Judicial Acknowledgment, Nicholas J. Prendergast
Policing, Masculinities, And Judicial Acknowledgment, Nicholas J. Prendergast
Vanderbilt Law Review
In the 1980s, the Supreme Court held that courts must consider the “totality of the circumstances” when deciding the reasonableness of a police officer’s conduct in an excessive force suit. To this day, the precise meaning of “reasonableness” remains elusive. For years, courts around the country have struggled to articulate what police conduct should and—equally as saliently— should not be considered during reasonableness determinations. Thus far, the Supreme Court has been unwilling to substantively clarify its reasonableness doctrine. This lack of clarity has led to an untenable patchwork of differing legal frameworks throughout the United States.
This issue exists in …
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
Notre Dame Law Review
Today, information is shared almost constantly. People share their DNA to track their ancestry or for individualized health information; they instruct Alexa to purchase products or provide directions; and, now more than ever, they use videoconferencing technology in their homes. According to the third-party doctrine, the government can access all such information without a warrant or without infringing on Fourth Amendment privacy protections. This exposure of vast amounts of highly personal data to government intrusion is permissible because the Supreme Court has interpreted the third-party doctrine as a per se rule. However, that interpretation rests on an improper understanding of …
The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict
The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict
Washington and Lee Law Review
Facial recognition technology (FRT) is a popular tool among police, who use it to identify suspects using photographs or still-images from videos. The technology is far from perfect. Recent studies highlight that many FRT systems are less effective at identifying people of color, women, older people, and children. These race, gender, and age biases arise because FRT is often “trained” using non-diverse faces. As a result, police have wrongfully arrested Black men based on mistaken FRT identifications. This Note explores the intersection of facial recognition technology and probable cause to arrest.
Courts rarely, if ever, examine FRT’s role in establishing …
Wrongfully Charged, Golden Gate University School Of Law
Wrongfully Charged, Golden Gate University School Of Law
Golden Gate University Race, Gender, Sexuality and Social Justice Law Journal
On January 10, 2020, a San Francisco Superior Court judge, at the request of a San Francisco Police officer, issued an arrest warrant in connection with a residential burglary. Mot. Suppress Evid. Off’d Against Def. Prelim. Hr’g, 6:1-2. The warrant listed suspects to be arrested and described a residence in Oakland that was to be searched. Id. at 3:5-13. The San Francisco Police Department sent a special operations unit to execute the warrant. Id. at 10:13-22. When the officers arrived at the house, they found the suspect as well as other individuals in the house.
One of those individuals was …
The Broken Fourth Amendment Oath, Laurent Sacharoff
The Broken Fourth Amendment Oath, Laurent Sacharoff
Sturm College of Law: Faculty Scholarship
The Fourth Amendment requires that warrants be supported by “Oath or affirmation.” Under current doctrine, a police officer may swear the oath to obtain a warrant merely by repeating the account of an informant. This Article shows, however, that the Fourth Amendment, as originally understood, required that the real accuser with personal knowledge swear the oath.
That real-accuser requirement persisted for nearly two centuries. Almost all federal courts and most state courts from 1850 to 1960 held that the oath, by its very nature, required a witness with personal knowledge. Only in 1960 did the Supreme Court hold in Jones …
The Problem Of Qualified Immunity In K-12 Schools, Sarah Smith
The Problem Of Qualified Immunity In K-12 Schools, Sarah Smith
Arkansas Law Review
When thirteen-year-old Savana Redding arrived at school one autumn day in 2003, she was not expecting to be pulled out of her math class and strip searched. But, that is exactly what happened after the assistant principal suspected her of possessing and distributing “prescription-strength ibuprofen” and “over-the-counter. . .naproxen” after receiving information from another student. After Savana consented to a search of her backpack and other belongings—a search which turned up no evidence of drug possession—the assistant principal asked the school nurse and administrative assistant to search Savana’s clothes. To do this, the school officials asked Savana “to remove her …
Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary
Seattle Journal of Technology, Environmental & Innovation Law
The aim of this article is to analyze and compare current events in the People's Republic of China and the United States to discuss the moral dilemmas that arise when establishing the boundary between national security interests and individual privacy rights. As we continue to intertwine our lives with technology, it has become increasingly important to establish clear privacy rights. The question then becomes: at what point should individuals sacrifice their rights for what the government considers the "greater good" of the country?
Further, this article analyzes the development of U.S. privacy law and its relationship to national security, technology, …
Girls, Assaulted, I. India Thusi
Girls, Assaulted, I. India Thusi
Northwestern University Law Review
Girls who are incarcerated share a common trait: They have often experienced multiple forms of sexual assault, at the hands of those close to them and at the hands of the state. The #MeToo movement has exposed how powerful people and institutions have facilitated pervasive sexual violence. However, there has been little attention paid to the ways that incarceration perpetuates sexual exploitation. This Article focuses on incarcerated girls and argues that the state routinely sexually assaults girls by mandating invasive, nonconsensual searches. Unwanted touching and display of private parts are common features of life before and after incarceration—from the sexual …
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
Faculty Articles
Today, information is shared almost constantly. People share their DNA to track their ancestry or for individualized health information; they instruct Alexa to purchase products or provide directions; and, now more than ever, they use videoconferencing technology in their homes. According to the third-party doctrine, the government can access all such information without a warrant or without infringing on Fourth Amendment privacy protections. This exposure of vast amounts of highly personal data to government intrusion is permissible because the Supreme Court has interpreted the third-party doctrine as a per se rule. However, that interpretation rests on an improper understanding of …
Preservation Letters And Fourth Amendment Seizures: A Response To Professor Kerr, Michael L. Levy
Preservation Letters And Fourth Amendment Seizures: A Response To Professor Kerr, Michael L. Levy
Saint Louis University Law Journal
The Stored Communications Act (18 U.S.C. § 2701 et seq.) requires an Internet Service Provider to preserve the contents of a user account upon receiving a request from a government agency. The maximum period of preservation is 180 days. However, the government agency cannot get access to the copy, unless it presents proper legal process, usually a search warrant. During this time, the user has complete access to their account. In a recent article, Professor Orin Kerr has advanced a thesis that copying pursuant to the government’s preservation requests under the Stored Communications Act is a Fourth Amendment seizure. This …
Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin
Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin
Scholarly Works
As the age of technology has taken this country by surprise and left us with an inability to formally prepare our legal system to incorporate these advances, many courts are forced to adapt by applying pre-technology rules to new technological scenarios. One illustration is the plain view exception to the Fourth Amendment. Recently, the issue of officer inadvertence at the time of the search, a rule that the United States Supreme Court has specifically stated is not required in plain view inquiries, has been revisited in cyber law cases. It could be said that the courts interested in the existence …
The New Bailments, Danielle D'Onfro
The New Bailments, Danielle D'Onfro
Scholarship@WashULaw
The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …
Equality In The Streets: Using Proportionality Analysis To Regulate Street Policing, Christopher Slobogin
Equality In The Streets: Using Proportionality Analysis To Regulate Street Policing, Christopher Slobogin
Vanderbilt Law School Faculty Publications
The racially disparate impact and individual and collective costs of stop and frisk, misdemeanor arrests, and pretextual traffic stops have been well documented. Less widely noticed is the contrast between Supreme Court case law permitting these practices and the Court's recent tendency to strictly regulate technologically enhanced searches that occur outside the street policing setting and that--coincidentally or not--happen to be more likely to affect the middle class. If, as the Court has indicated, electronic tracking and searches of digital records require probable cause that evidence of crime will be found, stops and frisks should also require probable cause that …
Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf
Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf
Faculty Scholarship
When we walk out our front door, we are in public and other people may look at us. But intuitively, we don’t open ourselves up to unlimited scrutiny just by going outside. We retain some privacy, even in public. What is the source of this residual public-privacy, and how should the law recognize it without degrading the open character of public space?
The answer given by commentators, and most recently by the Supreme Court in Carpenter v. U.S., comes in the form of two related claims. The first is the chilling theory of the Fourth Amendment. According to this idea, …
Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti
Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti
Articles by Maurer Faculty
The Supreme Court’s “reasonable expectation of privacy” test under the Fourth Amendment has often been criticized as circular, and hence subjective and unpredictable. The Court is presumed to base its decisions on society’s expectations of privacy, while society’s expectations of privacy are themselves presumed to be based on the Court’s judgements. As a solution to this problem, property law has been repeatedly propounded as an allegedly independent, autonomous area of law from which the Supreme Court can glean reasonable expectations of privacy without falling back into tautological reasoning.
Such an approach presupposes that property law is not itself circular. If …
Telephone Pole Cameras Under Fourth Amendment Law, Matthew Tokson
Telephone Pole Cameras Under Fourth Amendment Law, Matthew Tokson
Utah Law Faculty Scholarship
In a series of recent cases, police officers have mounted sophisticated surveillance cameras on telephone poles and pointed them at the homes of people suspected of a crime. These cameras often operate for months or even years without judicial oversight, collecting vast quantities of video footage on suspects and their activities near the home. Pole camera surveillance raises important Fourth Amendment questions that have divided courts and puzzled scholars.
These questions are complicated because Fourth Amendment law is complicated. This is especially the case today as Fourth Amendment law is in a transitional phase, caught between older and newer paradigms …
Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll
Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll
Georgia Law Review
The Fourth Amendment of the U.S. Constitution protects people “against unreasonable searches and seizures.” The private search doctrine provides a notable exception to the Fourth Amendment, providing that the government may reconstruct a search previously performed by a private party without first obtaining a warrant. The U.S. Supreme Court developed the private search doctrine prior to the advent of the internet; however, modern technology has changed the way that individuals live. What was once done entirely in private is now done alongside ever-present third parties, such as cell phones and virtual assistants.
Facebook and other social media sites complicate Fourth …
Regulatory Constitutional Law: Protecting Immigrant Free Speech Without Relying On The First Amendment, Michael Kagan
Regulatory Constitutional Law: Protecting Immigrant Free Speech Without Relying On The First Amendment, Michael Kagan
Georgia Law Review
The Supreme Court has long deprived immigrants of the full protection of substantive constitutional rights, including the right to free speech, leaving undocumented immigrants exposed to detention and deportation if they earn the government’s ire through political speech. The best remedy for this would be for the Supreme Court to reconsider its approach. This Essay offers an interim alternative borrowed from an analogous problem that arises under the Fourth Amendment. Under the Constitution, the Supreme Court has indicated that illegally obtained evidence may be suppressed in a removal proceeding only if the Fourth Amendment violation was “egregious.” Yet, some circuit …
Smart Meters As A Catalyst For Privacy Law, Matthew Tokson
Smart Meters As A Catalyst For Privacy Law, Matthew Tokson
Utah Law Faculty Scholarship
Smart utility meters raise several puzzling legal questions—and answering them can help point the way toward the future of Fourth Amendment and civil privacy law. This forum essay addresses two such issues: use restrictions on collected data, and voluntary data disclosure.
First, more than any other current technology, smart meters compel the development of use restrictions on collected data. The benefits of smart meters are potentially enormous, such that categorically prohibiting public utilities from collecting smart meter data is likely beyond the pale. Yet allowing law enforcement agents to obtain detailed or intimate data about the home without a warrant …
Criminal Justice Secrets, Meghan J. Ryan
Criminal Justice Secrets, Meghan J. Ryan
Faculty Journal Articles and Book Chapters
The American criminal justice system is cloaked in secrecy. The government employs covert surveillance operations. Grand-jury proceedings are hidden from public view. Prosecutors engage in closed-door plea-bargaining and bury exculpatory evidence. Juries convict defendants on secret evidence. Jury deliberations are a black box. And jails and prisons implement clandestine punishment practices. Although there are some justifications for this secrecy, the ubiquitous nature of it is contrary to this nation’s Founders’ steadfast belief in the transparency of criminal justice proceedings. Further, the pervasiveness of secrecy within today’s criminal justice system raises serious constitutional concerns. The accumulation of secrecy and the aggregation …
Girls, Assaulted, India Thusi
Girls, Assaulted, India Thusi
Articles by Maurer Faculty
Girls who are incarcerated share a common trait: They have often experienced multiple forms of sexual assault, at the hands of those close to them and at the hands of the state. The #MeToo movement has exposed how powerful people and institutions have facilitated pervasive sexual violence. However, there has been little attention paid to the ways that incarceration perpetuates sexual exploitation. This Article focuses on incarcerated girls and argues that the state routinely sexually assaults girls by mandating invasive, nonconsensual searches. Unwanted touching and display of private parts are common features of life before and after incarceration—from the sexual …
An Overview Of Privacy Law In 2022, Daniel J. Solove, Paul M. Schwartz
An Overview Of Privacy Law In 2022, Daniel J. Solove, Paul M. Schwartz
GW Law Faculty Publications & Other Works
Chapter 1 of PRIVACY LAW FUNDAMENTALS (6th edition, IAPP 2022) provides an overview of information privacy law circa 2022. The chapter summarizes the common themes in privacy laws and discusses the various types of laws (federal, constitutional, state, international). It contains a list and brief summary of the most significant U.S. federal privacy laws. The heart of the chapter is an historical timeline of major developments in the law of privacy and data security, including key cases, enactments of laws, major regulatory developments, influential publications, and other significant events. The chapter also contains a curated list of important treatises and …
A New Report Of Entick V. Carrington (1765), Christian Burset, T. T. Arvind
A New Report Of Entick V. Carrington (1765), Christian Burset, T. T. Arvind
Journal Articles
The Supreme Court has described Entick v. Carrington (1765) as “the true and ultimate expression of constitutional law” for the Founding generation. For more than 250 years, judges and commentators have read that case for guidance about the rule of law, executive authority, and the original meaning of the Fourth and Fifth Amendments. But we have been reading a flawed version. This Article publishes, for the first time, a previously unknown manuscript report of Entick v. Carrington. We explain why this version is more reliable than other reports of the case, and how this new discovery challenges prevailing assumptions about …
Ending Cps Home Searches' Evasion Of The Fourth Amendment, Joshua Gupta-Kagan
Ending Cps Home Searches' Evasion Of The Fourth Amendment, Joshua Gupta-Kagan
Faculty Scholarship
Every year, Child Protective Service (CPS) agencies investigate about 3 million families around the country for alleged neglect or abuse of their children. Under agency policies, all of those millions of investigations include searches of families’ homes. CPS investigators knock on the door (usually unannounced), look in every room of the house, open kitchen cabinets, sometimes inspect children’s bodies, and generally look for any evidence of child maltreatment. Yet CPS agencies rarely seek a warrant, and typically act as if that is unnecessary. (P. 18 & n.86.)
Fourth Amendment Limits On Extensive Quarantine Surveillance, Benjamin Wolters
Fourth Amendment Limits On Extensive Quarantine Surveillance, Benjamin Wolters
Duke Journal of Constitutional Law & Public Policy Sidebar
The devastation wreaked by the COVID-19 pandemic spurred innovations in technology and public policy. Many countries rushed to implement extensive quarantines, and some introduced disease surveillance, including location tracking to enforce quarantines. Though the United States has never implemented high-tech quarantine surveillance, such technology will certainly be available for the next disease outbreak.
Absent significant doctrinal change, the Fourth Amendment likely bars some, but not all, forms of quarantine surveillance. Quarantine surveillance probably constitutes a Fourth Amendment “search” that generally must be backed by probable cause. This probable cause requirement, and its subcomponent of individualized suspicion, likely applies differently to …
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
St. Mary's Law Journal
Abstract forthcoming.
Constitutional Law—Fourth Amendment Search And Seizure—Online Schools During A Pandemic: Fourth Amendment Implications When The State Requires Your Child To Turn On The Camera And Microphone Inside Your Home, Conan N. Becknell
University of Arkansas at Little Rock Law Review
No abstract provided.
The Aftermath Of Carpenter: An Empirical Study Of Fourth Amendment Law, 2018-2021, Matthew Tokson
The Aftermath Of Carpenter: An Empirical Study Of Fourth Amendment Law, 2018-2021, Matthew Tokson
Utah Law Faculty Scholarship
Fourth Amendment law is in flux. The Supreme Court recently established, in the landmark case Carpenter v. United States, that individuals can retain Fourth Amendment rights in information they disclose to a third party. In the internet era, this ruling has the potential to extend privacy protections to a huge variety of sensitive digital information. But Carpenter is also notoriously vague. Scholars and lower courts have tried to guess at what the law of Fourth Amendment searches will be going forward—and have reached different, contradictory conclusions.
This Article reports the results of a large-scale empirical study of the impact of …
Restoring Causality In Attenuation: Establishing The Breadth Of A Fourth Amendment Violation, Bryan H. Ward
Restoring Causality In Attenuation: Establishing The Breadth Of A Fourth Amendment Violation, Bryan H. Ward
West Virginia Law Review
When the police violate a suspect’s Fourth Amendment rights, what often follows is the discovery of incriminating evidence. Sometimes the evidence is discovered directly after the Fourth Amendment violation. In other situations, the evidence comes by a more indirect route and may occur long after the original Fourth Amendment violation. Courts struggle when trying to decide if the discovery of this indirectly obtained evidence was caused by the police misconduct. This causal question is important because causality acts as a limiting principle when deciding when to apply the exclusionary rule. A basic view of the exclusionary rule suggests that evidence …
The Second Amendment In A Carceral State, Alice Ristroph
The Second Amendment In A Carceral State, Alice Ristroph
Northwestern University Law Review
No abstract provided.