Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller Nov 2017

Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller

Teresa A. Miller

The power of privacy is diminishing in the prison setting, and yet privacy is the legal theory prisoners rely upon most to resist searches by correctional officers. Incarcerated women in particular rely upon privacy to shield them from the kind of physical contact that male guards have been known to abuse. The kind of privacy that protects prisoners from searches by guards of the opposite sex derives from several sources, depending on the factual circumstances. Although some form of bodily privacy is embodied in the First, Fourth, Eighth, and Fourteenth Amendments, prisoners challenging the constitutionality of cross-gender searches most commonly …


Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller Nov 2017

Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller

Teresa A. Miller

In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …


The Pro Bono Collaborative Project Spotlight: Rwu Law Street Law: Teaching Teens About The Law And Inspiring Future Lawyers 11-16-2017, Roger Williams University School Of Law Nov 2017

The Pro Bono Collaborative Project Spotlight: Rwu Law Street Law: Teaching Teens About The Law And Inspiring Future Lawyers 11-16-2017, Roger Williams University School Of Law

Pro Bono Collaborative Staff Publications

No abstract provided.


We Need To Talk About Police Disciplinary Records, Kate Levine Aug 2017

We Need To Talk About Police Disciplinary Records, Kate Levine

Faculty Publications

In March 2017, an employee of New York’s Civilian Complaint Review Board leaked the disciplinary record of Daniel Pantaleo to the media. Pantaleo, the police officer who choked Eric Garner to death in the video that went public and horrified many citizens, is under federal investigation after a Staten Island grand jury refused to indict him for Garner’s death. Legal Aid Society attorneys had unsuccessfully sought the release of his records in the courts for years. The leak of his records is the public face of an important but rarely discussed issue facing police, legislators, judges, lawyers, and scholars who …


The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins Jul 2017

The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour Apr 2017

Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour

Faculty Scholarship

The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …


Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman Feb 2017

Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman

Northwestern University Law Review

In light of the privacy concerns inherent to personal technological devices, the Supreme Court handed down a unanimous decision in 2014 recognizing the need for categorical heightened protection of cell phones during searches incident to arrest in Riley v. California. This Note argues for expansion of heightened protections for cell phones in the context of abandoned evidence because the same privacy concerns apply. This argument matters because state and federal courts have not provided the needed protection to abandoned cell phones pre- or post-Riley.


Constitutional Law—Fourth Amendment Search And Seizure—We've Got Ourselves In A Pickle: The Supreme Court Of Arkansas's Recent Expansion Of Fourht Amendment Rights May Have Unintended Consequences. Pickle V. State, 2015 Ark. 286, 466 S.W. 3d 410, Ben Honaker Jan 2017

Constitutional Law—Fourth Amendment Search And Seizure—We've Got Ourselves In A Pickle: The Supreme Court Of Arkansas's Recent Expansion Of Fourht Amendment Rights May Have Unintended Consequences. Pickle V. State, 2015 Ark. 286, 466 S.W. 3d 410, Ben Honaker

University of Arkansas at Little Rock Law Review

No abstract provided.


The Criminal Justice Black Box, Samuel R. Wiseman Jan 2017

The Criminal Justice Black Box, Samuel R. Wiseman

Scholarly Publications

"Big data "-- the collection and statistical analysis of numerous digital data points -- has transformed the commercial and policy realms, changing firms' understanding of consumer behavior and improving problems ranging from traffic congestion to drug interactions. In the criminal justice field, police now use data from widely dispersed monitoring equipment, crime databases, and statistical analysis to predict where and when crimes will occur, and police body cameras have the potential to both provide key evidence and reduce misconduct. But in many jurisdictions, digital access to basic criminal court records remains surprisingly limited, and, in contrast to the civil context, …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Certain Certiorari: The Digital Privacy Rights Of Probationers, Daniel Yeager Jan 2017

Certain Certiorari: The Digital Privacy Rights Of Probationers, Daniel Yeager

Faculty Scholarship

In a recent oral argument, a judge on the California Court of Appeal told me they had "at least 50" pending cases on the constitutionality of probation conditions authorizing suspicionless searches of digital devices. As counsel of record in three of those cases, I feel positioned to comment on this hot topic within criminal law. My intention here is less to reconcile California's cases on suspicionless searches of probationers' digital devices than to locate them within the precedents of the United States Supreme Court, which is bound before long to pick up a case for the same purpose.