首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
admin
2017-12-11
59
问题
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the contents of a mobile phone without a warrant if the phone is on or around a person during an arrest.
California has asked the justices to refrain from a sweeping ruling, particularly one that upsets the old assumptions that authorities may search through the possessions of suspects at the time of their arrest. It is hard, the state argues, for judges to assess the implications of new and rapidly changing technologies.
The court would be recklessly modest if it followed California’s advice. Enough of the implications are discernable, even obvious, so that the justice can and should provide updated guidelines to police, lawyers and defendants.
They should start by discarding California’s lame argument that exploring the contents of a smartphone—a vast storehouse of digital information—is similar to, say, going through a suspect’ s purse. The court has ruled that police don’t violate the Fourth Amendment when they go through the wallet or pocketbook of an arrestee without a warrant. But exploring one’ s smartphone is more like entering his or her home. A smartphone may contain an arrestee’ s reading history, financial history, medical history and comprehensive records of recent correspondence. The development of "cloud computing", meanwhile, has made that exploration so much the easier.
Americans should take steps to protect their digital privacy. But keeping sensitive information on these devices is increasingly a requirement of normal life. Citizens still have a right to expect private documents to remain private and protected by the Constitution’s prohibition on unreasonable searches.
As so often is the case, stating that principle doesn’t ease the challenge of line-drawing. In many cases, it would not be overly burdensome for authorities to obtain a warrant to search through phone contents. They could still invalidate Fourth Amendment protections when facing severe, urgent circumstances, and they could take reasonable measures to ensure that phone data are not erased or altered while waiting for a warrant. The court, though, may want to allow room for police to cite situations where they are entitled to more freedom.
But the justices should not swallow California’s argument whole. New, disruptive technology sometimes demands novel applications of the Constitution’s protections. Orin Kerr, a law professor, compares the explosion and accessibility of digital information in the 21st century with the establishment of automobile use as a virtual necessity of life in the 20th: The justices had to specify novel rules for the new personal domain of the passenger car then; they must sort out how the Fourth Amendment applies to digital information now.
The author believes that exploring one’ s phone contents is comparable to
选项
A、getting into one’ s residence.
B、handing one’ s historical records.
C、scanning one’ s correspondences.
D、going through one’ s wallet.
答案
A
解析
细节题。根据题干关键词exploring one’s phone content定位到第四段。由第四段第三句 But exploring one’s smartphone is more like entering his or her home可知,A项“侵入他的住处” 是该句的同义转换,故选A项。B项“交出历史记录”、C项“浏览通信”和D项“检查钱包”均是 文中所举的具体例子,只有A项与原文完全对应,具有概括性。
转载请注明原文地址:https://kaotiyun.com/show/soBZ777K
0
考研英语一
相关试题推荐
Whilewe’veknownforsometimeaboutthemanylong-termbenefitsofexercise,newresearchshowsaerobicexercisealsomayhave
ScientistshavediscoveredapowerfulantibioticinthebloodstreamofgiantpandasthatcandestroybacteriaTheChineseresea
Goinghungryisamajorcontributortoillhealth,particularlyamongchildren,andanewreportrevealshowlong-lastingtheda
Goinghungryisamajorcontributortoillhealth,particularlyamongchildren,andanewreportrevealshowlong-lastingtheda
Oldpeoplearealwayssayingthattheyoungarenotwhattheywere.Thesame【C1】______ismadefromgenerationtogenerationand
Oldpeoplearealwayssayingthattheyoungarenotwhattheywere.Thesame【C1】______ismadefromgenerationtogenerationand
Oldpeoplearealwayssayingthattheyoungarenotwhattheywere.Thesame【C1】______ismadefromgenerationtogenerationand
Arepasswordsoutdated?It’sstartingtoseemlikeit.Everybodyhatesthem,andnobodycanrememberalltheonesthey’ve【C1】___
Whenoneofhisemployeesphonedinsicklastyear,ScottMcDonald,CEOofMonumentSecurityinSacramento,California.,decided
Datahasahabitofspreading.ItslipspastmilitarysecurityanditcanalsoleakfromWikiLeaks.Itevenslippedpasttheban
随机试题
保护计算机软件的法律规范有()
参与氨基酸脱氨基作用的维生素有
早期诊断股骨头坏死最敏感的检查是()
28岁初产妇,孕39周,阵发性腹痛20小时,10~12分钟宫缩一次,持续30秒,宫口开大2cm。此时的处理原则为
能与鞣质生成沉淀的有( )。
曝气池的主要作用是()。
信度是指对培训项目所取得的成效进行测试时,其测量结果的有效性。例如,某公司培训管理人员对生产一线的操作工进行了一次笔试,测试他们对安全生产操作规范的实际掌握情况,进而评估他们参加安全生产教育培训的有效性。如果在操作工接受安全教育前后各进行一次测试,那么,可
根据下列资料,回答下题。按通信类型分,2012年1~5月新增固定资产增长率大于10%的行业,其资产之和为()亿元。
一支攻击型军队必须具有“三大件”:一是航母编队,一是战斗机,一是海外军事基础。目前的中国“一无所有”,根本无法形成攻击链。因此,聪明的兰德公司认为:“中国距离‘破坏’地区军事平衡还相差很远。”下面哪一选项在论证方式上与题干相同?()
马医生发现,在进行手术前喝高浓度加蜂蜜的热参茶可以使他手术时主刀更稳,同时时间更短,效果更好。因此,他认为,要么是参,要么是蜂蜜,含有的某些化学成分能帮助他更快更好地进行手术。以下哪项如果为真,能削弱马医生的上述结论?()Ⅰ.马
最新回复
(
0
)