This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Lessons for Laptops for the 18th Century
July/August 2006 (vol. 4 no. 4)
pp. 64-68
Roland L. Trope, Trope and Schramm LLP
E. Michael Power, Gowling LaFleur Henderson LLP
As governments attempt to prevent, investigate, or prosecute crimes by persons who use the Internet to plan and carry out terrorist acts, the protection of private, personal information stored on computers has recently become the subject of controversy. Inevitably, the home computer will become a target for surveillance, search, and seizure by government agents. As a result, courts will be asked to determine whether such agents have complied with applicable laws that condition such intrusions on meeting standards set by constitutions or laws that did not anticipate the home computer as a focal point for such controversies.
Index Terms:
privacy, data protection, search and seizure
Citation:
Roland L. Trope, E. Michael Power, "Lessons for Laptops for the 18th Century," IEEE Security & Privacy, vol. 4, no. 4, pp. 64-68, July-Aug. 2006, doi:10.1109/MSP.2006.97
Usage of this product signifies your acceptance of the Terms of Use.