首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
admin
2016-01-05
60
问题
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the contents of a mobile phone without a warrant if the phone is on or around a person during an arrest.
California has asked the justices to refrain from a sweeping ruling, particularly one that upsets the old assumptions that authorities may search through the possessions of suspects at the time of their arrest. It is hard, the state argues, for judges to assess the implications of new and rapidly changing technologies.
The court would be recklessly modest if it followed California’s advice. Enough of the implications are discernable, even obvious, so that the justice can and should provide updated guidelines to police, lawyers and defendants.
They should start by discarding California’s lame argument that exploring the contents of a smartphone—a vast storehouse of digital information—is similar to, say, going through a suspect’ s purse. The court has ruled that police don’t violate the Fourth Amendment when they go through the wallet or pocketbook of an arrestee without a warrant. But exploring one’ s smartphone is more like entering his or her home. A smartphone may contain an arrestee’ s reading history, financial history, medical history and comprehensive records of recent correspondence. The development of "cloud computing", meanwhile, has made that exploration so much the easier.
Americans should take steps to protect their digital privacy. But keeping sensitive information on these devices is increasingly a requirement of normal life. Citizens still have a right to expect private documents to remain private and protected by the Constitution’s prohibition on unreasonable searches.
As so often is the case, stating that principle doesn’t ease the challenge of line-drawing. In many cases, it would not be overly burdensome for authorities to obtain a warrant to search through phone contents. They could still invalidate Fourth Amendment protections when facing severe, urgent circumstances, and they could take reasonable measures to ensure that phone data are not erased or altered while waiting for a warrant. The court, though, may want to allow room for police to cite situations where they are entitled to more freedom.
But the justices should not swallow California’s argument whole. New, disruptive technology sometimes demands novel applications of the Constitution’s protections. Orin Kerr, a law professor, compares the explosion and accessibility of digital information in the 21st century with the establishment of automobile use as a virtual necessity of life in the 20th: The justices had to specify novel rules for the new personal domain of the passenger car then; they must sort out how the Fourth Amendment applies to digital information now.
The author’ s attitude toward California’ s argument is one of
选项
A、tolerance.
B、indifference.
C、disapproval.
D、cautiousness.
答案
C
解析
态度题。根据题干关键词California’s argument定位到第二段和第三段。根据上下文和第三段首句The court would be recklessly modest if it followed California’s advice可知,作者对加利福尼亚州的提议并不赞成,故C项“不赞成”符合题意。A项“宽容”、B项“冷漠”和D项“谨慎”均与作者的态度不符。
转载请注明原文地址:https://kaotiyun.com/show/OjsZ777K
0
考研英语一
相关试题推荐
Thatpeoplehavepersonalitiesgoeswithoutsaying.Petownerswillquicklyarguethattheiranimalshavepersonalitiestoo.Yet
Let’sbeginwiththissingle-questionexamination:Whatpercentageofcareer-orientedhighschoolseniorsareproficientin
Asmillionsoffamiliesplansummervisits,theworld’sfirst,oldest,largest,andmostenviedcollectionofnationalparksis
Thankstomorethan50yearsofresearch,weknowhowtochangechildren’sbehavior.Inbrief,youidentifytheunwantedbehavio
GoingonlineisafavoritepastimeformillionsofAmericanchildren.Almost10million(14percent)ofAmerica’s69millionchild
Someoftoday’smostcutting-edgetechnologyisnowbeingusedtohelpstudentswithspecialneeds.Nolongerjusttheprovince
Inthedaysandweeksafter9/11anumberofwritersaskedwhatthefutureoffictioncouldbeaftersucharupture.Thecomment
Parenthoodisn’tacareer-killer.Infact,economistswithtwoormorekidstendtoproducemoreresearch,notless,thantheir
Theword"science"isheardsoofteninmoderntimesthatalmosteverybodyhassomenotionofitsmeaning.Ontheotherhand,it
McGrawreceivesdailytextmessagesfromSeventeenmagazineaboutfashion,includingtipsaboutwhattoweartotheprom.Shepl
随机试题
根据《建设工程安全生产管理条例》规定,工程监理单位应当审查施工组织设计中的安全技术措施或专项施工方案是否符合工程建设强制性标准和()标准。
领导者树立“无功即是过”的观念,要求领导绩效考评必须坚持【】
不属于液化性坏死的是
可以不绘制城市电网系统现状图的情况是()。
临时中央政治局迁到中央根据地后,全面推行“左”倾冒险主义错误,在福建开展的运动是()。
科学家一直认为大脑中的“语言中心”让我们有别于人类的血缘近亲——猴子。但是,最近一项新研究发现,与人类语言能力有关的大脑区域所在位置与科学家此前认为的截然不同。这个控制语言能力的区域距离大脑中央更近,比此前认为的近了3厘米。这意味着,人类大脑与猴子大脑的相
在面向对象方法中,实现信息隐蔽是依靠______。
设有一个已按各元素的值排好序的顺序表(长度大于2),现分别用顺序查找法和二分查找法查找与给定值k相等的元素,比较的次数分别是s和b,在查找不成功情况下s和b的关系是
A、Becausehecan’tfindanidealdate.B、Becauseheistoocommonaperson.C、Becausehehasfailedtorealizehisdreams.D、Bec
Advertisingisaformofselling.Forthousandsofyearstherehavebeenindividualswhohavetriedto【C1】______otherstobuyth
最新回复
(
0
)