Procedures in the justice system Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

The US Supreme Court has sanctioned several types of checkpoints, defining the specific requirements for them. To be recognized as constitutional, a checkpoint has to conform to the constitutional requirements of its briefness, minimization of its intrusiveness and not direct relation to the criminal investigation. With the wide range of existing checkpoints which have been already authorized by the courts, more measures should not be sanctioned for protecting the citizens’ constitutional rights.

The validity of every single checkpoint can be measured by its conformity to the constitutional norms and requires considering the peculiarities of every single situation. The border and sobriety checkpoints as well as informational roadblocks are recognized as constitutional.

As it was cited in Hess and Orthmann (2009) the Court admitted in the case United States vs. Martinez-Fuerte in 1976 that “a vehicle may be stopped at a fixed checkpoint for brief questioning of its occupants even though there is no reason to believe the particular vehicle contains aliens” (p. 272).

The drug, general crime control and driver’s license checkpoints have been recognized as violating the Fourth Amendment and are not sanctioned as constitutional by the Court. The possibility that any motorist committed a crime is insufficient for sanctioning the stops. “The administrative rationale is not acceptable, by comparison, to detect evidence of criminal activity” (Worall, 2010, p. 208).

The case City of Indianapolis vs. Edmond demonstrated that the city’s administrative checkpoints without individualized suspicion were unconstitutional. The authorization of these measures would violate the Fourth Amendment and make the reasonless intrusion into the private life of citizens a part of America’s routine.

The authorization of a checkpoint requires balancing the security demands with the citizens’ constitutional rights. For this reason, the legalization of additional checkpoints is not necessary.

The US Supreme Court has recognized the four main types of inspections, namely home inspections, business inspections, fire inspections and international mail inspections. The searches would be recognized as legal on the condition that the officers issue a warrant, receive consent for conducting searches, the exigent circumstances occur or there is no expectation of privacy and the warrant is not necessary. The existing regulation and corrections cover the wide range of cases and the authorization of additional inspections is not necessary.

All types of inspections need to be compliant with the requirements of the Fourth Amendment and should be evaluated through comparing the inconveniences caused by the invasion and the need for conducting the search. The administrative nonconsensual home inspections presuppose a significant intrusion into the private life of the residents and require issuing a warrant.

However, the welfare home inspections which are aimed at ensuring that welfare recipients conform to the guidelines do not require a warrant. “The Court declared that welfare inspections are not searches within the meaning of the Fourth Amendment” (Worall, 2010, p. 199). The business inspections can be conducted for checking the business records, the state of equipment and firearms without a warrant. However, in case the purpose of the searches is compliant with criminal investigation, a warrant is required.

Even if the warrant is necessary, the inspection can be conducted without it on the condition that consent was given. “The limitations to a search made with consent are that the consent must be free and voluntary” (Hess and Orthmann, 2009, p. 300). Fire inspections require notice instead of warrants for conducting the searches. The international mail inspection is justified with the border-search exception.

The courts do not need to authorize more inspections for avoiding the violation of the Fourth Amendment and protecting the citizens’ constitutional rights.

Reference List

Hess, K. & Orthmann, C. (2009). Introduction to law enforcement and criminal justice. Belmont, CA: Cengage Learning.

Worrall, J. (2010). Criminal procedure: From first contact to appeal (3rd ed.). Upper Saddle River, NJ: Pearson

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, February 20). Procedures in the justice system. https://ivypanda.com/essays/procedures-in-the-justice-system-3/

Work Cited

"Procedures in the justice system." IvyPanda, 20 Feb. 2019, ivypanda.com/essays/procedures-in-the-justice-system-3/.

References

IvyPanda. (2019) 'Procedures in the justice system'. 20 February.

References

IvyPanda. 2019. "Procedures in the justice system." February 20, 2019. https://ivypanda.com/essays/procedures-in-the-justice-system-3/.

1. IvyPanda. "Procedures in the justice system." February 20, 2019. https://ivypanda.com/essays/procedures-in-the-justice-system-3/.


Bibliography


IvyPanda. "Procedures in the justice system." February 20, 2019. https://ivypanda.com/essays/procedures-in-the-justice-system-3/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1