Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- The University of Akron (4)
- University of Michigan Law School (4)
- University of Maryland Francis King Carey School of Law (3)
- Selected Works (2)
- Georgetown University Law Center (1)
-
- SJ Quinney College of Law, University of Utah (1)
- Seattle University School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Colorado Law School (1)
- University of Massachusetts School of Law (1)
- University of Nebraska - Lincoln (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Pittsburgh School of Law (1)
- Washington and Lee University School of Law (1)
- Western New England University School of Law (1)
- William & Mary Law School (1)
- Publication
-
- Akron Law Review (4)
- Maryland Law Review (3)
- Michigan Law Review First Impressions (2)
- Michigan Telecommunications & Technology Law Review (2)
- Articles (1)
-
- Faculty Publications (1)
- Faculty Scholarship (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Lori B. Andrews (1)
- Nevada Law Journal (1)
- Publications (1)
- Robert Sprague (1)
- Scholarly Articles (1)
- Seattle University Law Review (1)
- Touro Law Review (1)
- University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches (1)
- Utah Law Review (1)
- William & Mary Law Review (1)
- Publication Type
- File Type
Articles 1 - 25 of 25
Full-Text Articles in Law
Privacy, Police Power, And The Growth Of Public Power In The Early Twentieth Century: A Not So Unlikely Coexistence, Carol Nackenoff
Privacy, Police Power, And The Growth Of Public Power In The Early Twentieth Century: A Not So Unlikely Coexistence, Carol Nackenoff
Maryland Law Review
No abstract provided.
Neuro Lie Detection And Mental Privacy, Madison Kilbride, Jason Iuliano
Neuro Lie Detection And Mental Privacy, Madison Kilbride, Jason Iuliano
Maryland Law Review
New technologies inevitably raise novel legal questions. This is particularly true of technologies, such as neuro lie detection, that offer new ways to investigate crime. Recently, a number of scholars have asked whether neuro lie detection testing is constitutional. So far, the debate has focused on the Fifth Amendment—specifically whether evidence gathered through neuro lie detection is constitutionally admissible because it is “physical” in nature or inadmissible because it is “testimonial” in nature. Under current Supreme Court doctrine, this Fifth Amendment debate is intractable. However, the more fundamental question of whether the government can compel individuals to undergo a neuro …
Privacy At 50: The Bedroom, The Courtroom, And The Spaces In Between, Judith A. Baer
Privacy At 50: The Bedroom, The Courtroom, And The Spaces In Between, Judith A. Baer
Maryland Law Review
No abstract provided.
Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu
Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu
Seattle University Law Review
A vehicle on a public thoroughfare is observed driving erratically and careening across the roadway. After the vehicle strikes another passenger car and comes to a stop, the responding officer notices in the driver the telltale symptoms of intoxication—bloodshot eyes, slurred speech, and a distinct odor of intoxicants. On these facts, a lawfully-procured warrant authorizing the extraction of the driver’s blood is obtained. However, the document fails to circumscribe the manner and variety of testing that may be performed on the sample. Does this lack of particularity render the warrant constitutionally infirm as a mandate for chemical analysis of the …
Drones: Updating The Fourth Amendment And The Technological Trespass Doctrine, S. Alex Spelman
Drones: Updating The Fourth Amendment And The Technological Trespass Doctrine, S. Alex Spelman
Nevada Law Journal
No abstract provided.
Pot In My Backyard: Curtilage Concept Endorsed By The Queens Supreme Court To Suppress Physical Evidence Of Marijuana, Laura J. Mulholland
Pot In My Backyard: Curtilage Concept Endorsed By The Queens Supreme Court To Suppress Physical Evidence Of Marijuana, Laura J. Mulholland
Touro Law Review
No abstract provided.
The Need For Judicial Restriction On The Use Of Drug Detecting Canines, William R. Pomeroy
The Need For Judicial Restriction On The Use Of Drug Detecting Canines, William R. Pomeroy
Akron Law Review
The purpose of this comment is to examine these issues, outline the conflicting positions, and attempt to forecast the direction the courts may take in their effort to bring some harmony to this unsettled (and to some, unsettling) area of law. Few people would attempt to deny law enforcement officials the use of this highly effective and relatively unintrusive law enforcement tool. Yet there are those who fear that the unsettled questions concerning limits on the use of this tool may lead to serious abuse, and who raise the specter of unlimited government intrusion should this type of investigatory activity …
Wilson V. Arkansas: Thirty Years After The Supreme Court Addresses The Knock And Announce Issue, Todd Witten
Wilson V. Arkansas: Thirty Years After The Supreme Court Addresses The Knock And Announce Issue, Todd Witten
Akron Law Review
This Note will initially discuss the historical background of the knock and announce principle and its evolution from the English common law. Next, the Note will address the facts and the holdings of Wilson, in the lower courts and the Supreme Court. Finally, the Note will analyze the Wilson decision and its precedential value.
Overgeneralization Of The Hot Pursuit Doctrine Provides Another Blow To The Fourth Amendment In Middletown V. Flinchum, Nathan Vaughn
Overgeneralization Of The Hot Pursuit Doctrine Provides Another Blow To The Fourth Amendment In Middletown V. Flinchum, Nathan Vaughn
Akron Law Review
Unreasonable searches of the home have often been regarded as a serious infringement upon one’s right to privacy. The right to privacy is currently recognized by a variety of governments and has existed for hundreds of years. Although the Constitution does not grant an express right to privacy, the Supreme Court has consistently acknowledged the rights of personal privacy and zones of privacy. Affording extra protection to the home seems to show that our right to privacy is at its peak behind closed doors.
Unfortunately, the list of exceptions to the warrant requirement is large and continuously growing. These exceptions …
Two Wrongs Don't Make A Fourth Amendment Right: Samson Court Errs In Choosing Proper Analytical Framework, Errs In Result, Parolees Lose Fourth Amendment Protection, Rachael A. Lynch
Akron Law Review
This Note will follow the Fourth Amendment from its origins to its modern application to parolee rights, as evidenced by the Samson Court. Part II focuses on the Fourth Amendment, from the circumstances surrounding its adoption to modern court cases that have applied its tenets to prisoners, probationers, and, finally, parolees. Part III details the Supreme Court’s decision in Samson v. California, including a thorough discussion of the facts that gave rise to the case and lower court decisions. Part IV explores the problems with the Court’s framework and suggests other possible frameworks the Court could have used to come …
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Michigan Telecommunications & Technology Law Review
The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …
Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold
Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold
William & Mary Law Review
No abstract provided.
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Robert Sprague
Spies In The Skies: Dirtboxes And Airplane Electronic Surveillance, Brian L. Owsley
Spies In The Skies: Dirtboxes And Airplane Electronic Surveillance, Brian L. Owsley
Michigan Law Review First Impressions
Electronic surveillance in the digital age is essentially a cat-and-mouse game between governmental agencies that are developing new techniques and technologies for surveillance, juxtaposed against privacy rights advocates who voice concerns about such technologies. In November 2014, there was a discovery of a new twist on a relatively old theme. Recently, the Wall Street Journal reported that the U.S. Marshals Service was running a surveillance program employing devices—dirtboxes—that gather all cell phone numbers in the surrounding area. Other federal agencies, including the Drug Enforcement Agency, Immigration and Custom Enforcement, and the Department of Homeland Security, are also documented to have …
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches
Librarians in the United States have many professional guideposts to inform their work. A patron's right to privacy is one tenet that tends to be upheld tenaciously, and is informed first by the 4th Amendment to the U.S. Constitution, among other Amendments, as well as Article III of the American Library Association Code of Ethics. Section 215 of the USA PATRIOT Act, the so-called "library provision," contradicts both the 4th Amendment and Article III of the ALA Code of Ethics, making it a weak third leg of a triangle of guideposts. The speaker explains how Section 215 allows for confiscation …
The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens
The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens
Faculty Scholarship
Technology has transformed government surveillance and opened traditionally private information to official scrutiny. The current privacy-based approach to the Fourth Amendment is unable to cope with the changes. This Article offers a solution to the problems that technological surveillance techniques present. Starting with the introduction of the approach in Katz, the Article reviews the development of privacy-based approach. It then looks at three 21st century Supreme Court cases that grappled with applying the Katz test to advanced technological surveillance techniques: Kyllo, Quon, and Jones. These cases demonstrate the problems that the privacy-based approach creates and the …
Supreme Court Jurisprudence Of The Personal In City Of Los Angeles V. Patel, Brian L. Owsley
Supreme Court Jurisprudence Of The Personal In City Of Los Angeles V. Patel, Brian L. Owsley
Michigan Law Review First Impressions
Recently, the Supreme Court issued a 5-4 decision in City of Los Angeles v. Patel striking down a city ordinance that required hotel and motel owners to make their guest registries available to police officers whenever requested to do so. Although the Court’s opinion in Patel simply affirmed the Ninth Circuit’s finding that the ordinance was unconstitutional, the Court could have used Patel to readdress the third-party doctrine, which establishes that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Patel provided a vehicle for the Court to do so, particularly because …
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
Faculty Publications
This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …
No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst
No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst
Michigan Telecommunications & Technology Law Review
In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …
Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell
Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell
Scholarly Articles
Since joining the United States Supreme Court in 1986, Justice Scalia has been a prominent voice on the Fourth Amendment, having written twenty majority opinions, twelve concurrences, and six dissents on the topic. Under his pen, the Court has altered its test for determining when the Fourth Amendment should apply; provided a vision to address technology's encroachment on privacy; and articulated the standard for determining whether government officials are entitled to qualified immunity in civil suits involving alleged Fourth Amendment violations. In most of Justice Scalia's opinions, he has championed an originalist/textualist theory of constitutional interpretation. Based on that theory, …
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Publications
A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …
Environmental Privacy, Katrina F. Kuh
Environmental Privacy, Katrina F. Kuh
Utah Law Review
The purpose of this Article is not to anticipate whether or how the Fourth Amendment might apply to specific efforts to collect information about environmentally significant individual behaviors. The purpose is to discern the considerations that have proven salient in balancing environmental regulation and privacy to date that may likewise be relevant to navigating privacy concerns that arise with respect to policy directed to environmentally significant individual behaviors.
In this regard, the Article’s survey suggests that neither the fact that environmentally significant individual behaviors must be aggregated to produce environmental harm nor the fact that individuals, as opposed to commercial …
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.
The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …
Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews
Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews
Lori B. Andrews