...Search and Seizure of Cell Phone Courtney Henry COMM/215 12 May 2014 Virginia Stewart Search and Seizure of Cell Phone It is in the best interest of everyone not to have their cell phone search and seize during a routine traffic stop or when arrested. Although the police may or may not have probable cause, that shouldn’t give the police the right to search and seize your phone without a warrant. It is in the best interest of everyone because your Fourth Amendment right is being violated and your privacy is being taking away from you. Your cell phone should be considered as your property as stated in the fourth amendment, which cannot be searched without a warrant. Your cell phone contains a lot of sensitive information such as banking information, medical records, personal photos, videos, names of friends, and associates that you wouldn’t want for anyone else to know. Even if an arrest is being made for a major traffic violation such as DWI, excessive speeding, driving reckless, or the suspicion of a crime, a police offer should produce a warrant to justify the search and seizure of your cell phone. Probable Cause During a routine traffic stop, a police officer has a lot of power to their discretion. If they pull you over for speeding, not wearing your seat belt, having expired tags or a blown taillight, they may give you a ticket or give you a warning. In the most extreme case they may arrest you for not wearing your seatbelt or if you have an outstanding warrant...
Words: 1312 - Pages: 6
...really knows besides big brother? One thing is for sure though, and that’s if you carry around a cell phone they know where you are and they know what you are talking about. Some may say this is an invasion of privacy and some may say that it’s necessary to crack down on crime. With technology getting better and better not only can they track where you are, but listen in on your conversations. Although tracking citizens through their cell phones and listening in on conversations may seem like an invasion to their right of privacy, safety is more important than privacy and these things are crucial steps to keeping the United States as safe as possible. Some may wonder how is it that the government can figure out where people are through their cell phones. The quick answer to that would be cell phone towers. According to Science Correspondent Ronald Bailey, there are almost 300,000 cell towers and 600,000 micro sites. (Bailey 1) Your phone hits one of these cell towers approximately every seven seconds when it is on. Bailey also states that these hits off of the towers can register your location within 150 feet and “ By 2018 new Federal Communications Commission regulations will require that cell phone location information be even more precise: within 50 feet.” (2) That tool and law enforcement goes hand in hand because so many people; including criminals, carry cell phones and that can give them information they need to solve cases. Good example of this tool being utilized...
Words: 1118 - Pages: 5
...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords ...
Words: 7224 - Pages: 29
...implications of cell phones are – Proposed bills, cell phone unlocking, and political gain Bills are proposed when a product has caused danger to our society. Examples of this are the texting while driving ban in 39 states and the driving while talking on your cell phone, the hands free law, in 10 states. A growing concern now is the possible health effects of cell phone radiation. Though, nothing is conclusive, a few states jumped in and started proposing for bills to be passed. Cell phone unlocking is a hot topic today. Consumers believe that if you purchase your phone, it is yours to do what you wish. Congress didn’t agree and exempted cell phone unlocking from the Digital millennium copyright act. The act actually makes it a federal crime for you to unlock your purchased cell phone without permission from your carrier in which you purchased it from. This makes you have to purchase a new phone everytime you want to switch carriers. Politicians have stepped up an joined new technology. I never would have thought about is, but yes, there is an App for that. In the past election, 80 % of voters used their cell phones to gain details about politics and 8% of voters had an App from a campaing, political party, or interest group related to the campaign. You might have received in the last election a campaign pitch on your cell phone using all your minutes. Though there are guidelines for the campaigns to follow, they found loop holes to reach you all day via cell phone. Sneaky...
Words: 1467 - Pages: 6
...is the cell phone. This little item that can fit in the palm of your hand, has become a part of our everyday life. It is our lifeline for phone numbers, emails, pictures and numerous other pieces of our life. The cell phone reminds us of upcoming birthdays or medication refills. But in my opinion there are 3 major impacts of this specific technology. They are social interaction, privacy, injury. I will also look into the future and talk about what may be on the horizon for the cell phone. First of all, how the cell phone has affected our social interaction. Have you ever been sitting at a restaurant for a nice dinner with your family, and looked around at other people? Sure we all have, but did you ever notice all the phones? It’s impossible to find a table with someone not using a phone. They are taking pictures, texting a friend or updating Facebook. That little item that fits into your hand has become how society interacts. Whether it is calling, texting, emailing, Facebook or twitter you can interact with any person at any time of the day, almost instantly. It has shaped they way everyone interacts socially. Secondly privacy is a major issue with cell phones. Cell phones hold anything from a phone number to your banking information. I know I want that information to stay private. In the age of the cell phone, it almost seems you lose a little bit of that privacy. The smart phone has become a must for almost everyone. But how do I know all my private photos , phone numbers...
Words: 647 - Pages: 3
...network website in the world, but use of Facebook is becoming a controversial issue as it has potential hazards that threaten users’ privacy. Facebook is a great innovation since it makes people easily contact friends and families, but when users upload their personal information on profile pages, their privacy may be confirmed by strangers. Nevertheless, some people believe that users’ privacy can be protected with technological tools. Although some technology experts claim that companies can protect users’ personal information, modern technology is an invasion of privacy. Using modern technology allows other people to track users’ movements, so it invades people’s privacy. GPS devices can reveal users’ physical location information to others. Leah Yamshon, the author of “Mobile Apps Can Compromise Your Privacy” suggests that if people use GPS technology without sufficient understanding of the system, their movements may be easily tracked by other people (par. 1). Using GPS devices without controlling data transition processes may let other people easily know users’ location, yet most consumers do not know how to control data transition processes. Dishonest people can also steal users’ location information though smart phone applications. Patrick Leahy, the chairman of Senate Judiciary Committee, points out that users’ location information can be collected and stored in an unsafe way by smart phone applications without consumer’ agreement, which can allow criminals to steal...
Words: 1368 - Pages: 6
...Cell Phone-A Boon Or Bane 93 rate or flagTwitter Facebook By Kevin Peter Introduction to Cell Phones From the invention of fire to the world of digital,man has forced his scientific advance. In this fast moving genaration computers are considered to be the greatest gift of science. Cell phones are modified forms of computers which are utilized mainly for communication that have rapidly spread through out the world in less than 20 years. Even calculation of numerical values ,storing of data and retrieval of data are possible in cell phones. According to the survey nearly 300 crores of people are using cell phone. It is estimsted by 2010 nearly 500 crores of people use cellphone having internet and camera facility. The largest cell users in the world is china, next comes to india. Alexander Graham Bell introduced telephone to a less developed society.But by the time when cell phones are invented, people are ready to accept any form of development. In a fast moving society such as our’s we cannot spare time just for walking to friends or for official purposes. Why Cell Phones considered as a boon Advantages /Multipurpose of Cell Phones * Through cell phones we can communicate with people far away while doing the necessary work and even when travelling. * If our hands aren’t free ear phones are provided through which we can talk and hear without the movement of our hands. * Cell phones can also be used for recreation. There are many games which are available...
Words: 867 - Pages: 4
...The Supreme Court recently heard oral arguments over an important privacy rights case. The defendant in the case, Timothy Carpenter, was convicted of multiple armed robberies in Michigan and Ohio. Part of the evidence used to convict included his cell phone records, which showed his phone connected to cell towers in the vicinity of the robberies. Timothy Carpenter’s legal counsel argued that the prosecution could not use his phone records against him in the trial because they did not get a warrant for them. However, the lower courts disagreed and allowed the cell phone records to be used as evidence in the case and Carpenter was convicted of 116 years in prison. The privacy rights issue brought about by new technology appears to be testing...
Words: 500 - Pages: 2
...Assignment 3 Privacy: Perspectives, Public Information, and U.S. Legislation Maria A Castro 11/25/2014 IT590 Legal and Ethical Issue in IT Professor Ellen Raineri Kaplan University Table of Contents Abstract 1. Part 1. Explain the Fair Information Practices Act. Compare and contrast the Code of Fair Information Practices with the private sector’s use of information. Is the private sector better at self-policing than the government, or should the government’s rules be extended to include private database ………………………………………………………………………….. 4 Part 2. What are your rights with regards to the information that you post or text? Does your level of privacy increase depending on your network/cell phone provider? The social media site that you are using? Explain.................................................................................................. 6 Part 3. Research legislation related to technology that has been proposed or passed within the last five years. Describe the legislation. Indicate whether it passed, or if it is still in consideration. Then, explain the benefits and drawbacks of the legislation you chose. ………………….. 8 Conclusion Reference Abstract This paper provide an overview of what are the main points of the Fair Information Practice Act, and how this regulations are impacting the use of private and personal information within the digital transmissions. The increase number of user’s texting and sharing information in social networks...
Words: 2301 - Pages: 10
...recommendations on what to do and what not to do. Explain the reasoning for your recommendations. (10 marks) WILSON BROTHERS LIMITED Guidelines for Best Practices in Electronic Communications This document will serve as a guideline on the use of electronic communications and addresses major issues such as; email and cell phone usage, best practices, how we define appropriate use of email and cell phones in the workplace, the effective use of email as a business tool for internal and external communication and how it is to be managed. This policy applies to all Wilson Brothers Limited Employees. Important Factors to Note: Email is not guaranteed to be private. Email is not an appropriate substitute for face-to-face in specific situations. Email is not always sent and received instantly; messages can arrive several hours or days after they are sent. As a result, email is not an appropriate method for exchanging time-sensitive information. Emails are considered to be company records. Therefore, they should be retained in the same way as Wilson Bros does customer/sales records or other forms of communication, such as letters, faxes Risks Associated to using Email include: The privacy and security of email communication cannot be guaranteed. It is impossible to verify the true identity of the sender and guarantee that only the intended recipient will read the email once it has been sent. Emails can introduce viruses that damage or disrupt a computer or system...
Words: 1777 - Pages: 8
...Alex Martino LEGL 616.12 4/11/2012 Privacy with Regards to Electronic Communication in the Workplace Background Given the rise of electronic communication, it is not surprising that privacy with regards to communication such as emailing, texting, or social networking, has become a very big issue. Probably the most prominent area relating to electronic privacy is consumer privacy. Stories about Google or Facebook’s privacy policies are front-page news. However, although it perhaps receives less attention, electronic workplace privacy is just as big an issue. Workers communicate at work using various devices. Some workers rely on a computer to send emails. Other workers may favor using a land phone or a cell phone for communication with important clients. In some cases, workers use texting on cell phones to communicate with fellow employees. The one similarity between all these workers is that they are all probably communicating on a device or on a network that belongs to the company that they work for. Workers are also likely to use work equipment, a computer or a company cell phone, to make personal calls. This makes sense, given the long hours that people often spend at work and the ease of using work machines to communicate. A recent article in The Economist, “Slaves to the Smartphone”, states “Employees find it ever harder to distinguish between ‘on-time’ and ‘off-time’—and indeed between real work and make-work.” Most electronic communication at work (whether...
Words: 1674 - Pages: 7
...information that not shared. When using the Google search engine your search history reveals a lot about you like your beliefs, associations and other personal information. Anytime that you are visiting websites cached copies of those sites are saved and your activities links to they call “Internet identity” and remains the Google database for a very long time. Bluetooths have proved to be a helpful device for cell phones and hackers now have found ways to them in stealing people’s information. Many of the new cell phones have Bluetooth by for uses like wireless headsets, in-car connectivity, and syncing for your computer. This device allows hackers to do many things with this automated process being so simple in just walking around for as long periods of time collecting as much data as possible and then manipulate it. After the software hackers use searches and connect to a susceptible Bluetooth capable cell phone and began to download things like information from your address book, daily agendas and information off SIM card by phone calls using hacked device and bug phone. Lastly and you now would probably think different about this particular device a GPS. OnStar’s GPS systems now have the ability to collect your GPS location information and speed at any time for any purpose. OnStar now has abilities in the selling of personal information and other information to third parties which included any type of law enforcement. To make matters worse after...
Words: 1043 - Pages: 5
...Supreme Court interpretation of the case and how it interacts with the Fourth Amendment which reads: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” -United States...
Words: 880 - Pages: 4
...hand-held portable devices, health care organizations must consider the impact of patient privacy and how to secure it within their environment. Hand-held portable devices have been a blessing in the health care environment. The portability of a cell phone or a tablet allows physicians to access patient files anywhere and anytime. In addition, the use of pagers provides medical personnel the capability to reach a physician at any time. Pager networks provide better signal than cell phone signals and are more reliable than wireless internet signals. In the event of disasters, pagers were often most...
Words: 684 - Pages: 3
..........3 Introduction....................................................................................................4 Literature Review............................................................................................6 Discussion.......................................................................................................13 Conclusion......................................................................................................15 References.......................................................................................................17 Abstract Technology is constantly around us and from this point forward it is never going away not that most of us can remember a time without cell phones but for some of us we can still recall a time when it didn’t exist. Eavesdropping has been a complex endeavor and has been evolving over the years from placing a listening device which had a built in microphone and a short distance transmitter. Now it is complex algorithms that can when completely decrypted give a person or an organization complete information on a person and allow them access into a private life. I say private life when in all actuality we seem to be more responsive to sharing everything with everyone in fact it is a lack of anonymity and of a global pandemic of sharing information that when dissected may not or maybe should not be shared. The prospect of this paper is to look at the intrusiveness from not just...
Words: 4920 - Pages: 20