Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Police (3)
- Police surveillance (2)
- Searches (2)
- Behavior (1)
- CCTV (1)
-
- COINTELPRO (1)
- CalGang (1)
- Ceasefire program (1)
- City of Indianapolis v. Edmond (1)
- Computer security (1)
- Computer systems (1)
- Discretion (1)
- Discriminatory policing patterns (1)
- Due process (1)
- Electronic records (1)
- Flexibility (1)
- Gang Reporting Evaluation and Tracking (GREAT) system (1)
- Informer statutes (1)
- Mass incarceration (1)
- National Crime Information Center (1)
- Reasonable suspicion (1)
- Records (1)
- Regulation (1)
- Reimagining Police Surveillance: Protecting Activism and Ending Technologies of Oppression (1)
- Right to privacy (1)
- Search and seizure (1)
- Seizures (1)
- Sexual activity (1)
- ShotSpotter surveillance technology (1)
- ShotSpotter technology (1)
Articles 1 - 6 of 6
Full-Text Articles in Privacy Law
Remarks, Andrea Dennis
Remarks, Andrea Dennis
University of Michigan Journal of Law Reform
Over the course of one week, the Michigan Journal of Law Reform presented its annual Symposium, this year titled Reimagining Police Surveillance: Protecting Activism and Ending Technologies of Oppression. During this week, the Journal explored complicated questions surrounding the expansion of police surveillance technologies, including how police and federal agencies utilize their extensive resources to identify and surveil public protest, the ways in which technology employed by police is often flawed and disparately impacts people of color, and potential reforms of police surveillance technology. Before delving into these complicated questions, I presented remarks on the history of police surveillance …
“Bang!”: Shotspotter Gunshot Detection Technology, Predictive Policing, And Measuring Terry’S Reach, Harvey Gee
“Bang!”: Shotspotter Gunshot Detection Technology, Predictive Policing, And Measuring Terry’S Reach, Harvey Gee
University of Michigan Journal of Law Reform
ShotSpotter technology is a rapid identification and response system used in ninety American cities that is designed to detect gunshots and dispatch police. ShotSpotter is one of many powerful surveillance tools used by local police departments to purportedly help fight crime, but they often do so at the expense of infringing upon privacy rights and civil liberties. This Article expands the conversation about ShotSpotter technology considerably by examining the adjacent Fourth Amendment issues emanating from its use. For example, law enforcement increasingly relies on ShotSpotter to create reasonable suspicion where it does not exist. In practice, the use of ShotSpotter …
Public Employees Or Private Citizens: The Off-Duty Sexual Activities Of Police Officers And The Constitutional Right Of Privacy, Michael A. Woronoff
Public Employees Or Private Citizens: The Off-Duty Sexual Activities Of Police Officers And The Constitutional Right Of Privacy, Michael A. Woronoff
University of Michigan Journal of Law Reform
This Note proposes a framework for dealing with problems in this area in a manner which best balances the competing interests involved. It argues that, while there is no explicit constitutional guarantee of privacy, the state is not free to regulate all aspects of a police officer's otherwise legal, off-duty, sexual activity. Part I of the Note examines several possible sources of a constitutional right of privacy. It concludes that, although many of the courts which invalidate state regulation of police officers' off-duty sexual activity do so on the basis of some constitutional right of privacy, any implied fundamental right …
Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb
Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb
University of Michigan Journal of Law Reform
This article evaluates the constitutionality of CCTV "searches." Part I discusses the present uses being made of closed circuit technology and evaluates the merits of the CCTV surveillance system. The critical policy trade-off is the system's effectiveness in combatting crime against the resulting loss of privacy to individual citizens.
Part II considers the constitutional implications of CCTV use in terms of three major doctrines: the Fourth Amendment prohibition against "unreasonable searches and seizures"; the constitutional right of privacy; and the First Amendment guarantees of free speech and association. This part briefly summarizes the state of the law concerning these constitutional …
Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill
Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill
University of Michigan Journal of Law Reform
The purpose of this article is to describe the social benefits and costs of the NCIC and to indicate the need for a program of operational controls to temper the system's impact on the balance between individual privacy and law enforcement needs. Various approaches which could be incorporated into a program of safeguards are introduced and briefly analyzed. Finally, the article discusses several overall design issues which should be considered in the construction of an adequate program of safeguards. Particular emphasis is placed on the NCCH file since it is the major source of the tensions underlying the issues addressed.
The Concept Of Privacy And The Fourth Amendment, Steven C. Douse
The Concept Of Privacy And The Fourth Amendment, Steven C. Douse
University of Michigan Journal of Law Reform
This Article attempts at a minimum to offer a common background and frame of reference for defining and comparing myriad facets of the law. If successful, they furnish a model for the integration of these many facets. This inquiry begins with an examination of the proposition that the essence of the fourth amendment is protection of a right of privacy. The concept of privacy is then defined and elaborated, both without and within the constitutional context. These conclusions are further extended in an exploration of mechanisms for defining the invasions and protection of fourth amendment privacy.