首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
admin
2016-01-05
43
问题
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the contents of a mobile phone without a warrant if the phone is on or around a person during an arrest.
California has asked the justices to refrain from a sweeping ruling, particularly one that upsets the old assumptions that authorities may search through the possessions of suspects at the time of their arrest. It is hard, the state argues, for judges to assess the implications of new and rapidly changing technologies.
The court would be recklessly modest if it followed California’s advice. Enough of the implications are discernable, even obvious, so that the justice can and should provide updated guidelines to police, lawyers and defendants.
They should start by discarding California’s lame argument that exploring the contents of a smartphone—a vast storehouse of digital information—is similar to, say, going through a suspect’ s purse. The court has ruled that police don’t violate the Fourth Amendment when they go through the wallet or pocketbook of an arrestee without a warrant. But exploring one’ s smartphone is more like entering his or her home. A smartphone may contain an arrestee’ s reading history, financial history, medical history and comprehensive records of recent correspondence. The development of "cloud computing", meanwhile, has made that exploration so much the easier.
Americans should take steps to protect their digital privacy. But keeping sensitive information on these devices is increasingly a requirement of normal life. Citizens still have a right to expect private documents to remain private and protected by the Constitution’s prohibition on unreasonable searches.
As so often is the case, stating that principle doesn’t ease the challenge of line-drawing. In many cases, it would not be overly burdensome for authorities to obtain a warrant to search through phone contents. They could still invalidate Fourth Amendment protections when facing severe, urgent circumstances, and they could take reasonable measures to ensure that phone data are not erased or altered while waiting for a warrant. The court, though, may want to allow room for police to cite situations where they are entitled to more freedom.
But the justices should not swallow California’s argument whole. New, disruptive technology sometimes demands novel applications of the Constitution’s protections. Orin Kerr, a law professor, compares the explosion and accessibility of digital information in the 21st century with the establishment of automobile use as a virtual necessity of life in the 20th: The justices had to specify novel rules for the new personal domain of the passenger car then; they must sort out how the Fourth Amendment applies to digital information now.
Orin Kerr’s comparison is quoted to indicate that
选项
A、the Constitution should be implemented flexibly.
B、new technology requires reinterpretation of the Constitution.
C、California’s argument violates principles of the Constitution.
D、principles of the Constitution should never be altered.
答案
B
解析
推断题。根据题干关键词Orin Kerr’s comparison定位到最后一段。根据该段第二句New,disruptive technology sometimes demands novel applications of the Constitution’s protections可知.作者认为宪法应适应新技术的发展,接下来引用了奥林·克尔的话,也是为了证明这一点,故选B项“新技术要求宪法的重新解释”。A项“宪法应该被灵活地实施”没有提到新技术的影响.过于片面。C项“加利福尼亚州的提议违反了宪法原则”原文没有提到。D项“宪法原则绝不应被改变”与文意相反。
转载请注明原文地址:https://kaotiyun.com/show/ZjsZ777K
0
考研英语一
相关试题推荐
Doesthelanguagewespeakdeterminehowhealthyandrichwewillbe?NewresearchbyKeithChenofYaleBusinessSchoolsuggest
Inthedaysandweeksafter9/11anumberofwritersaskedwhatthefutureoffictioncouldbeaftersucharupture.Thecomment
Inthedaysandweeksafter9/11anumberofwritersaskedwhatthefutureoffictioncouldbeaftersucharupture.Thecomment
Thedevil,astheoldsayinggoes,isinthedetails.Or,inthecaseofthenewEstonianlawsettingupanationalgeneticdata
Expertshavelongknownthatchildrenimitatemanyofthedeeds—goodandbad—thattheyseeontelevision.Butithasrarelybeen
Parenthoodisn’tacareer-killer.Infact,economistswithtwoormorekidstendtoproducemoreresearch,notless,thantheir
McGrawreceivesdailytextmessagesfromSeventeenmagazineaboutfashion,includingtipsaboutwhattoweartotheprom.Shepl
Themoneyisthere.Sowhyisitnotbeingspent?Thatisthebigpuzzleabouttherichworld’seffortstoimprovehealthinpoo
Socialsciencehasweighedinonthe"tigermom"debate,anditlookslikeeveryoneisright:Bothover-protectiveandlaid-back
随机试题
证券交易内幕信息的知情人包括()。Ⅰ.发行人的高级管理人员Ⅱ.持有公司5%以上股份的股东Ⅲ.由于所任公司职务可以获取公司有关内幕信息的人员Ⅳ.证券监督管理机构工作人员
论述国际服务营销和国际服务贸易的联系和区别。
治疗男性早泄的是能够确实缩小前列腺体积的是
属于多方位图像重组的后处理方法是
斜疝修补术后,最适宜的卧位是
甲公司在中国签发一张以荷兰乙公司为受益人、以荷兰丙银行为付款人的汇票乙公司在荷兰将该汇票背书转让给德国丁公司,丁公司向丙银行提示承兑时被拒绝依照我国《票据法》,关于此案的法律适用,下列表述正确的是()
现代组织理论认为,组织设计应遵循下列原则()。
卢沟桥事变(河北师范大学2010年历史学复试真题)
Theauthor’sattitudetowardsthecurrentsituationintheexploitationofnaturalresourcesis______Accordingtotheauthor,
下列设备组中,完全属于计算机输出没备的一组是()。
最新回复
(
0
)