This Contribution examines whether the denial of Gender Confirmation Surgery to a transgender inmate suffering from severe gender dysphoria constitutes cruel and unusual punishment under the Eighth Amendment. Virginia Su (’22) argues that, under Eighth Amendment precedent, the denial of medically necessary gender confirmation surgery constitutes deliberately indifferent conduct by prison officials.
Contact tracing emerged during the beginning of the COVID-19 pandemic as an important tool to reduce the spread of COVID-19. The use of cell phone applications provides a method to effectively trace potential exposures since most individuals carry cell phones that can easily gather the necessary data. The federal government has thus far failed to introduce its own regulations regarding the large volume of data that can be collected during contact tracing efforts or attempt to help coordinate the regulations of the individual states to ensure consistency; paving the way for a patchwork system of rules to govern, as each state is left to formulate its own method to protect the health and privacy of its residents. However, due to the volume of interstate travel and difficulty of restricting application usage based on state borders, states must be careful not to run afoul of the so-called “Dormant Commerce Clause” of the United States Constitution. In this Contribution, Kenneth Brown (’22) argues that it is possible for a state to effectively regulate con-tact tracing applications without violating the Constitution.
The Eighth Amendment prohibits cruel and unusual punishments. But proving an Eighth Amendment violation based on dangerous or unfit prison conditions is difficult because it requires a showing of subjective culpability on the part of prison officials. Federal courts have grown increasingly aware of the harmful nature of solitary confinement, particularly for juveniles, the mentally ill, and inmates with special medical needs. In this Contribution, Jane M. Mahan (’22) argues that the placement of vulnerable inmates in solitary confinement for a period exceeding fifteen consecutive days should be per se unconstitutional under the Eighth Amendment.
The First Amendment’s Religion Clauses provide that “Congress shall make no law respecting the establishment of religion, or prohibiting the free exercise thereof . . . .” The Religion Clauses clearly prohibit both the Federal and state governments from establishing an official state religion or hindering religious practice to such an extent that it results in a constitutional infringement. However, the Supreme Court has long acknowledged that absent those two clear commands “there is room for play in the joints” when addressing the constitutionality of government action that implicates religious belief. Does a tax benefit that provides a financial benefit to a limited class of religious employees and their employers violate the Establishment Clause? In this Contribution, Alec Soghomonian (‘22) argues that the Parsonage Exemption, found in 26 U.S.C. § 107(2) of the United States tax code, unlawfully provides a benefit to religious employees and employers because it does not extend to similarly situated non-religious institutions.
Law enforcement agencies are increasingly seeking to compel the disclosure of passwords from the owners of password-protected encrypted devices, such as cell phones. Does the government have the right to compel this disclosure? In this Contribution, Diego Wright (‘22) argues that the Fifth Amendment right against self-incrimination protects an individual from being forced to disclose their passcode when analyzed under the “foregone conclusion” doctrine unless the government can demonstrate they already know the testimonial communications tacit in the act of providing the passcode.
This Contribution examines whether compliance with the Fifth Amendment should shield a federal condemnation action from a First Amendment retaliation claim. Hannah Beattie (’21) argues that the rationales for carving out safe harbors for government action to be free from First Amendment scrutiny if in compliance with the Fourth Amendment do not extend to the Fifth Amendment context. Ultimately, this Contribution concludes that an individual should be able to raise a First Amendment retaliation defense to a condemnation action, even if the government complied with the Fifth Amendment.
The Fifth Amendment prohibits the taking of private property “without just compensation,” but the optimal method of determining the precise amount of money that will justly compensate the property owner is not always clear. The general rule has been to set compensation at the fair market value of the property at the time the government takes it, with certain exceptions. In this Contribution, Timothy Lyons (’21) argues that when the government makes a well-publicized pre-condemnation announcement, it may be appropriate to compensate the owner based on the property’s value at the time of the announcement rather than its value at the time of the taking.
Should the qualified immunity doctrine be revisited to better allow civilians to sue government officials for violations of fundamental rights? In this Contribution, Victoria del Rio-Guarner (’18) discusses how the Supreme Court’s decisions in Harlow v. Fitzgerald and Pearson v. Callahan essentially rendered qualified immunity to Section 1983 claims unqualified. This Contribution argues that qualified immunity doctrine should be recalibrated in order to better fulfill its underlying purpose while not disabling Section 1983 claims.
Can an employee who has accessed computer database information in violation of use restrictions and direct instructions from his employer be convicted under the Computer Fraud and Abuse Act for accessing data “without authorization” or “exceed[ing] authorized access”? Susanna Griffith (’17) reflects on this question, based on her experience at the 2016 Spong Moot Court Tournament, hosted by William & Mary Law School. Her Contribution discusses the legal landscape and circuit split regarding the applicability of the statute to employees who have violated use restrictions and directives from employers. The Contribution argues that the narrow, code-based view is preferable as the clearly constitutional reading that also comports with standards of excellence in the field of cyber-security.
What standard should be applied to limited purpose public figures – individuals that are public figures only due to their involvement in a particular public controversy – who bring defamation claims, when the alleged defamatory remarks are unrelated to the plaintiff’s purpose for being a public figure? David Clements (’17) examines this question, presented at the Spring 2016 Marden Moot Court Competition, held at New York University School of Law. The “germaneness test” employed by several Circuit Courts of Appeal determines the extent of First Amendment protections a defendant in a defamation suit receives: a challenged statement germane to the controversy for which a defamation claimant is a public figure receive more protection than a statement unrelated to that controversy. This Contribution urges the Supreme Court to revisit this germaneness test, as applied to limited purpose public figures, for three reasons: first, allowing limited purpose public figures to recover damages for negligent defamation would cause a chilling effect on the press; second, engaging in a intensive investigation into whether certain comments are “germane” to a particular plaintiff’s purpose as a public constitutes a presumptively unconstitutional content-based analysis of speech; third, the distinction between limited purpose and general purpose public figures is no longer applicable due to technological advancement and the heightened access to self-help channels that even limited purpose public figures now possess.