Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Constitutional Law

The Catholic University of America, Columbus School of Law

Articles 1 - 6 of 6

Full-Text Articles in Law

Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran Apr 2024

Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran

Catholic University Law Review

During the COVID-19 vaccination campaign, the federal government adopted a more centralized approach to the collection of public health data. Although the states previously had controlled the storage of vaccination information, the federal government’s Operation Warp Speed plan required the reporting of recipients’ personal information on the grounds that it was needed to monitor the safety of novel vaccines and ensure correct administration of their multi-dose regimens.

Over the course of the pandemic response, this more centralized federal approach to data collection added a new dimension to pre-existing vaccination hesitancy. Requirements that recipients furnish individual information deterred vaccination among undocumented …


Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski Jan 2022

Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski

Catholic University Journal of Law and Technology

No abstract provided.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart Jan 2019

The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart

Catholic University Journal of Law and Technology

This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …


Being Forced To Code In The Technology Era As A Violation Of The First Amendment Protection Against Compelled Speech, Adrianna Oddo Mar 2018

Being Forced To Code In The Technology Era As A Violation Of The First Amendment Protection Against Compelled Speech, Adrianna Oddo

Catholic University Law Review

Over the past several decades, technological advancements led several courts to hold that computer code is protected as speech under the First Amendment of the Constitution. However, after fourteen people were killed in the 2015 San Bernardino massacre the U.S. Government sought to ignore those findings when it ordered Apple, Inc. to write a computer code to bypass the encryption software on the shooter’s cell phone. To access this particular phone Apple would need to write a code that could potentially compromise its customers’ data and personal information. Apple vehemently opposed the Government’s order and claimed that compelling it to …


State V. Brossart: Adapting The Fourth Amendment For A Future With Drones, Thomas Bryan Jun 2014

State V. Brossart: Adapting The Fourth Amendment For A Future With Drones, Thomas Bryan

Catholic University Law Review

No abstract provided.