[go: up one dir, main page]

Weaver, 2013 - Google Patents

Administrative Searches, Technology and Personal Privacy

Weaver, 2013

View PDF
Document ID
16238911924200998581
Author
Weaver R
Publication year
Publication venue
Wm. & Mary Bill Rts. J.

External Links

Snippet

Although administrative searches have been conducted since the British colonial period, modem administrative searches have become potentially more intrusive because of advances in technology. Agencies still conduct many of the same types of searches that they …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public service
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass

Similar Documents

Publication Publication Date Title
Clancy The role of individualized suspicion in assessing the reasonableness of searches and seizures
Coombs Shared Privacy and the Fourth Amendment, or the Rights of Relationships
Solove Digital dossiers and the dissipation of fourth amendment privacy
Kerr Terms of Service and Fourth Amendment Rights
Mestitz Unpacking digital containers: Extending Riley's reasoning to digital files and subfolders
Patel et al. Social media monitoring
Weaver Administrative Searches, Technology and Personal Privacy
Tien Privacy, technology and data mining
Bloom et al. Criminal procedure: The constitution and the police
Townsend Laptop Searches at the Border and United States v. Cotterman
Sisk et al. READING THE PRISONER’S LETTER
Pryby Forensic Border Searches After" Carpenter" Require Probable Cause and a Warrant
Calman Spy vs. spouse: Regulating surveillance software on shared marital computers
Bernstein Fourth Amendment--Using the Drug Courier Profile to Fight the War on Drugs
Fontecchio Suspicionless Laptop Searches Under the Border Search Doctrine: The Fourth Amendment Exception That Swallows Your Laptop
Galloway Jr Basic Fourth Amendment Analysis
Kerr Searching and seizing computers and obtaining electronic evidence in criminal investigations
Power Changing expectations of privacy and the fourth amendment
Hoeffel et al. Fear and Loathing at the US Border
Pryby Forensic Border Searches After Carpenter Require Probable Cause
Mullen The Hidden Crisis at the Border: The Government's Carte Blanche Access to Travelers' Electronic Devices and the Need to Reimplement Reasonableness
Leach Flyers Beware: The Ninth Circuit Decision, United States v. Arnold, Granted Customs Agents Access into Your Laptops
Harrell Down to the Last. JPEG: Addressing the Constitutionality of Suspicionless Border Searches of Computers and One Court's Pioneering Approach in United States v. Arnold
Diab Does the State Have a Compelling Interest in Searching Device Data at the Border? Emerging Approaches to Reasonable Search in Canada and the United States
Lambert United States v. Jacobsen: Expanded Private Search Doctrine Undermining Fourth Amendment Values