首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the
admin
2017-12-11
23
问题
Just how much does the Constitution protect your digital data? The Supreme Court will now consider whether police can search the contents of a mobile phone without a warrant if the phone is on or around a person during an arrest.
California has asked the justices to refrain from a sweeping ruling, particularly one that upsets the old assumptions that authorities may search through the possessions of suspects at the time of their arrest. It is hard, the state argues, for judges to assess the implications of new and rapidly changing technologies.
The court would be recklessly modest if it followed California’s advice. Enough of the implications are discernable, even obvious, so that the justice can and should provide updated guidelines to police, lawyers and defendants.
They should start by discarding California’s lame argument that exploring the contents of a smartphone—a vast storehouse of digital information—is similar to, say, going through a suspect’ s purse. The court has ruled that police don’t violate the Fourth Amendment when they go through the wallet or pocketbook of an arrestee without a warrant. But exploring one’ s smartphone is more like entering his or her home. A smartphone may contain an arrestee’ s reading history, financial history, medical history and comprehensive records of recent correspondence. The development of "cloud computing", meanwhile, has made that exploration so much the easier.
Americans should take steps to protect their digital privacy. But keeping sensitive information on these devices is increasingly a requirement of normal life. Citizens still have a right to expect private documents to remain private and protected by the Constitution’s prohibition on unreasonable searches.
As so often is the case, stating that principle doesn’t ease the challenge of line-drawing. In many cases, it would not be overly burdensome for authorities to obtain a warrant to search through phone contents. They could still invalidate Fourth Amendment protections when facing severe, urgent circumstances, and they could take reasonable measures to ensure that phone data are not erased or altered while waiting for a warrant. The court, though, may want to allow room for police to cite situations where they are entitled to more freedom.
But the justices should not swallow California’s argument whole. New, disruptive technology sometimes demands novel applications of the Constitution’s protections. Orin Kerr, a law professor, compares the explosion and accessibility of digital information in the 21st century with the establishment of automobile use as a virtual necessity of life in the 20th: The justices had to specify novel rules for the new personal domain of the passenger car then; they must sort out how the Fourth Amendment applies to digital information now.
The author believes that exploring one’ s phone contents is comparable to
选项
A、getting into one’ s residence.
B、handing one’ s historical records.
C、scanning one’ s correspondences.
D、going through one’ s wallet.
答案
A
解析
细节题。根据题干关键词exploring one’s phone content定位到第四段。由第四段第三句 But exploring one’s smartphone is more like entering his or her home可知,A项“侵入他的住处” 是该句的同义转换,故选A项。B项“交出历史记录”、C项“浏览通信”和D项“检查钱包”均是 文中所举的具体例子,只有A项与原文完全对应,具有概括性。
转载请注明原文地址:https://jikaoti.com/ti/ZTX7FFFM
0
考研英语一
相关试题推荐
ScientistshavediscoveredapowerfulantibioticinthebloodstreamofgiantpandasthatcandestroybacteriaTheChineseresea
Goinghungryisamajorcontributortoillhealth,particularlyamongchildren,andanewreportrevealshowlong-lastingtheda
We’vebeenhearingaboutitforyears,butthebooklesslibraryhasfinallyarrived,firstappearingoncollegecampuses.AtDre
Arepasswordsoutdated?It’sstartingtoseemlikeit.Everybodyhatesthem,andnobodycanrememberalltheonesthey’ve【C1】___
Arepasswordsoutdated?It’sstartingtoseemlikeit.Everybodyhatesthem,andnobodycanrememberalltheonesthey’ve【C1】___
Arepasswordsoutdated?It’sstartingtoseemlikeit.Everybodyhatesthem,andnobodycanrememberalltheonesthey’ve【C1】___
Universitiesareinaseeminglyself-contradictoryposition.AsStefanCollinipointsoutinhisbook,theseancient【C1】______ha
Universitiesareinaseeminglyself-contradictoryposition.AsStefanCollinipointsoutinhisbook,theseancient【C1】______ha
ConventionalwisdomholdsthatMillennialsareentitled,easilydistracted,impatient,self-absorbed,lazy,andunlikelytostay
ThequestforwisdomisasoldasSocrates,butit’salsoanup-to-the-minuteeconomicindicator.Acontrarianone:whenthings
随机试题
肺炎链球菌的主要致病物质是
男,40岁。胸痛、反酸、烧心、嗳气2个月,胃镜检查食管黏膜未见明显异常,最有助于明确诊断的检查是
利息是资金的( )。
财产保险是以()为保险标的的一种保险。
小燕在两岁时就会背“床前明月光,疑是地上霜……”这首唐诗。按加涅的学习结果分类,这里发生的学习是()。
爱迪生的成功和后期的某些失误,在科技文化发展史上具有一定的典型性,很值得后人__________。历史证明,在科技文化的发展中,理论家和发明家都非常重要。科学理论只有通过发明家才能__________为生产力,但又必须看到,发明若没有科学理论作后盾,则必然
下列哪些活动形成的关系属于行政法律关系?()
设A是n阶方阵,且A3=O,则()
算术移位指令SAL用于( )。
Jackson:Viewedfromascientist’sstandpoint,alloftheenergycontainedinfueleithernoworinthefuturebecomesheat.Som
最新回复
(
0
)