{"id":28774,"date":"2017-08-26T16:15:24","date_gmt":"2017-08-26T21:15:24","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=28774"},"modified":"2017-08-26T16:15:24","modified_gmt":"2017-08-26T21:15:24","slug":"the-smart-fourth-amendment-102-cornell-l-rev-547-2017","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=28774","title":{"rendered":"The &#8216;Smart&#8217; Fourth Amendment, 102 Cornell L. Rev. 547 (2017)"},"content":{"rendered":"<p><a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2752788\">The &#8216;Smart&#8217; Fourth Amendment<\/a>, 102 Cornell L. Rev. 547 (2017) by Andrew Guthrie Ferguson. Abstract:<br \/>\n<!--more--><\/p>\n<blockquote><p>\u201cSmart\u201d devices radiate data, detailing a continuous, intimate, and revealing pattern of daily life. Billions of sensors will soon collect data from smartphones, smart homes, smart cars, medical devices and an evolving assortment of consumer and commercial products. But, what are these data trails to the Fourth Amendment? Does data emanating from devices on or about our bodies, houses, things, and digital effects fall within the Fourth Amendment\u2019s protection of \u201cpersons, homes, papers, or effects\u201d? Does interception of this information violate a \u201creasonable expectation of privacy?\u201d <\/p>\n<p>The \u201cInternet of Things\u201d and the growing proliferation of smart devices create new opportunities for police investigation. If this web of sensor surveillance falls outside of the Fourth Amendment, then warrantless collection and tracking of this smart data presents no constitutional concern. If these data trails deserve constitutional protection, a new theory of the Fourth Amendment must be developed. <\/p>\n<p>This article addresses the question of how the Fourth Amendment should protect \u201csmart data.\u201d It exposes the growing danger of sensor surveillance and the weakness of current Fourth Amendment doctrine. The article then suggests a new theory of \u201cinformational curtilage\u201d to protect the data trails emerging from smart devices and reclaims the principle of \u201cinformational security\u201d as the organizing framework for a digital Fourth Amendment. <\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The &#8216;Smart&#8217; Fourth Amendment, 102 Cornell L. Rev. 547 (2017) by Andrew Guthrie Ferguson. Abstract:<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76],"tags":[],"class_list":["post-28774","post","type-post","status-publish","format-standard","hentry","category-surveillance-technology"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/28774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=28774"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/28774\/revisions"}],"predecessor-version":[{"id":28775,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/28774\/revisions\/28775"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=28774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=28774"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=28774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}