Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Law
Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton
Warrantless Searches And Smartphones: Privacy In The Palm Of Your Hand?, Margaret M. Lawton
University of the District of Columbia Law Review
Incident to a drug arrest, a police officer removes a smartphone from the pocket of the defendant. The smartphone may have incriminating evidence-phone numbers, pictures, text messages, and e-mails. But can the officer examine the smartphone on the scene or back at the station? Or does the officer need to show probable cause and obtain a warrant before examining the phone? If the phone were instead the arrestee's wallet or a cigarette package, under the search incident to lawful arrest exception to the Fourth Amendment's warrant requirement the officer could open and search inside either of these "containers." Anything found …
Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray
Looking Through The Prism Of Privacy And Trespass: Smartphones And The Fourth Amendment, Saby Ghoshray
University of the District of Columbia Law Review
Technology in the twenty-first century has dramatically changed our lives, but the law has not kept pace with technological advances. The treatment of smartphones in Fourth Amendment jurisprudence is no exception. This is made evident by the increasingly scattered outcomes of litigation involving the privacy interests of smartphone owners.' As the cross-jurisdictional inconsistencies of judicial decisions applying the Fourth Amendment to smartphones mount, I am drawn to seek answers from two foundational pillars of the Supreme Court's search and seizure jurisprudence: protection against invasions of privacy and the bulwark against trespass.
Do Automobile Passengers Have A Legitimate Expectation Of Privacy? An Analysis Of Reasonable Expectation Under The Fourth Amendment - People V. Howard, Lisa Belrose
Touro Law Review
No abstract provided.
The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi
The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi
University of Michigan Journal of Law Reform Caveat
Wired is reporting renewed hubbub regarding statutory and Fourth Amendment protections of individuals’ privacy in the digital age. This time, it comes in the form of federal officers using a fake cellphone tower (called a “stingray”) to locate their suspect, Mr. Rigmaiden, by tracking the location of his cellphone. According to an affidavit submitted to the court, the stingray only captures the equivalent of header information – such as the phone or account number assigned to the aircard as well as dialing, routing and address information involved in the communication.
Indecent Exposure: Do Warrantless Searches Of Cell Phones Violate The Fourth Amendment?, Amy Vorenberg
Indecent Exposure: Do Warrantless Searches Of Cell Phones Violate The Fourth Amendment?, Amy Vorenberg
Law Faculty Scholarship
This article argues that searches of student’s cell phone should require a warrant in most circumstances. The amount and personal nature of information on a smart phone warrants special Fourth Amendment protection. This issue is particularly relevant in the public school setting where administrators routinely confiscate phones from students caught using them in school. With more frequency, administrators are looking at the phones, scrolling through text messages and photos, and on some occasions, responding to text messages.
The U.S. Supreme Court in Safford v. Redding, acknowledges the special considerations that school children should be afforded in part because of the …
Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus
Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus
Articles
Anyone who has been stopped at a sobriety checkpoint, screened at an international border, scanned by a metal detector at an airport or government building, or drug tested for public employment has been subjected to an administrative search or seizure. Searches of public school students, government employees, and probationers are characterized as administrative, as are business inspections and-increasingly-wiretaps and other searches used in the gathering of national security intelligence. In other words, the government conducts thousands of administrative searches every day. None of these searches requires either probable cause or a search warrant. Instead, courts evaluating administrative searches need only …
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …
Western Union, The American Federation Of Labor, Google, And The Changing Face Of Privacy Advocates, Wesley Oliver
Western Union, The American Federation Of Labor, Google, And The Changing Face Of Privacy Advocates, Wesley Oliver
Wesley M Oliver
No abstract provided.
Expectations Of Privacy In Social Media, Stephen E. Henderson
Expectations Of Privacy In Social Media, Stephen E. Henderson
Stephen E Henderson
This article, which largely tracks my remarks at Mississippi College’s Social Media Symposium, examines expectations of privacy in social media such as weblogs (blogs), Facebook pages, and Twitter tweets. Social media is diverse and ever-diversifying, and while I address some of that complexity, I focus on the core functionality, which provides the groundwork for further conversation as the technology and related social norms develop. As one would expect, just as with our offline communications and other online communications, in some we have an expectation of privacy that is recognized by current law, in some we have an expectation of privacy …