首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
admin
2017-03-25
27
问题
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the contents of a mobile phone without a warrant if the phone is on or around a person during an arrest.
California has asked the justices to refrain from a sweeping ruling particularly one that upsets the old assumption that authorities may search through the possessions of suspects at the time of their arrest. It is hard, the state argues, for judges to assess the implications of new and rapidly changing technologies.
The court would be recklessly modest if it followed California’s advice. Enough of the implications are discernable, even obvious, so that the justices can and should provide updated guidelines to police, lawyers and defendants.
They should start by discarding California’s lame argument that exploring the contents of a smart phone — a vast storehouse of digital information — is similar to, say, rifling through a suspect’s purse. The court has ruled that police don’t violate the Fourth Amendment when they sift through the wallet or pocketbook of an arrestee without a warrant. But exploring one’s smart phone is more like entering his or her home. A smart phone may contain an arrestee’s reading history, financial history, medical history and comprehensive records of recent correspondence. The development of "cloud computing," meanwhile, has made that exploration so much the easier.
Americans should take steps to protect their digital privacy. But keeping sensitive information on these devices is increasingly a requirement of normal life. Citizens still have a right to expect private documents to remain private and protected by the Constitution’s prohibition on unreasonable searches.
As so often is the case, stating that principle doesn’t ease the challenge of line-drawing. In many cases, it would not be overly onerous for authorities to obtain a warrant to search through phone contents. They could still invalidate Fourth Amendment protections when facing severe, urgent circumstances, and they could take reasonable measures to ensure that phone data are not erased or altered while a warrant is pending. The court, though, may want to allow room for police to cite situations where they are entitled to more freedom.
But the justices should not swallow California’s argument whole. New, disruptive technology sometimes demands novel applications of the Constitution’s protections. Orin Kerr, a law professor, compares the explosion and accessibility of digital information in the 21st century with the establishment of automobile use as a virtual necessity of life in the 20th: The justices had to specify novel rules for the new personal domain of the passenger car then; they must sort out how the Fourth Amendment applies to digital information now.
Orin Kerr’s comparison is quoted to indicate that______.
选项
A、the Constitution should be implemented flexibly
B、new technology requires reinterpretation of the Constitution
C、California’s argument violates principles of the Constitution
D、principles of the Constitution should never be altered
答案
B
解析
此题细节信息定位到最后一段第三句话“Orin Kerr…The justices had to specify novel rules for the new personal domain of the passenger car then;they must sort out how the Fourth Amendment applies to digital information now”,其讨论了新科技与法律改进的关系问题,冒号后边的内容是作者所要表达的意思。“New technology requires reinterpretation of the Constitution”指根据科技进步修改或重新解释宪法法律条文,符合题意,因此选择B。
转载请注明原文地址:https://kaotiyun.com/show/FNGO777K
0
考博英语
相关试题推荐
Hisoriginalityasacomposeris______bythefollowinggroupofsongs.
Researcherswhoareunfamiliarwiththeculturalandethnicgroupstheyarestudyingmusttakeextraprecautionstoshedanybia
Themostimportant______forassessmentinthiscontestisoriginalityofdesign.
Theissueofthedeathpenaltyishighly______insomewesterncountries.
Signhasbecomeascientifichotbutton.Onlyinthepast20yearshavespecialistsinlanguagestudyrealizedthatsignedlangu
Theschoolmaster______thegirl’sbraveryinhisopeningspeech.
The______ofelectroniccomputershasopenedupnewwaysofdataanalysisforthescientist.
Wateristhegiverand,atthesametime,thetakeroflife.Itcoversmostofthesurfaceoftheplanetweliveonandfeatures
Mysisterhadavery______nature;weallwillinglydidwhatshewanted.
随机试题
考生文件夹下存在一个数据库文件“samp3.accdb”,里面已经设计好表对象“tEmployee”和宏对象“m1”,同时还设计出以“tEmployee”为数据源的窗体对象“fEmployee”。试在此基础上按照以下要求补充窗体设计:(1)在窗体的窗体页
已知曲线y=ax2+bx2+x2+3在点(1,6)处与直线y=11x一5相切,求a,b.
患者,男,48岁。反复发热40余天。体检:无贫血貌,皮肤黏膜无出血点,无黄染,双颌下、颈旁、腋下可触及肿大的淋巴结,无触痛,胸骨无压痛,肝脾肋下未触及;血红蛋白128g/L,白细胞8.8×109/L,血小板218×109/L,外周血涂片白细胞分类正常。首先
商业银行冻结单位存款的期限不超过()。
高某向周某借用一头耕牛,在借用期间高某意外死亡,其子小高不知耕牛非属高某所有而继承。不久耕牛产下一头小牛。期满后周某要求小高归还耕牛及小牛,但此时小牛已因小高管理不善而死亡。下列选项正确的是()。
根据专家推断,2006年内人民币将升值3%左右,按4月5日外汇市场美元兑人民币汇率的中间价推算,人民币对美元的汇率到2006年年底将跌至多少?2005年中国的外汇储备增幅为:( )
100份编号为1~100的文件交给10名文秘进行录入工作。第一个人拿走了编号为1的文件,往后每个人都按照编号顺序拿走一定数量的文件,且后一个人总是比前一个人多拿2份。问第10个人拿到的文件编号之和比第5个人拿到的文件编号之和大多少?
由6个字符的7位ASCⅡ编码排列,再加上水平垂直奇偶校验位构成下列矩阵(最后一列为水平奇偶校验位,最后一行为垂直奇偶校验位)。 字符: 3 0 X1 X2 0 0 1 1 0 I 1
Backintheearly1990sIknewlittleaboutcomputersbeyondwhatittooktogetthroughaworkingday.Buthere’swhatIdidkn
VisitorstoBritainarealwayscomplainingaboutEnglishfoodbecausetheyrarelygetachancetoeatit.Mostoftherestaurant
最新回复
(
0
)