Fourth Amendment Protections of Health Information After Carpenter v. United States: The Devil's In The Database

2019 ◽  
Vol 45 (4) ◽  
pp. 331-355
Author(s):  
Ryan Knox

Every day, companies collect health information from customers and analyze it for commercial purposes. This poses a significant threat to privacy, particularly as the Fourth Amendment protection of this deeply personal information is limited. Generally, law enforcement officers do not need probable cause and a warrant to access these private health information databases; only a subpoena is required, and sometimes nothing at all. The Fourth Amendment protections for health information may, however, have changed after the Supreme Court's 2018 decision in Carpenter v. United States, which held that the Fourth Amendment protects people from warrantless searches of historical cell-site location information possessed by their cell phone providers. The Court explained that, because of the nature of historical cell-site location information, individuals retain a reasonable expectation of privacy despite the information being in the possession of a third party. In reaching its holding, the Supreme Court considered the type of data, the uniqueness of cell-site location information, the impact of technological advancement on privacy, the voluntariness of the disclosure, and the property rights associated with the records. Many of these factors could support heightened Fourth Amendment protection for health information. This Article argues that Carpenter v. United States provides additional protections for future searches of health information in private databases.

2019 ◽  
pp. 1487
Author(s):  
Sarah Mezera

One of the most significant challenges confronting courts and legal scholars in the twenty-first century is the application of Fourth Amendment doctrine to new technology. The circuit split over the application of the private search doctrine to electronic devices exemplifies how courts struggle to apply old doctrines to new circumstances. Some courts take the position that the old doctrine should apply consistently in the new context. Other courts have changed the scope of the old doctrine in order to account for the change in circumstances. The Supreme Court took the latter position in Carpenter v. United States and held that the third-party doctrine does not apply to cell-site location information records. The Court’s willingness to limit the scope of an established doctrine to preserve fundamental privacy interests suggests that Carpenter is just the beginning of a dramatic shift in Fourth Amendment law. This Note argues that the circuit split over the private search doctrine should be resolved by creating a narrow electronic private search doctrine based on the logic of Carpenter.


2016 ◽  
Vol 150 (1) ◽  
pp. 60-66 ◽  
Author(s):  
Kelly Grindrod ◽  
Jonathan Boersema ◽  
Khrystine Waked ◽  
Vivian Smith ◽  
Jilan Yang ◽  
...  

Objective: To explore the privacy and security of free medication applications (apps) available to Canadian consumers. Methods: The authors searched the Canadian iTunes store for iOS apps and the Canadian Google Play store for Android apps related to medication use and management. Using an Apple iPad Air 2 and a Google Nexus 7 tablet, 2 reviewers generated a list of apps that met the following inclusion criteria: free, available in English, intended for consumer use and related to medication management. Using a standard data collection form, 2 reviewers independently coded each app for the presence/absence of passwords, the storage of personal health information, a privacy statement, encryption, remote wipe and third-party sharing. A Cohen’s Kappa statistic was used to measure interrater agreement. Results: Of the 184 apps evaluated, 70.1% had no password protection or sign-in system. Personal information, including name, date of birth and gender, was requested by 41.8% (77/184) of apps. Contact information, such as address, phone number and email, was requested by 25% (46/184) of apps. Finally, personal health information, other than medication name, was requested by 89.1% (164/184) of apps. Only 34.2% (63/184) of apps had a privacy policy in place. Conclusion: Most free medication apps offer very limited authentication and privacy protocols. As a result, the onus currently falls on patients to input information in these apps selectively and to be aware of the potential privacy issues. Until more secure systems are built, health care practitioners cannot fully support patients wanting to use such apps.


2012 ◽  
Vol 43 (3) ◽  
pp. 447
Author(s):  
Sam McMullan

Many New Zealanders live in shared living arrangements. The result of this is that reasonable expectations of privacy are becoming more limited. State officials may conduct a lawful search where a person consents to such a search if that person has the authority to consent. Where people live in shared living arrangements, several people may have authority to consent to a search of the same property. This article explores the extent of a third party's power to consent to property searches where more than one person has authority to consent to a search under the Search and Surveillance Act 2012. It argues that the question of reasonable expectations of privacy should not be assessed by reference to property rights. It also considers the concept of "apparent" authority which has arisen in New Zealand from the Court of Appeal's decision in R v Bradley as well as the concept of a present and objecting occupant which has arisen in the United States in the Supreme Court decision of Georgia v Randolph.


2012 ◽  
pp. 57-76
Author(s):  
Brian Gugerty ◽  
Michael J. Maranda

This chapter explores the application of Information Technology to healthcare in the United States. Recent developments and trends in healthcare information technology (HIT) are presented and discussed. Widespread adoption of HIT promises to save lives, save money, and improve health. Definitions, descriptions, and examples of electronic health records (EHRs) and personal health records (PHRs) are provided. The significant efforts to broadly and meaningfully adopt HIT over the next several years are discussed. The significant challenges in implementing EHRs are discussed, including transformation of clinical processes. Finally, the impact of HIT on the concept of ownership of the healthcare record and how it may change the relationship between the patient and healthcare provider are explored. Implementing effective HIT on a nationwide scale will require considerable effort.


1967 ◽  
Vol 13 (4) ◽  
pp. 481-487
Author(s):  
Noah Weinstein ◽  
Corinne R. Goodman

For the first time in its 68-year history, the juvenile court has felt the impact of the United States Supreme Court. It would be impossible to predict the exact effect of the decisions, but unquestionably they will be of prime importance in their influ ence on juvenile court procedures.


2020 ◽  
Vol 21 (8) ◽  
pp. 1526-1540
Author(s):  
Brandon Garrett ◽  
Christopher Slobogin

AbstractRecent events in the United States have highlighted the fact that American police resort to force, including deadly force, much more often than in many other Western countries. This Article describes how the current regulatory regime may ignore or even facilitate these aggressive police actions. The law governing police use of force in the United States derives in large part from the Fourth Amendment to the United States Constitution, which prohibits unreasonable searches and seizures. As construed by the United States Supreme Court, the Fourth Amendment provides police wide leeway in using deadly force, making custodial arrests, and stopping and frisking individuals. While state and local police departments can develop more restrictive rules, they often do not. Additionally, the remedies for violations of these rules are weak. The predominant remedy is exclusion of evidence, the impact of which falls primarily on the prosecutor and in any event only has a deterrent effect when evidence is sought. Civil and criminal sanctions have been significantly limited by the Supreme Court, particularly through the doctrine of qualified immunity (applied to individual officers) and the policy or custom defense (applied to municipalities). This minimal regulatory regime is one reason police-citizen encounters in the United States so often result in death or serious bodily harm to citizens, in particular those who are Black. The Article ends with a number of reform proposals.


Author(s):  
Timothy Galpin

The period from signing a negotiated and agreed sale and purchase agreement (SPA) to actual deal close is full of hurdles, including satisfying regulatory requirements, gaining third-party approvals, and securing shareholder consent for the transaction. This chapter provides an overview of the key elements of consummating a transaction, from “signing to closing,” and covers the SPA; regulatory requirements and reviews in the United States, United Kingdom, and European Union; national security regulatory reviews; public versus private transactions; asset versus stock sales; closing and post-closing requirements; determining a final transaction price; methods of funding; break fees; earn-out provisions; and the impact of activist investors on M&A. The tools, templates, best practices, potential pitfalls, and a case example of how to move a deal from signing to closing are also addressed, along with the main participants, core activities, buyer’s and seller’s perspectives, and key cross-border considerations.


Sign in / Sign up

Export Citation Format

Share Document