Requiring protocols in computer search warrants

被引:1
作者
Brenner, SW [1 ]
机构
[1] Univ Dayton, Sch Law, Dayton, OH 45469 USA
关键词
search warrant; protocol; Fourth Amendment; searching computers; seizing computers;
D O I
10.1016/j.diin.2005.07.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A controversy is brewing in the United States as to whether the magistrate who issues a computer search warrant can require the officer seeking the warrant to provide a protocol to be used in executing the search. The U.S. Department of Justice's guidelines on searching and seizing computers recommend including a protocol in the warrant application when possible. The controversy raises two interacting issues: the extent to which a magistrate has the authority to prescribe how computer searches should be conducted and the extent to which the expectation of privacy in a computer is "different" from that for other containers. The magistrates who require protocols insist that they have the authority to do so under the Fourth Amendment. There are very few federal cases on the issue, none of which are clearly dispositive, and one state case. The article explains why the controversy has arisen and analyzes how it may ultimately be resolved. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:180 / 188
页数:9
相关论文
共 1 条
[1]  
Susan W.B., The fourth amendment in an era of ubiquitous technology, Mississippi Law Journal, 74, 1, (2005)