This Article argues that Web users should enjoy a legitimate expectation of privacy in clickstream data. Fourth Amendment jurisprudence as developed over the last half-century does not support an expectation of privacy. However, reference to the history of the Fourth Amendment and the intent of its drafters reveals that government investigation and monitoring of clickstream data is precisely the type of activity the Framers sought to limit. Courts must update outdated methods of expectation of privacy analysis to address the unique challenges posed by the Internet in order to fulfill the Amendment\u27s purpose. Part I provides an overview of the Internet and cickstream data collection, and explains the value of this data to law enforcement....
This Article examines the central role that knowledge plays in determining the Fourth Amendment’s sc...
This article takes the position that the Wiretap Act and the Electronic Communications Privacy Act (...
For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches...
In a landmark non-decision last term, five Justices of the United States Supreme Court would have he...
The Fourth Amendment only protects against government intrusions into spaces or information that rec...
Technology has transformed government surveillance and opened traditionally private information to o...
Under existing law, social media information communicated through behind password -protected pag...
In a landmark non-decision last term, five Justices of the United States Supreme Court would have he...
This year marked the twenty-fifth anniversary of the World Wide Web (“Web”), and more than 81% of Am...
In a world in which Americans are tracked on the Internet, tracked through their cell phones, tracke...
This Article addresses the need to recognize a property-based right in personal data and to limit th...
The Internet is a unique and wholly new medium of worldwide human communication. This pronouncement ...
Under current doctrines, parties to a communication enjoy robust constitutional protection against g...
This Article argues that federal courts should seize the opportunity presented by the Snowden leaks ...
In this article, Professor Solove examines the increasing information flow from the private sector t...
This Article examines the central role that knowledge plays in determining the Fourth Amendment’s sc...
This article takes the position that the Wiretap Act and the Electronic Communications Privacy Act (...
For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches...
In a landmark non-decision last term, five Justices of the United States Supreme Court would have he...
The Fourth Amendment only protects against government intrusions into spaces or information that rec...
Technology has transformed government surveillance and opened traditionally private information to o...
Under existing law, social media information communicated through behind password -protected pag...
In a landmark non-decision last term, five Justices of the United States Supreme Court would have he...
This year marked the twenty-fifth anniversary of the World Wide Web (“Web”), and more than 81% of Am...
In a world in which Americans are tracked on the Internet, tracked through their cell phones, tracke...
This Article addresses the need to recognize a property-based right in personal data and to limit th...
The Internet is a unique and wholly new medium of worldwide human communication. This pronouncement ...
Under current doctrines, parties to a communication enjoy robust constitutional protection against g...
This Article argues that federal courts should seize the opportunity presented by the Snowden leaks ...
In this article, Professor Solove examines the increasing information flow from the private sector t...
This Article examines the central role that knowledge plays in determining the Fourth Amendment’s sc...
This article takes the position that the Wiretap Act and the Electronic Communications Privacy Act (...
For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches...