首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
admin
2017-03-25
70
问题
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the contents of a mobile phone without a warrant if the phone is on or around a person during an arrest.
California has asked the justices to refrain from a sweeping ruling particularly one that upsets the old assumption that authorities may search through the possessions of suspects at the time of their arrest. It is hard, the state argues, for judges to assess the implications of new and rapidly changing technologies.
The court would be recklessly modest if it followed California’s advice. Enough of the implications are discernable, even obvious, so that the justices can and should provide updated guidelines to police, lawyers and defendants.
They should start by discarding California’s lame argument that exploring the contents of a smart phone — a vast storehouse of digital information — is similar to, say, rifling through a suspect’s purse. The court has ruled that police don’t violate the Fourth Amendment when they sift through the wallet or pocketbook of an arrestee without a warrant. But exploring one’s smart phone is more like entering his or her home. A smart phone may contain an arrestee’s reading history, financial history, medical history and comprehensive records of recent correspondence. The development of "cloud computing," meanwhile, has made that exploration so much the easier.
Americans should take steps to protect their digital privacy. But keeping sensitive information on these devices is increasingly a requirement of normal life. Citizens still have a right to expect private documents to remain private and protected by the Constitution’s prohibition on unreasonable searches.
As so often is the case, stating that principle doesn’t ease the challenge of line-drawing. In many cases, it would not be overly onerous for authorities to obtain a warrant to search through phone contents. They could still invalidate Fourth Amendment protections when facing severe, urgent circumstances, and they could take reasonable measures to ensure that phone data are not erased or altered while a warrant is pending. The court, though, may want to allow room for police to cite situations where they are entitled to more freedom.
But the justices should not swallow California’s argument whole. New, disruptive technology sometimes demands novel applications of the Constitution’s protections. Orin Kerr, a law professor, compares the explosion and accessibility of digital information in the 21st century with the establishment of automobile use as a virtual necessity of life in the 20th: The justices had to specify novel rules for the new personal domain of the passenger car then; they must sort out how the Fourth Amendment applies to digital information now.
The author’s attitude toward California’s argument is one of______.
选项
A、disapproval
B、indifference
C、tolerance
D、cautiousness
答案
A
解析
此题细节信息定位到第三段第句话:“The court would be recklessly modestif it followed California’s advice.”即作者认为California’s argument无说服力,建议抛弃,所以“disapproval”符合作者的态度。其他选项,“tolerance”意为“宽容”,“indifference”意为“不关心”,“cautiousness”意为“谨慎”,所以应该选择A。
转载请注明原文地址:https://kaotiyun.com/show/HNGO777K
0
考博英语
相关试题推荐
Itisnosecretamongathletesthatinordertoimproveperformanceyou’vegottoworkhard.However,hardtrainingbreaksyoud
Inthe"NewHorizonCollegeEnglish"course,studentsmusttakeperformancetestsatmonthly______.
Manyyearsagopeoplethoughttheearthwasflat.Theybelievedthatthesky【C1】______abigupside-downbowlandthatthesun,m
Likemanyotheraspectsofthecomputerage,Yahoobeganasanidea,【C1】______intoahobbyandlatelyhas【C2】______intoafull-
Duringhistwo-monthstayinChina,Tomnever______achancetopracticehisChinese.
Theproducersofinstantcoffeefoundtheirproductstronglyresistedinthemarketplacesdespitetheirmanifestadvantages.Fu
Largecompaniesneedawaytoreachthesavingsofthepublicatlarge.Thesameproblem,onasmallerscale,facespractically
Language,culture,andpersonalitymaybeconsidered______ofeachotherinthought,buttheyareinseparableinfact.
Definitionof"culture"aremultiple,broad,andnotablyambiguous.Whilethereisnoagreed-upondefinitionofculture,thecla
Humanityusesalittlelessthanhalfthewateravailableworldwide.Yetoccurrencesofshortagesanddroughtsarecausingfamin
随机试题
设曲线y=f(x)上任意一点(x,y)处的切线斜率为且该曲线经过点(1,2),求该曲线的方程.
典型的J型增长和S型增长,在自然种群增长中是很少见的,常常表现为两类增长型之间的_______过渡型。
移植物血管危象发生的时间是
目前控制HCV传播的主要措施是
盐知母的作用是
依据委托合同,检查受托人的工作情况是委托人的()。
宏观经济数据对于市场经济体制下的人们,其意义已与计划经济时代不可___________。那时的统计数据,主要是眼睛向上,为党和政府提供施政参考,而现在却直接面向社会,向市场主体和广大公众传递公开透明的信息,从而为经济发展的未来走向确立预期。填入划横线部分最
互联网给人类带来极大便利。但是,1988年美国国防部的计算机主控中心遭黑客入侵,6000台计算机无法正常运行。2002年,美军组建了世界上第一支由计算机专家和黑客组成的网络部队。2008年,俄罗斯在对格鲁吉亚采取军事行动之前,先攻击格鲁吉亚的互联网,使其政
Motivationis"thedrivingforcewithinindividualsthatimpelsthemtoaction."Andgoalsarethesought-afterresults【C1】___
Howmanypeoplediedintheflood?
最新回复
(
0
)