{"id":6049,"date":"2019-02-04T15:33:50","date_gmt":"2019-02-04T19:33:50","guid":{"rendered":"http:\/\/ncjolt.org\/?p=6049"},"modified":"2020-06-04T20:52:27","modified_gmt":"2020-06-04T20:52:27","slug":"carpenter-v-united-states-a-new-era-for-protecting-data-generated-on-personal-technology-or-a-mere-caveat","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/carpenter-v-united-states-a-new-era-for-protecting-data-generated-on-personal-technology-or-a-mere-caveat\/","title":{"rendered":"Carpenter v. United States: A New Era for Protecting Data Generated on Personal Technology, or a Mere Caveat?"},"content":{"rendered":"\n<p>In deciding Carpenter, a majority of United States Supreme Court Justices recognized that, at a fundamental level, historical cell-site location information (CSLI) differs from other categories of business records in terms of deserving Fourth Amendment protection. However, the majority\u2019s opinion is unclear about the precise source of this distinction, and about how, or whether, to protect other data generated from personal technology in the future. Although the majority opinion purports to be limited to CSLI, this narrow scope is not in the best interest of consumers. At best, Carpenter presents the opportunity to establish a predictable and comprehensive system for protecting personal data from warrantless search. However, the majority\u2019s approach also risks becoming a mere caveat, drawing artificial distinctions between CSLI and other types of data that may be equally, or more, sensitive. Now that the Supreme Court has recognized some forms of data held by businesses are protected from warrantless search, this holding should be expanded to protect the increasingly comprehensive consumer data that companies acquire. Although Justice Kennedy\u2019s dissent in Carpenter highlighted the risks of the majority\u2019s unstructured approach, Justice Sotomayor\u2019s concurrence in United States v. Jones provided an aspirational glimpse of how personal data could be protected in the future. Courts should read Carpenter in conjunction with Justice Sotomayor\u2019s Jones concurrence to provide a predictable standard for evaluating personal data protections and avoid the uncertain approach that the Carpenter majority\u2019s opinion risks establishing. <\/p>\n\n\n<ul><li>Author: Aaron L. Dalton<\/li><li>Cite: Aaron L. Dalton, <em>Carpenter v. United States: A New Era for Protecting Data Generated on Personal Technology, or a Mere Caveat?<\/em>, 20 N.C. J.L. &amp; Tech. 1 (2018), \/\/journals.law.unc.edu\\\/ncjolt\/wp-content\/uploads\/sites\/4\/2019\/02\/DaltonFinal.pdf.<\/li><li>PDF: <a href=\"\/\/journals.law.unc.edu\\\/ncjolt\/wp-content\/uploads\/sites\/4\/2019\/02\/DaltonFinal.pdf\">\/\/journals.law.unc.edu\\\/ncjolt\/wp-content\/uploads\/sites\/4\/2019\/02\/DaltonFinal.pdf<\/a><\/li><li>Volume: Volume 20, Online Issue<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In deciding Carpenter, a majority of United States Supreme Court Justices recognized that, at a fundamental level, historical cell-site location information (CSLI) differs from other categories of business records in terms of deserving Fourth Amendment protection. However, the majority\u2019s opinion is unclear about the precise source of this distinction, and about how, or whether, to <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/carpenter-v-united-states-a-new-era-for-protecting-data-generated-on-personal-technology-or-a-mere-caveat\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,85,88],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/6049"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=6049"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/6049\/revisions"}],"predecessor-version":[{"id":6864,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/6049\/revisions\/6864"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=6049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=6049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=6049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}