TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

The Meridiem
State Privacy Laws' Data-Broker Blind Spot as Public Servant Threats RiseState Privacy Laws' Data-Broker Blind Spot as Public Servant Threats Rise

Published: Updated: 
3 min read

0 Comments

State Privacy Laws' Data-Broker Blind Spot as Public Servant Threats Rise

Regulatory gap exposed: 19 state privacy laws fail to protect public servants from data-broker sales. Rising violence incidents create inevitable pressure for legislative action targeting enforcement gap.

Article Image

The Meridiem TeamAt The Meridiem, we cover just about everything in the world of tech. Some of our favorite topics to follow include the ever-evolving streaming industry, the latest in artificial intelligence, and changes to the way our government interacts with Big Tech.

  • Public Service Alliance analysis finds zero of 19 state privacy laws prevent data brokers from selling home addresses obtained via public records

  • Violent threats against public servants tracked at 1,600+ incidents 2015-2025, with verbal threats occurring 9x more frequently than physical attacks according to Impact Project analysis

  • Only California offers free bulk data deletion; 18 other states require manual requests or paid services that succeed just 2/3 of the time

  • The Minnesota shooting of state legislator Melissa Hortman exemplifies the pipeline: alleged shooter used publicly available people-search engines to locate target address

A critical regulatory inflection point is crystallizing. The Public Service Alliance released a detailed analysis Tuesday showing that despite rising threats against public servants nationwide, 19 different state-level privacy laws systematically fail to address the core vulnerability: data brokers freely selling personal information—including home addresses—harvested from public records. This gap between regulatory intent and real-world protection creates the immediate pressure point where policy action becomes inevitable, not optional.

The regulatory gap is now documented, quantified, and directly connected to rising violence. That's the inflection moment.

Justin Sherman, a researcher at the Security Project within the Public Service Alliance, spent months analyzing 19 different "comprehensive" state-level consumer privacy laws. What he found should alarm anyone responsible for institutional security: while all 19 give consumers the right to stop data brokers from selling information obtained from private sources, not one prevents data brokers from selling data when it comes from public records—property filings, court documents, voting registrations. And critically, none include a "private right of action," meaning individuals can't sue for violations. The result is asymmetrical vulnerability. Public servants are uniquely exposed, with uniquely few legal remedies.

This isn't abstract regulatory failure. The Public Service Alliance and Impact Project tracked over 1,600 individual threats made against public servants between 2015 and 2025. Nearly a third targeted local officials—school board members, election workers, municipal employees. The pattern matters: threatening statements occur at nearly nine times the rate of physical attacks. One escalates to the other.

Last year's assassination attempt on Minnesota state representative Melissa Hortman crystallized the data-to-violence pipeline. Court records show the alleged shooter possessed handwritten lists of dozens of Minnesota state and federal officials—with Hortman's name and home address included. He'd used 11 "people search engines," services available to anyone willing to pay a nominal fee. Those addresses? Sourced from public records, then digitized, aggregated, and sold by data brokers for profit. The old friction—you'd need to know where to look and physically travel to find a public record—is gone. Now it's searchable, purchasable, weaponizable.

The gap becomes clear when you trace how this happened. State privacy laws like California's CCPA were designed to address corporate data collection—companies tracking behavior for marketing purposes. That's private-source data, mostly. Public servants occupy a different category. Their information already exists in public records by design—you should be able to find who your elected officials are. But there's a difference between "accessible" and "aggregated and sold to anyone with a credit card." Sherman's point isn't that public records should disappear. It's that data brokers shouldn't be able to transform public records into scalable weapons.

The enforcement reality makes this worse. Only California has implemented a functional mechanism: the Delete Request and Opt-out Platform (DROP), which lets residents request deletion en masse, for free. Everyone else has to file manual deletion requests or pay for third-party services. In 2024, Consumer Reports tested seven major deletion services—costs ranging from $19.99 to $249 annually—and found success rates topping out around 66 percent. You pay, and it still doesn't work reliably.

Last year, data brokers were actually caught hiding opt-out instructions from Google search results, making it deliberately harder for people to delete their information. This is intentional friction, not accident.

So what triggers policy response now? The evidence is accumulating visibly. A 2024 Brennan Center report found that women and Democrats reported sharper increases in harassment severity than men and Republicans. The threat data is organized, public, and grows monthly. Politicians themselves—election workers, judges, local officials—are experiencing this firsthand. Unlike generic privacy violations, this produces concrete, reportable victims. Someone tried to assassinate a legislator. The link is traceable.

The market is already sensing the policy shift. Privacy-focused tech companies see the regulatory window opening. Cities and states are quietly evaluating how they digitize and distribute public records. CISOs at large government agencies are flagging data broker exposure as institutional liability, not individual risk. That's the inflection.

The legislative trajectory now becomes predictable. Sherman's report suggests specific interventions: regulate how public records are digitized and distributed, rather than blocking access entirely. Some states are already moving. Others will follow once the liability calculus shifts—and once enough incidents accumulate on the public record.

The timing compression matters. Public servants operate on compressed windows for institutional response. If you're a state legislator or city manager, the question isn't whether to act, but whether to act before the next incident creates forced urgency. That window is open now.

The inflection point is policy enforcement becoming urgent. Decision-makers in government agencies and larger enterprises need to assume legislative change is coming within 12-18 months and begin treating public-servant data exposure as institutional liability now, not a future problem. Professionals in affected roles—elected officials, school administrators, election workers—have a narrowing window to pressure representatives for specific protections before incidents force reactive legislation. For builders in the privacy-tech space, this opens a market for compliance tooling around public-record data management. The next threshold to watch: which state legislates first, and what model do others copy?

People Also Ask

Trending Stories

Loading trending articles...

RelatedArticles

Loading related articles...

MoreinTech Policy & Regulation

Loading more articles...

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiem

TheMeridiemLogo

Missed this week's big shifts?

Our newsletter breaks them down in plain words.

Envelope
Meridiem
Meridiem