The Three-Tier Constitutional Enforcement Chain
The following enforcement chain — grounded exclusively in the Constitution and the Statutes at Large — establishes the complete legal basis for asserting digital property rights against any actor, government or private.
Fourth Amendment — 1 Stat. 97 (1791)
"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause…"
The phrase "shall not be violated" contains no qualifying language limiting it to government actors. It is a universal prohibition — binding on all persons, corporations, data brokers, telecom providers, cloud services, and government agencies alike. Digital data, metadata, communications, and personal records constitute "papers and effects" within the meaning of this amendment.
Civil Rights Act of 1866 — 14 Stat. 27
"…any person who, under color of any law, statute, ordinance, regulation, or custom, shall subject… any inhabitant… to the deprivation of any right secured by the Constitution… shall be liable to the party injured…"
This Act — enacted prior to the Fourteenth Amendment and grounded in the Statutes at Large — provides a direct cause of action against any person who deprives a natural person of a constitutionally secured right. The word "any" is not limited to government actors. A corporation, data broker, or private entity that retains your data after lawful notice is subject to this enforcement mechanism.
Common Law Notice Principle + Nemo potest ex aliena re commodum capere
"No one can derive benefit from another's property without permission." — Common Law Maxim, adopted at ratification
Once a natural person issues a lawful constitutional notice revoking consent for the retention of their private property (data), continued possession by any entity constitutes unlawful conversion and theft. There is no authority in the Statutes at Large granting any private or corporate actor the right to override a revocation of consent. Liability attaches immediately upon continued retention after notice.
Critical Doctrinal Correction: Fourth vs. Fifth Amendment
The conventional legal narrative incorrectly frames the Fifth Amendment as the primary protection for property rights. This is a fundamental error that must be corrected in any de jure constitutional analysis:
Incorrect (De Facto) Framing
"The Fifth Amendment protects your property from government taking." This framing limits property protection to government action and positions the Fifth Amendment as the source of the right.
Correct (De Jure) Framing
The Fourth Amendment is the source of the secured right. The Fifth Amendment addresses only one aspect of remedy and limitation on government once that right is already in place. The Fourth Amendment's "shall not be violated" is universal.
Carpenter v. United States (2018) — Binding Authority
The Supreme Court's 2018 decision in Carpenter v. United States (585 U.S. ___) confirms that the Fourth Amendment's warrant requirement applies to digital location data held by third parties — directly rejecting the government's reliance on the third-party doctrine:
"When the Government tracks the location of a cell phone it achieves near perfect surveillance, as if it had attached an ankle monitor to the phone's user. The retrospective quality of the data here gives police access to a category of information otherwise unknowable." — Chief Justice Roberts, Carpenter, 585 U.S. at ___.
This ruling confirms that the Stored Communications Act (100 Stat. 1848–1851, 1986) cannot override the Fourth Amendment's warrant requirement when applied to intimate digital data. The constitutional right supersedes the statutory authorization.
Under the de jure framework, this ruling is significant not merely for what it permits government to do — but for what it confirms about the nature of digital data as protected "papers and effects" under 1 Stat. 97. The protection is not contingent on who holds the data; it is secured by the right itself.
Assert Your Digital Property Rights
Use the Covington Research Assistant to explore any constitutional question, or generate a formal cease-and-desist notice to any entity retaining your data without consent.
Covington Research Assistant
AI-powered constitutional research operating exclusively within the Statutes at Large framework. Ask any constitutional question and receive a fully cited, de jure response.
Data Sovereignty Notice Generator
Generate a constitutionally grounded cease-and-desist notice directed at any entity retaining your private data without consent. Grounded in 1 Stat. 97 and 14 Stat. 27.