This course will examine the intersection of law enforcement andtechnology. In the first half of the semester, we will look at the variousrules that govern law enforcement actions, such as the use of cell phonedata to track suspects, or the practice of indiscriminately copying andsearching entire hard drives at border crossings and airports. We willfocus in particular on how courts have framed these issues, and what thoseresponses might suggest for future technological change. We will alsoexamine different constraints on governmental action, including the FourthAmendment, the Electronic Communications Privacy Act ("ECPA"), the StoredCommunications Act, and the Wiretap Act. In the second half of thesemester, we will examine how the internet has spawned new forms ofcriminal conduct, and how both Congress and law enforcement have responded to that conduct. We will look at several of the laws specificallyaddressing criminal acts committed using computers, as well as theadaptation of older laws to apply to this newer arena.
Comments/Suggestions | Site Map | Work Requests | Admin Portal | Disclaimer | Supported Browsers | U of M Home
Regents of the
University of Michigan. All images property of Michigan Law
The University of Michigan Law School.
625 South State Street,
Ann Arbor, Michigan
48109-1215 USA - Contact Us