Due process

No warrant, no vehicle location dragnet.

A car location trail can reveal home, work, church, medical visits, political activity, family routines, and private relationships. That deserves a warrant, not a paperwork shortcut.

The rule this campaign demands

Government access to precise live or historical vehicle geolocation should require a warrant. Emergency access should be narrow, logged, reviewed, and followed by notice when safety allows.

Required safeguards

  1. Warrant required for precise vehicle geolocation, route history, app location, telematics location, and connected-service location records.
  2. Narrow emergency exception for imminent danger, not routine investigations.
  3. Later notice to the vehicle owner or affected person unless a court delays it for a specific reason.
  4. Annual transparency reports from automakers, service providers, lenders, insurers, and agencies.
  5. No bulk searches, reverse-location fishing expeditions, or geofence-style queries without strict court oversight.
  6. Suppression and civil remedies when vehicle data is obtained unlawfully.

Why self-regulation is not enough

The research base shows voluntary privacy principles did not produce uniform warrant rules, uniform notice practices, or clear deletion and retention limits. A rights-based campaign should focus on enforceable law, not promises.

W

Warrant

Precise vehicle location should receive strong Fourth Amendment-style protection by statute.

N

Notice

Owners should be told when their car data was requested unless a judge delays notice.

T

Transparency

Companies and agencies should publish counts, legal process types, emergency claims, and outcomes.

Legislator language

No government entity may compel, purchase, query, or receive precise vehicle geolocation data, connected-service location data, driver-behavior data, or in-cabin monitoring data without a warrant based on probable cause, except under a narrowly defined emergency involving imminent danger of death or serious bodily harm. Emergency access must be logged, audited, and followed by notice and court review.