Weaver, 2013 - Google Patents
Administrative Searches, Technology and Personal PrivacyWeaver, 2013
View PDF- Document ID
- 16238911924200998581
- Author
- Weaver R
- Publication year
- Publication venue
- Wm. & Mary Bill Rts. J.
External Links
Snippet
Although administrative searches have been conducted since the British colonial period, modem administrative searches have become potentially more intrusive because of advances in technology. Agencies still conduct many of the same types of searches that they …
- 238000005516 engineering process 0 title abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public service
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Clancy | The role of individualized suspicion in assessing the reasonableness of searches and seizures | |
| Coombs | Shared Privacy and the Fourth Amendment, or the Rights of Relationships | |
| Solove | Digital dossiers and the dissipation of fourth amendment privacy | |
| Kerr | Terms of Service and Fourth Amendment Rights | |
| Mestitz | Unpacking digital containers: Extending Riley's reasoning to digital files and subfolders | |
| Patel et al. | Social media monitoring | |
| Weaver | Administrative Searches, Technology and Personal Privacy | |
| Tien | Privacy, technology and data mining | |
| Bloom et al. | Criminal procedure: The constitution and the police | |
| Townsend | Laptop Searches at the Border and United States v. Cotterman | |
| Sisk et al. | READING THE PRISONER’S LETTER | |
| Pryby | Forensic Border Searches After" Carpenter" Require Probable Cause and a Warrant | |
| Calman | Spy vs. spouse: Regulating surveillance software on shared marital computers | |
| Bernstein | Fourth Amendment--Using the Drug Courier Profile to Fight the War on Drugs | |
| Fontecchio | Suspicionless Laptop Searches Under the Border Search Doctrine: The Fourth Amendment Exception That Swallows Your Laptop | |
| Galloway Jr | Basic Fourth Amendment Analysis | |
| Kerr | Searching and seizing computers and obtaining electronic evidence in criminal investigations | |
| Power | Changing expectations of privacy and the fourth amendment | |
| Hoeffel et al. | Fear and Loathing at the US Border | |
| Pryby | Forensic Border Searches After Carpenter Require Probable Cause | |
| Mullen | The Hidden Crisis at the Border: The Government's Carte Blanche Access to Travelers' Electronic Devices and the Need to Reimplement Reasonableness | |
| Leach | Flyers Beware: The Ninth Circuit Decision, United States v. Arnold, Granted Customs Agents Access into Your Laptops | |
| Harrell | Down to the Last. JPEG: Addressing the Constitutionality of Suspicionless Border Searches of Computers and One Court's Pioneering Approach in United States v. Arnold | |
| Diab | Does the State Have a Compelling Interest in Searching Device Data at the Border? Emerging Approaches to Reasonable Search in Canada and the United States | |
| Lambert | United States v. Jacobsen: Expanded Private Search Doctrine Undermining Fourth Amendment Values |