Decentralizing Fourth Amendment Search Doctrine

Total Page:16

File Type:pdf, Size:1020Kb

Decentralizing Fourth Amendment Search Doctrine Kentucky Law Journal Volume 107 Issue 2 Article 2 2018 Decentralizing Fourth Amendment Search Doctrine Michael J. Zydney Mannheimer Northern Kentucky University Follow this and additional works at: https://uknowledge.uky.edu/klj Part of the Constitutional Law Commons, and the Fourth Amendment Commons Right click to open a feedback form in a new tab to let us know how this document benefits ou.y Recommended Citation Mannheimer, Michael J. Zydney (2018) "Decentralizing Fourth Amendment Search Doctrine," Kentucky Law Journal: Vol. 107 : Iss. 2 , Article 2. Available at: https://uknowledge.uky.edu/klj/vol107/iss2/2 This Article is brought to you for free and open access by the Law Journals at UKnowledge. It has been accepted for inclusion in Kentucky Law Journal by an authorized editor of UKnowledge. For more information, please contact [email protected]. Kentucky Law Journal VOLUME 107 2018-2019 NUMBER2 ARTICLES DECENTRALIZING FOURTH AMENDMENT SEARCH DOCTRINE MichaelJ. Zydney Mannheimer' ABSTRACT In examining the threshold question for Fourth Amendment analysis-what constitutes a search?-both courts and commentators have generally premised their analysis on a sharp dichotomy between an approachbased on trespassto real or personal property, on the one hand and one grounded in non-property-based expectations of privacy, on the other. The trespass-basedregime seemed to have given way in 1967 to the "reasonable expectation of privacy" standard But the resurgence of a trespass-basedapproach in recent Supreme Court cases has served to highlightthe supposed distinction between the two methodologies. When subjected to close scrutiny, the dichotomy between the two approaches becomes highly questionable. Whether analyzed in terms of trespass or reasonable expectations of privacy, the question in close cases concerning whether government conduct constitutes a Fourth Amendment search comes down to the same essential touchstone: social norms governing security in one's person and property from intrusion by others. Those social norms inform both when a particular expectation of privacy should be deemed reasonable and when an incursion on property should be deemed a trespass. This social-norm-based analysis of whether a Fourth Amendment search has occurred should not be surprising. The common law governing rights to security in one's person and property stems from longstanding custom, which is inextricably linked with social norms: the practices of a people become their social norms, which harden into custom, and custom in turn evolves into enforceable rights and interests that sometimes, though not always, find expression in positive law. Thus, expectations of privacy and trespass constitute, not two distinct tests, but rather two points on the same evolutionary scale. Our notions of trespass have as their touchstone the ' Professor of Law, Salmon P. Chase College of Law, Northern Kentucky University. I thank the following for their helpful comments on earlier iterations of this Article: Will Baude, Will Berry, Russell Christopher, Brenner Fissell, Steve Henderson, Craig Konnoth, James Stern, Matt Tokson, and participants of the 2016 CrimFest! Conference, the 2017 Federalist Society Annual Faculty Conference, and workshops at the University of Kentucky College of Law and the Salmon P. Chase College of Law, Northern Kentucky University. 169 170 KENTUCKY LAW JOURNAL VoL 107 very same social norms thatform the backbone of the reasonable expectation of privacy test. One can articulate a uniform meaning of "search" irrespective of whether we are operating under a "trespass" or a "reasonableexpectation of privacy" model. A Fourth Amendment search occurs when, for the purpose of gathering information, government agents act contrary to law, broadly conceived-that is, law in whatever stage of evolutionary development-providing us with security vis-a-vis private actors in our "persons, houses, papers, and effects." A violation of positive law thatfits this definition is sufficient but not necessary to constitute a Fourth Amendment search; a violation of social norms thatfits this definition, even where the norms have not yet gelled into positive law, should also be considered a search. But because law, in all its manfestations, often differs by jurisdiction, the question whether a Fourth Amendment search has occurred might be answered dsferently in dfferent parts of the country, and perhaps even in diferent parts of the same State. 2018-2019 DECENTRALIZING FOURTH AMENDMENT SEARCH DOCTRINE 171 TABLE OF CONTENTS A BSTRACT.......................................................................................................... 169 TABLE OF CONTENTS ......................................................................................... 171 INTRODUCTION ................. ...... .................. ............................. 172 I. FOURTH AMENDMENT SEARCH DOCTRINE(S) ............................ 174 A. From Olmstead to Katz....................................................................... 174 B. Katz's Reasonable Expectation of Privacy Test................................... 178 C. The "Resurgence" of Trespass............................................................ 184 II. A POST-JONES SYNTHESIS: SOCIAL NORMS GOVERNING SECURITY AGAINST PRIVATE INTRUSIONS AS THE TOUCHSTONE.................................. 186 A. An OriginalistApproach to the FourthAmendment Search Question... 187 B. The Common Law as Custom and Usage ............................................. 190 i. The Traditional View of English Common Law as Custom ......... 190 ii. The Democratic Foundations of Custom as Law........................... 192 iii. The Transformation from Practice to Law.................................... 194 C. The Persistenceof Social Norms as PrimordialLaw............................ 199 D. Everything Old is New Again: The Trespass Test as the Expectations Test ................................................................................ 204 III. Two IMPLICATIONS OF THE POST-JONES SYNTHESIS: UNIFICATION AND DECENTRALIZATION ................................................................................... 209 A. Unfying the Fourth Amendment Search Inquiry..... ........... 209 B. Decentralizingthe Fourth Amendment Search Inquiry ........................ 213 CONCLUSION ................. ............................... .................................. 219 172 KENTCKY LAW JOURNAL Vol 107 INTRODUCTION According to the conventional wisdom, the doctrine on the threshold question of Fourth Amendment inquiry-what is a "search?"-has wavered back and forth between a property-based "trespass" approach and a privacy-based "expectations" approach. On this view, prior to the U.S. Supreme Court decision in Katz v. United States in 1967, courts determined whether a Fourth Amendment search had occurred with reference to common-law notions of trespass: a search had occurred if, but only if, government agents committed a physical intrusion into one of the four interests enumerated in the Amendment-persons, houses, papers, or effects.2 In Katz, the Court reversed course, seemingly burying the trespass approach and creating an altogether new methodology, the "reasonable expectation of privacy" test.' Under this approach, a Fourth Amendment search occurs if, but only if, government agents infringed upon a person's expectation of privacy, and if society is prepared to consider that expectation a reasonable one.' In United States v. Jones, in 2012, the Court revived the trespass test, so that a Fourth Amendment search occurs as long as either test is satisfied.' This is the conventional wisdom. As a historical matter, the conventional wisdom is questionable.' But more importantly, this sharp dichotomy between the two approaches is conceptually flawed. The common law, upon which the trespass approach is based, is itself only the end product of centuries of accumulation of custom which has created enforceable rights and interests, even before those rights and interests are expressed in statutory or decisional form as positive law. Custom, in turn, is simply a hardening of social norms that reflect the repeated practices of a people forced to navigate the complex relationships between individual and community. And it is those very same social norms that form the backbone of the reasonable expectation of privacy test. Thus, questions about both reasonable expectations of privacy and unwanted physical intrusions have at their root social conventions governing how individuals interact with one another and the extent to which we ought to respect each other's interest in security against intrusions on our persons and property. Sometimes these social conventions have ripened into positive law and sometimes they have not. When they have, they are expressed in the common law of trespass (among other areas), on which the Court's physical intrusion approach hinges. When they have not, these social conventions may remain at the level of social norms, which are at the heart of the reasonable expectation of privacy approach. And there is a vast, blurry middle ground, where social norms have evolved into enforceable rights and 2 See Katz v. United States, 389 U.S. 347, 353-54 (1967). ' See id at 360 (Harlan, J. concurring). Although the standard stems from Justice Harlan's concurrence in Katz, the Court quickly adopted it See Terry v. Ohio, 392 U.S. 1, 9 (1968). 4 Katz, 389 U.S. at 361 (Harlan, J., concurring). s United States v. Jones, 565 U.S. 400, 409-11 (2012). 6 See generally
Recommended publications
  • IN the CIRCUIT COURT for Baltimore City
    ',E~: 1 ~ ~. a,~~ Baltimore City IN THE CIRCUIT COURT FOR------------------------------ CIVIL - NnN-DnMESTIC CASE INFnRM T DIRECTIONS t~ ~ ~~ ~4~ Plaintiff: This Information Report must be completed and attached to the complaintfiled with the Clerk of Court unless your case is exempted from the requirement.by t~i~'+~~a~~~u~ the~Court of Appeals pursuant to Rule 2-111(a). Defendant: You must file an Information Report as required by Rule 2,323(h).: THIS INFORMATION REPpRT CANNOT~BE ACCEPTED AS A PLEADING BY:~7PLAINTIFF DEFENDANT CASE NUMBER FORM FILED •--- --- ------'-- - - -f~rkto nser~------------------ Brenda Bennett, et al. University of Marylan~ ~Viec~icat System CASE vs. ----------------- NAME:------------------------- amti - ------------------~~TSe en ant PARTY'S NAME: PHONE: PARTY'S ADDRESS:-------------------------------------------------------------------------------------------------- - ------ - --- -- --- PARTY'S E-MAIL:----------- --- -------------------------------------_._____--------------------------•-------------- ~f r~~zr~sented__by an_ attorn.ey; --Ben'amin L:Davis, III - - --410 244 7005- PARTY'S ATTORNEY'S NAME:---------~_- --- _---- _ ~,_~___ PHONE:.------_--___- _--_----- -------__ ADDRESS:~6 South Charles ~freet,Baltimore, Maryland 21201 PARTY'S ATTORNEY'S bdavTs~"nicholtlaw.com"""""- PARTY'S ATTORNEY'S E-MAIL: JURY DEMAND? Yes O No RELATED CASE PENDING? L7Yes f~No If yes, Case #~s), if known:__________~_________~_~M________. ANTICIPATED LENGTH OF TRIAL?: ____._hours _____.__da s PLEADING TYPE New Case: Original
    [Show full text]
  • Much Ado About Newsgathering: Personal Privacy, Law Enforcement, and the Law of Unintended Consequences for Anti-Paparazzi Legislation
    MUCH ADO ABOUT NEWSGATHERING: PERSONAL PRIVACY, LAW ENFORCEMENT, AND THE LAW OF UNINTENDED CONSEQUENCES FOR ANTI-PAPARAZZI LEGISLATION ANDREW D. MORTONt Experience should teach us to be most on our guard to protect liberty when the Government's purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dan- gers to liberty lurk in insidiousI encroachment by men of zeal, well-meaning but without understanding. INTRODUCTION: BALANCING THE INDIVIDUAL RIGHT TO PRIVACY WITH LEGITIMATE LAW ENFORCEMENT SURVEILLANCE Horror, not humor, brought actors Michael J. Fox and Paul Reiser to testify before a hearing of the United States House Judiciary Committee last summer.2 Fox described the "mercenary tactics of tabloid photographers" who turned his wedding into a "nightmare" as helicopters recklessly jock- eyed for position above the ceremony, then "fired away with high-powered cameras" on the couple's honeymoon suite.3 When Reiser's son was born prematurely, disguised journalists infiltrated the hospital with hidden cam- eras to steal a photo of the infant, and after returning home, the child was photographed in the privacy of the family's backyard by "resourceful" jour- t B.A. 1991, M.P.P. Candidate 2000, University of Maryland; J.D. Candidate 2000, Uni- versity of Pennsylvania. This Comment is dedicated to the memory of Alan Rubinstein- gifted attorney, and the father-in-law I have known only through the many whose lives he touched. I am deeply indebted to Ed Pease, Diana Schacht, the staff and members of the U.S.
    [Show full text]
  • Defamation and the Right of Privacy
    Vanderbilt Law Review Volume 15 Issue 4 Issue 4 - October 1962 Article 4 10-1962 Defamation and the Right of Privacy John W. Wade, Dean Vanderbilt Law School Follow this and additional works at: https://scholarship.law.vanderbilt.edu/vlr Part of the Privacy Law Commons, and the Torts Commons Recommended Citation John W. Wade, Dean, Defamation and the Right of Privacy, 15 Vanderbilt Law Review 1093 (1962) Available at: https://scholarship.law.vanderbilt.edu/vlr/vol15/iss4/4 This Article is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Law Review by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. Defamation and the Right of Privacy JOHN W. WADE* In this article Dean Wade discusses the scope of the tort of un- warranted invasion of the right of privacy, comparing and contrasting it with the tort of defamation. He observes that the action for invasion of the right of privacy may come to supplant the action for defamation and that this development should be welcomed by the courts and writers. Finally, he concludes that the whole law of privacy may someday be- come a part of the larger, more comprehensive tort of intentional in- fliction of mental suffering. I. INTRODUOTMON The history of the two torts of defamation and unwarranted invasion of the right of privacy has been greatly different. Defamation developed over a period of many centuries, with the twin torts of libel and slander having completely separate origins and historical growth.
    [Show full text]
  • INTRUSIVE MONITORING: EMPLOYEE PRIVACY EXPECTATIONS ARE REASONABLE in EUROPE, DESTROYED in the UNITED STATES Lothar Determannt & Robert Spragueu
    INTRUSIVE MONITORING: EMPLOYEE PRIVACY EXPECTATIONS ARE REASONABLE IN EUROPE, DESTROYED IN THE UNITED STATES Lothar Determannt & Robert SpragueU TABLE OF CONTENTS I. INTRODUCTION ................. ...................... 980 II. EMPLOYER MONITORING AND EMPLOYEE PRIVACY-U.S. PERSPECTIVE ............................ 981 A. WORK-RELATED EMPLOYER MONITORING........................................981 B. WORK-RELATED EMPLOYEE PRIVACY ................ ....... 986 1. Work-Related Rights to Privag Under the Constitution.....................986 2. Work-Related Rights to Privag Under the Common Law..................990 3. Statutog Rjghts to Privag................................. 993 a) The Electronic Communications Privacy Act ............... 995 C. INTRUSIVE WORKPLACE MONITORING AND EMPLOYEE PRIVACY................................................ 1001 1. Employer Access to PersonalWeb-Based Applications..................... 1007 2. Webcams ...................................... 1009 3. GPS ..................................... 1012 D. WORKPLACE PRIVACY TRENDS IN THE UNITED STATES............... 1016 III. EMPLOYER MONITORING AND EMPLOYEE PRIVACY-EUROPEAN PERSPECTIVE .. ................... 1018 A. LAWS IN EUROPE-OVERVIEW ................ ............. 1019 B. CIVIL RIGHTS PROTECTIONS FOR PRIVACY AT THE EUROPEAN LEVEL............................. .......... 1019 ( 2011 Lothar Determann & Robert Sprague. t Dr. iur habil, Privatdozent, Freie Universitat Berlin; Adjunct Professor, University of California, Berkeley School of Law and Hastings College
    [Show full text]
  • Photographers' Guide to Privacy
    Photographers’ Guide to Privacy What every cameraman, photographer and videographer should know about invasion of privacy standards in the 50 states and D.C. Fall 2007 A primer on invasion of privacy The question of when the coverage and agrees that a news organization has omitted by reporting a misuse of taxpayer money. reporting of news becomes an invasion or played down facts that put a truthful state- (Harris v. City of Seattle, 152 Fed.Appx. 565 of privacy is a difficult one, especially for ment in its proper context. In 2003, a Florida (9th Cir. 2005)) photographers and videographers. jury awarded $18 million to Joe Anderson, The invasion of another’s privacy is a Reporting news stories in a way that the owner of a road-paving company who “tort,” meaning a civil wrong against another serves and informs the public will often entail sued over a Pensacola News Journal article that results in injury. publicizing facts or displaying images that that truthfully reported he had shot and A privacy tort occurs when a person or will embarrass or anger someone. killed his wife. However, the fact that an entity breaches the duty to leave another To make privacy matters even more diffi- investigation determined that the death was person alone. When journalists intrude on cult for journalists, courts constantly redefine a hunting accident was not mentioned until a person’s privacy and cause emotional or what is private based upon interpretations two sentences later, which Anderson said cre- monetary injury, they may be forced to pay of the elusive legal standard of a “reasonable ated a false impression that he murdered his damages.
    [Show full text]
  • Reasonable Expectations of Privacy and Novel Search Technologies: an Economic Approach Steven Penney
    Journal of Criminal Law and Criminology Volume 97 Article 3 Issue 2 Winter Winter 2007 Reasonable Expectations of Privacy and Novel Search Technologies: An Economic Approach Steven Penney Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Steven Penney, Reasonable Expectations of Privacy and Novel Search Technologies: An Economic Approach, 97 J. Crim. L. & Criminology 477 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0477 THEJOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 97, No. 2 Copyright © 2007 by NorthwesternUniversity, Schoolof Law Printed in U.S.A. REASONABLE EXPECTATIONS OF PRIVACY AND NOVEL SEARCH TECHNOLOGIES: AN ECONOMIC APPROACH STEVEN PENNEY* The "reasonable expectation of privacy" test, which defines the scope of constitutionalprotection from governmental privacy intrusions in both the United States and Canada, is notoriously indeterminate. This indeterminacy stems in large measure from the tendency ofjudges to think ofprivacy in non-instrumentalistterms. This "moral" approach to privacy is normatively questionable, and it does a poor job of identifying the circumstances in which privacy should prevail over countervailing interests, such as the deterrence of crime. In this Article, I develop an alternative,economically-informed approach to the reasonable expectation of privacy test. In contrast to the moral approach, which treatsprivacy as a fundamental right, the economic approach views it as an (normatively neutral) aspect of self-interest: the desire to conceal and control potentially damagingpersonal information.
    [Show full text]
  • Limitations of Actions in Conversion and Detinue
    Manitoba Law Reform Commission 432-405 Broadway, Winnipeg, Manitoba, R3C 3L6 T 204 945-2896 F 204 948-2184 Email: [email protected] http://www.gov.mb.ca/justice/mlrc LIMITATIONS OF ACTIONS IN CONVERSION AND DETINUE Report #125 November 2011 Library and Archives Canada Cataloguing in Publication Manitoba. Law Reform Commission Limitations of actions in conversion and detinue. (Report ; 125) Includes bibliographical references. ISBN 978-0-7711-1557-8 — 1. Limitation of actions 2. Trover and conversion Manitoba 3. Time (Law)--Manitoba I. Title. II. Series: Report (Manitoba. Law Reform Commission) ; 125 KEM 484 .L54 .M35 2011 346.7127052 222 20119620014 ’s Copies of the Commission Reports may be ordered from Statutory Publications, 20 - 200 ’s Reports are also available Vaughan Street, Winnipeg, MB R3C 1T5. The Commission electronically at www.jus.gov.mb/mlrc. The Manitoba Law Reform Commission was established by The Law Reform Commission Act in 1970 and began functioning in 1971. Commissioners: Cameron Harvey, Q.C., President John C. Irvine Hon. Mr. Gerald O. Jewers Hon. Mr. Justice Perry Schulman Legal Counsel: Catherine Skinner Administrator: Debra Floyd The Commission offices are located at 432-405 Broadway, Winnipeg, MB R3C 3L6 Tel: (204) 945-2896 Fax: (204) 948-2184 Email: [email protected] Website: http://gov.mb.ca/justice/mlrc The Manitoba Law Reform Commission is funded by grants from: The Government of Manitoba and The Manitoba Law Foundation TABLE OF CONTENTS Page # – CHAPTER 1 INTRODUCTION 1 – CHAPTER 2 CHARACTERISTICS OF CONVERSION AND DETINUE 3 A. CONVERSION 3 1. Reform of Conversion 6 B.
    [Show full text]
  • Determining Reasonable Expectation of Privacy in the Intrusion Into Seclusion Tort
    DETERMINING REASONABLE EXPECTATION OF PRIVACY IN THE INTRUSION INTO SECLUSION TORT William Fussey* Abstract As new and intrusive ways of invading a person’s privacy become increasingly common, it is important that tort law has a satisfactory way of protecting a person from intrusion. The case of C v Holland in 2012 created such a protection mechanism, by importing the tort of intrusion into seclusion from the USA. Whereas the first tort of privacy introduced in New Zealand protects the publication of private facts, intrusion into seclusion prevents access to a person even if it does not result in dissemination of any personal information. This article focuses on how to determine when a reasonable expectation of privacy is satisfied, suggesting it involves a detailed analysis of three suggested factors, modified from Richard Wilkins’ approach in the US search and seizure context. The article considers how the factors could be applied to an intrusion into seclusion claim in New Zealand. I. Introduction The 2012 High Court case of C v Holland1 introduced the privacy tort of intrusion into seclusion in New Zealand. In the case, C was filmed in the shower by a camera surreptitiously installed by Mr Holland, causing C great distress.2 The purpose of the intrusion into seclusion tort is to protect the privacy intrusion interest which, prior to the introduction of this cause of action, was inadequately protected in the legal framework. This article aims to explore what the intrusion interest is, and when and why it should be respected. It addresses how the tort of intrusion into seclusion can best be applied and developed in New Zealand.
    [Show full text]
  • The Regulation of Embryo and Fetal Experimentation and Disposal in England and the United States
    VANDERBILT LAW REVIEW VOLUME 39 APRIL 1986 NUMBER 3 "Alas! Poor Yorick," I Knew Him Ex Utero: The Regulation of Embryo and Fetal Experimentation and Disposal in England and the United States Nicolas P. Terry* I. INTRODUCTION ..................................... 420 II. EXPERIMENTATION, DISPOSAL, AND THE ABORTION DE- BATE .............................................. 422 III. FETUSES AND FETAL MATERIALS: DISPOSAL ......... 426 A. Disposal-Specific Legislation .............. 427 B. Disposal-IndirectRegulation .............. 430 C. Fetus Disposal and Tort Law ............... 431 IV. FETUSES AND FETAL MATERIALS: POSSESSORY RIGHTS 432 A. Common Law Possessory Interests .......... 432 B. Possessory Interests in Nonburial Situations. 433 C. Fetal Possession-Specific Legislation ....... 437 V. FETAL EXPERIMENTATION ........................... 440 A. Definitional Problems ...................... 441 *Associate Professor of Law, St. Louis University. Formerly, Lecturer in Law, Univer- sity of Exeter, England. B.A. (Law) Kingston Polytechnic; LL.M. Cambridge. I owe a debt of gratitude to Kate Whitby, my research assistant, for her painstaking work. I would like to thank my colleagues, Isaak Dore, Stanislaw Frankowski, Sandra Johnson, and Carolyn Jones for their support and encouragement. VANDERBILT LAW REVIEW [Vol. 39:419 B. Guidelines for Research in England ......... 442 C. Federally Funded Fetal Research ........... 444 D. State Regulation of Fetal Research ......... 446 E. Fetal Experimentation Regulation and Pri- vacy Guarantees..........................
    [Show full text]
  • Chapter 6 – Civil Case Procedures
    GENERAL DISTRICT COURT MANUAL CIVIL CASE PROCEDURES Page 6-1 Chapter 6 – Civil Case Procedures Introduction Civil cases are brought to enforce, redress, or protect the private rights of an individual, organization or government entity. The remedies available in a civil action include the recovery of money damages and the issuance of a court order requiring a party to the suit to complete an agreement or to refrain from some activity. The party who initiates the suit is the “plaintiff,” and the party against whom the suit is brought is the “defendant.” In civil cases, the plaintiff must prove his case by “a preponderance of the evidence.” Any person who is a plaintiff in a civil action in a court of the Commonwealth and a resident of the Commonwealth or a defendant in a civil action in a court of the Commonwealth, and who is on account of his poverty unable to pay fees or costs, may be allowed by the court to sue or defendant a suit therein without paying fees and costs. The person may file the DC-409, PETITION FOR PROCEEDING IN CIVIL CASE WITHOUT PAYMENT OF FEES OR COSTS . In determining a person’s ability to pay fees or costs on account of his/her poverty, the court shall consider whether such person is current recipient of a state and federally funded public assistance program for the indigent or is represented by legal aid society, including an attorney appearing as counsel, pro bono or assigned or referred by legal aid society. If so, such person shall be presumed unable to pay such fees and costs.
    [Show full text]
  • Comparison of the Actions of Trespass and Trover Alfred Paul Newton Cornell Law School
    Cornell Law Library Scholarship@Cornell Law: A Digital Repository Historical Theses and Dissertations Collection Historical Cornell Law School 1896 Comparison of the Actions of Trespass and Trover Alfred Paul Newton Cornell Law School Follow this and additional works at: http://scholarship.law.cornell.edu/historical_theses Part of the Law Commons Recommended Citation Newton, Alfred Paul, "Comparison of the Actions of Trespass and Trover" (1896). Historical Theses and Dissertations Collection. Paper 315. This Thesis is brought to you for free and open access by the Historical Cornell Law School at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Historical Theses and Dissertations Collection by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. COMPARISON OF THE ACTIONS OF TRESPASS AND TROVER, A THE SI S By, Alfred Paul Newton, Submitted for the Degree of Bachelor of Laws. Cornell University,...1896. COMPRISON OF TIE ACTIONS OF TRESPASS AND TROVER. I N T R 0 D U C T I 0 N. In an essay of this kind,which must necessa- rily be somewhat limited i# scope, it would be inex- pedient to endeavor to cover the whole field of the law of trespass or of trover, therefore the writer has di- rected his attention to the salient characteristics of each action, to those points which are most import- ant and interesting,not only from their prominence,but also from the fact that they are somewhat unsettled. It is the purpose of the writer to present a comparison of the modern actions of trespass and tro- ver as they now exist ,the distinction abolished in form, but still having some influence on the Imr and practice.
    [Show full text]
  • Taming the Tort Monster: the American Civil Justice System As a Battleground of Social Theory Michael L
    Brooklyn Law Review Volume 68 | Issue 1 Article 1 9-1-2002 Taming the Tort Monster: The American Civil Justice System as a Battleground of Social Theory Michael L. Rustad Thomas H. Koenig Follow this and additional works at: https://brooklynworks.brooklaw.edu/blr Recommended Citation Michael L. Rustad & Thomas H. Koenig, Taming the Tort Monster: The American Civil Justice System as a Battleground of Social Theory, 68 Brook. L. Rev. 1 (2002). Available at: https://brooklynworks.brooklaw.edu/blr/vol68/iss1/1 This Article is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Law Review by an authorized editor of BrooklynWorks. Brooklyn Law Review Volume 68 2002 Number 1 ARTICLES TAMING THE TORT MONSTER: THE AMERICAN CIVIL JUSTICE SYSTEM AS A BATTLEGROUND OF SOCIAL THEORY' Michael L. Rustadt & Thomas H. Koenig* 02002 Michael L. Rustad & Thomas H. Koenig. All Rights Reserved. Michael L. Rustad is the Thomas F. Lambert Jr. Professor of Law and Director of the Intellectual Property Law Program at Suffolk University Law School School. B.A. 1971, University of North Dakota; M.A. 1973, University of Maryland; Ph.D. 1981, Boston College; J.D. 1984, Suffolk University Law School; LL.M. 1986, Harvard University Law School. Thomas Koenig is Professor, Department of Sociology and Law, Policy and Society Doctoral Program, Northeastern University. A.B. 1971, University of California, Santa Cruz; M.A. 1973, University of California Santa Barbara; Ph.D. 1979, University of California, Santa Barbara. This article is dedicated to the memory of Thomas F.
    [Show full text]