Page 199 - Privacy in a Cyber Age Policy and Practice
P. 199

NOTES  187

              “circular to say that there is no invasion of privacy unless the individual whose
              privacy is invaded had a reasonable expectation of privacy; whether he will or
              will not have such an expectation will depend on what the legal rule is”). See
              also Richard S. Julie, High-Tech Surveillance Tools and the Fourth Amendment:
              Reasonable Expectations of Privacy in the Technological Age, 37 Am. Crim. L.
              Rev. 132 (2000); Anthony G. Amsterdam, Perspectives on the Fourth Amend-
              ment, 58 Minn. L. Rv. 349, 384 (1974); Jed Rubenfeld, The End of Privacy, 61
              Stan. L. Rev. 106 (2008); Richard H. Seamon, Kyllo v. United States and the Par-
              tial Ascendance of Justice Scalia’s Fourth Amendment, 79 Wash. U. L. Q. 1023–4
              (2001). The Court acknowledged this criticism in Kyllo, 121 S. Ct. at 2043.
           33.  Amitai Etzioni, “A Liberal Communitarian Conception of Privacy,” John Mar-
              shall Journal of Information Technology and Privacy Law 29, no. 419 (2012).
           34.  Peter P. Swire, “Katz Is Dead. Long Live  Katz,”  Michigan Law Review 102,
              (2004): 913.
           35.  United States v. Windsor (570 U.S. 12, 2013).
           36.  For a concept of harm, see Cate, Cullen, and Mayer-Schönberger, “Reinventing
              Privacy Principles for the Big Data Age,” 14.
           37.  Berkemer v. McCarty (468 U.S. 420, 1984). Although the Supreme Court
              granted certiorari to a case of drunk driving that sought to clarify this distinc-
              tion, the Court ruled that until the suspect is actually placed under arrest and
              into a police vehicle the question of whether she is in custody is a function
              of the extent to which the circumstances of the stop mimic the restraints and
              stresses of actual arrest.
           38.  In common law, “impartial” was understood to mean having a lack of familial
              ties to or financial interest in the outcome of a case; however, today people
              often interpret “impartial” to mean that jurors know nothing of the case at
              hand other than the facts presented at trial. Caren Myers Morrison, “Jury 2.0,”
              Hastings Law Journal 62, 6 (2011): 1619.
           39.  Maynard v. United States. Orin Kerr, “The Mosaic Theory of the Fourth
              Amendment,” Michigan Law Review 111, 3 (2012): 329.
           40.  Though arguably restrictions or guidelines on the megabytes of information to
              be collected should vary based on the type of information. This is because the
              byte is strictly speaking a measure of data, not information. 100 mb of data,
              for example, is enough for thousands of text e-mails but less than five minutes
              of high-quality video, and the former could provide a much greater amount of
              private information than the latter.
           41.  “Surveillance Self-Defense: Getting a Court Order Authorizing a Wiretap,”
              Electronic Frontier Foundation, Accessed March 13, 2014, https://ssd.eff.org/
              wire/govt/wiretapping-authorization.
           42.  Kevin V. Ryan and Mark L. Krotosi, “Caution Advised: Avoid Undermining the
              Legitimate Needs of Law Enforcement to Solve Crimes Involving the Internet
              in Amending the Electronic Communications Privacy Act,” University of San
              Francisco Law Review 47, 2 (2012): 321.
           43.  United States v. Jones (2012).
           44.  To clarify, speed cameras tell only what speed a vehicle is going at a single
              moment in time—that is, they collect one discrete data point. The same is true
   194   195   196   197   198   199   200   201   202   203   204