How the Constitution Protects your Cell Phone and Laptop Encryption Key

  • Friday, March 1, 2013 | 10:20 AM – 11:20 AM | Room: Room 302

View all Sessions

Recent cases have brought the question to light of when a user's privacy rights are violated in their cell phone and encryption passwords. This talk highlights the relevant cases and logic behind the cases to make sense of the decisions. We cover the 4th amendment and tie it to searches of your cell phone. We also cover the 5th amendment in relation to giving up your encryption password.


This document was retrieved from on Sun, 29 Nov 2015 03:43:31 -0500.
© 2015 EMC Corporation. All rights reserved.