Computer technology has grown by leaps and bounds in the last decade. As the new technologies develop, criminals are using more sophisticated encryption tools to safeguard the contents of their e-mail and the documents on their hard drives. Assuming that police have valid warrant to seize and search a suspect’s hard drive for evidence of criminal activity, can the suspect be compelled to give
the police the key to his encryption program so that they may have access to his records?
What will be an ideal response?
Central to the debate over this question is the issue of whether the key to the encryption program is physical evidence or strictly communicative in nature. As discussed in the chapter, while most communicational evidence is protected under a person’s right against self-incrimination, this right does not extend to cover physical evidence.
You might also like to view...
You can begin to earn a good reputation at work by:
A. Collaborating well with support staff B. Taking notes when someone shows you how to do something C. Giving easy tasks to another person to do D. A & B E. B & C F. A, B, & C
Sections within a township are numbered consecutively beginning in the
A. southeast corner of the township. B. northeast corner of the township. C. northwest corner of the township. D. southwest corner of the township.
The bankruptcy court will determine whether an obligation is "support" or dischargeable in bankruptcy
Indicate whether the statement is true or false
The managing partner in a law firm is the one who:
a. Gets the profits from the firm b. Makes decisions relating to the firm's policies and procedures and who generally oversees the business operations of the firm c. Begins the firm, but then does not maintain an active role in running it d. None of these choices are correct