Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   15  
      Information TechnologyCriminal LawConstitutional LawTerrorism
    • by 
    •   16  
      Information SystemsConstitutional LawInformation SecurityFacial Recognition
Table of ContentsI. Introduction 1506II. Background Law 1510A. The Exclusionary Rule 1510B. The Fruit-of-the-Poisonous-Tree Doctrine 1512C. The Good-Faith Exception 1513III. Problem at Issue 1515A. Circuits That Have Held the Good-Faith... more
    • by 
    •   2  
      SociologyFourth Amendment
    • by 
    •   18  
      LawConstitutional LawRhetoricHuman Rights Law
The right to privacy has been a longstanding source of contention in the United States. The Constitution does not make claim to such a right per se. However, the Bill of Rights makes specific claims to privacy. The ambiguity and necessity... more
    • by 
    •   4  
      Constitutional LawHuman RightsComparative Constitutional LawFourth Amendment
No Arkansas appellate court has examined the constitutionality of the recently enacted House Bill 1473 – better known as “Juli’s Law” – which allows officers to take DNA samples from suspects arrested for capital murder, murder in the... more
    • by 
    •   11  
      Criminal LawCriminal ProcedureConstitutional LawDNA
This report offers a framework to reason through the very real risks that face recognition use by police creates. It urges Congress and state legislatures to address these risks through commonsense regulation comparable to the Wiretap... more
    • by 
    •   4  
      Face RecognitionSurveillancePrivacy (Law)Fourth Amendment
    • by 
    •   4  
      PoliceFourth Amendment4th Amendment RightsCriminal Procedural Law
    • by 
    •   6  
      PolicePolice ReformCase lawFourth Amendment
This chapter is a reexamination of the Writs of Assistance speech by James Otis. In particular, it is a reconsideration of the evidence upon which rests the historical reputation of Otis’s address. Are the claims by historians who... more
    • by 
    •   17  
      American HistoryAdmiralty LawRhetoricColonial America
This chapter is a reexamination of the Writs of Assistance speech by James Otis. In particular, it is a reconsideration of the evidence upon which rests the historical reputation of Otis’s address. Are the claims by historians who... more
    • by 
    •   17  
      American HistoryAdmiralty LawRhetoricColonial America
The officer walking the beat has numerous tools at her disposal to effectuate a warrantless search, the most popular of which is the consent search. Academics, courts, and the public appear skeptical of current consent search practices;... more
    • by 
    •   9  
      Constitutional LawPoliceConsentprivacy, search and seizure, Constitutional Law
Considerable disagreement persists as to the fourth amendment rights of students within schools. Particularly, this disagreement regards the extent to which fourth amendment rights possessed by students may frustrate reasonable attempts... more
    • by 
    •   11  
      EducationFourth AmendmentStudent PrivacyState Interest
On October 31, 2013—just days before New York City’s mayoral election—three federal appellate judges, José A. Cabranes, John M. Walker, Jr., and Barrington D. Parker, Jr., hastily issued an unusual order staying two major decisions by... more
    • by 
    •   7  
      PoliceJudicial independenceEqualityThe role of the judiciary
In this Essay, I focus on a case study of policing in Harlem to make a larger argument regarding privacy rights, the changing landscape of social media as a medium for private assembly, and the perpetuation of discriminatory practices by... more
    • by 
    •   7  
      PrivacyFirst Amendment Law (USA)Race Relations of Communities of ColorInformation Security and Privacy
The much-discussed Arizona immigration statute, SB 1070, continues an effort – this time at the legislative level – to broaden the discretionary power of law enforcement. Yet, a fascinating question lies at the base of the public’s... more
    • by 
    •   7  
      Criminal LawCriminal ProcedureImmigrationUndocumented Immigration
    • by 
    •   7  
      Criminal ProcedurePrivacyImmigrationImmigration Law
    • by 
    • Fourth Amendment
Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third... more
    • by 
    •   4  
      PrivacyInformation Technology LawSurveillanceFourth Amendment
    • by 
    •   4  
      PrivacyPrivacy and data protectionFourth AmendmentLocation Tracking
Marshall, Secretary of Labor, Et Al. V. Barlow’s, Inc (1978)
Secretary of Labor v. SeaWorld of Florida, LLC, 2011
Secretary of Labor v. Wal-Mart Stores, 2011
    • by 
    •   11  
      Occupational Health & SafetyU.S. Supreme Court LitigationFourth AmendmentOsha
Across the Web, consumers annually share double the information they did the year before. Use of smartphones, wireless, email, and other technologies is also growing exponentially. The U.S. government and businesses can do things that... more
    • by 
    •   3  
      PrivacyRule of LawFourth Amendment
This article operates at the intersection of privacy law, Fourth Amendment doctrine, and public health policy instigated by the United States drug overdose epidemic. Reputable reporting sources, public health scholars, and pundits... more
    • by 
    •   5  
      PrivacyPublic HealthPrivacy and data protectionFourth Amendment
The importance of the door for human civilization cannot be overstated. In various cultures, the door has been a central technology for negotiating the distinction between inside and outside, private and public, and profane and sacred. By... more
    • by 
    •   7  
      Criminal ProcedureLiminalityPolice powersFourth Amendment
    • by 
    •   8  
      Criminal ProcedureConstitutional LawHuman RightsImmigration
National security intelligence collection is defined by secrecy and covert data collection. Methods of data collection and processing have developed rapidly along with advances in technology and data encryption. Activities undertaken by... more
    • by 
    •   6  
      Constitutional LawMilitary IntelligenceIntelligence StudiesJudicial Politics
This paper introduces a symposium, published in Volume 10, Issue 2 of I/S: A Journal of Law and Policy for the Information Society, entitled, "NSA Surveillance: Security, Privacy, and Civil Liberty," which is available at... more
    • by 
    •   6  
      Presidency (American Politics)U.S. PresidencyIntelligence and EspionageNational Security
This article operates at the intersection of privacy law, Fourth Amendment doctrine, and public health realities triggered by the United States drug overdose epidemic. Reputable reporting sources, public health scholars, and pundits... more
    • by 
    •   6  
      PrivacyPublic HealthPrivacy (Law)Data Privacy
My pro se civil rights lawsuit, Second Amended Complaint.
    • by 
    •   8  
      Criminal LawU.S. law and public policy; civil rights and civil libertiesCivil ProcedureExclusionary Rule
    • by 
    •   10  
      Criminal LawComparative LawConstitutional LawFourth Amendment
In addition to “persons, houses, [and] papers,” the Constitution protects individuals against unreasonable searches and seizures of “effects.” However, “effects” have received considerably less attention than the rest of the categories in... more
    • by 
    •   4  
      Criminal ProcedureLegal HistoryFourth AmendmentPersonal property
No Arkansas appellate court has examined the constitutionality of the recently enacted House Bill 1473 – better known as “Juli’s Law” – which allows officers to take DNA samples from suspects arrested for capital murder, murder in the... more
    • by 
    •   4  
      DNAFourth AmendmentDNA samplingArrestee Sampling
This article raises some issues about the last years when Obama has successfully tried to destroy our country. He covered up for executive agencies, he distributed pork to his supporters and generally increased the national debt. He has... more
    • by 
    •   7  
      Second amendmentImpeachmentObamaFourth Amendment
Smart home device Amazon Echo, equipped with a voice assistant named Alexa, is a new ear within the home, gathering previously inaccessible sounds of the domestic sphere. Devices such as Echo are constantly 'on' and listening, but whether... more
    • by 
    •   7  
      Sound studiesSurveillance StudiesCopyright (Law)Neoliberalism
The Fourth Amendment protects us against unreasonable seizures and the Eighth Amendment protects us from cruel and unusual punishment. Because the use of deadly force is more akin to punishment than seizure, this comment advocates for... more
    • by 
    •   7  
      Criminal JusticeConstitutional LawCivil RightsLaw Enforcement
    • by 
    •   5  
      Constitutional LawFourth AmendmentWarrantless SearchSearch and seizures
This chapter analyzes the privacy, intellectual property, competition policy, and human rights law implications of the rise of Facebook and the threat of a natural monopoly in social networking. Facebook instructed its users that it may... more
    • by 
    •   16  
      Information SecurityPrivacyKnowledge sharingSurveillance Studies
    • by 
    •   2  
      Racial ProfilingFourth Amendment
    • by 
    •   2  
      Constitutional LawFourth Amendment
In Bostick and Drayton, the Supreme Court announced that per se rules were inappropriate in answering the Fourth Amendment seizure question, “Would a reasonable citizen feel free to leave?” But when, if ever, can one factor in a... more
    • by 
    •   8  
      LawCriminal LawCriminal ProcedureJurisprudence
    • by 
    •   2  
      National Security LawFourth Amendment
    • by 
    •   20  
      LawCriminal LawCriminal ProcedureJurisprudence
Because many low-level crimes rarely, if ever, serve as the basis for charges in a criminal case that is seriously litigated, they have long been beyond the reach of the vagueness doctrine, even though many may in fact be... more
    • by 
    •   6  
      Criminal LawCriminal ProcedureCriminal JusticeConstitutional Law
    • by  and +1
    •   6  
      Exclusionary RuleFourth AmendmentPosse Comitatus1878 Posse Comitatus Act
    • by 
    • Fourth Amendment
    • by 
    •   20  
      LawJurisprudenceTechnologyFacial Recognition
    • by 
    •   19  
      LawCriminal LawCriminal JusticeRace and Racism
    • by 
    •   10  
      PrivacyPolitical SciencePublic HealthSocial Science Research Network
A new era of criminal investigation has dawned in which decades-old cold cases are being solved through the forensic use of consumer genetic databases. Law enforcement increasingly harnesses the power of these databases to which... more
    • by 
    •   3  
      GeneticsSurveillance StudiesFourth Amendment