We've just started the process of redesigning our site and we're trying to learn as much as we can about the wants and needs of the people that visit. That is, people like you!
Please give us a few minutes of your time to respond to our survey. We really appreciate it.
This course will examine the intersection of law enforcement and technology. In the first half of the semester, we will look at the various rules that govern law enforcement actions, such as the use of cell phone data to track suspects, or the practice of indiscriminately copying and searching entire hard drives at border crossings and airports. We will focus in particular on how courts have framed these issues, and what those responses might suggest for future technological change. We will also examine different constraints on governmental action, including the Fourth Amendment, the Electronic Communications Privacy Act ("ECPA"), the Stored Communications Act, and the Wiretap Act. In the second half of the semester, we will examine how the internet has spawned new forms of criminal conduct, and how both Congress and law enforcement have responded to that conduct. We will look at several of the laws specifically addressing criminal acts committed using computers, as well as the adaptation of older laws to apply to this newer arena.
Comments/Suggestions | Site Map | Work Requests | Admin Portal | Disclaimer | Supported Browsers | U of M Home
Regents of the
University of Michigan. All images property of Michigan Law
The University of Michigan Law School.
625 South State Street,
Ann Arbor, Michigan
48109-1215 USA - Contact Us