Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Law

Privacy, Police Power, And The Growth Of Public Power In The Early Twentieth Century: A Not So Unlikely Coexistence, Carol Nackenoff Dec 2015

Privacy, Police Power, And The Growth Of Public Power In The Early Twentieth Century: A Not So Unlikely Coexistence, Carol Nackenoff

Maryland Law Review

No abstract provided.


Neuro Lie Detection And Mental Privacy, Madison Kilbride, Jason Iuliano Dec 2015

Neuro Lie Detection And Mental Privacy, Madison Kilbride, Jason Iuliano

Maryland Law Review

New technologies inevitably raise novel legal questions. This is particularly true of technologies, such as neuro lie detection, that offer new ways to investigate crime. Recently, a number of scholars have asked whether neuro lie detection testing is constitutional. So far, the debate has focused on the Fifth Amendment—specifically whether evidence gathered through neuro lie detection is constitutionally admissible because it is “physical” in nature or inadmissible because it is “testimonial” in nature. Under current Supreme Court doctrine, this Fifth Amendment debate is intractable. However, the more fundamental question of whether the government can compel individuals to undergo a neuro …


Privacy At 50: The Bedroom, The Courtroom, And The Spaces In Between, Judith A. Baer Dec 2015

Privacy At 50: The Bedroom, The Courtroom, And The Spaces In Between, Judith A. Baer

Maryland Law Review

No abstract provided.


Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu Nov 2015

Blood And Privacy: Towards A "Testing-As-Search" Paradigm Under The Fourth Amendment, Andrei Nedelcu

Seattle University Law Review

A vehicle on a public thoroughfare is observed driving erratically and careening across the roadway. After the vehicle strikes another passenger car and comes to a stop, the responding officer notices in the driver the telltale symptoms of intoxication—bloodshot eyes, slurred speech, and a distinct odor of intoxicants. On these facts, a lawfully-procured warrant authorizing the extraction of the driver’s blood is obtained. However, the document fails to circumscribe the manner and variety of testing that may be performed on the sample. Does this lack of particularity render the warrant constitutionally infirm as a mandate for chemical analysis of the …


Drones: Updating The Fourth Amendment And The Technological Trespass Doctrine, S. Alex Spelman Sep 2015

Drones: Updating The Fourth Amendment And The Technological Trespass Doctrine, S. Alex Spelman

Nevada Law Journal

No abstract provided.


Pot In My Backyard: Curtilage Concept Endorsed By The Queens Supreme Court To Suppress Physical Evidence Of Marijuana, Laura J. Mulholland Aug 2015

Pot In My Backyard: Curtilage Concept Endorsed By The Queens Supreme Court To Suppress Physical Evidence Of Marijuana, Laura J. Mulholland

Touro Law Review

No abstract provided.


The Need For Judicial Restriction On The Use Of Drug Detecting Canines, William R. Pomeroy Jul 2015

The Need For Judicial Restriction On The Use Of Drug Detecting Canines, William R. Pomeroy

Akron Law Review

The purpose of this comment is to examine these issues, outline the conflicting positions, and attempt to forecast the direction the courts may take in their effort to bring some harmony to this unsettled (and to some, unsettling) area of law. Few people would attempt to deny law enforcement officials the use of this highly effective and relatively unintrusive law enforcement tool. Yet there are those who fear that the unsettled questions concerning limits on the use of this tool may lead to serious abuse, and who raise the specter of unlimited government intrusion should this type of investigatory activity …


Wilson V. Arkansas: Thirty Years After The Supreme Court Addresses The Knock And Announce Issue, Todd Witten Jul 2015

Wilson V. Arkansas: Thirty Years After The Supreme Court Addresses The Knock And Announce Issue, Todd Witten

Akron Law Review

This Note will initially discuss the historical background of the knock and announce principle and its evolution from the English common law. Next, the Note will address the facts and the holdings of Wilson, in the lower courts and the Supreme Court. Finally, the Note will analyze the Wilson decision and its precedential value.


Overgeneralization Of The Hot Pursuit Doctrine Provides Another Blow To The Fourth Amendment In Middletown V. Flinchum, Nathan Vaughn Jul 2015

Overgeneralization Of The Hot Pursuit Doctrine Provides Another Blow To The Fourth Amendment In Middletown V. Flinchum, Nathan Vaughn

Akron Law Review

Unreasonable searches of the home have often been regarded as a serious infringement upon one’s right to privacy. The right to privacy is currently recognized by a variety of governments and has existed for hundreds of years. Although the Constitution does not grant an express right to privacy, the Supreme Court has consistently acknowledged the rights of personal privacy and zones of privacy. Affording extra protection to the home seems to show that our right to privacy is at its peak behind closed doors.

Unfortunately, the list of exceptions to the warrant requirement is large and continuously growing. These exceptions …


Two Wrongs Don't Make A Fourth Amendment Right: Samson Court Errs In Choosing Proper Analytical Framework, Errs In Result, Parolees Lose Fourth Amendment Protection, Rachael A. Lynch Jul 2015

Two Wrongs Don't Make A Fourth Amendment Right: Samson Court Errs In Choosing Proper Analytical Framework, Errs In Result, Parolees Lose Fourth Amendment Protection, Rachael A. Lynch

Akron Law Review

This Note will follow the Fourth Amendment from its origins to its modern application to parolee rights, as evidenced by the Samson Court. Part II focuses on the Fourth Amendment, from the circumstances surrounding its adoption to modern court cases that have applied its tenets to prisoners, probationers, and, finally, parolees. Part III details the Supreme Court’s decision in Samson v. California, including a thorough discussion of the facts that gave rise to the case and lower court decisions. Part IV explores the problems with the Court’s framework and suggests other possible frameworks the Court could have used to come …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold May 2015

Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold

William & Mary Law Review

No abstract provided.


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Apr 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing …


Spies In The Skies: Dirtboxes And Airplane Electronic Surveillance, Brian L. Owsley Apr 2015

Spies In The Skies: Dirtboxes And Airplane Electronic Surveillance, Brian L. Owsley

Michigan Law Review First Impressions

Electronic surveillance in the digital age is essentially a cat-and-mouse game between governmental agencies that are developing new techniques and technologies for surveillance, juxtaposed against privacy rights advocates who voice concerns about such technologies. In November 2014, there was a discovery of a new twist on a relatively old theme. Recently, the Wall Street Journal reported that the U.S. Marshals Service was running a surveillance program employing devices—dirtboxes—that gather all cell phone numbers in the surrounding area. Other federal agencies, including the Drug Enforcement Agency, Immigration and Custom Enforcement, and the Department of Homeland Security, are also documented to have …


The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner Mar 2015

The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Librarians in the United States have many professional guideposts to inform their work. A patron's right to privacy is one tenet that tends to be upheld tenaciously, and is informed first by the 4th Amendment to the U.S. Constitution, among other Amendments, as well as Article III of the American Library Association Code of Ethics. Section 215 of the USA PATRIOT Act, the so-called "library provision," contradicts both the 4th Amendment and Article III of the ALA Code of Ethics, making it a weak third leg of a triangle of guideposts. The speaker explains how Section 215 allows for confiscation …


The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens Jan 2015

The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens

Faculty Scholarship

Technology has transformed government surveillance and opened traditionally private information to official scrutiny. The current privacy-based approach to the Fourth Amendment is unable to cope with the changes. This Article offers a solution to the problems that technological surveillance techniques present. Starting with the introduction of the approach in Katz, the Article reviews the development of privacy-based approach. It then looks at three 21st century Supreme Court cases that grappled with applying the Katz test to advanced technological surveillance techniques: Kyllo, Quon, and Jones. These cases demonstrate the problems that the privacy-based approach creates and the …


Supreme Court Jurisprudence Of The Personal In City Of Los Angeles V. Patel, Brian L. Owsley Jan 2015

Supreme Court Jurisprudence Of The Personal In City Of Los Angeles V. Patel, Brian L. Owsley

Michigan Law Review First Impressions

Recently, the Supreme Court issued a 5-4 decision in City of Los Angeles v. Patel striking down a city ordinance that required hotel and motel owners to make their guest registries available to police officers whenever requested to do so. Although the Court’s opinion in Patel simply affirmed the Ninth Circuit’s finding that the ordinance was unconstitutional, the Court could have used Patel to readdress the third-party doctrine, which establishes that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Patel provided a vehicle for the Court to do so, particularly because …


The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele Jan 2015

The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele

Faculty Publications

This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …


No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst Jan 2015

No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst

Michigan Telecommunications & Technology Law Review

In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …


Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell Jan 2015

Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell

Scholarly Articles

Since joining the United States Supreme Court in 1986, Justice Scalia has been a prominent voice on the Fourth Amendment, having written twenty majority opinions, twelve concurrences, and six dissents on the topic. Under his pen, the Court has altered its test for determining when the Fourth Amendment should apply; provided a vision to address technology's encroachment on privacy; and articulated the standard for determining whether government officials are entitled to qualified immunity in civil suits involving alleged Fourth Amendment violations. In most of Justice Scalia's opinions, he has championed an originalist/textualist theory of constitutional interpretation. Based on that theory, …


Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski Jan 2015

Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski

Publications

A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …


Environmental Privacy, Katrina F. Kuh Jan 2015

Environmental Privacy, Katrina F. Kuh

Utah Law Review

The purpose of this Article is not to anticipate whether or how the Fourth Amendment might apply to specific efforts to collect information about environmentally significant individual behaviors. The purpose is to discern the considerations that have proven salient in balancing environmental regulation and privacy to date that may likewise be relevant to navigating privacy concerns that arise with respect to policy directed to environmentally significant individual behaviors.

In this regard, the Article’s survey suggests that neither the fact that environmentally significant individual behaviors must be aggregated to produce environmental harm nor the fact that individuals, as opposed to commercial …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


The Dawn Of Social Intelligence (Socint), Laura K. Donohue Jan 2015

The Dawn Of Social Intelligence (Socint), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/‌11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.

The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …


Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews Dec 2014

Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews

Lori B. Andrews

A comprehensive report concerning the many ways that webcams can be used against those who possess them. Digital Peepholes also provides in depth legal analysis of the legality of private companies and the government using people’s webcams to spy on them. A must read for anyone concerned with privacy or anyone with a webcam built in to their devices!