首页 > 最新文献

Emory law journal最新文献

英文 中文
Suing The NRA for Damages 向NRA索赔
Pub Date : 2020-01-07 DOI: 10.2139/ssrn.3630429
Frank J. Vandall
A solution is needed for the gun violence epidemic, where approximately 15,000 innocent persons are shot to death each year. Close analysis reveals that meaningful legislative solutions have failed to move forward. The reason for this failure is the National Rifle Association’s (NRA) stranglehold on federal and state legislators. This Article explores a nonlegislative solution—a tort suit aimed at obtaining compensation for the shooting victims and returning the NRA to its original purpose. It will examine conduct actions by the NRA and consider the NRA’s foundational defenses: failure to engage in any “imminent lawless action,” the First Amendment, the Second Amendment, and proximate cause. It will also consider the five tort causes of action: (1) aiding and abetting, (2) civil conspiracy, (3) strict liability, (4) the intentional infliction of emotional distress, and (5) negligence.
需要解决枪支暴力流行病,每年约有15000名无辜者被枪杀。仔细分析表明,有意义的立法解决方案未能取得进展。这次失败的原因是全国步枪协会(NRA)对联邦和州立法者的压制。本文探讨了一种非法律解决方案——旨在为枪击案受害者获得赔偿并使NRA恢复其原始目的的侵权诉讼。它将审查NRA的行为行为,并考虑NRA的基本辩护:未能参与任何“迫在眉睫的违法行为”、第一修正案、第二修正案和近因。它还将考虑五种侵权诉讼原因:(1)协助和教唆,(2)民事共谋,(3)严格责任,(4)故意造成精神痛苦,以及(5)疏忽。
{"title":"Suing The NRA for Damages","authors":"Frank J. Vandall","doi":"10.2139/ssrn.3630429","DOIUrl":"https://doi.org/10.2139/ssrn.3630429","url":null,"abstract":"A solution is needed for the gun violence epidemic, where approximately 15,000 innocent persons are shot to death each year. Close analysis reveals that meaningful legislative solutions have failed to move forward. The reason for this failure is the National Rifle Association’s (NRA) stranglehold on federal and state legislators. This Article explores a nonlegislative solution—a tort suit aimed at obtaining compensation for the shooting victims and returning the NRA to its original purpose. It will examine conduct actions by the NRA and consider the NRA’s foundational defenses: failure to engage in any “imminent lawless action,” the First Amendment, the Second Amendment, and proximate cause. It will also consider the five tort causes of action: (1) aiding and abetting, (2) civil conspiracy, (3) strict liability, (4) the intentional infliction of emotional distress, and (5) negligence.","PeriodicalId":81162,"journal":{"name":"Emory law journal","volume":"69 1","pages":"1077"},"PeriodicalIF":0.0,"publicationDate":"2020-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48824901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
National Personal Jurisdiction 国家属人管辖权
Pub Date : 2019-02-04 DOI: 10.2139/SSRN.3119383
J. Nash
Personal jurisdiction has always constrained plaintiffs’ access to courts; recent Supreme Court decisions impose even more severe limits, especially in suits against nonresident foreign corporations. These limitations are magnified by the standard understanding that the relevant forum for purposes of the personal jurisdiction calculus is the state. The Court’s Fourteenth Amendment jurisprudence relies on the state as the relevant forum, and the Federal Rules of Civil Procedure in the typical case direct a federal court to apply the same test as would a court of the state in which it sits. This Article takes on the challenge of exploring the possibility of expanding the use of national personal jurisdiction, and thus revitalizing plaintiffs’ access to courts. In so doing, it undertakes three distinct tasks. First, it argues first that there is no Fifth Amendment Due Process barrier to national personal jurisdiction. Second, it considers the viability of national personal jurisdiction as to various categories of claims, brought in federal court and state court. It argues that Congress has the power to introduce national personal jurisdiction as to all claims brought in the federal courts, but that Congress lacks authority to introduce national personal jurisdiction as to any claims brought in the state courts. However, Congress could open the federal courthouse doors wider to claims where national personal jurisdiction is deemed appropriate. Third, the Article considers what steps Congress is free to utilize in order to implement national personal jurisdiction. While two steps are obvious—Congress can enact statutory authority and can convey authority on a delegate—the Article focuses on a more controversial path to national personal jurisdiction: the common law. It argues that, while federal courts may enjoy interstitial common-law powers in this area, they likely do not have broad powers to generate new instances of national personal jurisdiction.
属人管辖权一直限制原告诉诸法院;最高法院最近的裁决施加了更严格的限制,尤其是在针对非居民外国公司的诉讼中。对于属人管辖权计算而言,相关法院是国家这一标准理解放大了这些限制。法院的第十四修正案判例依赖于州作为相关的法院,在典型案例中,《联邦民事诉讼规则》指示联邦法院应用与其所在州法院相同的测试。本条面临的挑战是探索扩大国家属人管辖权使用的可能性,从而恢复原告诉诸法院的机会。在这样做的过程中,它承担着三项不同的任务。首先,它认为,《第五修正案》对国家属人管辖权不存在正当程序障碍。其次,它考虑了在联邦法院和州法院提出的各类索赔的国家属人管辖权的可行性。它辩称,国会有权对联邦法院提出的所有索赔引入国家属人管辖权,但国会无权对州法院提出的任何索赔引入国家人管辖权。然而,在国家属人管辖权被认为合适的情况下,国会可以向联邦法院敞开大门。第三,该条款考虑了国会可以自由利用哪些步骤来实施国家属人管辖权。虽然有两个步骤是显而易见的——国会可以制定法定权力,也可以向代表传达权力——但该条款侧重于一条更具争议的国家属人管辖权之路:普通法。它认为,虽然联邦法院可能在这一领域享有间隙的普通法权力,但它们可能没有产生新的国家属人管辖权的广泛权力。
{"title":"National Personal Jurisdiction","authors":"J. Nash","doi":"10.2139/SSRN.3119383","DOIUrl":"https://doi.org/10.2139/SSRN.3119383","url":null,"abstract":"Personal jurisdiction has always constrained plaintiffs’ access to courts; recent Supreme Court decisions impose even more severe limits, especially in suits against nonresident foreign corporations. These limitations are magnified by the standard understanding that the relevant forum for purposes of the personal jurisdiction calculus is the state. The Court’s Fourteenth Amendment jurisprudence relies on the state as the relevant forum, and the Federal Rules of Civil Procedure in the typical case direct a federal court to apply the same test as would a court of the state in which it sits. \u0000 \u0000This Article takes on the challenge of exploring the possibility of expanding the use of national personal jurisdiction, and thus revitalizing plaintiffs’ access to courts. In so doing, it undertakes three distinct tasks. First, it argues first that there is no Fifth Amendment Due Process barrier to national personal jurisdiction. Second, it considers the viability of national personal jurisdiction as to various categories of claims, brought in federal court and state court. It argues that Congress has the power to introduce national personal jurisdiction as to all claims brought in the federal courts, but that Congress lacks authority to introduce national personal jurisdiction as to any claims brought in the state courts. However, Congress could open the federal courthouse doors wider to claims where national personal jurisdiction is deemed appropriate. Third, the Article considers what steps Congress is free to utilize in order to implement national personal jurisdiction. While two steps are obvious—Congress can enact statutory authority and can convey authority on a delegate—the Article focuses on a more controversial path to national personal jurisdiction: the common law. It argues that, while federal courts may enjoy interstitial common-law powers in this area, they likely do not have broad powers to generate new instances of national personal jurisdiction.","PeriodicalId":81162,"journal":{"name":"Emory law journal","volume":"68 1","pages":"509"},"PeriodicalIF":0.0,"publicationDate":"2019-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43176424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Partisan Gerrymandering and the Constitutionalization of Statistics 党派不公正的选区划分与统计的宪法化
Pub Date : 2018-03-21 DOI: 10.2139/SSRN.3145191
Jacob Eisler
Data analysis has transformed the legal academy and is now poised to do the same to constitutional law. In the latest round of partisan gerrymandering litigation, lower courts have used quantitative tests to define rights violations and strike down legislative districtings across the country. The Supreme Court’s most recent opinion on partisan gerrymandering, Gill v. Whitford, hinted that quantitative tests may yet define the constitutionality of partisan gerrymandering. Statistical thresholds thus could be enshrined as constitutional protections and courts recast as agents of discretionary policy.This Article describes how excessive dependence on metrics transforms judicial decision-making and undermines rights enforcement. Courts enforce constitutional law to ensure governmental compliance with rights, not to advance alternative policy arrangements. Yet the core of rights is moral principle, not descriptive conditions in the world. If quantitative outcomes are used to define rights, the moral character of judicial rights enforcement is undermined, and courts act as quasi-regulatory entities that compete with democratically elected branches. Arguably the most condemned decision of the twentieth century, Lochner, reflected such a quasi-regulatory approach to rights enforcement; excessive reliance on statistics threatens to repeat that mistake.The law of partisan gerrymandering needs a new principle, not new metrics. The best principle to identify partisan gerrymandering is the right to fair representation, which is violated when legislatures seize partisan advantage in democratic process. Quantitative analysis should have the sole function of proving that alleged partisan gerrymanders seek such advantage.This Article thus identifies a novel and troubling trend in constitutional law and describes how it dominates a topic of immediate practical importance. It then offers a general framework for conceptualizing rights protection and applies it to this pressing doctrinal issue.
数据分析已经改变了法律学院,现在正准备对宪法做同样的事情。在最新一轮党派不公正划分选区的诉讼中,下级法院使用定量测试来界定侵犯权利的行为,并在全国范围内取消立法选区。最高法院在吉尔诉惠特福德案(Gill v. Whitford)中关于党派不公正划分选区的最新意见暗示,定量测试可能还没有确定党派不公正划分选区是否符合宪法。因此,统计阈值可以被奉为宪法保护,法院可以被重塑为自由裁量政策的代理人。本文描述了过度依赖指标如何改变司法决策并破坏权利执行。法院执行宪法法律是为了确保政府遵守权利,而不是推进替代政策安排。然而,权利的核心是道德原则,而不是世界上的描述性条件。如果用量化结果来定义权利,司法权利执行的道德品质就会受到损害,法院就会成为与民主选举部门竞争的准监管实体。可以说,20世纪最受谴责的判决洛克纳案(Lochner)反映了这种准监管的权利执行方式;过度依赖统计数据可能会重蹈覆辙。党派不公正划分选区的法律需要一个新的原则,而不是新的衡量标准。确定党派不公正划分的最佳原则是公平代表权,立法机关在民主过程中抓住党派优势,就违反了公平代表权。定量分析的唯一作用应该是证明所谓的党派不公正划分选区者寻求这种优势。因此,本文确定了宪法中一个新颖而令人不安的趋势,并描述了它如何主导一个具有直接实际重要性的主题。然后,它提供了一个概念化权利保护的总体框架,并将其应用于这一紧迫的理论问题。
{"title":"Partisan Gerrymandering and the Constitutionalization of Statistics","authors":"Jacob Eisler","doi":"10.2139/SSRN.3145191","DOIUrl":"https://doi.org/10.2139/SSRN.3145191","url":null,"abstract":"Data analysis has transformed the legal academy and is now poised to do the same to constitutional law. In the latest round of partisan gerrymandering litigation, lower courts have used quantitative tests to define rights violations and strike down legislative districtings across the country. The Supreme Court’s most recent opinion on partisan gerrymandering, Gill v. Whitford, hinted that quantitative tests may yet define the constitutionality of partisan gerrymandering. Statistical thresholds thus could be enshrined as constitutional protections and courts recast as agents of discretionary policy.This Article describes how excessive dependence on metrics transforms judicial decision-making and undermines rights enforcement. Courts enforce constitutional law to ensure governmental compliance with rights, not to advance alternative policy arrangements. Yet the core of rights is moral principle, not descriptive conditions in the world. If quantitative outcomes are used to define rights, the moral character of judicial rights enforcement is undermined, and courts act as quasi-regulatory entities that compete with democratically elected branches. Arguably the most condemned decision of the twentieth century, Lochner, reflected such a quasi-regulatory approach to rights enforcement; excessive reliance on statistics threatens to repeat that mistake.The law of partisan gerrymandering needs a new principle, not new metrics. The best principle to identify partisan gerrymandering is the right to fair representation, which is violated when legislatures seize partisan advantage in democratic process. Quantitative analysis should have the sole function of proving that alleged partisan gerrymanders seek such advantage.This Article thus identifies a novel and troubling trend in constitutional law and describes how it dominates a topic of immediate practical importance. It then offers a general framework for conceptualizing rights protection and applies it to this pressing doctrinal issue.","PeriodicalId":81162,"journal":{"name":"Emory law journal","volume":"68 1","pages":"979"},"PeriodicalIF":0.0,"publicationDate":"2018-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46951560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
THE CASE FOR STREAMLINING EMERGENCY DECLARATION AUTHORITIES AND ADAPTING LEGAL REQUIREMENTS TO EVER-CHANGING PUBLIC HEALTH THREATS. 精简紧急状态宣布机构和调整法律要求以适应不断变化的公共卫生威胁。
Pub Date : 2017-01-01
Gregory Sunshine
{"title":"THE CASE FOR STREAMLINING EMERGENCY DECLARATION AUTHORITIES AND ADAPTING LEGAL REQUIREMENTS TO EVER-CHANGING PUBLIC HEALTH THREATS.","authors":"Gregory Sunshine","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":81162,"journal":{"name":"Emory law journal","volume":"67 3","pages":"397-414"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5956522/pdf/nihms959836.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"36114500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Cyberintelligence and the Posse Comitatus Act 生物识别、网络智能和团体委员会法案
Pub Date : 2016-12-16 DOI: 10.2139/SSRN.2886575
Margaret Hu
This Article addresses the rapid growth of what the military and intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence system is reliant upon biometric databases — for example, digitalized collections of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to describe more accurately the manner in which this new tool is dependent upon cybersurveillance and big data’s mass-integrative systems.To better understand the legal implications of biometric cyberintelligence, this Article advances three primary claims. First, it argues that the technological and programmatic architecture of biometric cyberintelligence can be embedded within the data collection and data analysis protocols of civilian governance and domestic law enforcement activities. Next, to demonstrate the potential lethality of this emerging technological and policy development, this Article illustrates how biometric data may be increasingly integrated into drone weaponry, including targeted killing and drone strike technologies. Finally, this Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, may be impotent in light of the growth of cybersurveillance.Maintaining strict separation of data between military and intelligence operations on the one hand, and civilian, homeland security, and domestic law enforcement agencies on the other hand, is increasingly difficult as cooperative data sharing increases. The Posse Comitatus Act and constitutional protections such as the Fourth Amendment’s privacy jurisprudence, therefore, must be reinforced in the digital age in order to appropriately protect citizens from militarized cyberpolicing, i.e., the blending of military/foreign intelligence tools and operations and homeland security/domestic law enforcement tools and operations. The Article concludes that, as of yet, neither statutory nor constitutional protections have evolved sufficiently to cover the unprecedented surveillance harms posed by the migration of biometric cyberintelligence from foreign to domestic use.
本文讨论了军事和情报界所称的“生物识别智能”的快速增长。这个新兴的情报系统依赖于生物识别数据库,例如,扫描指纹和虹膜的数字化集合,面部识别技术的数字照片,以及DNA。本文引入了术语“生物识别网络智能”,以更准确地描述这种新工具依赖于网络监控和大数据的大规模整合系统的方式。为了更好地理解生物识别网络智能的法律含义,本文提出了三个主要主张。首先,它认为生物识别网络智能的技术和程序架构可以嵌入到公民治理和国内执法活动的数据收集和数据分析协议中。接下来,为了展示这种新兴技术和政策发展的潜在杀伤力,本文说明了生物识别数据如何越来越多地集成到无人机武器中,包括定点杀伤和无人机打击技术。最后,本文认为,1878年《军务委员会法》(Posse Comitatus Act)旨在限制联邦军事资源为国内政策服务的部署,但鉴于网络监控的增长,该法案可能无能为力。随着合作数据共享的增加,一方面在军事和情报行动之间保持严格的数据分离,另一方面在民用、国土安全和国内执法机构之间保持严格的数据分离越来越困难。因此,在数字时代,必须加强《治安委员会法》(Posse Comitatus Act)和宪法保护,如第四修正案的隐私判例,以适当保护公民免受军事化网络警务的影响,即军事/外国情报工具和行动与国土安全/国内执法工具和行动的混合。文章的结论是,到目前为止,法律和宪法保护都没有发展到足以覆盖生物识别网络情报从国外转移到国内使用所带来的前所未有的监视危害。
{"title":"Biometric Cyberintelligence and the Posse Comitatus Act","authors":"Margaret Hu","doi":"10.2139/SSRN.2886575","DOIUrl":"https://doi.org/10.2139/SSRN.2886575","url":null,"abstract":"This Article addresses the rapid growth of what the military and intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence system is reliant upon biometric databases — for example, digitalized collections of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to describe more accurately the manner in which this new tool is dependent upon cybersurveillance and big data’s mass-integrative systems.To better understand the legal implications of biometric cyberintelligence, this Article advances three primary claims. First, it argues that the technological and programmatic architecture of biometric cyberintelligence can be embedded within the data collection and data analysis protocols of civilian governance and domestic law enforcement activities. Next, to demonstrate the potential lethality of this emerging technological and policy development, this Article illustrates how biometric data may be increasingly integrated into drone weaponry, including targeted killing and drone strike technologies. Finally, this Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, may be impotent in light of the growth of cybersurveillance.Maintaining strict separation of data between military and intelligence operations on the one hand, and civilian, homeland security, and domestic law enforcement agencies on the other hand, is increasingly difficult as cooperative data sharing increases. The Posse Comitatus Act and constitutional protections such as the Fourth Amendment’s privacy jurisprudence, therefore, must be reinforced in the digital age in order to appropriately protect citizens from militarized cyberpolicing, i.e., the blending of military/foreign intelligence tools and operations and homeland security/domestic law enforcement tools and operations. The Article concludes that, as of yet, neither statutory nor constitutional protections have evolved sufficiently to cover the unprecedented surveillance harms posed by the migration of biometric cyberintelligence from foreign to domestic use.","PeriodicalId":81162,"journal":{"name":"Emory law journal","volume":"66 1","pages":"697"},"PeriodicalIF":0.0,"publicationDate":"2016-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68418170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Freedom from Thought 摆脱思想的自由
Pub Date : 2016-02-08 DOI: 10.1056/nejm196202152660715
Jane R. Bambauer
This short Essay explores when ignorance can be supported or even coerced by law, and when it cannot. In the end, although freedom from thought has much to offer to the development of privacy and dignitary rights, interests in self-ignorance are better handled through norms than through law. Like other forms of privacy, First Amendment commitments are likely to frustrate legal efforts to support or coerce self-ignorance. If a speaker wishes to disclose information, the government is unlikely to be able to interfere with that disclosure unless the speaker’s interests are demonstrably weak. However, when both the speaker and the listener prefer silence, government compulsion of information disclosure will offend privacy and First Amendment principles alike.
这篇短文探讨了什么时候法律可以支持甚至强迫无知,什么时候不能。最后,尽管思想自由对隐私和尊严权利的发展大有裨益,但通过规范比通过法律更好地处理自我无知的利益。与其他形式的隐私一样,第一修正案的承诺可能会阻碍支持或强迫自我无知的法律努力。如果发言人希望披露信息,政府不太可能干涉该披露,除非发言人的利益明显薄弱。然而,当说话者和听者都倾向于沉默时,政府强制信息披露会违反隐私权和第一修正案原则。
{"title":"Freedom from Thought","authors":"Jane R. Bambauer","doi":"10.1056/nejm196202152660715","DOIUrl":"https://doi.org/10.1056/nejm196202152660715","url":null,"abstract":"This short Essay explores when ignorance can be supported or even coerced by law, and when it cannot. In the end, although freedom from thought has much to offer to the development of privacy and dignitary rights, interests in self-ignorance are better handled through norms than through law. Like other forms of privacy, First Amendment commitments are likely to frustrate legal efforts to support or coerce self-ignorance. If a speaker wishes to disclose information, the government is unlikely to be able to interfere with that disclosure unless the speaker’s interests are demonstrably weak. However, when both the speaker and the listener prefer silence, government compulsion of information disclosure will offend privacy and First Amendment principles alike.","PeriodicalId":81162,"journal":{"name":"Emory law journal","volume":"48 1","pages":"219"},"PeriodicalIF":0.0,"publicationDate":"2016-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1056/nejm196202152660715","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"58206234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Both the Eu and the U.S. Are "Stricter" Than Each Other for the Privacy of Government Requests for Information 欧盟和美国如何在政府信息请求隐私方面比对方“更严格”
Pub Date : 2016-01-01 DOI: 10.2139/SSRN.2920748
Peter P. Swire, DeBrae Kennedy-Mayo
Law enforcement access to personal data presents a paradox at the heart of debates between the European Union (EU) and the United States about privacy protections. On the one hand, the comprehensive privacy regime in the EU contains many requirements that do not apply in the United States-the EU is "stricter" than the United States in applying requirements that do not exist in the latter. On the other hand, the United States also sets requirements that do not exist in the EU, such as the Fourth Amendment requirement that a warrant be signed by a judge upon a finding of probable cause. Thus, both are stricter in important ways when setting standards for law enforcement access to personal data. The fact that both sides are stricter in significant respects is important to two distinct topics: how to reform the system of Mutual Legal Assistance (MLA), and whether the United States provides "adequate" protection for personal data under EU law, and thus is an appropriate destination for data flows from the EU.The relative strictness of standards for law enforcement access is central to understanding current obstacles to reforming the MLA system, the mechanism for sharing law enforcement evidence held in one country for use in criminal investigations in a different country. Our research team has been writing a series of articles about MLA reform.1 The topic has become increasingly important in recent years-globalized communications mean that e-mails, social network data, and other evidence for criminal investigations are often held in a different country. In the course of studying obstacles to effective reform, we have come to believe that the fact that both the EU and the United States provide stricter privacy protections is salient but little understood-each side is reluctant to compromise on a new approach to the extent that there would be a weakening of some specific safeguards that currently exist in their respective jurisdictions. We hope that a fuller understanding of the relative strictness of both sides will enable a more fruitful discussion of possible paths to MLA reform.The relative strictness of both the EU and the United States is also important to a second topic, the current litigation and debates about whether the United States provides "adequate" protection of privacy, and thus is a lawful destination for flows of personal data from the EU.2 Under the EU Data Protection Directive, which went into effect in 1998,3 transfers of personal data from EU Member States to other countries, such as the United States, are generally permitted only if the recipient jurisdiction has "adequate" protections.4 From its negotiation in 2000 until 2015, a major legal basis for such transfers was the EU/U.S. Safe Harbor, under which participating companies could lawfully send personal data to the United States.5 In 2015, the European Court of Justice struck down the Safe Harbor for lacking adequacy in Schrems v. Data Protection Commissioner.6 A related tran
在欧盟(EU)和美国关于隐私保护的辩论中,执法部门对个人数据的访问呈现出一个悖论。一方面,欧盟的全面隐私制度包含了许多在美国不适用的要求——在适用美国不存在的要求方面,欧盟比美国“更严格”。另一方面,美国也制定了欧盟不存在的要求,例如第四修正案要求法官在发现合理原因后签署搜查令。因此,在制定执法部门获取个人数据的标准时,两者在重要方面都更为严格。双方在重要方面都更加严格,这一事实对两个截然不同的主题很重要:如何改革司法互助体系(MLA),以及美国是否根据欧盟法律为个人数据提供“充分”保护,从而成为来自欧盟的数据流的合适目的地。执法部门获取证据的标准相对严格,这对于理解目前改革MLA制度的障碍至关重要。MLA制度是一种分享在一个国家掌握的执法证据,以便在另一个国家进行刑事调查的机制。我们的研究小组一直在写一系列关于MLA改革的文章近年来,这个话题变得越来越重要——全球化的通信意味着电子邮件、社交网络数据和其他刑事调查证据往往存放在另一个国家。在研究有效改革的障碍的过程中,我们开始相信,欧盟和美国都提供了更严格的隐私保护这一事实是显而易见的,但却鲜为人知——双方都不愿在新方法上妥协,以至于削弱了各自管辖范围内现有的一些具体保障措施。我们希望,在更充分地了解双方相对严格的情况下,能够更富有成效地讨论立法改革的可能途径。欧盟和美国的相对严格对第二个主题也很重要,即当前关于美国是否提供“充分”隐私保护的诉讼和辩论,因此是欧盟个人数据流动的合法目的地。根据1998年生效的欧盟数据保护指令,个人数据从欧盟成员国转移到其他国家,如美国。通常只有在接收司法管辖区有“充分”保护的情况下才允许从2000年的谈判到2015年,此类转让的主要法律依据是欧盟/美国5 2015年,在Schrems诉数据保护专员一案中,欧洲法院以“安全港法案”的充分性不足为由,驳回了该法案。6一个相关的传输机制——标准合同条款,目前在爱尔兰也面临着类似的法律挑战,爱尔兰数据保护专员初步认为这一挑战“有充分根据”。7此外,欧盟最近批准了两项将于2018年全面生效并加强现有隐私保护的文书:《一般数据保护条例》(GDPR),8主要适用于私营部门对个人信息的处理,以及一项新的警察和刑事司法指令,该指令管理执法部门对个人数据的访问GDPR和执法指令对个人数据的传输都有类似的“充分性”要求因此,准确评估美国执法部门获取信息的充分性,对于当前欧盟数据保护法的多个方面至关重要。本文的第一部分提供了MLA改革和当前适当性辩论的背景。第二部分强调了欧盟全面的数据保护制度创造隐私保护的方式,包括执法访问,比适用于美国的更严格。…
{"title":"How Both the Eu and the U.S. Are \"Stricter\" Than Each Other for the Privacy of Government Requests for Information","authors":"Peter P. Swire, DeBrae Kennedy-Mayo","doi":"10.2139/SSRN.2920748","DOIUrl":"https://doi.org/10.2139/SSRN.2920748","url":null,"abstract":"Law enforcement access to personal data presents a paradox at the heart of debates between the European Union (EU) and the United States about privacy protections. On the one hand, the comprehensive privacy regime in the EU contains many requirements that do not apply in the United States-the EU is \"stricter\" than the United States in applying requirements that do not exist in the latter. On the other hand, the United States also sets requirements that do not exist in the EU, such as the Fourth Amendment requirement that a warrant be signed by a judge upon a finding of probable cause. Thus, both are stricter in important ways when setting standards for law enforcement access to personal data. The fact that both sides are stricter in significant respects is important to two distinct topics: how to reform the system of Mutual Legal Assistance (MLA), and whether the United States provides \"adequate\" protection for personal data under EU law, and thus is an appropriate destination for data flows from the EU.The relative strictness of standards for law enforcement access is central to understanding current obstacles to reforming the MLA system, the mechanism for sharing law enforcement evidence held in one country for use in criminal investigations in a different country. Our research team has been writing a series of articles about MLA reform.1 The topic has become increasingly important in recent years-globalized communications mean that e-mails, social network data, and other evidence for criminal investigations are often held in a different country. In the course of studying obstacles to effective reform, we have come to believe that the fact that both the EU and the United States provide stricter privacy protections is salient but little understood-each side is reluctant to compromise on a new approach to the extent that there would be a weakening of some specific safeguards that currently exist in their respective jurisdictions. We hope that a fuller understanding of the relative strictness of both sides will enable a more fruitful discussion of possible paths to MLA reform.The relative strictness of both the EU and the United States is also important to a second topic, the current litigation and debates about whether the United States provides \"adequate\" protection of privacy, and thus is a lawful destination for flows of personal data from the EU.2 Under the EU Data Protection Directive, which went into effect in 1998,3 transfers of personal data from EU Member States to other countries, such as the United States, are generally permitted only if the recipient jurisdiction has \"adequate\" protections.4 From its negotiation in 2000 until 2015, a major legal basis for such transfers was the EU/U.S. Safe Harbor, under which participating companies could lawfully send personal data to the United States.5 In 2015, the European Court of Justice struck down the Safe Harbor for lacking adequacy in Schrems v. Data Protection Commissioner.6 A related tran","PeriodicalId":81162,"journal":{"name":"Emory law journal","volume":"66 1","pages":"617"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68432441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Severability as Conditionality 可分割性即条件性
Pub Date : 2014-02-21 DOI: 10.2139/SSRN.2395650
Eric S. Fish
The Supreme Court currently operates under the premise that if it finds one part of a law unconstitutional, it can strike down other parts as well. In NFIB v. Sebelius, four justices would have exercised this power to strike down the entire Affordable Care Act on the basis of one unconstitutional provision. But it is not clear where the Court finds this power to declare laws inseverable. And that lack of clarity has created a doctrinal muddle wherein the Court applies several inconsistent tests. In this Article, I seek to clarify the scope of the inseverability power by considering several different theories of its source. Three such theories are implicit in the current judicial doctrine and academic debate about severability: (1) that it is an equitable remedial power, akin to the power to issue a civil injunction, (2) that it is a form of intentionalist statutory interpretation, wherein courts strike down further provisions of a partially unconstitutional law so as to preserve the legislators’ intentions, and (3) that it is a judicial contract remedy applied to legislative deals. The Article explores these three theories, teasing out their respective logics, and showing that they are all both implausibly broad and inconsistent with Article III of the Constitution. The Article then develops and defends a fourth, narrower theory: that a court can declare a statute inseverable only where the legislature has made one part of the statute conditional on the continued validity of another. Such conditionality can most easily be found through explicit inseverability clauses. But it can also be found implicitly, where severing a provision would make nonsense of a statute’s language, or where otherwise valid parts of a statute cannot have legal effect or do not serve any purpose without the unconstitutional provision. The main cost of this theory is that it only permits inseverability in limited circumstances, and does not allow courts to rewrite statutes so as to avoid the perverse consequences of judicial review. The benefits are that the theory is consistent with Article III, and that it prevents judges from acting like legislators. Two further implications follow from the conditionality theory: that there must be a party with standing to challenge an inseverable provision before a federal court can strike it down; and that the proper unit of analysis for severability questions is the entire legislative code (rather than a single act or bill).
最高法院目前的运作前提是,如果它发现法律的一部分违宪,它也可以推翻其他部分。在NFIB诉西贝利厄斯案中,四名法官本可以行使这一权力,以一项违宪条款为基础,推翻整个《合理医疗费用法案》。但目前尚不清楚法院从何处获得这种宣布法律不可分割的权力。这种缺乏明确性造成了一种教义上的混乱,在这种混乱中,最高法院采用了几种不一致的检验标准。在本文中,我试图通过考虑其来源的几种不同理论来澄清不可分割权的范围。在目前关于可分割性的司法学说和学术辩论中,隐含着三种这样的理论:(1)它是一种衡平法上的补救权力,类似于发布民事禁制令的权力;(2)它是一种意图主义的法定解释形式,即法院推翻部分违宪法律的进一步规定,以维护立法者的意图;(3)它是一种适用于立法交易的司法合同救济。本文探讨了这三种理论,梳理了它们各自的逻辑,并表明它们都是令人难以置信的广泛,与宪法第三条不一致。然后,该条发展并捍卫了第四种更狭义的理论:只有在立法机关以另一部分的持续有效性为条件的情况下,法院才能宣布一部成文法不可分割。这种条件性最容易通过明确的不可分割条款找到。但它也可以隐含地发现,当切断一项规定将使成文法的语言变得毫无意义时,或者当成文法中其他有效部分没有违宪规定就不能具有法律效力或不能达到任何目的时。这一理论的主要代价是,它只允许在有限的情况下不可分割,并且不允许法院重写成文法以避免司法审查的不正当后果。好处是,该理论与第三条是一致的,而且它可以防止法官像立法者一样行事。从条约性理论可以得出两个进一步的含义:在联邦法院可以推翻不可分割条款之前,必须有一方有资格对该条款提出质疑;分析可分割性问题的适当单位是整个立法法典(而不是单一的法案或法案)。
{"title":"Severability as Conditionality","authors":"Eric S. Fish","doi":"10.2139/SSRN.2395650","DOIUrl":"https://doi.org/10.2139/SSRN.2395650","url":null,"abstract":"The Supreme Court currently operates under the premise that if it finds one part of a law unconstitutional, it can strike down other parts as well. In NFIB v. Sebelius, four justices would have exercised this power to strike down the entire Affordable Care Act on the basis of one unconstitutional provision. But it is not clear where the Court finds this power to declare laws inseverable. And that lack of clarity has created a doctrinal muddle wherein the Court applies several inconsistent tests. In this Article, I seek to clarify the scope of the inseverability power by considering several different theories of its source. Three such theories are implicit in the current judicial doctrine and academic debate about severability: (1) that it is an equitable remedial power, akin to the power to issue a civil injunction, (2) that it is a form of intentionalist statutory interpretation, wherein courts strike down further provisions of a partially unconstitutional law so as to preserve the legislators’ intentions, and (3) that it is a judicial contract remedy applied to legislative deals. The Article explores these three theories, teasing out their respective logics, and showing that they are all both implausibly broad and inconsistent with Article III of the Constitution. The Article then develops and defends a fourth, narrower theory: that a court can declare a statute inseverable only where the legislature has made one part of the statute conditional on the continued validity of another. Such conditionality can most easily be found through explicit inseverability clauses. But it can also be found implicitly, where severing a provision would make nonsense of a statute’s language, or where otherwise valid parts of a statute cannot have legal effect or do not serve any purpose without the unconstitutional provision. The main cost of this theory is that it only permits inseverability in limited circumstances, and does not allow courts to rewrite statutes so as to avoid the perverse consequences of judicial review. The benefits are that the theory is consistent with Article III, and that it prevents judges from acting like legislators. Two further implications follow from the conditionality theory: that there must be a party with standing to challenge an inseverable provision before a federal court can strike it down; and that the proper unit of analysis for severability questions is the entire legislative code (rather than a single act or bill).","PeriodicalId":81162,"journal":{"name":"Emory law journal","volume":"349 1","pages":"1293"},"PeriodicalIF":0.0,"publicationDate":"2014-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68177747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The Contingent Fourth Amendment 偶然的第四修正案
Pub Date : 2014-02-10 DOI: 10.2139/SSRN.2366486
M. Mannheimer
In the past forty years, the U.S. Supreme Court has increasingly advanced the notion that the Fourth Amendment encompasses the common-law restrictions on searches and seizures that existed in 1791 when the Amendment was adopted. Yet, in case after case, the Court has encountered indeterminacy in the common law circa 1791. At times, the Court confronts this indeterminacy by concluding that, in the absence of a clear common-law rule, the Fourth Amendment does not govern the issue. At other times, in the face of indeterminacy, the Court falls back upon general Fourth Amendment principles. And on occasion the Court pretends that the indeterminacy does not exist. The reason for the absence of clear common-law search-and-seizure rules in 1791 is that the common law differed in important respects among the thirteen new American States. More importantly, the Anti-Federalists, those who demanded that the Bill of Rights be added to the Constitution as the price of ratification, recognized that the common law was different in every State. This differentiated common law included the common-law rights of Englishmen secured by state bills of rights. The Anti-Federalists saw the common-law, not as a fixed set of rules they were freezing in time, but as fluid, contingent, and evolving around them. Thus, if the Court is going to continue to interpret the Fourth Amendment as incorporating common-law search-and-seizure rules, it must come to terms with the fact that the common law of 1791 was viewed by a significant part of the population as contingent rather than fixed. And given that we owe the Bill of Rights to the Anti-Federalists, it makes some sense to interpret its commands in light of their view of the common law. This Article introduces a view of the Fourth Amendment – the contingent Fourth Amendment – that courts and commentators have overlooked. It asserts that we ought to conceive of our rights against unreasonable searches and seizures by federal officials as being largely contingent on state law. The only common-law rules that the Fourth Amendment freezes into the Constitution are those explicitly set forth in the Warrant Clause: rules against warrants that are general, issued on less than probable cause, or unsupported by oath or affirmation. The residuum of constitutional search-and-seizure rules are to be dictated by state law, even when it is a federal officer doing the searching or seizing. On this approach, as a matter of federal constitutional law, a federal officer is generally constrained by the search-and-seizure law of the State where a federal search or seizure occurs.
在过去的四十年里,美国最高法院不断推进这样一种观念,即第四修正案包含了1791年通过该修正案时存在的普通法对搜查和扣押的限制。然而,在一个又一个案件中,法院在1791年前后的普通法中遇到了不确定性。有时,最高法院面对这种不确定性的结论是,在没有明确的普通法规则的情况下,第四修正案不适用这个问题。在其他时候,面对不确定性,最高法院会求助于第四修正案的一般原则。有时,最高法院假装不存在这种不确定性。1791年缺乏明确的普通法搜查和扣押规则的原因是,美国新成立的13个州的普通法在重要方面存在差异。更重要的是,那些要求在宪法中加入权利法案作为批准条件的反联邦主义者认识到,每个州的普通法都是不同的。这种有区别的普通法包括由国家权利法案保障的英国人的普通法权利。反联邦主义者认为习惯法不是一套固定不变的规则,而是一种流动的、偶然的、围绕着它们发展的规则。因此,如果法院打算继续将第四修正案解释为包含普通法的搜查和扣押规则,它必须接受这样一个事实,即1791年的普通法被相当一部分人视为偶然的,而不是固定的。鉴于《权利法案》是反联邦党人制定的,根据他们对普通法的看法来解读《权利法案》是有道理的。本文介绍了法院和评论家所忽视的关于第四修正案的观点——偶然的第四修正案。它主张,我们应该认为,我们反对联邦官员不合理搜查和扣押的权利在很大程度上取决于州法律。第四修正案冻结在宪法中的唯一普通法规则是那些在搜查令条款中明确规定的规则:针对一般性搜查令的规则,根据不太可能的理由签发的,或没有宣誓或誓词支持的。宪法搜查和扣押规定的剩余部分应由州法律规定,即使是由联邦官员进行搜查或扣押。在这种做法上,作为联邦宪法法律的一个问题,联邦官员通常受到发生联邦搜查或扣押的州的搜查和扣押法的约束。
{"title":"The Contingent Fourth Amendment","authors":"M. Mannheimer","doi":"10.2139/SSRN.2366486","DOIUrl":"https://doi.org/10.2139/SSRN.2366486","url":null,"abstract":"In the past forty years, the U.S. Supreme Court has increasingly advanced the notion that the Fourth Amendment encompasses the common-law restrictions on searches and seizures that existed in 1791 when the Amendment was adopted. Yet, in case after case, the Court has encountered indeterminacy in the common law circa 1791. At times, the Court confronts this indeterminacy by concluding that, in the absence of a clear common-law rule, the Fourth Amendment does not govern the issue. At other times, in the face of indeterminacy, the Court falls back upon general Fourth Amendment principles. And on occasion the Court pretends that the indeterminacy does not exist. The reason for the absence of clear common-law search-and-seizure rules in 1791 is that the common law differed in important respects among the thirteen new American States. More importantly, the Anti-Federalists, those who demanded that the Bill of Rights be added to the Constitution as the price of ratification, recognized that the common law was different in every State. This differentiated common law included the common-law rights of Englishmen secured by state bills of rights. The Anti-Federalists saw the common-law, not as a fixed set of rules they were freezing in time, but as fluid, contingent, and evolving around them. Thus, if the Court is going to continue to interpret the Fourth Amendment as incorporating common-law search-and-seizure rules, it must come to terms with the fact that the common law of 1791 was viewed by a significant part of the population as contingent rather than fixed. And given that we owe the Bill of Rights to the Anti-Federalists, it makes some sense to interpret its commands in light of their view of the common law. This Article introduces a view of the Fourth Amendment – the contingent Fourth Amendment – that courts and commentators have overlooked. It asserts that we ought to conceive of our rights against unreasonable searches and seizures by federal officials as being largely contingent on state law. The only common-law rules that the Fourth Amendment freezes into the Constitution are those explicitly set forth in the Warrant Clause: rules against warrants that are general, issued on less than probable cause, or unsupported by oath or affirmation. The residuum of constitutional search-and-seizure rules are to be dictated by state law, even when it is a federal officer doing the searching or seizing. On this approach, as a matter of federal constitutional law, a federal officer is generally constrained by the search-and-seizure law of the State where a federal search or seizure occurs.","PeriodicalId":81162,"journal":{"name":"Emory law journal","volume":"64 1","pages":"1229"},"PeriodicalIF":0.0,"publicationDate":"2014-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68144821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Students, Security, and Race 学生、安全与种族
Pub Date : 2013-07-24 DOI: 10.2139/SSRN.2214202
Jason P. Nance
In the wake of the terrible shootings in Newtown, Connecticut, our nation has turned its attention to school security. For example, several states have passed or are considering passing legislation that will provide new funding to schools for security equipment and law enforcement officers. Strict security measures in schools are certainly not new. In response to prior acts of school violence, many public schools for years have relied on metal detectors, random sweeps, locked gates, surveillance cameras, and law enforcement officers to promote school safety. Before policymakers and school officials invest more money in strict security measures, this Article provides additional factors that should be considered. First, drawing on recent, restricted data from the U.S. Department of Education, this Article presents an original empirical analysis revealing that low-income students and minority students are much more likely to experience intense security conditions in their schools than other students, even when taking into account neighborhood crime, school crime, and school disorder. These findings raise concerns that such inequalities may continue or worsen as policymakers provide additional funding for security measures. Second, this Article argues that strict security measures do not support long-term solutions needed to effectively prevent school violence. Indeed, strict security measures exacerbate the underlying problems by creating barriers of adversity and mistrust between students and educators. In addition, this Article offers recommendations to address the disproportionate use of security measures on low-income and minority students and to curb violence more effectively. It urges school officials and policymakers to support programs that build trust and collective responsibility instead of providing grants for strict security measures. Further, it recommends that the Department of Education’s Office of Civil Rights play a more active role in addressing the disproportionate use of strict security measures on minority students.
在康涅狄格州纽敦市发生可怕的枪击事件之后,我们的国家已经将注意力转向了学校安全。例如,有几个州已经通过或正在考虑通过立法,为学校提供新的安全设备和执法人员资金。学校采取严格的安全措施当然不是什么新鲜事。为了应对之前的校园暴力行为,许多公立学校多年来一直依靠金属探测器、随机扫描、锁上门、监控摄像头和执法人员来促进学校安全。在政策制定者和学校官员在严格的安全措施上投入更多资金之前,这篇文章提供了应该考虑的其他因素。首先,利用美国教育部最近的有限数据,本文提出了一个原始的实证分析,揭示了低收入学生和少数民族学生比其他学生更有可能在他们的学校经历强烈的安全条件,即使考虑到社区犯罪、学校犯罪和学校混乱。这些发现引起了人们的担忧,即随着政策制定者为安全措施提供额外资金,这种不平等可能会继续或恶化。其次,本文认为严格的安全措施并不支持有效防止校园暴力所需的长期解决方案。事实上,严格的安全措施在学生和教育者之间制造了逆境和不信任的障碍,从而加剧了潜在的问题。此外,本文还提出了一些建议,以解决对低收入和少数民族学生过度使用安全措施的问题,并更有效地遏制暴力。它敦促学校官员和政策制定者支持建立信任和集体责任的项目,而不是为严格的安全措施提供拨款。此外,它建议教育部民权办公室在解决对少数民族学生过度使用严格安全措施方面发挥更积极的作用。
{"title":"Students, Security, and Race","authors":"Jason P. Nance","doi":"10.2139/SSRN.2214202","DOIUrl":"https://doi.org/10.2139/SSRN.2214202","url":null,"abstract":"In the wake of the terrible shootings in Newtown, Connecticut, our nation has turned its attention to school security. For example, several states have passed or are considering passing legislation that will provide new funding to schools for security equipment and law enforcement officers. Strict security measures in schools are certainly not new. In response to prior acts of school violence, many public schools for years have relied on metal detectors, random sweeps, locked gates, surveillance cameras, and law enforcement officers to promote school safety. Before policymakers and school officials invest more money in strict security measures, this Article provides additional factors that should be considered. First, drawing on recent, restricted data from the U.S. Department of Education, this Article presents an original empirical analysis revealing that low-income students and minority students are much more likely to experience intense security conditions in their schools than other students, even when taking into account neighborhood crime, school crime, and school disorder. These findings raise concerns that such inequalities may continue or worsen as policymakers provide additional funding for security measures. Second, this Article argues that strict security measures do not support long-term solutions needed to effectively prevent school violence. Indeed, strict security measures exacerbate the underlying problems by creating barriers of adversity and mistrust between students and educators. In addition, this Article offers recommendations to address the disproportionate use of security measures on low-income and minority students and to curb violence more effectively. It urges school officials and policymakers to support programs that build trust and collective responsibility instead of providing grants for strict security measures. Further, it recommends that the Department of Education’s Office of Civil Rights play a more active role in addressing the disproportionate use of strict security measures on minority students.","PeriodicalId":81162,"journal":{"name":"Emory law journal","volume":"63 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.2139/SSRN.2214202","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67997231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
Emory law journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1