Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 4th Amendment (1)
- ACLU (1)
- APA (1)
- Administrative procedures (1)
- All Writs Act (1)
-
- Apple (1)
- Apple Inc. (1)
- Auer Deference (1)
- Border (1)
- Border search (1)
- CALEA (1)
- CBP (1)
- Chevron Deference (1)
- Confiscating (1)
- DHS (1)
- Discrimination (1)
- Electronic devices (1)
- Encryption (1)
- Expository reasoning (1)
- First Amendment (1)
- Fourth Amendment (1)
- ICE (1)
- Interpretation (1)
- Interpretive rules (1)
- Jus Tertii (1)
- Legislative rules (1)
- Muslim (1)
- National Security (1)
- Policymaking (1)
- Prescriptive reasoning (1)
Articles 1 - 3 of 3
Full-Text Articles in Privacy Law
Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel
Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel
Catholic University Journal of Law and Technology
Deference doctrines should be understood in light of the Administrative Procedures Act’s distinction between legislative rules and interpretive rules and should be based on a solid theoretical foundation. Modern Auer deference calls for categorical deference for an agency’s regulatory interpretation of an ambiguous regulation. This is inconsistent with the APA’s characterization of the purpose of an interpretive rule. Properly construed, interpretive rules clarify the meaning of a legal text which should be justified by use of expository reasoning. These rules deserve a lesser form of deference (Skidmore deference), based on an agency’s unique understanding of its own regulations which …
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
Catholic University Journal of Law and Technology
This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Catholic University Journal of Law and Technology
The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …