Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Privacy Law

Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker Jun 2019

Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker

Articles

In Carpenter v United States, the Supreme Court struggled to modernize twentieth-century search and seizure precedents for the “Cyber Age.” Twice previously this decade the Court had tweaked Fourth Amendment doctrine to keep pace with advancing technology, requiring a search warrant before the government can either peruse the contents of a cell phone seized incident to arrest or use a GPS tracker to follow a car’s long-term movements.


The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin Murphy Feb 2013

The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin Murphy

Michigan Law Review

When criminal justice scholars think of privacy, they think of the Fourth Amendment. But lately its domain has become far less absolute. The United States Code currently contains over twenty separate statutes that restrict both the acquisition and release of covered information. Largely enacted in the latter part of the twentieth century, these statutes address matters vital to modern existence. They control police access to driver's licenses, educational records, health histories, telephone calls, email messages, and even video rentals. They conform to no common template, but rather enlist a variety of procedural tools to serve as safeguards - ranging from …


Disentangling Administrative Searches, Eve Brensike Primus Jan 2011

Disentangling Administrative Searches, Eve Brensike Primus

Articles

Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …


A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb Mar 2004

A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb

Michigan Law Review

Imagine for a moment that it is the year 2020. An American company has developed a mind-reading device, called the "brain wave recorder" ("BWR"). The BWR is a highly sensitive instrument that detects electrical impulses from any brain within ten feet of the machine. Though previously thought impossible, the BWR can discern the following information about the target individual: (1) whether he or she is happy, sad, anxious, depressed, or irritable; (2) whether he or she is even slightly sexually aroused; (3) whether he or she is taking any medication (and if so, what the medication is); (4) if a …


Katz Is Dead. Long Live Katz, Peter P. Swire Mar 2004

Katz Is Dead. Long Live Katz, Peter P. Swire

Michigan Law Review

Katz v. United States is the king of Supreme Court surveillance cases. Written in 1967, it struck down the earlier regime of property rules, declaring that "the Fourth Amendment protects people, not places." The concurrence by Justice Harlan announced the new regime - court-issued warrants are required where there is an infringement on a person's "reasonable expectation of privacy." Together with the companion case Berger v. New York, Katz has stood for a grand conception of the Fourth Amendment as a bulwark against wiretaps and other emerging forms of surveillance. Professor Orin Kerr, in his excellent article, shows that …


The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky Oct 2003

The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky

Michigan Telecommunications & Technology Law Review

I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok Jun 2000

Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok

Michigan Telecommunications & Technology Law Review

This Article argues that Web users should enjoy a legitimate expectation of privacy in clickstream data. Fourth Amendment jurisprudence as developed over the last half-century does not support an expectation of privacy. However, reference to the history of the Fourth Amendment and the intent of its drafters reveals that government investigation and monitoring of clickstream data is precisely the type of activity the Framers sought to limit. Courts must update outdated methods of expectation of privacy analysis to address the unique challenges posed by the Internet in order to fulfill the Amendment's purpose. Part I provides an overview of the …


Reconsideration Of The Katz Expectation Of Privacy Test, Michigan Law Review Nov 1977

Reconsideration Of The Katz Expectation Of Privacy Test, Michigan Law Review

Michigan Law Review

This Note, by modifying certain aspects of the reasonable expectation of privacy test, offers a theory that attempts to identify the minimum content of the fourth amendment. In the first section, the Note examines the reasonable expectation of privacy test and considers whether it has been or can be applied in a manner that fails to protect the right to have certain minimum expectations of privacy. It analyzes both the "actual" and the "reasonable" expectation requirements, identifies weaknesses inherent in the current application of these requirements, and suggests certain ways in which they might be refined. In the second section, …


The Concept Of Privacy And The Fourth Amendment, Steven C. Douse Jan 1972

The Concept Of Privacy And The Fourth Amendment, Steven C. Douse

University of Michigan Journal of Law Reform

This Article attempts at a minimum to offer a common background and frame of reference for defining and comparing myriad facets of the law. If successful, they furnish a model for the integration of these many facets. This inquiry begins with an examination of the proposition that the essence of the fourth amendment is protection of a right of privacy. The concept of privacy is then defined and elaborated, both without and within the constitutional context. These conclusions are further extended in an exploration of mechanisms for defining the invasions and protection of fourth amendment privacy.