{"id":28515,"date":"2017-08-08T03:46:18","date_gmt":"2017-08-08T08:46:18","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=28515"},"modified":"2017-08-08T03:46:18","modified_gmt":"2017-08-08T08:46:18","slug":"the-hill-congress-must-act-to-protect-data-privacy-before-courts-make-surveillance-even-easier","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=28515","title":{"rendered":"The Hill: Congress must act to protect data privacy before courts make surveillance even easier"},"content":{"rendered":"<p>The Hill: <a href=\"http:\/\/thehill.com\/blogs\/pundits-blog\/technology\/345559-congress-must-act-to-protect-data-privacy-before-courts-make\">Congress must act to protect data privacy before courts make surveillance even easier<\/a> by Ashley Baker:<br \/>\n<!--more--><\/p>\n<blockquote><p>The Fourth Amendment was established in a time when privacy expectations could be articulated through a simple maxim that \u201cevery man\u2019s home is his castle.\u201d In the 21st century, however, our most private information is often guarded not by walls or with a key, but by the companies \u2014 Microsoft, Verizon, and the like \u2014 that provide us with access to the data cloud.<\/p>\n<p>In a perfect world, the technologies of today would be met with the same principles that were laid out in the Fourth Amendment by our founders. Unfortunately, that is easier said than done. Technology has added lots of complications, and we are left trying to figure out what a reasonable search is in the age of the data cloud.<\/p>\n<p>Much of the doctrine of the Fourth Amendment is based on definitions that are ill-equipped for dealing with challenges in the era of cloud computing. &#8230;<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The Hill: Congress must act to protect data privacy before courts make surveillance even easier by Ashley Baker:<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76,79],"tags":[],"class_list":["post-28515","post","type-post","status-publish","format-standard","hentry","category-surveillance-technology","category-third-party-doctrine"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/28515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=28515"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/28515\/revisions"}],"predecessor-version":[{"id":28516,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/28515\/revisions\/28516"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=28515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=28515"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=28515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}