SlideShare a Scribd company logo
1 of 6
Breach of Privacy in the
Age of Technology
Brianna Price
briannaprice@unomaha.edu
Introduction
• Privacy Infringement
• Cell Site Location Information (CSLI)
• Violations of the Fourth Amendment
• Case Laws and Legal Analyses
Legal History:
• Privacy Rights in an Open and Changing Society
• Communication and the Law, 2019 Edition
• Terilli Jr. & Splichal
• Evolution of Privacy Rights
• Foundation of Fourth Amendment
• Technological Intrusion in today’s society
Case Laws:
• United States v. Graham (2012)
• Through tracking of CSLI, Graham and Jordan were linked to a series of robberies
• Riley v. California (2014)
• Unconsented search of cell phone by law enforcement officer linked Riley to gang
violence
• Carpenter v. United States (2018)
• Through tracking of CSLI, Carpenter was linked to a series of robberies
Law Analyses:
• Cumpstone, 2016
• Real-time tracking of CSLI violates Fourth Amendment because it, “violates a person’s
reasonable expectation of privacy, constitutes a trespass doctrine, and relies on
technology not available to the general public when conducting a search.”
• D’Amico, 2016
• Conflict between supreme courts, federal courts of appeal, and lower courts on
whether a warrant should be obtained to access CSLI
• “Whether privacy is reasonably expected in CSLI or not, there must be some
uniformity among the courts so that society has some guidance”
Conclusion
• John Doe v. Sam Reed (2010)
• Signing a petition is accessible to public
• First Amendment + Fourth Amendment
• Tie together through question of consent or intrusion of privacy
• Purpose of Cell Phones
• Citizens must be aware of laws that give government access to CSLI

More Related Content

What's hot

Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapanrmackinnon
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology AlyssaSingleterry
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetVincy
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counselamprivacy
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)Ian Tausig
 
Right to personality and privacy in south korea
Right to personality and privacy in south koreaRight to personality and privacy in south korea
Right to personality and privacy in south koreaK.s. Park
 
President and Social Media
President and Social MediaPresident and Social Media
President and Social MediaKathryn Nizzi
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 
2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the YoungFrederick Lane
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Mc Kenna - The Legal Limits of Tolerance: Managing Controversial Employees
Mc Kenna - The Legal Limits of Tolerance:  Managing Controversial EmployeesMc Kenna - The Legal Limits of Tolerance:  Managing Controversial Employees
Mc Kenna - The Legal Limits of Tolerance: Managing Controversial EmployeesHR Florida State Council, Inc.
 

What's hot (20)

Pls 780 week 9
Pls 780 week 9Pls 780 week 9
Pls 780 week 9
 
Digital law
Digital lawDigital law
Digital law
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
 
Ohara winchester 21.4.15
Ohara winchester 21.4.15Ohara winchester 21.4.15
Ohara winchester 21.4.15
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internet
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)
 
Right to personality and privacy in south korea
Right to personality and privacy in south koreaRight to personality and privacy in south korea
Right to personality and privacy in south korea
 
President and Social Media
President and Social MediaPresident and Social Media
President and Social Media
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Laura Quilter NISO Privacy Meeting #4 - June 19, 2015
Laura Quilter NISO Privacy Meeting #4 - June 19, 2015Laura Quilter NISO Privacy Meeting #4 - June 19, 2015
Laura Quilter NISO Privacy Meeting #4 - June 19, 2015
 
Cyberbullying and the law
Cyberbullying and the lawCyberbullying and the law
Cyberbullying and the law
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
SOPA
SOPASOPA
SOPA
 
Mc Kenna - The Legal Limits of Tolerance: Managing Controversial Employees
Mc Kenna - The Legal Limits of Tolerance:  Managing Controversial EmployeesMc Kenna - The Legal Limits of Tolerance:  Managing Controversial Employees
Mc Kenna - The Legal Limits of Tolerance: Managing Controversial Employees
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 

Similar to Breach of Privacy in the Age of Technology

Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
 
Mass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and GovernmentMass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and Governmentczavisca
 
Janae gerard final digital law and policy
Janae gerard final digital law and policyJanae gerard final digital law and policy
Janae gerard final digital law and policyjanaegerard
 
AboutPressCopyrightContact usCreatorsAdvertiseDevelopersTermsPrivacy
AboutPressCopyrightContact usCreatorsAdvertiseDevelopersTermsPrivacyAboutPressCopyrightContact usCreatorsAdvertiseDevelopersTermsPrivacy
AboutPressCopyrightContact usCreatorsAdvertiseDevelopersTermsPrivacymilissaccm
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptAnil Yadav
 
3 ways cops are catching crooks
3 ways cops are catching crooks3 ways cops are catching crooks
3 ways cops are catching crookshunterfithen
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the YoungFrederick Lane
 
English Final stop & frisk
English Final stop & friskEnglish Final stop & frisk
English Final stop & friskleandra_budhram
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docxdrennanmicah
 
352 filson:loo:mclaughlin
352 filson:loo:mclaughlin352 filson:loo:mclaughlin
352 filson:loo:mclaughlinHallieFilson
 
National Civic Summit - Lorraine C. Minnite
National Civic Summit - Lorraine C. MinniteNational Civic Summit - Lorraine C. Minnite
National Civic Summit - Lorraine C. MinniteNational Civic Summit
 
Terry vs. Ohio CJ302 Terry vs. OhioNam.docx
Terry vs. Ohio     CJ302 Terry vs. OhioNam.docxTerry vs. Ohio     CJ302 Terry vs. OhioNam.docx
Terry vs. Ohio CJ302 Terry vs. OhioNam.docxmattinsonjanel
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Santosh Sigdel
 
Sex Trafficking Survivors Fighting Constant Revictimization.pdf
Sex Trafficking Survivors Fighting Constant Revictimization.pdfSex Trafficking Survivors Fighting Constant Revictimization.pdf
Sex Trafficking Survivors Fighting Constant Revictimization.pdfHeatherTapani
 

Similar to Breach of Privacy in the Age of Technology (20)

Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
Essay On 4Th Amendment
Essay On 4Th AmendmentEssay On 4Th Amendment
Essay On 4Th Amendment
 
Digital Privacy
Digital PrivacyDigital Privacy
Digital Privacy
 
4Th Amendment Essay
4Th Amendment Essay4Th Amendment Essay
4Th Amendment Essay
 
4Th Amendment Essay
4Th Amendment Essay4Th Amendment Essay
4Th Amendment Essay
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
Mass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and GovernmentMass Media and Society Chapter 15: Media and Government
Mass Media and Society Chapter 15: Media and Government
 
Janae gerard final digital law and policy
Janae gerard final digital law and policyJanae gerard final digital law and policy
Janae gerard final digital law and policy
 
5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University
 
AboutPressCopyrightContact usCreatorsAdvertiseDevelopersTermsPrivacy
AboutPressCopyrightContact usCreatorsAdvertiseDevelopersTermsPrivacyAboutPressCopyrightContact usCreatorsAdvertiseDevelopersTermsPrivacy
AboutPressCopyrightContact usCreatorsAdvertiseDevelopersTermsPrivacy
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.ppt
 
3 ways cops are catching crooks
3 ways cops are catching crooks3 ways cops are catching crooks
3 ways cops are catching crooks
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young
 
English Final stop & frisk
English Final stop & friskEnglish Final stop & frisk
English Final stop & frisk
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
 
352 filson:loo:mclaughlin
352 filson:loo:mclaughlin352 filson:loo:mclaughlin
352 filson:loo:mclaughlin
 
National Civic Summit - Lorraine C. Minnite
National Civic Summit - Lorraine C. MinniteNational Civic Summit - Lorraine C. Minnite
National Civic Summit - Lorraine C. Minnite
 
Terry vs. Ohio CJ302 Terry vs. OhioNam.docx
Terry vs. Ohio     CJ302 Terry vs. OhioNam.docxTerry vs. Ohio     CJ302 Terry vs. OhioNam.docx
Terry vs. Ohio CJ302 Terry vs. OhioNam.docx
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
Sex Trafficking Survivors Fighting Constant Revictimization.pdf
Sex Trafficking Survivors Fighting Constant Revictimization.pdfSex Trafficking Survivors Fighting Constant Revictimization.pdf
Sex Trafficking Survivors Fighting Constant Revictimization.pdf
 

Recently uploaded

如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 

Recently uploaded (20)

如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 

Breach of Privacy in the Age of Technology

  • 1. Breach of Privacy in the Age of Technology Brianna Price briannaprice@unomaha.edu
  • 2. Introduction • Privacy Infringement • Cell Site Location Information (CSLI) • Violations of the Fourth Amendment • Case Laws and Legal Analyses
  • 3. Legal History: • Privacy Rights in an Open and Changing Society • Communication and the Law, 2019 Edition • Terilli Jr. & Splichal • Evolution of Privacy Rights • Foundation of Fourth Amendment • Technological Intrusion in today’s society
  • 4. Case Laws: • United States v. Graham (2012) • Through tracking of CSLI, Graham and Jordan were linked to a series of robberies • Riley v. California (2014) • Unconsented search of cell phone by law enforcement officer linked Riley to gang violence • Carpenter v. United States (2018) • Through tracking of CSLI, Carpenter was linked to a series of robberies
  • 5. Law Analyses: • Cumpstone, 2016 • Real-time tracking of CSLI violates Fourth Amendment because it, “violates a person’s reasonable expectation of privacy, constitutes a trespass doctrine, and relies on technology not available to the general public when conducting a search.” • D’Amico, 2016 • Conflict between supreme courts, federal courts of appeal, and lower courts on whether a warrant should be obtained to access CSLI • “Whether privacy is reasonably expected in CSLI or not, there must be some uniformity among the courts so that society has some guidance”
  • 6. Conclusion • John Doe v. Sam Reed (2010) • Signing a petition is accessible to public • First Amendment + Fourth Amendment • Tie together through question of consent or intrusion of privacy • Purpose of Cell Phones • Citizens must be aware of laws that give government access to CSLI