Matches in SemOpenAlex for { <https://semopenalex.org/work/W396880260> ?p ?o ?g. }
Showing items 1 to 78 of
78
with 100 items per page.
- W396880260 startingPage "2321" @default.
- W396880260 abstract "TABLE OF CONTENTS INTRODUCTION I. BACKGROUND A. A Reasonable Expectation of Privacy B. General Fourth Amendment Challenges with Computers II. CLOUD STORAGE AND A REASONABLE EXPECTATION OF PRIVACY A. Is There a Reasonable Expectation to Begin With? 1. Positive Model of Privacy and the Electronic Communications Privacy Act a. Electronic Communication Services b. Remote Computing Services 2. The Current Law's Future and Policy Judgments B. The Third-Party Doctrine and Cloud Storage III. CLOUD STORAGE AND LOCAL SOFTWARE A. Plain View B. Exigent Circumstances IV. A POSSIBLE SOLUTION CONCLUSION INTRODUCTION Suppose the police suspect Winston of possessing child pornography on his computer. Acting on that suspicion, authorities secure a warrant to seize and search Winston's computer and all other digital storage mediums at his residence. However, when combing through the files stored on Winston's devices, the police find no trace of the illicit images. To ensure that the search is thorough, law enforcement officers begin to open separate programs installed on the machine, searching for documents hidden within the applications. One program they open is Microsoft's OneDrive, (1) which provides a list of files that are stored in Winston's cloud storage account. The files, however, are not actually present on his computer's hard drive, or on any other storage medium he possesses. The police do this despite the fact that their warrant specifies only their right to search the contents of Winston's physical drive. Regardless, they can see the files available for download and they seize them anyway. Later, when checking the downloaded data, the police do not find any evidence of child pornography, but they do find documents incriminating Winston of another crime. As it turns out, Winston does not traffic child porn, but he was in fact committing bank fraud. This seemingly small exploration might appear innocuous on its face, but it carries broad implications for search and seizure law in a digital environment. The warrant gave the police license to search files on Winston's computer and the storage media he owned, but in this instance they did not find incriminating data there. Instead, the police discovered evidence on a remote platform that Winston's computer could access, but the evidence was not stored on his actual computer. The Fourth Amendment to the Constitution protects citizens against warrantless searches and seizures of their homes, papers, and effects. (2) Nevertheless, this guarantee is not unconditional; the Supreme Court has recognized several exceptions. (3) Courts face the challenge of applying these standards as society and technology evolve beyond the immediate foresight of the Fourth Amendment's drafters. Winston's predicament highlights not only the general Fourth Amendment difficulties intrinsic to searching computers, but also the added complications of privacy and the Internet. The aforementioned hypothetical dealt specifically with issues surrounding cloud computing. Cloud computing is a colloquial term for computer services provided remotely over the Internet, rather than by direct local access. (4) Cloud computing has both a private and a public form. A private cloud hosts services to a limited number of people, (5) whereas a public cloud is one offered through a third-party service to general consumers. (6) In particular, cloud storage is a term for storing data and files on remote drives. (7) A user essentially sends their files to another location where the files are redundantly preserved. (8) Companies providing public cloud storage maintain user data on clusters of networked servers at off-site locations. (9) Users can upload data to cloud servers in various ways, including placing files in a folder that synchronizes with the storage service, (10) accessing the account directly from an Internet browser, or doing so through cloud-linked software installed on a computer. …" @default.
- W396880260 created "2016-06-24" @default.
- W396880260 creator A5062676495 @default.
- W396880260 date "2015-05-01" @default.
- W396880260 modified "2023-09-24" @default.
- W396880260 title "Obscured by Clouds: The Fourth Amendment and Searching Cloud Storage Accounts Through Locally Installed Software" @default.
- W396880260 hasPublicationYear "2015" @default.
- W396880260 type Work @default.
- W396880260 sameAs 396880260 @default.
- W396880260 citedByCount "0" @default.
- W396880260 crossrefType "journal-article" @default.
- W396880260 hasAuthorship W396880260A5062676495 @default.
- W396880260 hasConcept C10138342 @default.
- W396880260 hasConcept C108827166 @default.
- W396880260 hasConcept C110875604 @default.
- W396880260 hasConcept C111919701 @default.
- W396880260 hasConcept C136764020 @default.
- W396880260 hasConcept C144133560 @default.
- W396880260 hasConcept C17744445 @default.
- W396880260 hasConcept C199539241 @default.
- W396880260 hasConcept C2776211767 @default.
- W396880260 hasConcept C2776916960 @default.
- W396880260 hasConcept C2777059624 @default.
- W396880260 hasConcept C2777154746 @default.
- W396880260 hasConcept C2778223634 @default.
- W396880260 hasConcept C2778910426 @default.
- W396880260 hasConcept C2780262971 @default.
- W396880260 hasConcept C38652104 @default.
- W396880260 hasConcept C41008148 @default.
- W396880260 hasConcept C79974875 @default.
- W396880260 hasConceptScore W396880260C10138342 @default.
- W396880260 hasConceptScore W396880260C108827166 @default.
- W396880260 hasConceptScore W396880260C110875604 @default.
- W396880260 hasConceptScore W396880260C111919701 @default.
- W396880260 hasConceptScore W396880260C136764020 @default.
- W396880260 hasConceptScore W396880260C144133560 @default.
- W396880260 hasConceptScore W396880260C17744445 @default.
- W396880260 hasConceptScore W396880260C199539241 @default.
- W396880260 hasConceptScore W396880260C2776211767 @default.
- W396880260 hasConceptScore W396880260C2776916960 @default.
- W396880260 hasConceptScore W396880260C2777059624 @default.
- W396880260 hasConceptScore W396880260C2777154746 @default.
- W396880260 hasConceptScore W396880260C2778223634 @default.
- W396880260 hasConceptScore W396880260C2778910426 @default.
- W396880260 hasConceptScore W396880260C2780262971 @default.
- W396880260 hasConceptScore W396880260C38652104 @default.
- W396880260 hasConceptScore W396880260C41008148 @default.
- W396880260 hasConceptScore W396880260C79974875 @default.
- W396880260 hasIssue "6" @default.
- W396880260 hasLocation W3968802601 @default.
- W396880260 hasOpenAccess W396880260 @default.
- W396880260 hasPrimaryLocation W3968802601 @default.
- W396880260 hasRelatedWork W130789376 @default.
- W396880260 hasRelatedWork W1563065269 @default.
- W396880260 hasRelatedWork W1654380553 @default.
- W396880260 hasRelatedWork W2192937377 @default.
- W396880260 hasRelatedWork W2302485670 @default.
- W396880260 hasRelatedWork W2307371548 @default.
- W396880260 hasRelatedWork W2318072429 @default.
- W396880260 hasRelatedWork W2327626616 @default.
- W396880260 hasRelatedWork W2595151528 @default.
- W396880260 hasRelatedWork W2609978007 @default.
- W396880260 hasRelatedWork W266006277 @default.
- W396880260 hasRelatedWork W2765747283 @default.
- W396880260 hasRelatedWork W3122423505 @default.
- W396880260 hasRelatedWork W3124197490 @default.
- W396880260 hasRelatedWork W3170932308 @default.
- W396880260 hasRelatedWork W341690970 @default.
- W396880260 hasRelatedWork W854590 @default.
- W396880260 hasRelatedWork W1760035875 @default.
- W396880260 hasRelatedWork W1809389405 @default.
- W396880260 hasRelatedWork W2599964192 @default.
- W396880260 hasVolume "56" @default.
- W396880260 isParatext "false" @default.
- W396880260 isRetracted "false" @default.
- W396880260 magId "396880260" @default.
- W396880260 workType "article" @default.