Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Privacy Law

Putting Cano On Ice – A Path Forward For Border Searches Of Electronic Devices, Davis Price Shugrue Jan 2022

Putting Cano On Ice – A Path Forward For Border Searches Of Electronic Devices, Davis Price Shugrue

Vanderbilt Journal of Entertainment & Technology Law

Across the country, circuit courts disagree over what level of suspicion, if any, is required for border officials to search electronic devices. This leaves law enforcement agencies in the lurch because they must craft nationwide policies that cover jurisdictions with differing rules. The Supreme Court should bring this quandary to an end by holding that no reasonable suspicion or warrant is required for border searches of electronic devices. Many scholars and litigants have called for a reasonable suspicion or warrant requirement in light of Supreme Court decisions like Riley and Carpenter that recognize the privacy concerns raised by searches of …


A World Of Difference? Law Enforcement, Genetic Data, And The Fourth Amendment, Christopher Slobogin, J. W. Hazel Jan 2021

A World Of Difference? Law Enforcement, Genetic Data, And The Fourth Amendment, Christopher Slobogin, J. W. Hazel

Vanderbilt Law School Faculty Publications

Law enforcement agencies are increasingly turning to genetic databases as a way of solving crime, either through requesting the DNA profile of an identified suspect from a database or, more commonly, by matching crime scene DNA with DNA profiles in a database in an attempt to identify a suspect or a family member of a suspect. Neither of these efforts implicates the Fourth Amendment, because the Supreme Court has held that a Fourth Amendment "search" does not occur unless police infringe "expectations of privacy society is prepared to recognize as reasonable" and has construed that phrase narrowly, without reference to …


Community Control Over Camera Surveillance: A Response To Bennett Capers's "Crime, Surveillance, And Communities", Christopher Slobogin Jan 2013

Community Control Over Camera Surveillance: A Response To Bennett Capers's "Crime, Surveillance, And Communities", Christopher Slobogin

Vanderbilt Law School Faculty Publications

Professor Capers's article helps stimulate thinking about the way in which community views and individual rights interact. In my view, where police propose to conduct surveillance of groups, as occurs with camera surveillance (including the newly developing drone camera systems)', the affected group should be heavily involved in the authorization process. If the surveillance is authorized, care must be taken to ensure that all members of the group are equally affected by it unless and until individualized suspicion, proportionate to the intrusion, develops. That formula ensures that the interests of both the collective and the individual are protected.


The Double-Helix Double-Edged Sword: Comparing Dna Retention Policies Of The United States And The United Kingdom, Erica S. Deray Jan 2011

The Double-Helix Double-Edged Sword: Comparing Dna Retention Policies Of The United States And The United Kingdom, Erica S. Deray

Vanderbilt Journal of Transnational Law

Forensic scientists have used DNA profiling technologies to link suspects to crimes since Alec Jeffreys first proposed the idea in the 1970s. Recognizing the potential for using DNA databases to solve crimes and to prevent future crimes, England and Wales attempted to greatly expand its DNA database by allowing for the collection and indefinite retention of DNA profiles from arrestees. The European Court of Human Rights, however, issued a ruling in 2008 in the case of S. & Marper v. United Kingdom, advising the United Kingdom to restrict use of DNA profiles from arrestees and to establish time frames for …


Subpoenas And Privacy, Christopher Slobogin Jan 2005

Subpoenas And Privacy, Christopher Slobogin

Vanderbilt Law School Faculty Publications

This symposium article, the first of two on regulation of government's efforts to obtain paper and digital records of our activities, analyzes the constitutional legitimacy of subpoenas. Whether issued by a grand jury or an administrative agency, subpoenas are extremely easy to enforce, merely requiring the government to demonstrate that the items sought pursuant to the subpoena are "relevant" to a investigation. Yet today subpoenas and pseudo-subpoenas are routinely used not only to obtain business records and the like, but also documents containing significant amounts of personal information about individuals, including medical, financial, and email records. Part I provides an …


Privatization Of Corrections: Is The State Out On A Limb When The Company Goes Bankrupt?, Cathy E. Holley Mar 1988

Privatization Of Corrections: Is The State Out On A Limb When The Company Goes Bankrupt?, Cathy E. Holley

Vanderbilt Law Review

The incarceration of convicted criminals is an important matter to law enforcement officials and the public at large. Institutional correctional services consume significant governmental energy and resources. In 1983 corrections, including jails, prisons, probation, and parole, cost over 10.4 billion dollars. In 1985 approximately 503,000 people were imprisoned in federal and state correctional facilities.' The provision of prison services must occur on a continuous basis, and space must be available for every convicted criminal. As certain commentators have noted, "[o]ne cannot simply let offenders wait in line for an opening."'Historically, local, state, and federal government has overseen and operated our …