-
1
-
-
77955767765
-
-
note
-
See, e.g., Ronald Jay Allen et al., Comprehensive Criminal Procedure 337 (3d ed. 2011) (describing the Fourth Amendment as "the law's chief source of privacy protec tion"). Of course, it was not until the mid-nineteenth century that a criminal justice system even remotely resembling our own (in terms of professionalized police, public prosecutors, et cetera) came into being, and federal law enforcement was all but nonexistent until the early 1900s.
-
(2011)
Comprehensive Criminal Procedure
, pp. 337
-
-
Allen, R.J.1
-
2
-
-
84873127951
-
Wolf v. Colorado
-
Wolf v. Colorado, 338 U.S. 25 (1949)
-
(1949)
U.S.
, vol.338
, pp. 25
-
-
-
3
-
-
77954979256
-
Mapp v. Ohio
-
Mapp v. Ohio, 367 U.S. 643 (1961).
-
(1961)
U.S.
, vol.367
, pp. 643
-
-
-
21
-
-
84873156873
-
-
note
-
Appendix, and a helpful compendium of federal privacy laws can be found online at Ctr. for Democracy & Tech., Existing Federal Privacy Laws, https://www.cdt.org/ privacy/guide/protect/laws.php (last visited Oct. 12, 2012). As this list suggests, the focus of this Article is privacy as regards criminal investigations, not the acquisition or release of criminal justice data (like "rap sheets" or conviction records), or general consumer privacy (like "Do Not Call" statutes).
-
Existing Federal Privacy Laws
-
-
-
22
-
-
0347358112
-
Privacy and Democracy in Cyberspace
-
Paul M. Schwartz, Privacy and Democracy in Cyberspace, 52 Vand. L. Rev. 1609, 1632-33 (1999).
-
(1999)
Vand. L. Rev.
, vol.52
-
-
Schwartz, P.M.1
-
23
-
-
84872446343
-
Winston v. Lee
-
note
-
But see Winston v. Lee, 470 U.S. 753, 766 (1985) (finding that the Constitution prohibits extraction of embedded bullet via compelled anesthetized surgery).
-
(1985)
U.S.
, vol.470
-
-
-
24
-
-
33947416337
-
Katz v. United States
-
note
-
Katz v. United States, 389 U.S. 347, 360 (1967).
-
(1967)
U.S.
, vol.389
-
-
-
25
-
-
80955159460
-
The Case Against the Case for Third-Party Doctrine: A Response to Epstein and Kerr
-
E.g., Erin Murphy, The Case Against the Case for Third-Party Doctrine: A Response to Epstein and Kerr, 24 Berkeley Tech. L.J. 1239 (2009).
-
(2009)
Berkeley Tech. L.J.
, vol.24
, pp. 1239
-
-
Murphy, E.1
-
26
-
-
84871524994
-
Home, Home on the Web and Other Fourth Amendment Implications of Technosocial Change
-
E.g., Katherine J. Strandburg, Home, Home on the Web and Other Fourth Amendment Implications of Technosocial Change, 70 Md. L. Rev. 614 (2011).
-
(2011)
Md. L. Rev.
, vol.70
, pp. 614
-
-
Strandburg, K.J.1
-
28
-
-
84881875524
-
The New Legal Process, the Synthesis of Discourse, and the Microanalysis of Institutions
-
This debate resonates beyond criminal justice, of course, see, e.g., Edward L. Rubin, The New Legal Process, the Synthesis of Discourse, and the Microanalysis of Institutions, 109 Harv. L. Rev. 1393 (1996) (summarizing literature and history), but the literature tailored to criminal justice specifically is itself quite rich. Apart from the institutional questions, there are also long-standing debates along the rules-versus-standards line, among other questions.
-
(1996)
Harv. L. Rev.
, vol.109
, pp. 1393
-
-
Rubin, E.L.1
-
29
-
-
0347578977
-
Bright Line Fever and the Fourth Amendment
-
note
-
See, e.g., Albert W. Alschuler, Bright Line Fever and the Fourth Amendment, 45 U. Pitt. L. Rev. 227 (1984).
-
(1984)
U. Pitt. L. Rev.
, vol.45
, pp. 227
-
-
Alschuler, A.W.1
-
31
-
-
84925873560
-
Implicit Bargains, Government Power, and the Fourth Amendment
-
William J. Stuntz, Implicit Bargains, Government Power, and the Fourth Amendment, 44 Stan. L. Rev. 553 (1992)
-
(1992)
Stan. L. Rev.
, vol.44
, pp. 553
-
-
Stuntz, W.J.1
-
32
-
-
0345807564
-
The Pathological Politics of Criminal Law
-
William J. Stuntz, The Pathological Politics of Criminal Law, 100 Mich. L. Rev. 505 (2001)
-
(2001)
Mich. L. Rev.
, vol.100
, pp. 505
-
-
Stuntz, W.J.1
-
33
-
-
32044450366
-
The Political Constitution of Criminal Justice
-
note
-
William J. Stuntz, The Political Constitution of Criminal Justice, 119 Harv. L. Rev. 780 (2006).
-
(2006)
Harv. L. Rev.
, vol.119
, pp. 780
-
-
Stuntz, W.J.1
-
34
-
-
0041873845
-
The Uneasy Relationship Between Criminal Procedure and Criminal Justice
-
William J. Stuntz, The Uneasy Relationship Between Criminal Procedure and Criminal Justice, 107 Yale L.J. 1 (1997)
-
(1997)
Yale L.J.
, vol.107
, pp. 1
-
-
Stuntz, W.J.1
-
35
-
-
47349121009
-
Unequal Justice
-
William J. Stuntz, Unequal Justice, 121 Harv. L. Rev. 1969 (2008).
-
(2008)
Harv. L. Rev.
, vol.121
, pp. 1969
-
-
Stuntz, W.J.1
-
36
-
-
84860814184
-
Killer Seatbelts and Criminal Procedure
-
note
-
See, e.g., David Alan Sklansky, Response, Killer Seatbelts and Criminal Procedure, 119 Harv. L. Rev. F. 56 (2006).
-
(2006)
Harv. L. Rev. F.
, vol.119
, pp. 56
-
-
Sklansky, D.A.1
-
37
-
-
84873121830
-
First Causes and the Dynamics of Criminal Justice
-
note
-
Robert Weisberg, Response, First Causes and the Dynamics of Criminal Justice, 119 Harv. L. Rev. F. 131 (2006).
-
(2006)
Harv. L. Rev. F.
, vol.119
, pp. 131
-
-
Weisberg, R.1
-
38
-
-
8744289773
-
The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution
-
See Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Mich. L. Rev. 801, 805, 857-87 (2004).
-
(2004)
Mich. L. Rev.
, vol.102
-
-
Kerr, O.S.1
-
39
-
-
8744289773
-
The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution
-
See Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Mich. L. Rev. 801, 805, 857-87 (2004).
-
(2004)
Mich. L. Rev.
, vol.102
-
-
Kerr, O.S.1
-
40
-
-
29544443054
-
Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference
-
note
-
Professor Kerr's analysis was most directly addressed in Daniel J. Solove, Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference, 74 Fordham L. Rev. 747, 748, 760-77 (2005), but a handful of other scholars have also weighed in on specific aspects of this debate.
-
(2005)
Fordham L. Rev.
, vol.74
-
-
Solove, D.J.1
-
41
-
-
84865314966
-
Designing Surveillance Law
-
Patricia L. Bellia, Designing Surveillance Law, 43 Ariz. St. L.J. 293 (2011)
-
(2011)
Ariz. St. L.J.
, vol.43
, pp. 293
-
-
Bellia, P.L.1
-
43
-
-
8744289773
-
The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution
-
See Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Mich. L. Rev. 801, 805, 857-87 (2004).
-
(2004)
Mich. L. Rev.
, vol.102
-
-
Kerr, O.S.1
-
44
-
-
84871911217
-
Constitutional Theory for Criminal Procedure: Dickerson, Miranda, and the Continuing Quest for Broad-but-Shallow
-
See, e.g., Donald A. Dripps, Constitutional Theory for Criminal Procedure: Dickerson, Miranda, and the Continuing Quest for Broad-but-Shallow, 43 Wm. & Mary L. Rev. 1, 4 (2001)
-
(2001)
Wm. & Mary L. Rev.
, vol.43
-
-
Dripps, D.A.1
-
45
-
-
84860814184
-
Killer Seatbelts and Criminal Procedure
-
note
-
See, e.g., David Alan Sklansky, Response, Killer Seatbelts and Criminal Procedure, 119 Harv. L. Rev. F. 56 (2006).
-
(2006)
Harv. L. Rev. F.
, vol.119
, pp. 56
-
-
Sklansky, D.A.1
-
46
-
-
29544443054
-
Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference
-
note
-
Professor Kerr's analysis was most directly addressed in Daniel J. Solove, Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference, 74 Fordham L. Rev. 747, 748, 760-77 (2005), but a handful of other scholars have also weighed in on specific aspects of this debate.
-
(2005)
Fordham L. Rev.
, vol.74
-
-
Solove, D.J.1
-
47
-
-
84888229417
-
Correspondence, Katz is Dead. Long Live Katz
-
Peter P. Swire, Correspondence, Katz is Dead. Long Live Katz., 102 Mich. L. Rev. 904, 913-14, 919-20 (2004).
-
(2004)
Mich. L. Rev.
, vol.102
-
-
Swire, P.P.1
-
48
-
-
84860814184
-
Killer Seatbelts and Criminal Procedure
-
note
-
See, e.g., David Alan Sklansky, Response, Killer Seatbelts and Criminal Procedure, 119 Harv. L. Rev. F. 56 (2006).
-
(2006)
Harv. L. Rev. F.
, vol.119
, pp. 56
-
-
Sklansky, D.A.1
-
49
-
-
84888229417
-
Correspondence, Katz is Dead. Long Live Katz
-
Peter P. Swire, Correspondence, Katz is Dead. Long Live Katz., 102 Mich. L. Rev. 904, 913-14, 919-20 (2004).
-
(2004)
Mich. L. Rev.
, vol.102
-
-
Swire, P.P.1
-
50
-
-
84871917112
-
-
132 S. Ct. 945 (2012).
-
(2012)
S. Ct.
, vol.132
, pp. 945
-
-
-
51
-
-
84866644864
-
Kyllo v. United States
-
note
-
The last major pronouncement along these lines was in Kyllo v. United States, 533 U.S. 27 (2001). But that case, which involved heat sensors used on the exterior of a building, lacked the analogic and rhetorical potential of a case involving GPS trackers, which is more readily likened to a broad range of surveillance technologies.
-
(2001)
U.S.
, vol.533
, pp. 27
-
-
-
52
-
-
84873132776
-
Jones
-
note
-
See, e.g., Jones, 132 S. Ct. at 957 (Alito, J., concurring in the judgment) ("Ironically, the Court has chosen to decide this case based on 18th-century tort law. ").
-
S. Ct.
, vol.132
, pp. 957
-
-
-
53
-
-
8744289773
-
The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution
-
See Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Mich. L. Rev. 801, 805, 857-87 (2004).
-
(2004)
Mich. L. Rev.
, vol.102
-
-
Kerr, O.S.1
-
54
-
-
84873135193
-
Regulating the Use and Sharing of Energy Consumption Data: Assessing California's SB 1476 Smart Meter Privacy Statute
-
note
-
For example, states have enacted omnibus data-breach-notification provisions, state privacy torts, trade secrets provisions, rape shield laws, and so forth, none of which are addressed in this Article. California, in particular, has been considered a leader in the area of state privacy legislation. John R. Forbush, Comment, Regulating the Use and Sharing of Energy Consumption Data: Assessing California's SB 1476 Smart Meter Privacy Statute, 75 Alb. L. Rev. 341, 353-54 (2011-12) ("California is the first state to have an office dedicated solely to protecting consumer privacy and the state has been a leader in passing privacy protection statutes that go beyond the minimum 'floor' protections set out in various federal laws. ").
-
(2011)
Alb. L. Rev.
, vol.75
-
-
Forbush, J.R.1
-
55
-
-
84873135193
-
Regulating the Use and Sharing of Energy Consumption Data: Assessing California's SB 1476 Smart Meter Privacy Statute
-
note
-
For example, states have enacted omnibus data-breach-notification provisions, state privacy torts, trade secrets provisions, rape shield laws, and so forth, none of which are addressed in this Article. California, in particular, has been considered a leader in the area of state privacy legislation. John R. Forbush, Comment, Regulating the Use and Sharing of Energy Consumption Data: Assessing California's SB 1476 Smart Meter Privacy Statute, 75 Alb. L. Rev. 341, 353-54 (2011-12) ("California is the first state to have an office dedicated solely to protecting consumer privacy and the state has been a leader in passing privacy protection statutes that go beyond the minimum 'floor' protections set out in various federal laws. ").
-
(2011)
Alb. L. Rev.
, vol.75
-
-
Forbush, J.R.1
-
56
-
-
84873103260
-
-
note
-
Although national security is, of course, a form of "law enforcement" (and concededly, one that often interlaces with domestic law enforcement), I find that the peculiarities of both law and policy with regard to national security are difficult to see beyond once they are introduced. Therefore, I have omitted those provisions in order to bring the purely domestic issues into unobstructed view.
-
-
-
-
59
-
-
29544443054
-
Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference
-
note
-
Professor Kerr's analysis was most directly addressed in Daniel J. Solove, Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference, 74 Fordham L. Rev. 747, 748, 760-77 (2005), but a handful of other scholars have also weighed in on specific aspects of this debate.
-
(2005)
Fordham L. Rev.
, vol.74
-
-
Solove, D.J.1
-
64
-
-
8744289773
-
The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution
-
See Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Mich. L. Rev. 801, 805, 857-87 (2004).
-
(2004)
Mich. L. Rev.
, vol.102
-
-
Kerr, O.S.1
-
65
-
-
23844549426
-
Roe v. Wade
-
See, e.g., Roe v. Wade, 410 U.S. 113 (1973)
-
(1973)
U.S.
, vol.410
, pp. 113
-
-
-
66
-
-
33947433798
-
Eisenstadt v. Baird
-
Eisenstadt v. Baird, 405 U.S. 438 (1972).
-
(1972)
U.S.
, vol.405
, pp. 438
-
-
-
67
-
-
15744361838
-
Griswold v. Connecticut
-
Griswold v. Connecticut, 381 U.S. 479 (1965).
-
(1965)
U.S.
, vol.381
, pp. 479
-
-
-
68
-
-
33947389408
-
NAACP v. Alabama ex rel. Patterson
-
NAACP v. Alabama ex rel. Patterson, 357 U.S. 449 (1958).
-
(1958)
U.S.
, vol.357
, pp. 449
-
-
-
69
-
-
34047274169
-
Access and Aggregation: Public Records, Privacy and the Constitution
-
See, e.g., Daniel J. Solove, Access and Aggregation: Public Records, Privacy and the Constitution, 86 Minn. L. Rev. 1137, 1164-65 (2002).
-
(2002)
Minn. L. Rev.
, vol.86
-
-
Solove, D.J.1
-
70
-
-
1542401733
-
An Introduction to Privacy in Economics and Politics
-
George J. Stigler, An Introduction to Privacy in Economics and Politics, 9 J. Legal Stud. 623, 633 (1980).
-
(1980)
J. Legal Stud.
, vol.9
-
-
Stigler, G.J.1
-
71
-
-
84873127309
-
-
note
-
Privacy Prot. Study Comm'n, Personal Privacy in an Information Society (1977). The report offered a comprehensive assessment of the state of individual privacy rights and recordkeeping practices across a range of environments, with special emphasis on the private sector.
-
-
-
-
72
-
-
29544443054
-
Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference
-
note
-
Professor Kerr's analysis was most directly addressed in Daniel J. Solove, Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference, 74 Fordham L. Rev. 747, 748, 760-77 (2005), but a handful of other scholars have also weighed in on specific aspects of this debate.
-
(2005)
Fordham L. Rev.
, vol.74
-
-
Solove, D.J.1
-
73
-
-
0003889357
-
-
note
-
The earliest common law privacy torts reflected the private nature of these concerns, with rights of action created for public disclosure of private facts, intrusion upon seclusion, false light, and appropriation-all of which seem most concerned with private or commercial exploitation of confidences. See Restatement (Second) of Torts §§ 652B-652E (1977).
-
(1977)
Restatement (Second) of Torts
-
-
-
74
-
-
0347358112
-
Privacy and Democracy in Cyberspace
-
Paul M. Schwartz, Privacy and Democracy in Cyberspace, 52 Vand. L. Rev. 1609, 1632-33 (1999).
-
(1999)
Vand. L. Rev.
, vol.52
-
-
Schwartz, P.M.1
-
75
-
-
79751519568
-
Privacy on the Books and on the Ground
-
note
-
Kenneth A. Bamberger & Deirdre K. Mulligan, Privacy on the Books and on the Ground, 63 Stan. L. Rev. 247, 250-51 (2011) (comparing American model with the "model of protection adopted throughout Europe: omnibus [Fair Information Practices Principles]-based privacy principles in law or binding codes, interpreted and monitored by... [an] independent privacy agency").
-
(2011)
Stan. L. Rev.
, vol.63
-
-
Bamberger, K.A.1
Mulligan, D.K.2
-
76
-
-
84873103097
-
-
note
-
The major exception to this rule, however, is the Privacy Act, which is a form of an omnibus protection.
-
-
-
-
77
-
-
84873201132
-
-
note
-
See generally Fred H. Cate, Privacy in the Information Age 80 (1997) (describing American law as "a patchwork of uneven, inconsistent, and often irrational" federal and state rules).
-
(1997)
Privacy in the Information Age
, vol.80
-
-
Cate, F.H.1
-
78
-
-
79751519568
-
Privacy on the Books and on the Ground
-
note
-
Kenneth A. Bamberger & Deirdre K. Mulligan, Privacy on the Books and on the Ground, 63 Stan. L. Rev. 247, 250-51 (2011) (comparing American model with the "model of protection adopted throughout Europe: omnibus [Fair Information Practices Principles]-based privacy principles in law or binding codes, interpreted and monitored by... [an] independent privacy agency").
-
(2011)
Stan. L. Rev.
, vol.63
-
-
Bamberger, K.A.1
Mulligan, D.K.2
-
79
-
-
79751519568
-
Privacy on the Books and on the Ground
-
note
-
Kenneth A. Bamberger & Deirdre K. Mulligan, Privacy on the Books and on the Ground, 63 Stan. L. Rev. 247, 250-51 (2011) (comparing American model with the "model of protection adopted throughout Europe: omnibus [Fair Information Practices Principles]-based privacy principles in law or binding codes, interpreted and monitored by... [an] independent privacy agency").
-
(2011)
Stan. L. Rev.
, vol.63
-
-
Bamberger, K.A.1
Mulligan, D.K.2
-
85
-
-
84873167392
-
-
note
-
It was not clear at the time the DNA Act was enacted that this was the case, although precedent strongly suggested that collection of DNA from individuals-even convicted felons-would implicate Fourth Amendment interests.
-
-
-
-
86
-
-
78751647463
-
Smith v. Maryland
-
See Smith v. Maryland, 442 U.S. 735 (1979).
-
(1979)
U.S.
, vol.442
, pp. 735
-
-
-
87
-
-
77249131620
-
United States v. Miller
-
United States v. Miller, 425 U.S. 435 (1976).
-
(1976)
U.S.
, vol.425
, pp. 435
-
-
-
88
-
-
77249131620
-
Miller
-
note
-
See, e.g., Miller, 425 U.S. at 435.
-
U.S.
, vol.425
, pp. 435
-
-
-
89
-
-
77249131620
-
Miller
-
note
-
See, e.g., Miller, 425 U.S. at 435.
-
U.S.
, vol.425
, pp. 435
-
-
-
90
-
-
77249131620
-
Miller
-
note
-
See, e.g., Miller, 425 U.S. at 435.
-
U.S.
, vol.425
, pp. 435
-
-
-
91
-
-
84873176900
-
Zurcher v. Stanford Daily
-
note
-
Zurcher v. Stanford Daily, 436 U.S. 547, 565 (1978), prompted passage of the PPA.
-
(1978)
U.S.
, vol.436
-
-
-
92
-
-
84873176900
-
Zurcher v. Stanford Daily
-
note
-
Zurcher v. Stanford Daily, 436 U.S. 547, 565 (1978), prompted passage of the PPA.
-
(1978)
U.S.
, vol.436
-
-
-
93
-
-
84873154923
-
-
note
-
For example, the DPPA was passed after it came to light that actress Rebecca Schaeffer had been murdered by a stalker who had easily obtained her address from the Department of Motor Vehicles. See 140 Cong. Rec. 7924-25 (1994) (statement of Rep. Moran).
-
(1994)
Cong. Rec.
, vol.140
, pp. 7924-7925
-
-
-
95
-
-
79955881467
-
-
note
-
S. Rep. No. 93-1183, at 4 (1974), reprinted in 1974 U.S.C.C.A.N. 6916, 6919.
-
(1974)
S. Rep. No. 93-1183
, pp. 4
-
-
-
96
-
-
0034727944
-
Standards for Privacy of Individually Identifiable Health Information
-
note
-
Standards for Privacy of Individually Identifiable Health Information, 65 Fed. Reg. 82,462, 82,465 (Dec. 28, 2000) ("This ease of information collection, organization, retention, and exchange made possible by the advances in computer and other electronic technology affords many benefits to individuals and to the health care industry. ").
-
(2000)
Fed. Reg.
, vol.65
-
-
-
97
-
-
0347020552
-
Opportunity Lost: Why and How to Improve the HHS-Proposed Legislation Governing Law Enforcement Access to Medical Records
-
Peter H.W. van der Goes, Jr., Comment, Opportunity Lost: Why and How to Improve the HHS-Proposed Legislation Governing Law Enforcement Access to Medical Records, 147 U. Pa. L. Rev. 1009, 1012 (1999).
-
(1999)
U. Pa. L. Rev.
, vol.147
-
-
van der Goes Jr., P.H.W.1
-
98
-
-
33644654715
-
Privacy Rights in Personal Information: HIPAA and the Privacy Gap Between Fundamental Privacy Rights and Medical Information
-
Kevin B. Davis, Privacy Rights in Personal Information: HIPAA and the Privacy Gap Between Fundamental Privacy Rights and Medical Information, 19 J. Marshall J. Computer & Info. L. 535, 536 (2001).
-
(2001)
J. Marshall J. Computer & Info. L.
, vol.19
-
-
Davis, K.B.1
-
99
-
-
84873108835
-
The Nationalization of Health Information Privacy Protections
-
Lawrence O. Gostin et al., The Nationalization of Health Information Privacy Protections, 8 Conn. Ins. L.J. 283, 286 (2002).
-
(2002)
Conn. Ins. L.J.
, vol.8
-
-
Gostin, L.O.1
-
100
-
-
84873164781
-
The Right to Financial Privacy Act of 1978-The Congressional Response to United States v. Miller: A Procedural Right to Challenge Government Access to Financial Records
-
See Nancy M. Kirschner, The Right to Financial Privacy Act of 1978-The Congressional Response to United States v. Miller: A Procedural Right to Challenge Government Access to Financial Records, 13 U. Mich. J.L. Reform 10, 24 (1979).
-
(1979)
U. Mich. J.L. Reform
, vol.13
-
-
Kirschner, N.M.1
-
101
-
-
84873206536
-
Protecting Drive [sic] Privacy: Hearing on H.R. 3365 Before the Subcomm. on Civil and Constitutional Rights of the H. Comm. on the Judiciary
-
note
-
Passage of the DPPA was prompted by a series of high-profile cases in which stalkers or other criminal offenders obtained access to personal information of potential victims through routine inquiries at state departments of motor vehicles; this concern was heightened by the perception that a lucrative financial market existed for states to sell such information to private entities. See, e.g., Protecting Drive [sic] Privacy: Hearing on H.R. 3365 Before the Subcomm. on Civil and Constitutional Rights of the H. Comm. on the Judiciary, 103d Cong. (1994) (statement of Janlori Goldman, Director, Privacy and Technology Project, American Civil Liberties Union), available at 1994 WL 212813.
-
(1994)
103d Cong.
-
-
-
102
-
-
84873172319
-
-
note
-
FERPA "was perceived as a parental rights bill designed to halt government intrusion, " and its primary sponsor, Senator Buckley, "noted that the Watergate revelations had emphasized the dangers of government data gathering and the abuse of personal files. " Ellen M. Bush, The Buckley Amendment and Campus Police Reports (Aug. 8, 1992) (unpublished student conference paper), microformed on ERIC No. ED 351 677 (U.S. Dep't of Educ.).
-
(1992)
The Buckley Amendment and Campus Police Reports
-
-
Bush, E.M.1
-
103
-
-
84873168535
-
-
note
-
See, e.g., CAN-SPAM Act of 2003, 15 U.S.C. §§ 7701-7713 (2006) (creating penalties for bulk junk email).
-
(2006)
CAN-SPAM Act of 2003, 15 U.S.C.
-
-
-
106
-
-
84873204166
-
-
note
-
see also Gramm-Leach-Bliley Act, 15 U.S.C. §§ 6801-6809 (2006 & Supp. V 2011) (regulating the disclosure of data by financial institutions, among other things).
-
(2006)
Gramm-Leach-Bliley Act, 15 U.S.C.
-
-
-
107
-
-
84873142017
-
-
note
-
Children's Online Privacy Protection Act of 1998, 15 U.S.C. §§ 6501-6506 (2006) (passed specifically to deal with private entities' collection and exploitation of information about children's activities online).
-
(2006)
Children's Online Privacy Protection Act of 1998, 15 U.S.C.
-
-
-
108
-
-
84873133228
-
-
note
-
Video Voyeurism Prevention Act of 2004, 18 U.S.C. § 1801 (2006) (targeted exclusively at criminalizing "upskirt" images). The statutory language reveals a particular focus on technological means of recording-covering "videotape, photograph, film, record... or broadcast. "
-
(2006)
Video Voyeurism Prevention Act of 2004, 18 U.S.C.
-
-
-
109
-
-
80052783907
-
The Bork Tapes
-
note
-
Michael Dolan, The Bork Tapes, Wash. City Paper, Sept. 25-Oct. 1, 1987, reproduced at http://www.theamericanporch.com/bork2.htm.
-
(1987)
Wash. City Paper
, pp. 1
-
-
Dolan, M.1
-
110
-
-
80052783907
-
The Bork Tapes
-
note
-
Michael Dolan, The Bork Tapes, Wash. City Paper, Sept. 25-Oct. 1, 1987, reproduced at http://www.theamericanporch.com/bork2.htm.
-
(1987)
Wash. City Paper
, pp. 1
-
-
Dolan, M.1
-
111
-
-
80052783907
-
The Bork Tapes
-
note
-
Michael Dolan, The Bork Tapes, Wash. City Paper, Sept. 25-Oct. 1, 1987, reproduced at http://www.theamericanporch.com/bork2.htm.
-
(1987)
Wash. City Paper
, pp. 1
-
-
Dolan, M.1
-
112
-
-
80052783907
-
The Bork Tapes
-
note
-
Michael Dolan, The Bork Tapes, Wash. City Paper, Sept. 25-Oct. 1, 1987, reproduced at http://www.theamericanporch.com/bork2.htm.
-
(1987)
Wash. City Paper
, pp. 1
-
-
Dolan, M.1
-
113
-
-
84873160820
-
Maryland v. Macon
-
note
-
Maryland v. Macon, 472 U.S. 463, 466, 469 (1985) (rejecting heightened scrutiny for police officer's purchase of magazine from bookstore).
-
(1985)
U.S.
, vol.472
-
-
-
114
-
-
84873176900
-
Zurcher v. Stanford Daily
-
note
-
Zurcher v. Stanford Daily, 436 U.S. 547, 565-66 (1978) (rejecting argument for higher standard to seize material from newspaper office). But cf. In re Grand Jury Subpoena to Kramerbooks & Afterwords, Inc., 26 Media L. Rep. (BNA) 1599, 1601 (D.D.C. 1998) (finding First Amendment interests superseded government interest in gaining access to patron's records).
-
(1978)
U.S.
, vol.436
-
-
-
115
-
-
84873146092
-
Effective Reader Privacy for Electronic Books: A Proposal
-
note
-
Jennifer Elmore, Note, Effective Reader Privacy for Electronic Books: A Proposal, 34 Hastings Comm. & Ent. L.J. 127, 130-32 (2011). It may be that the lack of consensus about the library-records provision signaled the preference of privacy-protective legislators to leave the area untouched rather than explicity craft a law enforcement exemption.
-
(2011)
Hastings Comm. & Ent. L.J.
, vol.34
-
-
Elmore, J.1
-
116
-
-
84873146092
-
Effective Reader Privacy for Electronic Books: A Proposal
-
note
-
Jennifer Elmore, Note, Effective Reader Privacy for Electronic Books: A Proposal, 34 Hastings Comm. & Ent. L.J. 127, 130-32 (2011). It may be that the lack of consensus about the library-records provision signaled the preference of privacy-protective legislators to leave the area untouched rather than explicity craft a law enforcement exemption.
-
(2011)
Hastings Comm. & Ent. L.J.
, vol.34
-
-
Elmore, J.1
-
117
-
-
84866706378
-
Oliver v. United States
-
note
-
E.g., Oliver v. United States, 466 U.S. 170, 179 (1984) (no expectation of privacy in open fields).
-
(1984)
U.S.
, vol.466
-
-
-
118
-
-
84873125857
-
United States v. White
-
note
-
United States v. White, 401 U.S. 745, 749 (1971) (plurality opinion) (no expectation of privacy in conversations with informants).
-
(1971)
U.S.
, vol.401
-
-
-
119
-
-
84873156660
-
California v. Ciraolo
-
note
-
See, e.g., California v. Ciraolo, 476 U.S. 207, 215 (1986) (aircraft).
-
(1986)
U.S.
, vol.476
-
-
-
120
-
-
84873119031
-
Dow Chem. Co. v. United States
-
note
-
Dow Chem. Co. v. United States, 476 U.S. 227, 239 (1986) (same).
-
(1986)
U.S.
, vol.476
-
-
-
121
-
-
33750242426
-
United States v. Knotts
-
note
-
United States v. Knotts, 460 U.S. 276, 285 (1983) (beepers).
-
(1983)
U.S.
, vol.460
-
-
-
122
-
-
33750242426
-
United States v. Knotts
-
note
-
United States v. Knotts, 460 U.S. 276, 285 (1983) (beepers).
-
(1983)
U.S.
, vol.460
-
-
-
125
-
-
84873148352
-
-
note
-
Although initially enacted as a total bar on disclosure of such records absent patient consent, Comprehensive Alcohol Abuse and Alcoholism Prevention, Treatment, and Rehabilitation Act of 1970, Pub. L. No. 91-616, § 333, 84 Stat. 1848, 1853, subsequent amendments permit disclosure in limited circumstances, namely medical emergency, for scientific research if anonymized, and by court order on good cause where there is a need to avert death or serious bodily harm. See 42 U.S.C. § 290dd-2(b)(2) (2006).
-
(2006)
U.S.C.
, vol.42
-
-
-
129
-
-
84873115054
-
-
note
-
18 U.S.C. § 1801(c).
-
U.S.C.
, vol.18
-
-
-
130
-
-
84873110256
-
-
note
-
18 U.S.C. § 1801(c).
-
U.S.C.
, vol.18
-
-
-
131
-
-
84873173155
-
-
note
-
18 U.S.C. § 1801(c).
-
U.S.C.
, vol.18
-
-
-
132
-
-
84873164781
-
The Right to Financial Privacy Act of 1978-The Congressional Response to United States v. Miller: A Procedural Right to Challenge Government Access to Financial Records
-
See Nancy M. Kirschner, The Right to Financial Privacy Act of 1978-The Congressional Response to United States v. Miller: A Procedural Right to Challenge Government Access to Financial Records, 13 U. Mich. J.L. Reform 10, 24 (1979).
-
(1979)
U. Mich. J.L. Reform
, vol.13
-
-
Kirschner, N.M.1
-
133
-
-
84873112377
-
-
note
-
See Dep't of Health & Human Servs., Confidentiality of Individually-Identifiable Health Information: Recommendations of the Secretary of Health and Human Services, Pursuant to Section 264 of the Health Insurance Portability and Accountability Act of 1996, at II.E.9 (1997), available at http://epic.org/privacy/ medical/hhs_recommendations_1997.html ("We are not recommending any changes to existing legal constraints that govern access to or use of patient information by law enforcement agencies.").
-
(1997)
Pursuant to Section 264 of the Health Insurance Portability and Accountability Act of 1996
-
-
-
134
-
-
84873197364
-
-
note
-
The reason for this is perhaps clear. A quick review of those organizations' websites, some of which list congressional testimony, reveal a busy docket focused on issues exclusively related to criminal justice. See, e.g., Nat'l Ass'n Crim. Def. Law., Federal Action, http://www.nacdl.org/federalaction/ (last visited Oct. 12, 2012) (listing legislative priorities as crime labs and forensics reform, discovery reform, grand jury reform, indigent defense, national security, sentencing reform, sex offenses, street gangs, and white-collar crime).
-
Nat'l Ass'n Crim. Def. Law., Federal Action
-
-
-
135
-
-
84873197364
-
-
note
-
The reason for this is perhaps clear. A quick review of those organizations' websites, some of which list congressional testimony, reveal a busy docket focused on issues exclusively related to criminal justice. See, e.g., Nat'l Ass'n Crim. Def. Law., Federal Action, http://www.nacdl.org/federalaction/ (last visited Oct. 12, 2012) (listing legislative priorities as crime labs and forensics reform, discovery reform, grand jury reform, indigent defense, national security, sentencing reform, sex offenses, street gangs, and white-collar crime).
-
Nat'l Ass'n Crim. Def. Law., Federal Action
-
-
-
136
-
-
84873173043
-
Video and Library Privacy Protection Act of 1988: Joint Hearing Before the Subcomm. on Courts, Civil Liberties, and the Admin. of Justice of the H. Comm. on the Judiciary and the Subcomm. on Tech. & the Law of the S. Comm. on the Judiciary
-
note
-
The VPPA was enacted quickly in the wake of the Bork incident, and the bulk of the hearings were consumed either by the initial provisions of the bill that also would have protected library records or by the concerns of direct marketers. See Video and Library Privacy Protection Act of 1988: Joint Hearing Before the Subcomm. on Courts, Civil Liberties, and the Admin. of Justice of the H. Comm. on the Judiciary and the Subcomm. on Tech. & the Law of the S. Comm. on the Judiciary, 100th Cong. 123-25 (1989). For reasons unclear from the record, the FBI declined to testify with regard to the bill and instead promised to submit written comments, which never arrived.
-
(1989)
100th Cong.
, pp. 123-125
-
-
-
138
-
-
0003635002
-
-
note
-
See Richard A. Posner, The Economics of Justice 299 (1981) (noting that "the general trend of legislative activity was to increase the privacy of individuals... and decrease that of business firms and other organizations" while acknowledging that "[t]he pattern is actually more complicated"). There are many distinctions that have been made between individual and entity privacy. For instance, a public corporation is typically heavily regulated, and must by law disclose a wide swath of information. Even a privately held company might have a broad array of legal obligations to disclose or publish certain information, or to make such information available to regulators. Moreover, privacy is typically justified by reference to the needs of personal autonomy, freedom from embarrassment or humiliation, or basic principles of liberty-none of which is as readily translated to the inanimate corporate context.
-
(1981)
The Economics of Justice
, pp. 299
-
-
Posner, R.A.1
-
139
-
-
84870589486
-
-
131 S. Ct. 1177 (2011).
-
(2011)
S. Ct.
, vol.131
, pp. 1177
-
-
-
140
-
-
84873208156
-
-
note
-
12 U.S.C. § 3401(4) (2006).
-
(2006)
U.S.C.
, vol.12
-
-
-
141
-
-
84873123546
-
-
note
-
15 U.S.C. § 1681a(c)-(d) (2006).
-
(2006)
U.S.C.
, vol.15
-
-
-
142
-
-
84873170774
-
-
note
-
18 U.S.C. § 2510(6) (2006).
-
(2006)
U.S.C.
, vol.18
-
-
-
143
-
-
84873207961
-
In Defense of Individual Tax Privacy
-
Joshua D. Blank, In Defense of Individual Tax Privacy, 61 Emory L.J. 265 (2011).
-
(2011)
Emory L.J.
, vol.61
, pp. 265
-
-
Blank, J.D.1
-
144
-
-
84873125958
-
-
note
-
18 U.S.C. §§ 2721-2725 (2006).
-
(2006)
U.S.C.
, vol.18
-
-
-
145
-
-
84873147865
-
-
note
-
There are also some independent protections for corporate information like trade secrets, see, e.g., Economic Espionage Act of 1996, 18 U.S.C. §§ 1831-1839 (2006 & Supp. V 2011).
-
(2006)
Economic Espionage Act of 1996, 18 U.S.C.
-
-
-
146
-
-
29544443054
-
Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference
-
note
-
Professor Kerr's analysis was most directly addressed in Daniel J. Solove, Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference, 74 Fordham L. Rev. 747, 748, 760-77 (2005), but a handful of other scholars have also weighed in on specific aspects of this debate.
-
(2005)
Fordham L. Rev.
, vol.74
-
-
Solove, D.J.1
-
147
-
-
84873152916
-
-
note
-
42 U.S.C. § 1437z (2006) (emphasis added).
-
(2006)
U.S.C.
, vol.42
-
-
-
148
-
-
84873148930
-
-
note
-
42 U.S.C. § 1437z (2006) (emphasis added).
-
(2006)
U.S.C.
, vol.42
-
-
-
149
-
-
84873195912
-
-
note
-
42 U.S.C. § 1437z (2006) (emphasis added).
-
(2006)
U.S.C.
, vol.42
-
-
-
150
-
-
84873158361
-
-
note
-
42 U.S.C. § 1437z (2006) (emphasis added).
-
(2006)
U.S.C.
, vol.42
-
-
-
151
-
-
77950427020
-
The Criminalization of Poverty
-
note
-
Prior to the passage of PRWORA, law enforcement could obtain private information only through the use of formal legal process. Kaaryn Gustafson, The Criminalization of Poverty, 99 J. Crim. L. & Criminology 643, 668-69 (2009).
-
(2009)
J. Crim. L. & Criminology
, vol.99
-
-
Gustafson, K.1
-
152
-
-
84873200091
-
-
note
-
Pub. L. No. 104-193, 110 Stat. 2105.
-
-
-
-
153
-
-
84873150852
-
-
note
-
42 U.S.C. § 608(a)(9).
-
U.S.C.
, vol.42
-
-
-
154
-
-
34548413526
-
The Sexual Regulation Dimension of Contemporary Welfare Law: A Fifty State Overview
-
note
-
Anna Marie Smith, The Sexual Regulation Dimension of Contemporary Welfare Law: A Fifty State Overview, 8 Mich. J. Gender & L. 121, 145-47, 147 n.103 (2002).
-
(2002)
Mich. J. Gender & L.
, vol.8
, Issue.103
-
-
Smith, A.M.1
-
155
-
-
34548413526
-
The Sexual Regulation Dimension of Contemporary Welfare Law: A Fifty State Overview
-
note
-
Anna Marie Smith, The Sexual Regulation Dimension of Contemporary Welfare Law: A Fifty State Overview, 8 Mich. J. Gender & L. 121, 145-47, 147 n.103 (2002).
-
(2002)
Mich. J. Gender & L.
, vol.8
, Issue.103
-
-
Smith, A.M.1
-
156
-
-
77950427020
-
The Criminalization of Poverty
-
note
-
Prior to the passage of PRWORA, law enforcement could obtain private information only through the use of formal legal process. Kaaryn Gustafson, The Criminalization of Poverty, 99 J. Crim. L. & Criminology 643, 668-69 (2009).
-
(2009)
J. Crim. L. & Criminology
, vol.99
-
-
Gustafson, K.1
-
157
-
-
84873138873
-
Confidentiality of Records as to Recipients of Public Welfare
-
note
-
Joseph T. Bockrath, Annotation, Confidentiality of Records as to Recipients of Public Welfare, 54 A.L.R.3d 768 (1974 & Supp. 2012).
-
(1974)
A.L.R.3d
, vol.54
, pp. 768
-
-
Bockrath, J.T.1
-
158
-
-
84873162624
-
-
note
-
See 42 U.S.C. § 608(a)(9)(B).
-
U.S.C.
, vol.42
-
-
-
159
-
-
84873165972
-
-
note
-
42 U.S.C. § 603(a)(5)(D)(ii), (J).
-
U.S.C.
, vol.42
-
-
-
160
-
-
77950427020
-
The Criminalization of Poverty
-
note
-
Prior to the passage of PRWORA, law enforcement could obtain private information only through the use of formal legal process. Kaaryn Gustafson, The Criminalization of Poverty, 99 J. Crim. L. & Criminology 643, 668-69 (2009).
-
(2009)
J. Crim. L. & Criminology
, vol.99
-
-
Gustafson, K.1
-
161
-
-
0037310460
-
Recognizing the Societal Value in Information Privacy
-
note
-
See James P. Nehf, Recognizing the Societal Value in Information Privacy, 78 Wash. L. Rev. 1, 43 (2003).
-
(2003)
Wash. L. Rev.
, vol.78
-
-
Nehf, J.P.1
-
162
-
-
77950427020
-
The Criminalization of Poverty
-
note
-
Prior to the passage of PRWORA, law enforcement could obtain private information only through the use of formal legal process. Kaaryn Gustafson, The Criminalization of Poverty, 99 J. Crim. L. & Criminology 643, 668-69 (2009).
-
(2009)
J. Crim. L. & Criminology
, vol.99
-
-
Gustafson, K.1
-
163
-
-
77950427020
-
The Criminalization of Poverty
-
note
-
Prior to the passage of PRWORA, law enforcement could obtain private information only through the use of formal legal process. Kaaryn Gustafson, The Criminalization of Poverty, 99 J. Crim. L. & Criminology 643, 668-69 (2009).
-
(2009)
J. Crim. L. & Criminology
, vol.99
-
-
Gustafson, K.1
-
164
-
-
84873199338
-
Samson v. California
-
note
-
Compare Samson v. California, 547 U.S. 843 (2006) (upholding warrantless, suspicionless searches of homes of conditional releases).
-
(2006)
U.S.
, vol.547
, pp. 843
-
-
-
165
-
-
29144498133
-
-
note
-
See Caroline Wolf Harlow, U.S. Dep't of Justice, NCJ 179023, Defense Counsel in Criminal Cases 5 (2000), available at http://bjs.ojp.usdoj.gov/content/pub/pdf/ dccc.pdf ("[A]bout 86% of those already on criminal justice status-for example, on pretrial release, probation, or parole... used appointed counsel.").
-
(2000)
U.S. Dep't of Justice, NCJ 179023, Defense Counsel in Criminal Cases
, pp. 5
-
-
Harlow, C.W.1
-
167
-
-
84873156872
-
Sharing Criminal Records: The United States, the European Union, and Interpol Compared
-
note
-
James B. Jacobs & Dimitra Blitsa, Sharing Criminal Records: The United States, the European Union, and Interpol Compared, 30 Loy. L.A. Int'l & Comp. L. Rev. 125, 142 (2008) ("They can be obtained through three channels: (1) courts and court systems; (2) state criminal record repositories; and (3) private companies that sell information. While the statelevel repositories and the FBI's National Criminal Information Center (NCIC) restrict access to their criminal records, court records are open to the public as a matter of historical practice and constitutional common law. Private information companies mostly obtain criminal record information from courts and sell it to private customers. " (footnotes omitted).
-
(2008)
Loy. L.A. Int'l & Comp. L. Rev.
, vol.30
-
-
Jacobs, J.B.1
Blitsa, D.2
-
168
-
-
65949106463
-
The Expanding Scope, Use, and Availability of Criminal Records
-
note
-
James Jacobs & Tamara Crepet, The Expanding Scope, Use, and Availability of Criminal Records, 11 N.Y.U. J. Legis. & Pub. Pol'y 177, 180-82 (2008) (describing array of "federal funding for the improvement and expansion of state criminal record keeping" along with federal analogues, including the National Instant Criminal Background Check System ("NICS"), the Interstate Identification Index ("III"), and the National Crime Information Center ("NCIC"), and the Integrated Automated Fingerprint Identification System ("IAFIS").
-
(2008)
N.Y.U. J. Legis. & Pub. Pol'y
, vol.11
-
-
Jacobs, J.1
Crepet, T.2
-
169
-
-
65949106463
-
The Expanding Scope, Use, and Availability of Criminal Records
-
note
-
James Jacobs & Tamara Crepet, The Expanding Scope, Use, and Availability of Criminal Records, 11 N.Y.U. J. Legis. & Pub. Pol'y 177, 180-82 (2008) (describing array of "federal funding for the improvement and expansion of state criminal record keeping" along with federal analogues, including the National Instant Criminal Background Check System ("NICS"), the Interstate Identification Index ("III"), and the National Crime Information Center ("NCIC"), and the Integrated Automated Fingerprint Identification System ("IAFIS").
-
(2008)
N.Y.U. J. Legis. & Pub. Pol'y
, vol.11
-
-
Jacobs, J.1
Crepet, T.2
-
170
-
-
77955320294
-
Big Brother's Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement
-
Chris Jay Hoofnagle, Big Brother's Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement, 29 N.C. J. Int'l L. & Com. Reg. 595 (2004).
-
(2004)
N.C. J. Int'l L. & Com. Reg.
, vol.29
, pp. 595
-
-
Hoofnagle, C.J.1
-
171
-
-
65949095738
-
Mass Incarceration and the Proliferation of Criminal Records
-
James B. Jacobs, Mass Incarceration and the Proliferation of Criminal Records, 3 U. St. Thomas L.J. 387, 389-90 (2006).
-
(2006)
U. St. Thomas L.J.
, vol.3
-
-
Jacobs, J.B.1
-
172
-
-
65949106463
-
The Expanding Scope, Use, and Availability of Criminal Records
-
note
-
James Jacobs & Tamara Crepet, The Expanding Scope, Use, and Availability of Criminal Records, 11 N.Y.U. J. Legis. & Pub. Pol'y 177, 180-82 (2008) (describing array of "federal funding for the improvement and expansion of state criminal record keeping" along with federal analogues, including the National Instant Criminal Background Check System ("NICS"), the Interstate Identification Index ("III"), and the National Crime Information Center ("NCIC"), and the Integrated Automated Fingerprint Identification System ("IAFIS").
-
(2008)
N.Y.U. J. Legis. & Pub. Pol'y
, vol.11
-
-
Jacobs, J.1
Crepet, T.2
-
173
-
-
65949106463
-
The Expanding Scope, Use, and Availability of Criminal Records
-
note
-
James Jacobs & Tamara Crepet, The Expanding Scope, Use, and Availability of Criminal Records, 11 N.Y.U. J. Legis. & Pub. Pol'y 177, 180-82 (2008) (describing array of "federal funding for the improvement and expansion of state criminal record keeping" along with federal analogues, including the National Instant Criminal Background Check System ("NICS"), the Interstate Identification Index ("III"), and the National Crime Information Center ("NCIC"), and the Integrated Automated Fingerprint Identification System ("IAFIS").
-
(2008)
N.Y.U. J. Legis. & Pub. Pol'y
, vol.11
-
-
Jacobs, J.1
Crepet, T.2
-
174
-
-
65949106463
-
The Expanding Scope, Use, and Availability of Criminal Records
-
note
-
James Jacobs & Tamara Crepet, The Expanding Scope, Use, and Availability of Criminal Records, 11 N.Y.U. J. Legis. & Pub. Pol'y 177, 180-82 (2008) (describing array of "federal funding for the improvement and expansion of state criminal record keeping" along with federal analogues, including the National Instant Criminal Background Check System ("NICS"), the Interstate Identification Index ("III"), and the National Crime Information Center ("NCIC"), and the Integrated Automated Fingerprint Identification System ("IAFIS").
-
(2008)
N.Y.U. J. Legis. & Pub. Pol'y
, vol.11
-
-
Jacobs, J.1
Crepet, T.2
-
175
-
-
84873173997
-
-
note
-
To be sure, state laws may regulate access to or use of criminal records-for instance, by sealing arrest histories or barring use of criminal records in employment decisions-but no federal mandate requires such provisions.
-
-
-
-
176
-
-
84873209593
-
-
note
-
42 C.F.R. § 431.306 (2012) (describing federal standards for release of information, which includes a policy to safeguard the information).
-
(2012)
C.F.R.
, vol.42
-
-
-
177
-
-
84873205491
-
Privacy Right and Public Families
-
note
-
Khiara M. Bridges, Privacy Right and Public Families, 34 Harv. J.L. & Gender 113 (2011) (describing highly intrusive information gathering performed as a condition of public assistance for state prenatal care). To be clear, the Constitution does not fare much better.
-
(2011)
Harv. J.L. & Gender
, vol.34
, pp. 113
-
-
Bridges, K.M.1
-
178
-
-
70349826349
-
The Poverty Exception to the Fourth Amendment
-
Christopher Slobogin, The Poverty Exception to the Fourth Amendment, 55 Fla. L. Rev. 391, 401-05 (2003).
-
(2003)
Fla. L. Rev.
, vol.55
-
-
Slobogin, C.1
-
179
-
-
0038212672
-
Protecting Informational Privacy in the Information Society
-
note
-
They are specifically covered by the Privacy Act, including the Computer Matching and Privacy Protection Act Amendments of 1988, which otherwise does not apply to the states. See George B. Trubow, Protecting Informational Privacy in the Information Society, 10 N. Ill. U. L. Rev. 521, 526 (1990).
-
(1990)
N. Ill. U. L. Rev.
, vol.10
-
-
Trubow, G.B.1
-
180
-
-
0038212672
-
Protecting Informational Privacy in the Information Society
-
note
-
They are specifically covered by the Privacy Act, including the Computer Matching and Privacy Protection Act Amendments of 1988, which otherwise does not apply to the states. See George B. Trubow, Protecting Informational Privacy in the Information Society, 10 N. Ill. U. L. Rev. 521, 526 (1990).
-
(1990)
N. Ill. U. L. Rev.
, vol.10
-
-
Trubow, G.B.1
-
181
-
-
84873191527
-
-
note
-
See 34 C.F.R. § 5b.9(b)(7) (2012) (allowing such disclosure to a government agency without consent if "the activity is authorized by law, and if the... agency... has submitted a written request... specifying the record desired and the law enforcement activity for which the record is sought").
-
(2012)
C.F.R.
, vol.34
-
-
-
182
-
-
84873193375
-
The Protection of Taxpayer's [sic] Federal Tax Return Information in the Internet Age-Is Tax Return Information Being Afforded Proper Confidentiality and Privacy Protections?
-
note
-
See generally Agnes Gesiko, The Protection of Taxpayer's [sic] Federal Tax Return Information in the Internet Age-Is Tax Return Information Being Afforded Proper Confidentiality and Privacy Protections?, 62 Tax Law. 175 (2008) (detailing authorized disclosures and noting strict policies limiting transfer of covered material, requiring destruction or return after use, and imposing criminal and civil penalties on violators).
-
(2008)
Tax Law.
, vol.62
, pp. 175
-
-
Gesiko, A.1
-
183
-
-
29544443054
-
Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference
-
note
-
Professor Kerr's analysis was most directly addressed in Daniel J. Solove, Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference, 74 Fordham L. Rev. 747, 748, 760-77 (2005), but a handful of other scholars have also weighed in on specific aspects of this debate.
-
(2005)
Fordham L. Rev.
, vol.74
-
-
Solove, D.J.1
-
184
-
-
84873186207
-
Policy Basics: Where Do Our Federal Tax Dollars Go?
-
note
-
Such programs include the following: [T]he refundable portion of the earned-income and child tax credits, which assist lowand moderate-income working families through the tax code; programs that provide cash payments to eligible individuals or households, including Supplemental Security Income for the elderly or disabled poor and unemployment insurance; various forms of in-kind assistance for low-income families and individuals, including food stamps, school meals, low-income housing assistance, child-care assistance, and assistance in meeting home energy bills; and various other programs such as those that aid abused and neglected children. Policy Basics: Where Do Our Federal Tax Dollars Go?, Center on Budget & Pol'y Priorities, http://www.cbpp.org/cms/index.cfm?fa=view&id=1258 (last updated Aug. 13, 2012).
-
Center on Budget & Pol'y Priorities
-
-
-
185
-
-
84873186207
-
Policy Basics: Where Do Our Federal Tax Dollars Go?
-
note
-
Such programs include the following: [T]he refundable portion of the earned-income and child tax credits, which assist lowand moderate-income working families through the tax code; programs that provide cash payments to eligible individuals or households, including Supplemental Security Income for the elderly or disabled poor and unemployment insurance; various forms of in-kind assistance for low-income families and individuals, including food stamps, school meals, low-income housing assistance, child-care assistance, and assistance in meeting home energy bills; and various other programs such as those that aid abused and neglected children. Policy Basics: Where Do Our Federal Tax Dollars Go?, Center on Budget & Pol'y Priorities, http://www.cbpp.org/cms/index.cfm?fa=view&id=1258 (last updated Aug. 13, 2012).
-
Center on Budget & Pol'y Priorities
-
-
-
186
-
-
84873194000
-
-
note
-
See 18 U.S.C. § 2721(b) (2006) (obligating disclosure for motor vehicle-related matters, but simply allowing it under other circumstances).
-
(2006)
U.S.C.
, vol.18
-
-
-
187
-
-
84873141554
-
-
note
-
See 18 U.S.C. § 2721(b) (2006) (obligating disclosure for motor vehicle-related matters, but simply allowing it under other circumstances).
-
(2006)
U.S.C.
, vol.18
-
-
-
188
-
-
84873199132
-
-
note
-
See 18 U.S.C. § 2721(b) (2006) (obligating disclosure for motor vehicle-related matters, but simply allowing it under other circumstances).
-
(2006)
U.S.C.
, vol.18
-
-
-
190
-
-
29544443054
-
Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference
-
note
-
Professor Kerr's analysis was most directly addressed in Daniel J. Solove, Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference, 74 Fordham L. Rev. 747, 748, 760-77 (2005), but a handful of other scholars have also weighed in on specific aspects of this debate.
-
(2005)
Fordham L. Rev.
, vol.74
-
-
Solove, D.J.1
-
191
-
-
29544443054
-
Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference
-
note
-
Professor Kerr's analysis was most directly addressed in Daniel J. Solove, Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference, 74 Fordham L. Rev. 747, 748, 760-77 (2005), but a handful of other scholars have also weighed in on specific aspects of this debate.
-
(2005)
Fordham L. Rev.
, vol.74
-
-
Solove, D.J.1
-
192
-
-
84873172704
-
-
note
-
See 18 U.S.C. § 2721(b) (2006) (obligating disclosure for motor vehicle-related matters, but simply allowing it under other circumstances).
-
(2006)
U.S.C.
, vol.18
-
-
-
193
-
-
33947416337
-
Katz v. United States
-
note
-
Each responded to the Court, but in different ways: Title III was enacted in response to the Supreme Court's findings in Katz v. United States, 389 U.S. 347 (1967).
-
(1967)
U.S.
, vol.389
, pp. 347
-
-
-
194
-
-
33947416337
-
Katz v. United States
-
note
-
Each responded to the Court, but in different ways: Title III was enacted in response to the Supreme Court's findings in Katz v. United States, 389 U.S. 347 (1967).
-
(1967)
U.S.
, vol.389
, pp. 347
-
-
-
195
-
-
18444389169
-
Sliding Down a Slippery Slope? The Future Use of Administrative Subpoenas in Criminal Investigations
-
note
-
Risa Berkower, Note, Sliding Down a Slippery Slope? The Future Use of Administrative Subpoenas in Criminal Investigations, 73 Fordham L. Rev. 2251, 2252, 2270-71 (2005).
-
(2005)
Fordham L. Rev.
, vol.73
-
-
Berkower, R.1
-
196
-
-
18444389169
-
Sliding Down a Slippery Slope? The Future Use of Administrative Subpoenas in Criminal Investigations
-
note
-
Risa Berkower, Note, Sliding Down a Slippery Slope? The Future Use of Administrative Subpoenas in Criminal Investigations, 73 Fordham L. Rev. 2251, 2252, 2270-71 (2005).
-
(2005)
Fordham L. Rev.
, vol.73
-
-
Berkower, R.1
-
197
-
-
84873112667
-
Construction and Application of Right to Financial Privacy Act of 1978
-
note
-
See generally Richard Cordero, Annotation, Construction and Application of Right to Financial Privacy Act of 1978, 112 A.L.R. Fed. 295 (1993) (referring to section 3408 in only one small entry).
-
(1993)
A.L.R. Fed.
, vol.112
, pp. 295
-
-
Cordero, R.1
-
198
-
-
84873112667
-
Construction and Application of Right to Financial Privacy Act of 1978
-
note
-
See generally Richard Cordero, Annotation, Construction and Application of Right to Financial Privacy Act of 1978, 112 A.L.R. Fed. 295 (1993) (referring to section 3408 in only one small entry).
-
(1993)
A.L.R. Fed.
, vol.112
, pp. 295
-
-
Cordero, R.1
-
199
-
-
84873112667
-
Construction and Application of Right to Financial Privacy Act of 1978
-
note
-
See generally Richard Cordero, Annotation, Construction and Application of Right to Financial Privacy Act of 1978, 112 A.L.R. Fed. 295 (1993) (referring to section 3408 in only one small entry).
-
(1993)
A.L.R. Fed.
, vol.112
, pp. 295
-
-
Cordero, R.1
-
200
-
-
84873147035
-
-
note
-
15 U.S.C. § 1681f (2006).
-
(2006)
U.S.C.
, vol.15
-
-
-
201
-
-
84873156427
-
-
note
-
15 U.S.C. § 6502(b)(2)(E)(iv).
-
U.S.C.
, vol.15
-
-
-
202
-
-
84873148868
-
-
note
-
5 U.S.C. § 552a(b)(7) (2006).
-
(2006)
U.S.C.
, vol.5
-
-
-
203
-
-
84873108839
-
Panel Report: Secret Evidence in the Investigative Stage: FISA, Administrative Subpoenas, and Privacy
-
note
-
The optional nature of compliance allows proponents of administrative subpoena authority to view it as simply allowing the government to bypass cumbersome procedures to obtain information that already is routinely accessed using grand jury subpoenas. However, opponents view it as an end run around the probable cause, particularity, and neutrality standards embodied by the Fourth Amendment, and warn against expanding the categories beyond narrow fields in which limited records would prove relevant (for instance "health fraud" versus "any fraud"). See, e.g., Jameel Jaffer, Panel Report: Secret Evidence in the Investigative Stage: FISA, Administrative Subpoenas, and Privacy, 5 Cardozo Pub. L. Pol'y & Ethics J. 7 (2006).
-
(2006)
Cardozo Pub. L. Pol'y & Ethics J.
, vol.5
, pp. 7
-
-
Jaffer, J.1
-
204
-
-
84873132225
-
-
note
-
See, e.g., 15 U.S.C. § 1681b(a)(1).
-
U.S.C.
, vol.15
-
-
-
205
-
-
84873200090
-
Doe v. Ashcroft
-
note
-
Doe v. Ashcroft, 334 F. Supp. 2d 471, 481 (S.D.N.Y. 2004).
-
(2004)
F. Supp. 2d
, vol.334
-
-
-
206
-
-
84873200090
-
Doe v. Ashcroft
-
note
-
Doe v. Ashcroft, 334 F. Supp. 2d 471, 481 (S.D.N.Y. 2004).
-
(2004)
F. Supp. 2d
, vol.334
-
-
-
209
-
-
84873144494
-
Nixon v. Sirica (In re Grand Jury Proceedings)
-
note
-
Nixon v. Sirica (In re Grand Jury Proceedings), 487 F.2d 700, 737 (D.C. Cir. 1973) ("[J]udicial subpoenas seek information in aid of the power to adjudicate controversies between individual litigants in a single civil or criminal case. ").
-
(1973)
F.2d
, vol.487
-
-
-
210
-
-
84873122090
-
R. Enters., Inc
-
note
-
R. Enters., Inc., 498 U.S. at 296-300 (referencing subpoena process and relevancy standard for trial and grand jury subpoenas). Many statutes also authorize law enforcement access via a court order, but a court order is by its nature almost always a higher threshold than a subpoena because it requires the express approval of a judicial official. However, because an investigator can petition a court for an order even in the absence of an ongoing formal proceeding or grand jury investigation, it might in some cases be a preferable vehicle for obtaining information.
-
U.S.
, vol.498
, pp. 296-300
-
-
-
211
-
-
84873122090
-
R. Enters., Inc
-
note
-
R. Enters., Inc., 498 U.S. at 296-300 (referencing subpoena process and relevancy standard for trial and grand jury subpoenas). Many statutes also authorize law enforcement access via a court order, but a court order is by its nature almost always a higher threshold than a subpoena because it requires the express approval of a judicial official. However, because an investigator can petition a court for an order even in the absence of an ongoing formal proceeding or grand jury investigation, it might in some cases be a preferable vehicle for obtaining information.
-
U.S.
, vol.498
, pp. 296-300
-
-
-
212
-
-
84873122090
-
R. Enters., Inc
-
note
-
R. Enters., Inc., 498 U.S. at 296-300 (referencing subpoena process and relevancy standard for trial and grand jury subpoenas). Many statutes also authorize law enforcement access via a court order, but a court order is by its nature almost always a higher threshold than a subpoena because it requires the express approval of a judicial official. However, because an investigator can petition a court for an order even in the absence of an ongoing formal proceeding or grand jury investigation, it might in some cases be a preferable vehicle for obtaining information.
-
U.S.
, vol.498
, pp. 296-300
-
-
-
213
-
-
84873122090
-
R. Enters., Inc
-
note
-
R. Enters., Inc., 498 U.S. at 296-300 (referencing subpoena process and relevancy standard for trial and grand jury subpoenas). Many statutes also authorize law enforcement access via a court order, but a court order is by its nature almost always a higher threshold than a subpoena because it requires the express approval of a judicial official. However, because an investigator can petition a court for an order even in the absence of an ongoing formal proceeding or grand jury investigation, it might in some cases be a preferable vehicle for obtaining information.
-
U.S.
, vol.498
, pp. 296-300
-
-
-
214
-
-
84873122090
-
R. Enters., Inc
-
note
-
R. Enters., Inc., 498 U.S. at 296-300 (referencing subpoena process and relevancy standard for trial and grand jury subpoenas). Many statutes also authorize law enforcement access via a court order, but a court order is by its nature almost always a higher threshold than a subpoena because it requires the express approval of a judicial official. However, because an investigator can petition a court for an order even in the absence of an ongoing formal proceeding or grand jury investigation, it might in some cases be a preferable vehicle for obtaining information.
-
U.S.
, vol.498
, pp. 296-300
-
-
-
215
-
-
84873122090
-
R. Enters., Inc
-
note
-
R. Enters., Inc., 498 U.S. at 296-300 (referencing subpoena process and relevancy standard for trial and grand jury subpoenas). Many statutes also authorize law enforcement access via a court order, but a court order is by its nature almost always a higher threshold than a subpoena because it requires the express approval of a judicial official. However, because an investigator can petition a court for an order even in the absence of an ongoing formal proceeding or grand jury investigation, it might in some cases be a preferable vehicle for obtaining information.
-
U.S.
, vol.498
, pp. 296-300
-
-
-
216
-
-
84873122090
-
R. Enters., Inc
-
note
-
R. Enters., Inc., 498 U.S. at 296-300 (referencing subpoena process and relevancy standard for trial and grand jury subpoenas). Many statutes also authorize law enforcement access via a court order, but a court order is by its nature almost always a higher threshold than a subpoena because it requires the express approval of a judicial official. However, because an investigator can petition a court for an order even in the absence of an ongoing formal proceeding or grand jury investigation, it might in some cases be a preferable vehicle for obtaining information.
-
U.S.
, vol.498
, pp. 296-300
-
-
-
217
-
-
84873122090
-
R. Enters., Inc
-
note
-
R. Enters., Inc., 498 U.S. at 296-300 (referencing subpoena process and relevancy standard for trial and grand jury subpoenas). Many statutes also authorize law enforcement access via a court order, but a court order is by its nature almost always a higher threshold than a subpoena because it requires the express approval of a judicial official. However, because an investigator can petition a court for an order even in the absence of an ongoing formal proceeding or grand jury investigation, it might in some cases be a preferable vehicle for obtaining information.
-
U.S.
, vol.498
, pp. 296-300
-
-
-
218
-
-
84873122090
-
R. Enters., Inc
-
note
-
R. Enters., Inc., 498 U.S. at 296-300 (referencing subpoena process and relevancy standard for trial and grand jury subpoenas). Many statutes also authorize law enforcement access via a court order, but a court order is by its nature almost always a higher threshold than a subpoena because it requires the express approval of a judicial official. However, because an investigator can petition a court for an order even in the absence of an ongoing formal proceeding or grand jury investigation, it might in some cases be a preferable vehicle for obtaining information.
-
U.S.
, vol.498
, pp. 296-300
-
-
-
219
-
-
84873122090
-
R. Enters., Inc
-
note
-
R. Enters., Inc., 498 U.S. at 296-300 (referencing subpoena process and relevancy standard for trial and grand jury subpoenas). Many statutes also authorize law enforcement access via a court order, but a court order is by its nature almost always a higher threshold than a subpoena because it requires the express approval of a judicial official. However, because an investigator can petition a court for an order even in the absence of an ongoing formal proceeding or grand jury investigation, it might in some cases be a preferable vehicle for obtaining information.
-
U.S.
, vol.498
, pp. 296-300
-
-
-
220
-
-
84873156572
-
-
note
-
42 U.S.C. § 2000aa(c) (2006).
-
(2006)
U.S.C.
, vol.42
-
-
-
221
-
-
84873198185
-
-
note
-
45 C.F.R. § 164.512(f) (2012).
-
(2012)
C.F.R.
, vol.45
-
-
-
222
-
-
84873201663
-
-
note
-
45 C.F.R. § 164.512(f) (2012).
-
(2012)
C.F.R.
, vol.45
-
-
-
223
-
-
84873124213
-
-
note
-
18 U.S.C. § 2721(a)(2).
-
U.S.C.
, vol.18
-
-
-
224
-
-
84873120261
-
-
note
-
See, e.g., 12 U.S.C. § 3409 (2006) (RFPA); 20 U.S.C. § 1232g(b)(1)(J) (FERPA).
-
(2006)
U.S.C.
, vol.12
-
-
-
225
-
-
84873105596
-
-
note
-
As Congressman John LaFalce stated in opposition to those provisions, "Restricting the use of lawfully acquired information to the original purpose for which it was obtained is contrary to established legal principles found both in case law and the Privacy Act of 1974. The generally applicable rule is that, once the privacy interest in records has been legitimately breached... unanticipated information in such records... may be used by law enforcement authorities. " H.R. Rep. No. 95-1383, at 212 (1978), reprinted in 1978 U.S.C.C.A.N. 9273, 9343.
-
-
-
-
226
-
-
84873193646
-
-
note
-
18 U.S.C. § 2710(e) (2006).
-
(2006)
U.S.C.
, vol.18
-
-
-
227
-
-
84873112317
-
-
note
-
18 U.S.C. § 2710(e) (2006).
-
(2006)
U.S.C.
, vol.18
-
-
-
228
-
-
84873139695
-
-
note
-
18 U.S.C. § 2710(e) (2006).
-
(2006)
U.S.C.
, vol.18
-
-
-
229
-
-
84873104753
-
-
note
-
20 U.S.C. § 1232g(b)(1)(E)(ii)(II).
-
U.S.C.
, vol.20
-
-
-
231
-
-
84873151942
-
-
note
-
47 U.S.C. § 551(e) (2006).
-
(2006)
U.S.C.
, vol.47
-
-
-
232
-
-
84857989219
-
Andresen v. Maryland
-
note
-
The constitutional law governing the acquisition of evidence through a subpoena duces tecum stands somewhat in opposition to the law governing the acquisition of evidence through physical search and seizure. Whereas a search is governed by Fourth Amendment law, with minimal to nonexistent Fifth Amendment protection, a subpoena is largely regulated through the Fifth Amendment and left only lightly regulated by the Fourth Amendment. See Andresen v. Maryland, 427 U.S. 463 (1976) (holding that the Fifth Amendment was not implicated, and the Fourth Amendment not violated, by search warrant resulting in seizure of business documents).
-
(1976)
U.S.
, vol.427
, pp. 463
-
-
-
233
-
-
84873181784
-
Hale v. Henkel
-
note
-
Hale v. Henkel, 201 U.S. 43, 74-76 (1906) (holding that Fourth Amendment did not automatically prohibit subpoena duces tecum issued to corporate officer, but invalidating issued subpoena as unreasonably broad). The Court has not wholly disclaimed application of the Fourth Amendment to subpoena processes; those cases suggest that only the barest regulation applies. However, one source of uncertainty lies in the fact that most cases involve the subpoena or seizure of business, and not personal, documents: Without attempting to summarize or accurately distinguish all of the cases, the fair distillation, in so far as they apply merely to the production of corporate records and papers in response to a subpoena or order authorized by law and safeguarded by judicial sanction, seems to be that the Fifth Amendment affords no protection by virtue of the selfincrimination provision, whether for the corporation or for its officers; and the Fourth, if applicable, at the most guards against abuse only by way of too much indefiniteness or breadth in the things required to be 'particularly described,' if also the inquiry is one the demanding agency is authorized by law to make and the materials specified are relevant. The gist of the protection is in the requirement, expressed in terms, that the disclosure sought shall not be unreasonable.
-
(1906)
U.S.
, vol.201
-
-
-
234
-
-
84857964351
-
United States v. Doe
-
note
-
2 Wayne La Fave, Search and Seizure § 4.13(a) (4th ed. 2004) ("Although the Supreme Court has stated in dicta that the Fourth Amendment continues to limit the subpoena power of the government, the Court has rejected Fourth Amendment objections to subpoenas in every case it has decided in modern times. "). The Fifth Amendment only comes into play for personal papers sought from the suspect herself, which while not themselves protected, may be protected from compelled production. United States v. Doe, 465 U.S. 605 (1984) (subpoena).
-
(1984)
U.S.
, vol.465
, pp. 605
-
-
-
235
-
-
84860162030
-
See v. City of Seattle
-
See, e.g., See v. City of Seattle, 387 U.S. 541, 545 (1967).
-
(1967)
U.S.
, vol.387
-
-
-
236
-
-
84873166243
-
United States v. Powell
-
note
-
United States v. Powell, 379 U.S. 48, 57 (1964) (administrative subpoena by IRS did not require probable cause standard).
-
(1964)
U.S.
, vol.379
-
-
-
237
-
-
84873110268
-
United States v. Morton Salt Co
-
note
-
United States v. Morton Salt Co., 338 U.S. 632, 641-42 (1950) (distinguishing judicial subpoena power, which "extends only to adjudication of cases and controversies and... [whose] investigative powers should be jealously confined to these ends, " from administrative subpoena, which has more inquisitorial power).
-
(1950)
U.S.
, vol.338
-
-
-
238
-
-
84873160228
-
RIP to IRP-Money Laundering and Drug Trafficking Controls Score a Knockout Victory over Bank Secrecy
-
See Berta Esperanza Hernández, RIP to IRP-Money Laundering and Drug Trafficking Controls Score a Knockout Victory over Bank Secrecy, 18 N.C. J. Int'l L. & Com. Reg. 235, 246 n.78 (1993).
-
(1993)
N.C. J. Int'l L. & Com. Reg.
, vol.18
, Issue.78
-
-
Hernández, B.E.1
-
239
-
-
0043159103
-
Lifting the "Fog" of Internet Surveillance: How a Suppression Remedy Would Change Computer Crime Law
-
See Orin S. Kerr, Lifting the "Fog" of Internet Surveillance: How a Suppression Remedy Would Change Computer Crime Law, 54 Hastings L.J. 805, 837 n.154 (2003).
-
(2003)
Hastings L.J.
, vol.54
, Issue.154
-
-
Kerr, O.S.1
-
240
-
-
77954979256
-
Mapp v. Ohio
-
note
-
And, of course, per Mapp v. Ohio, 367 U.S. 643 (1961).
-
(1961)
U.S.
, vol.367
, pp. 643
-
-
-
241
-
-
77954979256
-
Mapp v. Ohio
-
note
-
And, of course, per Mapp v. Ohio, 367 U.S. 643 (1961).
-
(1961)
U.S.
, vol.367
, pp. 643
-
-
-
242
-
-
84873155554
-
-
note
-
E.g., 47 U.S.C. § 551(f)(3) (2006).
-
(2006)
U.S.C.
, vol.47
-
-
-
243
-
-
84893336466
-
United States v. Kington
-
note
-
12 U.S.C. § 3417(d) (2006) ("The remedies and sanctions described in this chapter shall be the only authorized judicial remedies and sanctions for violations of this chapter. "); see, e.g., United States v. Kington, 801 F.2d 733, 737 (5th Cir. 1986).
-
(1986)
F.2d
, vol.801
-
-
-
244
-
-
84873141314
-
United States v. Thompson
-
note
-
18 U.S.C. § 2708 (2006) ("The remedies and sanctions described in this chapter are the only judicial remedies and sanctions for nonconstitutional violations of this chapter. "). The Pen Register Act has also been interpreted to reject exclusion, see, e.g., United States v. Thompson, 936 F.2d 1249 (11th Cir. 1991).
-
(1991)
F.2d
, vol.936
, pp. 1249
-
-
-
245
-
-
84873200869
-
-
note
-
42 U.S.C. § 2000aa-6(d) (2006).
-
(2006)
U.S.C.
, vol.42
-
-
-
246
-
-
84873127735
-
Exclusion of Evidence in Federal Prosecutions on the Basis of State Law
-
note
-
In addition, the language prescribing a statutory exclusionary remedy is of particular importance because violations of state constitutional law do not necessarily require suppression of evidence in federal court, whereas a federal statute can effectively bar introduction of evidence in any court. See Kenneth J. Melilli, Exclusion of Evidence in Federal Prosecutions on the Basis of State Law, 22 Ga. L. Rev. 667, 713 (1988) (noting that although "silver platter doctrine" and Mapp forbid introduction of evidence seized unlawfully under the Fourth Amendment, regardless of court or seizing officer, most circuits have interpreted Elkins as allowing introduction of evidence in federal court seized only in violation of state law).
-
(1988)
Ga. L. Rev.
, vol.22
-
-
Melilli, K.J.1
-
247
-
-
84873117645
-
-
note
-
See, e.g., Steven House, DWI, Champion, Aug. 2007, at 46, 50.
-
(2007)
DWI
-
-
House, S.1
-
248
-
-
84873207069
-
United States v. Elliott
-
note
-
See, e.g., United States v. Elliott, 676 F. Supp. 2d 431, 439 (D. Md. 2009).
-
(2009)
F. Supp. 2d
, vol.676
-
-
-
249
-
-
84873184304
-
State v. Mubita
-
note
-
State v. Mubita, 188 P.3d 867, 874 (Idaho 2008).
-
(2008)
P.3d
, vol.188
-
-
-
251
-
-
33947545572
-
United States v. Davis
-
note
-
See, e.g., United States v. Davis, 657 F. Supp. 2d 630, 663 (D. Md. 2009), aff'd, 690 F.3d 226 (4th Cir. 2012).
-
(2009)
F. Supp. 2d
, vol.657
-
-
-
252
-
-
84873103627
-
United States v. Edgar
-
note
-
See, e.g., United States v. Edgar, 82 F.3d 499 (1st Cir. 1996).
-
(1996)
F.3d
, vol.82
, pp. 499
-
-
-
253
-
-
84873119449
-
Word v. United States
-
note
-
Cf. Word v. United States, 604 F.2d 1127, 1129-30 (8th Cir. 1979).
-
(1979)
F.2d
, vol.604
-
-
-
254
-
-
84873157044
-
United States v. Orlando
-
note
-
See, e.g., United States v. Orlando, 281 F.3d 586, 596 (6th Cir. 2002) ("The exclusionary rule is therefore inapplicable to the present case, because any purported violation of § 6103 did not infringe upon Daniels's constitutional rights. ").
-
(2002)
F.3d
, vol.281
-
-
-
255
-
-
84873122679
-
Nowicki v. Comm'r
-
note
-
Nowicki v. Comm'r, 262 F.3d 1162, 1164 (11th Cir. 2001).
-
(2001)
F.3d
, vol.262
-
-
-
256
-
-
84873189949
-
United States v. Michaelian
-
note
-
United States v. Michaelian, 803 F.2d 1042, 1046-48 (9th Cir. 1986).
-
(1986)
F.2d
, vol.803
-
-
-
257
-
-
84873130213
-
Marvin v. United States
-
note
-
Marvin v. United States, 732 F.2d 669, 672-73 (8th Cir. 1984).
-
(1984)
F.2d
, vol.732
-
-
-
258
-
-
84873117424
-
-
note
-
See, e.g., 18 U.S.C. § 2712(a) (2006) (civil remedy for willful violations of both SCA and certain provisions of FISA).
-
(2006)
U.S.C.
, vol.18
-
-
-
259
-
-
79959420554
-
Doe v. Chao
-
See, e.g., Doe v. Chao, 540 U.S. 614 (2004) (holding that the Privacy Act allows recovery for only actual damages, and therefore denying $1,000 award to claimant who successfully showed that Department of Labor improperly disclosed Social Security number).
-
(2004)
U.S.
, vol.540
, pp. 614
-
-
-
260
-
-
84873145941
-
Title III
-
note
-
E.g., Title III, 18 U.S.C. § 2529(d).
-
U.S.C.
, vol.18
-
-
-
261
-
-
84873143683
-
RFPA
-
note
-
RFPA, 12 U.S.C. § 3417(c).
-
U.S.C.
, vol.12
-
-
-
262
-
-
84873183441
-
United States v. Graham
-
note
-
Courts may also interpret law enforcement reliance on statutory provisions later ruled unconstitutional to constitute "good faith, " and thus preclude recovery. See, e.g., United States v. Graham, 846 F. Supp. 2d 384 (D. Md. 2012) (holding that even if police acquisition of cell-site data were unconstitutional, police acted in good-faith reliance on SCA).
-
(2012)
F. Supp. 2d
, vol.846
, pp. 384
-
-
-
263
-
-
84873198351
-
-
note
-
A range of immunity doctrines can impede recovery. Suits against the government require either a federal cause of action (like section 1983 or Bivens) or a state analogue. A state may have sovereign immunity, and a locality's immunity can be limited by requirements that plaintiffs show a policy, custom, or failure to train with deliberate indifference. Suits against persons in their official capacity raise the specter of qualified immunity if their actions did not, at the time, violate clearly established law. However, it should be noted that federal privacy statutes may at times serve as the basis for a claim raised under state law, even where federal law might be unavailing.
-
-
-
-
264
-
-
84873127427
-
Daniel v. Cantrell
-
note
-
E.g., Daniel v. Cantrell, 375 F.3d 377, 383-84 (6th Cir. 2004) (dismissing VPPAbased claims against law enforcement officers who obtained video rental records, noting that statute allowed recovery against only the video rental providers). Of course, such a provision particularly matters in the absence of an exclusionary rule, since a defendant whose information is improperly disclosed by a third party relying on law enforcement representations may have neither a route for civil redress (due to the third party's good-faith defense, and the lack of a cause of action against the officer) nor one for criminal redress (because the exclusionary rule does not apply).
-
(2004)
F.3d
, vol.375
-
-
-
265
-
-
84873143683
-
RFPA
-
note
-
E.g., RFPA, 12 U.S.C. § 3417(b).
-
U.S.C.
, vol.12
-
-
-
267
-
-
84873199341
-
Gonzaga Univ. v. Doe
-
note
-
Gonzaga Univ. v. Doe, 536 U.S. 273, 276-91 (2002) (FERPA does not give rise to private right of action).
-
(2002)
U.S.
, vol.536
-
-
-
268
-
-
84873164274
-
Accara v. Banks
-
note
-
Accara v. Banks, 470 F.3d 569 (5th Cir. 2006) (per curiam) (no private cause of action under HIPAA).
-
(2006)
F.3d
, vol.470
, pp. 569
-
-
-
269
-
-
29544443054
-
Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference
-
note
-
Professor Kerr's analysis was most directly addressed in Daniel J. Solove, Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference, 74 Fordham L. Rev. 747, 748, 760-77 (2005), but a handful of other scholars have also weighed in on specific aspects of this debate.
-
(2005)
Fordham L. Rev.
, vol.74
-
-
Solove, D.J.1
-
270
-
-
29544443054
-
Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference
-
note
-
Professor Kerr's analysis was most directly addressed in Daniel J. Solove, Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference, 74 Fordham L. Rev. 747, 748, 760-77 (2005), but a handful of other scholars have also weighed in on specific aspects of this debate.
-
(2005)
Fordham L. Rev.
, vol.74
-
-
Solove, D.J.1
-
271
-
-
84873184166
-
Privacy Act
-
note
-
E.g., Privacy Act § 3, 5 U.S.C. § 552a(i) (2006).
-
(2006)
U.S.C.
, vol.5
-
-
-
272
-
-
79958139351
-
Fair Credit Reporting Act
-
note
-
Fair Credit Reporting Act § 619, 15 U.S.C. § 1681q.
-
U.S.C.
, vol.15
-
-
-
273
-
-
84873208073
-
Electronic Communications Privacy Act of 1986
-
note
-
Electronic Communications Privacy Act of 1986 § 802, 18 U.S.C. § 2511 (2006).
-
(2006)
U.S.C.
, vol.18
-
-
-
274
-
-
84873132800
-
Driver's Privacy Protection Act of 1994
-
note
-
Driver's Privacy Protection Act of 1994 § 300002(a), 18 U.S.C. § 2723.
-
U.S.C.
, vol.18
-
-
-
275
-
-
84873193484
-
Health Insurance Portability and Accountability Act of 1996
-
note
-
Health Insurance Portability and Accountability Act of 1996 § 262(a), 42 U.S.C. § 1320d-6 (2006 & Supp. V 2011); 42 U.S.C. § 14135e (2006).
-
(2006)
U.S.C.
, vol.42
-
-
-
276
-
-
85053004188
-
Right to Financial Privacy Act of 1978
-
note
-
Right to Financial Privacy Act of 1978 § 1117, 12 U.S.C. § 3417.
-
U.S.C.
, vol.12
-
-
-
277
-
-
84873169989
-
Privacy Protection Act of 1980
-
note
-
Privacy Protection Act of 1980 § 106, 42 U.S.C. § 2000aa-6 (2006).
-
(2006)
U.S.C.
, vol.42
-
-
-
278
-
-
84873175644
-
-
note
-
Of course, there is much academic debate regarding the actual effectiveness of exclusion, but in principle the doctrine provides both an incentive for law enforcement to conform its behavior to the constitutional standard as well as a mechanism for law creation, norm setting, and public transparency.
-
-
-
-
279
-
-
29544443054
-
Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference
-
note
-
Professor Kerr's analysis was most directly addressed in Daniel J. Solove, Fourth Amendment Codification and Professor Kerr's Misguided Call for Judicial Deference, 74 Fordham L. Rev. 747, 748, 760-77 (2005), but a handful of other scholars have also weighed in on specific aspects of this debate.
-
(2005)
Fordham L. Rev.
, vol.74
-
-
Solove, D.J.1
-
280
-
-
21844513426
-
Privacy and Participation: Personal Information and Public Sector Regulation in the United States
-
Paul M. Schwartz, Privacy and Participation: Personal Information and Public Sector Regulation in the United States, 80 Iowa L. Rev. 553, 595 (1995).
-
(1995)
Iowa L. Rev.
, vol.80
-
-
Schwartz, P.M.1
-
281
-
-
84873123395
-
-
note
-
18 U.S.C. § 2723(b).
-
U.S.C.
, vol.18
-
-
-
282
-
-
84873149405
-
-
note
-
45 C.F.R. § 164.408(d) (2012) (HIPAA).
-
(2012)
C.F.R.
, vol.45
-
-
-
283
-
-
0347358112
-
Privacy and Democracy in Cyberspace
-
Paul M. Schwartz, Privacy and Democracy in Cyberspace, 52 Vand. L. Rev. 1609, 1632-33 (1999).
-
(1999)
Vand. L. Rev.
, vol.52
-
-
Schwartz, P.M.1
-
284
-
-
84873166766
-
-
note
-
20 U.S.C. § 1232g(b)(4).
-
U.S.C.
, vol.20
-
-
-
285
-
-
84873130178
-
-
note
-
20 U.S.C. § 1232g(b)(4).
-
U.S.C.
, vol.20
-
-
-
286
-
-
84873195427
-
Taxpayer Privacy and Tax Compliance
-
Stephen W. Mazza, Taxpayer Privacy and Tax Compliance, 51 U. Kan. L. Rev. 1065, 1095 (2003).
-
(2003)
U. Kan. L. Rev.
, vol.51
-
-
Mazza, S.W.1
-
287
-
-
84873150850
-
-
note
-
5 U.S.C. §§ 552a(u), 552a(s) (2006).
-
(2006)
U.S.C.
, vol.5
-
-
-
288
-
-
84873198318
-
COPPA did require a five-year report to Congress
-
note
-
Note that COPPA did require a five-year report to Congress. 15 U.S.C. § 6506 (2006).
-
(2006)
U.S.C.
, vol.15
-
-
-
289
-
-
84873113511
-
-
note
-
Section 552a(s) contains the original provision, but this requirement "cease[d] to be effective" on May 15, 2000. Federal Reports Elimination and Sunset Act of 1995, Pub. L. No. 104-66, § 3003(a)(1), 109 Stat. 707, 733, reprinted as amended in 31 U.S.C. § 1113 note at 197 (2006). Agencies still must submit reports under the Computer Matching and Privacy Protection portion of the Privacy Act.
-
-
-
-
290
-
-
84873115964
-
-
note
-
See 12 U.S.C. § 3421 (1988) (repealed 1995).
-
(1988)
U.S.C.
, vol.12
-
-
-
291
-
-
84866716557
-
People v. Defore
-
note
-
People v. Defore, 150 N.E. 585, 587 (N.Y. 1926). It is also unsatisfying as of late as the Supreme Court appears committed to dramatically curtailing its applicability.
-
(1926)
N.E.
, vol.150
-
-
-
292
-
-
77954476919
-
Hudson v. Michigan
-
Hudson v. Michigan, 547 U.S. 586 (2006).
-
(2006)
U.S.
, vol.547
, pp. 586
-
-
-
294
-
-
0347358112
-
Privacy and Democracy in Cyberspace
-
Paul M. Schwartz, Privacy and Democracy in Cyberspace, 52 Vand. L. Rev. 1609, 1632-33 (1999).
-
(1999)
Vand. L. Rev.
, vol.52
-
-
Schwartz, P.M.1
-
295
-
-
84873164781
-
The Right to Financial Privacy Act of 1978-The Congressional Response to United States v. Miller: A Procedural Right to Challenge Government Access to Financial Records
-
See Nancy M. Kirschner, The Right to Financial Privacy Act of 1978-The Congressional Response to United States v. Miller: A Procedural Right to Challenge Government Access to Financial Records, 13 U. Mich. J.L. Reform 10, 24 (1979).
-
(1979)
U. Mich. J.L. Reform
, vol.13
-
-
Kirschner, N.M.1
-
296
-
-
18344368345
-
Printz v. United States
-
note
-
Cf. Printz v. United States, 521 U.S. 898 (1997) (invalidating federal law that "commandeered" state officers for background checks on firearm purchasers).
-
(1997)
U.S.
, vol.521
, pp. 898
-
-
-
297
-
-
33044493019
-
New York v. United States
-
note
-
New York v. United States, 505 U.S. 144 (1992) (striking federal act as violative of Tenth Amendment).
-
(1992)
U.S.
, vol.505
, pp. 144
-
-
-
298
-
-
33645495000
-
United States v. Morrison
-
note
-
Cf. United States v. Morrison, 529 U.S. 598 (2000) (invalidating provision of Violence Against Women Act of 1994 that provided civil remedy for violation as insufficiently justified by Commerce Clause or Fourteenth Amendment).
-
(2000)
U.S.
, vol.529
, pp. 598
-
-
-
299
-
-
15744389689
-
United States v. Lopez
-
note
-
United States v. Lopez, 514 U.S. 549 (1995) (invalidating Gun-Free School Zones Act of 1990 as insufficiently justified under Commerce Clause).
-
(1995)
U.S.
, vol.514
, pp. 549
-
-
-
300
-
-
84873205822
-
Firearm Transaction Disclosure in the Digital Age: Should the Government Know What Is in Your Home?
-
note
-
See generally Elaine Vullmahn, Comment, Firearm Transaction Disclosure in the Digital Age: Should the Government Know What Is in Your Home?, 27 J. Marshall J. Computer & Info. L. 497, 503 (2010).
-
(2010)
J. Marshall J. Computer & Info. L.
, vol.27
-
-
Vullmahn, E.1
-
301
-
-
84873208516
-
-
528 U.S. 141, 147-48 (2000).
-
(2000)
U.S.
, vol.528
-
-
-
302
-
-
84873110047
-
Condon
-
note
-
Condon, 528 U.S. at 150-51.
-
U.S.
, vol.528
, pp. 150-151
-
-
-
303
-
-
84873209469
-
Foxworth v. Trustmark Nat'l Bank
-
note
-
See, e.g., Foxworth v. Trustmark Nat'l Bank, 934 F. Supp. 218, 223 (S.D. Miss. 1996) (remanding lawsuit based on state law claims back to state court and rejecting bank's argument of preemption).
-
(1996)
F. Supp.
, vol.934
-
-
-
304
-
-
84873142950
-
Grand Jury Subpoena (Conn. Sav. Bank)
-
note
-
In re Grand Jury Subpoena (Conn. Sav. Bank), 481 F. Supp. 833, 834-35 (D. Conn. 1979) (finding state law requiring notice preempted by RFPA). But see In re Grand Jury Subpoena, 41 F. Supp. 2d 1026, 1035-37 (D. Alaska 1999) (reconciling federal and state law, but noting remaining confusion since it would impose additional procedural burden on U.S. Attorney to seek delay of notice in order to comply with state statute).
-
(1979)
F. Supp.
, vol.481
-
-
-
305
-
-
84873165620
-
-
note
-
18 U.S.C. § 2710(f) (2006).
-
(2006)
U.S.C.
, vol.18
-
-
-
306
-
-
84873141558
-
-
note
-
42 U.S.C. § 1320d-7 (2006).
-
(2006)
U.S.C.
, vol.42
-
-
-
307
-
-
0004320806
-
-
note
-
Health Insurance Portability and Accountability Act of 1996, Pub. L. No. 104-191, § 264(c)(2), 110 Stat. 1936, 2033-34 (1996) (codified as note to 42 U.S.C. § 1320d-2 (2006) ("A regulation promulgated under paragraph (1) shall not supersede a contrary provision of State law, if the provision of State law imposes requirements, standards, or implementation specifications that are more stringent than the requirements, standards, or implementation specifications imposed under the regulation. "); 45 C.F.R. § 160.203 (2012).
-
(1996)
Health Insurance Portability and Accountability Act of 1996
-
-
-
308
-
-
84873103665
-
Protection for Invasions of Conversational and Communication Privacy by Electronic Surveillance in Family, Marriage, and Domestic Disputes Under Federal and State Wiretap and Store Communications Acts and the Common Law Privacy Invasion Tort
-
note
-
The Wiretap Act is commonly interpreted to preempt less protective state laws. See Richard C. Turkington, Protection for Invasions of Conversational and Communication Privacy by Electronic Surveillance in Family, Marriage, and Domestic Disputes Under Federal and State Wiretap and Store Communications Acts and the Common Law Privacy Invasion Tort, 82 Neb. L. Rev. 693, 704 (2004).
-
(2004)
Neb. L. Rev.
, vol.82
-
-
Turkington, R.C.1
-
309
-
-
84873104304
-
-
note
-
20 U.S.C. § 1232g(i)(2) (2006) (regarding drug and alcohol disclosures).
-
(2006)
U.S.C.
, vol.20
-
-
-
310
-
-
84873106932
-
-
note
-
47 U.S.C. § 552(d) (2006).
-
(2006)
U.S.C.
, vol.47
-
-
-
311
-
-
84873119545
-
-
note
-
15 U.S.C. § 6807 (2006).
-
(2006)
U.S.C.
, vol.15
-
-
-
312
-
-
84873140808
-
-
note
-
18 U.S.C. § 2703(d) (2006).
-
(2006)
U.S.C.
, vol.18
-
-
-
313
-
-
84873174837
-
-
note
-
15 U.S.C. § 1681t.
-
U.S.C.
, vol.15
-
-
-
314
-
-
84873141588
-
-
note
-
15 U.S.C. § 1681t.
-
U.S.C.
, vol.15
-
-
-
315
-
-
0347358112
-
Privacy and Democracy in Cyberspace
-
Paul M. Schwartz, Privacy and Democracy in Cyberspace, 52 Vand. L. Rev. 1609, 1632-33 (1999).
-
(1999)
Vand. L. Rev.
, vol.52
-
-
Schwartz, P.M.1
-
316
-
-
33646398875
-
Partial Preemption Under the Health Insurance Portability and Accountability Act
-
note
-
Grace Ko, Note, Partial Preemption Under the Health Insurance Portability and Accountability Act, 79 S. Cal. L. Rev. 497, 501 (2006).
-
(2006)
S. Cal. L. Rev.
, vol.79
-
-
Ko, G.1
-
317
-
-
84873207553
-
HIPAA's Preemption Provision Doomed Cooperative Federalism
-
Sarah Beatty Ratner, HIPAA's Preemption Provision Doomed Cooperative Federalism, 35 J. Health L. 523, 524, 536 (2002).
-
(2002)
J. Health L.
, vol.35
-
-
Ratner, S.B.1
-
318
-
-
84870626736
-
Nw. Mem'l Hosp. v. Ashcroft
-
note
-
Compare Nw. Mem'l Hosp. v. Ashcroft, 362 F.3d 923 (7th Cir. 2004) (quashing subpoena on ground of undue burden on hospital when weighed against patient privacy and limited probative value, but otherwise finding Illinois patient privilege inapplicable in federal question suits like the one at issue), with Nat'l Abortion Fed'n v. Ashcroft, No. 03 Civ. 8695(RCC), 2004 WL 555701, at *6 (S.D.N.Y. Mar. 19, 2004) (finding that HIPAA did not incorporate state privacy statute that was more stringent than federal standard and thus disclosure of medical records was permitted under federal evidence rules, which do not require compliance with state privacy law).
-
(2004)
F.3d
, vol.362
, pp. 923
-
-
-
319
-
-
84873169919
-
FERPA: Only a Piece of the Privacy Puzzle
-
note
-
See generally Margaret L. O'Donnell, FERPA: Only a Piece of the Privacy Puzzle, 29 J.C. & U.L. 679, 680-85, 698-99 (2003).
-
(2003)
J.C. & U.L.
, vol.29
-
-
O'Donnell, M.L.1
-
320
-
-
84873113711
-
The ECPA, ISPs & Obtaining E-mail: A Primer for Local Prosecutors
-
note
-
See Leonard Deutchman & Sean Morgan, The ECPA, ISPs & Obtaining E-mail: A Primer for Local Prosecutors, Am. Prosecutors Res. Inst., 6 (Jul. 2005), http://www.ndaa.org/pdf/ecpa_isps_obtaining_email_05.pdf ("Because there is a difference between the Fourth Amendment rights protected under Title III and the statutorily-created rights found in the SCA provisions of the ECPA, and because the preemption language of Section 2516 so clearly applies solely to Title III, it can be argued that federal law regarding stored electronic communication (e-mail) does not preempt and control state law as does federal wiretap law.").
-
(2005)
Am. Prosecutors Res. Inst.
, pp. 6
-
-
Deutchman, L.1
Morgan, S.2
-
321
-
-
66849143359
-
Federalization in Information Privacy Law
-
Patricia L. Bellia, Feature, Federalization in Information Privacy Law, 118 Yale L.J. 868, 887-89 (2009).
-
(2009)
Yale L.J.
, vol.118
-
-
Bellia, P.L.1
-
322
-
-
66849143359
-
Federalization in Information Privacy Law
-
Patricia L. Bellia, Feature, Federalization in Information Privacy Law, 118 Yale L.J. 868, 887-89 (2009).
-
(2009)
Yale L.J.
, vol.118
-
-
Bellia, P.L.1
-
323
-
-
66849143359
-
Federalization in Information Privacy Law
-
Patricia L. Bellia, Feature, Federalization in Information Privacy Law, 118 Yale L.J. 868, 887-89 (2009).
-
(2009)
Yale L.J.
, vol.118
-
-
Bellia, P.L.1
-
324
-
-
66849143359
-
Federalization in Information Privacy Law
-
Patricia L. Bellia, Feature, Federalization in Information Privacy Law, 118 Yale L.J. 868, 887-89 (2009).
-
(2009)
Yale L.J.
, vol.118
-
-
Bellia, P.L.1
-
325
-
-
84873176900
-
Zurcher v. Stanford Daily
-
note
-
Zurcher v. Stanford Daily, 436 U.S. 547 (1978) (holding that the First Amendment press right did not block execution of a warrant).
-
(1978)
U.S.
, vol.436
, pp. 547
-
-
-
326
-
-
77249131620
-
United States v. Miller
-
note
-
United States v. Miller, 425 U.S. 435 (1976) (holding that financial records handed over to a third-party financial institution receive no Fourth Amendment protection).
-
(1976)
U.S.
, vol.425
, pp. 435
-
-
-
327
-
-
66849143359
-
Federalization in Information Privacy Law
-
Patricia L. Bellia, Feature, Federalization in Information Privacy Law, 118 Yale L.J. 868, 887-89 (2009).
-
(2009)
Yale L.J.
, vol.118
-
-
Bellia, P.L.1
-
328
-
-
79751519568
-
Privacy on the Books and on the Ground
-
note
-
Kenneth A. Bamberger & Deirdre K. Mulligan, Privacy on the Books and on the Ground, 63 Stan. L. Rev. 247, 250-51 (2011) (comparing American model with the "model of protection adopted throughout Europe: omnibus [Fair Information Practices Principles]-based privacy principles in law or binding codes, interpreted and monitored by... [an] independent privacy agency").
-
(2011)
Stan. L. Rev.
, vol.63
-
-
Bamberger, K.A.1
Mulligan, D.K.2
-
329
-
-
79953885112
-
Reunifying Privacy Law
-
note
-
Lior Jacob Strahilevitz, Reunifying Privacy Law, 98 Calif. L. Rev. 2007, 2034 n.108 (2010) (amassing examples of "ECPAbashing").
-
(2010)
Calif. L. Rev.
, vol.98
, Issue.108
-
-
Strahilevitz, L.J.1
-
330
-
-
84873168704
-
Dirkes v. Borough of Runnemede
-
note
-
"[I]n construing the scope of the Act, this Court must strive to protect this aspect of an individual's right to privacy in the face of technological innovations that threaten this fundamental right. " Dirkes v. Borough of Runnemede, 936 F. Supp. 235, 239 (D.N.J. 1996).
-
(1996)
F. Supp.
, vol.936
-
-
-
331
-
-
84873164434
-
-
note
-
Of course, an empirical determination of which remedy is more effective is beyond the scope of this Article.
-
-
-
-
332
-
-
8744289773
-
The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution
-
See Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Mich. L. Rev. 801, 805, 857-87 (2004).
-
(2004)
Mich. L. Rev.
, vol.102
-
-
Kerr, O.S.1
-
333
-
-
84873152623
-
-
note
-
As I explain in a manuscript currently in progress, many contemporary tools of criminal justice (such as DNA, drug analysis machines, and even computer software) rely upon the development of materials and instruments by the private sector.
-
-
-
-
334
-
-
84873199643
-
Where Are We with Location Tracking: A Look at the Current Technology and the Implications on Fourth Amendment Jurisprudence
-
note
-
See generally Ian Herbert, Where Are We with Location Tracking: A Look at the Current Technology and the Implications on Fourth Amendment Jurisprudence, 16 Berkeley J. Crim. L. 442 (2011) (describing companies behind GPS tracking devices).
-
(2011)
Berkeley J. Crim. L.
, vol.16
, pp. 442
-
-
Herbert, I.1
-
335
-
-
84873155601
-
Davis v. United States
-
See, e.g., Davis v. United States, 131 S. Ct. 2419 (2011).
-
(2011)
S. Ct.
, vol.131
, pp. 2419
-
-
-
336
-
-
84873198550
-
Herring v. United States
-
Herring v. United States, 555 U.S. 135 (2009).
-
(2009)
U.S.
, vol.555
, pp. 135
-
-
-
337
-
-
84873167232
-
-
note
-
In this respect, my focus on privacy is more as a nominal idea that is the product of legal processes that shift and reconfigure over time-most particularly, as the previous Part tells us, from an exclusively constitutional or judicial category to something in which legislative enactments also play a role-than as a substantive set of rules or restrictions.
-
-
-
-
338
-
-
0003444750
-
-
note
-
Several models of such cooperative rule elaboration have been proposed over time. See, e.g., 1 Bruce Ackerman, We the People: Foundations 5 (1991).
-
(1991)
We the People: Foundations
, pp. 5
-
-
Ackerman, B.1
-
341
-
-
84888229417
-
Correspondence, Katz is Dead. Long Live Katz
-
Peter P. Swire, Correspondence, Katz is Dead. Long Live Katz., 102 Mich. L. Rev. 904, 913-14, 919-20 (2004).
-
(2004)
Mich. L. Rev.
, vol.102
-
-
Swire, P.P.1
-
342
-
-
33947416337
-
Katz v. United States
-
Katz v. United States, 389 U.S. 347, 353-56 (1967).
-
(1967)
U.S.
, vol.389
-
-
-
343
-
-
33947354725
-
Berger v. New York
-
note
-
Berger v. New York, 388 U.S. 41, 54-56 (1967).
-
(1967)
U.S.
, vol.388
-
-
-
344
-
-
77249131620
-
United States v. Miller
-
note
-
United States v. Miller, 425 U.S. 435, 442-43 (1976). The Privacy Protection Act of 1980 perhaps offers an example of the principle at work, although in a counterintuitive fashion, as there the legislature decided to enhance the threshold imposed by the Constitution.
-
(1976)
U.S.
, vol.425
-
-
-
345
-
-
84857620249
-
City of Chicago v. Morales
-
note
-
City of Chicago v. Morales, 527 U.S. 41 (1999).
-
(1999)
U.S.
, vol.527
, pp. 41
-
-
-
346
-
-
33846119553
-
Dickerson v. United States
-
note
-
Dickerson v. United States, 530 U.S. 428 (2000) (invalidating a statute intended to override the ruling that created the Miranda warnings for suspects).
-
(2000)
U.S.
, vol.530
, pp. 428
-
-
-
347
-
-
33846119553
-
Dickerson v. United States
-
note
-
Dickerson v. United States, 530 U.S. 428 (2000) (invalidating a statute intended to override the ruling that created the Miranda warnings for suspects).
-
(2000)
U.S.
, vol.530
, pp. 428
-
-
-
348
-
-
84959350300
-
-
428 U.S. 364 (1976).
-
(1976)
U.S.
, vol.428
, pp. 364
-
-
-
349
-
-
84873201632
-
-
note
-
495 U.S. 1 (1990) (invalidating under inventory-search exception a search in which closed containers were opened because the jurisdiction lacked a policy concerning the opening of containers).
-
(1990)
U.S.
, vol.495
, pp. 1
-
-
-
350
-
-
84873205834
-
Wells
-
note
-
Wells, 495 U.S. at 4-5.
-
U.S.
, vol.495
, pp. 4-5
-
-
-
351
-
-
84888229417
-
Correspondence, Katz is Dead. Long Live Katz
-
Peter P. Swire, Correspondence, Katz is Dead. Long Live Katz., 102 Mich. L. Rev. 904, 913-14, 919-20 (2004).
-
(2004)
Mich. L. Rev.
, vol.102
-
-
Swire, P.P.1
-
352
-
-
34247498788
-
Against Preemption: How Federalism Can Improve the National Legislative Process
-
note
-
Akin to Rick Hills's suggestion that state laws can prompt business interests to put topics on the federal agenda because those interests seek federal preemption, Roderick M. Hills, Jr., Against Preemption: How Federalism Can Improve the National Legislative Process, 82 N.Y.U. L. Rev. 1, 19-20 (2007), judicial rulings can similarly prompt law enforcement to put topics on the federal agenda for the same reason.
-
(2007)
N.Y.U. L. Rev.
, vol.82
-
-
Hills Jr., R.M.1
-
353
-
-
84873172588
-
-
note
-
132 S. Ct. 945, 954-57 (Sotomayor, J., concurring).
-
S. Ct.
, vol.132
-
-
-
354
-
-
84870558309
-
Jones
-
Jones, 132 S. Ct. at 956-57.
-
S. Ct.
, vol.132
, pp. 956-957
-
-
-
355
-
-
84870558309
-
Jones
-
Jones, 132 S. Ct. at 956-57.
-
S. Ct.
, vol.132
, pp. 956-957
-
-
-
356
-
-
84873111990
-
How to Address "Standardless Discretion" After Jones
-
note
-
Peter Swire & Erin Murphy, How to Address "Standardless Discretion" After Jones, Soc. Sci. Res. Network (June 4, 2012), http://ssrn.com/abstract=2122941.
-
(2012)
Soc. Sci. Res. Network
-
-
Swire, P.1
Murphy, E.2
-
357
-
-
84873111990
-
How to Address "Standardless Discretion" After Jones
-
note
-
Peter Swire & Erin Murphy, How to Address "Standardless Discretion" After Jones, Soc. Sci. Res. Network (June 4, 2012), http://ssrn.com/abstract=2122941.
-
(2012)
Soc. Sci. Res. Network
-
-
Swire, P.1
Murphy, E.2
-
358
-
-
84992179657
-
Jones
-
note
-
Precisely the complaint, it should be noted, that Justice Alito's concurrence made of Justice Scalia's plurality determination to use state-based common law to define the scope of constitutional protection in Jones. 132 S. Ct. at 961-62 (Alito, J., concurring in the judgment).
-
S. Ct.
, vol.132
, pp. 961-962
-
-
-
359
-
-
84992179657
-
Jones
-
note
-
Precisely the complaint, it should be noted, that Justice Alito's concurrence made of Justice Scalia's plurality determination to use state-based common law to define the scope of constitutional protection in Jones. 132 S. Ct. at 961-62 (Alito, J., concurring in the judgment).
-
S. Ct.
, vol.132
, pp. 961-962
-
-
|