delivered the opinion of the Court.
Modern technology has raised a number of questions that are intertwined in this case: To what extent can private individuals *389 “surf” the “Web” anonymously? Do Internet subscribers have a reasonable expectation of privacy in their identity while accessing Internet websites? And under what circumstances may the State learn the actual identity of Internet users?
In this case, defendant Shirley Reid allegedly logged onto an Internet website from her home computer. The site belonged to a company that supplied material to her employer’s business. While on the supplier’s website, Reid allegedly changed her employer’s password and shipping address to a non-existent address.
Whenever an individual logs onto an Internet website, that user’s identity is revealed only in the form of a unique multi-digit number (an “IP address”) assigned by the user’s Internet Service Provider (“ISP”). A website may collect that number, but only a service provider can translate it into the name of an actual user or subscriber.
Here, the supplier’s website captured a ten-digit IP address, and the supplier told Reid’s employer what had occurred. The employer, in turn, reported the IP address to local authorities. They issued a deficient municipal subpoena to Comcast, the service provider, and Comcast revealed that the IP address was assigned to Shirley Reid.
Reid is now under indictment for second-degree computer theft. She successfully moved to suppress the subscriber information obtained via the municipal subpoena.
We now hold that citizens have a reasonable expectation of privacy, protected by Article I, Paragraph 7, of the New Jersey Constitution, in the subscriber information they provide to Internet service providers—-just as New Jersey citizens have a privacy interest in their bank records stored by banks and telephone billing records kept by phone companies. Law enforcement officials can satisfy that constitutional protection and obtain subscriber information by serving a grand jury subpoena on an ISP without notice to the subscriber.
*390 Because the police used a deficient municipal subpoena to obtain protected subscriber information in this case, defendant’s motion to suppress was properly granted. However, records of the protected subscriber information existed independently of the faulty process the police used, and the conduct of the police did not affect that information. As a result, the State may seek to reacquire the subscriber information with a proper grand jury subpoena.
I.
A.
Some background information about computers and the Internet may assist in evaluating the issues presented. The Internet is a global network of computers that allows for the “sharing” or “networking” of information to and from remote locations. See Harry Newton, Newton’s Telecom Dictionary 502 (23rd ed. 2007). Users of the Internet can send electronic mail, share files, and explore or “surf” the World Wide Web (“Web”), a graphical computer-based information network. Id. at 502-03. While surfing the Web, a user can visit and interact with sites maintained by businesses, educational institutions, governments, and individuals, which cover almost every conceivable topic.
An individual customer must select an Internet Service Provider like Comcast, AOL, or Verizon, in order to connect to the Internet. See, e.g., id. at 107. To sign up for service, a customer must disclose personal information including one’s name, billing information, phone number, and home address.
To interact with other computers also attached to the Internet, a computer must be assigned an Internet Protocol address, or IP address. Id. at 342. An IP address is a string of up to twelve numbers separated by dots—for example, 123.45.67.89. Ibid. In certain situations, a computer is assigned a permanent IP address, called a static IP address. Ibid. Most often, when an individual connects to the Internet, his or her Internet Service Provider *391 dynamically assigns an IP address to the computer, which can change every time the user accesses the Internet. Ibid. In other words, the “dynamic” IP address assigned to the computer can be different for each Internet session. Ibid.
The American Registry for Internet Numbers (ARIN) is in charge of assigning IP addresses within North America. See http://www.arin.neVindex.shtm!. Anyone acquiring an IP address must register and provide ARIN certain contact information, which ARIN makes publicly available. Ibid. However, most Internet users do not obtain IP addresses directly from ARIN; they instead “lease” an IP address from a service provider like Comcast, which is the actual, named registrant. See RIR Comparative Policy Overview (2008), http://www.nro.neVdocuments/ nro47.html Oast visited April 16, 2008) (linked to ARIN website).
When an Internet user surfs the Web, sends e-mail, or shares a file, any site the user connects to can collect certain information, including the user’s IP address. See Newton, supra, at 506. However, the sites ordinarily cannot identify the name of an individual user. Only the ISP can match the name of the customer to a dynamic IP address.
Recently, IP Address Locator Websites have become available to the general public. 1 Such websites operate similarly to a reverse phone directory: they permit a person to type in an IP address and obtain the name and location of the registrant for that address. Once again, because most Internet users access the Internet via third-party service providers like AOL, Comcast, Yahoo, and others, Address Locator Websites typically reveal the name and location of the service provider—such as Comcast—but not information about the individual user.
*392 Thus, even with the advent of IP Address Locator Websites, most users continue to enjoy relatively complete IP address anonymity when surfing the Web.
B.
The facts of this case are not in dispute. On August 27, 2004, Timothy Wilson, the owner of Jersey Diesel, reported to the Lower Township Police Department that someone had used a computer to change his company’s shipping address and password for its supрliers. The shipping address was changed to a nonexistent address.
In response to a question by the police, Wilson explained that Shirley Reid, an employee who had been on disability leave, could have made the changes. Reid returned to work on the morning of August 24, had an argument with Wilson about her temporary light duty assignment, and left. According to Wilson, Reid was the only employee who knew the company’s computer password and ID.
Wilson learned of the changes through one of his suppliers, Donaldson Company, Inc. Both the password and shipping address for Jersey Diesel had been changed on Donaldson’s website on August 24, 2004. According to an information technology specialist at Donaldson, someone accessed their website and used Jersey Diesel’s username and password to sign on at 9:57 a.m. The individual changed the password and Jersey Diesel’s shipping address and then completed the requests at 10:07 a.m.
Donaldson’s website captured the user’s IP address, 68.32.145.220, which was registered to Comcast. When Wilson contacted Comcast and asked for subscriber information associated with that address—so that he could identify the person who made the unauthorized changes—Comcast declined to respond without a subpoena.
On September 7, 2004, a subpoena duces tecum issued by the Lower Township Municipal Court was served on Comcast. The *393 subpoena sought “[a]ny and all information pertaining to IP Address information belonging to IP address: 68.32.145.220, which occurred on 08/24/04 between 8:00 a.m. and 11:00 а.m. EST.” The subpoena was captioned “Timothy C. Wilson, Plaintiff, vs. Shirley Reed [sic], Defendant,” although no such case was pending.
Comcast responded on September 16, 2004 and identified Reid as the subscriber of the IP address. In addition, Comcast provided the following information: Reid’s address, telephone number, type of service provided, IP assignment (dynamic), account number, e-mail address, and method of payment.
An arrest warrant was issued on September 29, 2004, and Reid was arrested ten days later. On February 22, 2005, the Cape May County Grand Jury returned an indictment charging Reid with second-degree computer theft, in violation of N.J.S.A. 2C:20-25(b).
Reid moved to suppress the evidence obtained via the municipal court subpoena. On September 22, 2005, the trial court granted Reid’s motion. The court identified various flaws with the municipal court subpoena and noted that the procedure followed by the police was “unauthorized in its entirety.” The court also concluded that Reid had an expectation of privacy in her Internet subscriber information on file with Comcast. Therefore, the trial court held that the subpoena violated Reid’s “right to be free from unreasonable searches and seizures” and was unconstitutional.
The Appellate Division, in a published opinion, affirmed the order of suppression.
State v. Reid,
389
N.J.Super.
563,
*394
The panel reasoned that “New Jersey appears to have recognized a right to what has been called ‘informational privacy.’ ”
Id.
at 570,
[informational privacy] encompasses any information that is identifiable to an individual. This includes both assigned information, such as a name, address, or sоcial security number, and generated information, such as financial or credit card records, medical records, and phone logs____ [P]ersonal information will be defined as any information, no matter how trivial, that can be traced or linked to an identifiable individual.
[Ibid, (quoting Elbert Lin, Prioritizing Privacy: A Constitutional Response to the Internet, 17 Berkeley Tech. L.J. 1085, 1096-97 (2002)).]
In support of this precept, the panel cited to
State v. Hunt,
91
N.J.
338,
The panel concluded that information on file with Comcast concerning the identity of Internet users fell within the protected privacy right. Accordingly, that information could “only be obtained by law enforcement through some means of proper judicial process.”
Reid, supra,
389
N.J.Super.
at 575,
On March 15, 2007, this Court granted the State’s motion for leave to appeal. 190
N.J.
250,
II.
The State contends that there is no reasonablе expectation of privacy in subscriber information provided to one’s ISP. The State submits that
State v. Evers,
175
N.J.
355,
If the Court were to recognize a privacy interest, the State argues that a grand jury subpoena would be legally sufficient to gain access to subscriber information, consistent with the holdings in
McAllister, supra,
184
N.J.
17,
Reid asks us to affirm the Appellate Division’s holding and find a constitutional right of privacy in internet subscriber information. Reid argues that Evers, supra, did not settle the issue. In addition, Reid submits that suppression is the proper remedy for a violation of her constitutional right.
Reid also urges this Court to require notice to the Internet user whenever the government, using judicial process, seeks subscriber information from an ISP. The State could avoid the notice requirement in a given case if it were able to justify an exception to that rule.
We granted amicus curiae status to the Association of Criminal Defense Lawyers of New Jersey (ACDL) as well as the American Civil Liberties Union of New Jersey (ACLU). (The ACLU submitted a brief on behalf of itself and the Electronic Frontier Foundation, Electronic Privacy Information Center, Freedom to Read Foundation, Privacy Rights Clearinghouse, and New Jersey Library Association.)
All amici contend that there is a reasonable expectation of privacy under the New Jersey Constitution with regard to ISP subscriber information. They also argue for contemporaneous notice to the Internet user when the government seeks such information. In case of a violation of the constitutionally protected privacy right, they argue that suppression is required. They submit that statutory civil remedies are insufficient to protect an individual’s right of privacy.
III.
We first considеr the existence of a New Jersey citizen’s privacy interest in Internet subscriber information.
*396 A.
Both the Fourth Amendment to the United States Constitution and Article I, Paragraph 7, of the New Jersey Constitution protect, in nearly identical language, “the right of the people to be secure ... against unreasonable searches and seizures.”
Federal case law interpreting the Fourth Amendment has found no expectation of privacy in Internet subscriber information.
See Guest v. Leis,
Our inquiry does not end there because “despite the congruity of the language,” the search and seizure protections in the federal and New Jersey Constitutions “are not always coterminous.”
Hunt, supra,
91
N.J.
at 344,
During the past twenty-five years, a series of New Jersey cases has expanded the privacy rights enjoyed by citizens of this state. In 1982, this Court concluded in
Hunt, supra,
that telephone toll billing records are “part of the privacy package.” 91
N.J.
at 347,
Finding that Article I, Paragraph 7, of the New Jersey Constitution provides more protection than federal law affords, this Court concluded that a person “is entitled to assume that the numbers he dials in the privacy of his home will be recorded solely for the telephone company’s business purposes.”
Id.
at 345, 347,
[i]t is unrealistic to say that the cloak of privacy has been shed because the telephone company and some of its employees are aware of this information____ This disclosure has been necessitated because of the nature of the instrumentality, but more significantly the disclosure has been made for a limited business purpose and not for release to other persons for other reasons.
[Id. at 347,450 A.2d 952 .]
More recently, in
McAllister, supra,
this Court held that the New Jersey Constitution provides bank account holders a reasonable expectation of privacy in their bank records. 184
N.J.
at 32-33,
B.
ISP records share much in common with long distance billing information and bank records. All are integrally connected to essential activities of today’s society. Indeed, it is hard to overstate how important computers and the Internet have become to everyday, modern life. Citizens routinely access the Web for all manner of daily activities: to gather information, explore ideas, read, study, shop, and more.
Individuals need an ISP address in order to access the Internet. However, when users surf the Web from the privacy of their homes, they have reason to expect that their actions are confidential. Many are unaware that a numerical IP address can be captured by thе websites they visit. More sophisticated users understand that that unique string of numbers, standing alone, reveals little if anything to the outside world. Only an Internet service provider can translate an IP address into a user’s name.
In addition, while decoded IP addresses do not reveal the content of Internet communications, subscriber information alone can tell a great deal about a person. With a complete listing of IP addresses, one can track a person’s Internet usage. “The government can learn the names of stores at which a person shops, the political organizations a person finds interesting, a person’s ... fantasies, her health concerns, and so on.” Daniel Solove, The Future of Internet Surveillance Law, 72 Geo. Wash. L.Rev. 1264, 1287 (2004). Such information can reveal intimate details about one’s personal affairs in the same way disclosure of telephone *399 billing records does. Although the contents of Internet communications may be even more revealing, both types of information implicate privacy interests.
The State compares IP addresses to the return addresses found on the outside of envelopes, which carry no privacy protection. But there is an important difference: letter writers choose to include their address on an envelope. They may also opt for anonymity and list no return address. Internet users have no such choice because they must have an IP address to access a website. In addition, the string of numbers that comprises an IP address and can be collected by a website is both less revealing and less public than a name or street address posted on an envelope.
It is well-settled under New Jersey law that disclosure to a third-party provider, as an essential step to obtaining service altogether, does not upend the privacy interest at stake.
See McAllister, supra,
184
N.J.
at 31,
For all of those reasons, we find that Article I, Paragraph 7, of the New Jersey Constitution protects an individual’s privacy interest in the subscriber information he or she provides to an Internet service provider. 3
*400
This Court’s decision in
Evers
does not hold otherwise. In
Evers,
a deputy sheriff in California was investigating the use of child pornography on the Internet. He connected to AOL, entered a chat room whose name suggested sexual activity involving children, and sent an e-mail that allowed other AOL subscribers interested in the subject matter to communicate with him.
Evers, supra,
175
N.J.
at 365,
The deputy obtained a search warrant to learn the identities associated with the ninety-eight screen names and served the warrant on AOL’s corporate headquarters in Dulles, Virginia. AOL, in turn, provided names and billing addresses for the requested screen names.
Ibid.
Because the person who sent the pornographic images resided in Nutley, New Jersey, the deputy forwarded the information to the Nutley Police Department. The Department acquired a warrant to search defendant’s house.
Id.
at 366,
Evers claimed he had a reasonable expectation of privacy in the contents of the e-mail of the nude girl. This Court quickly dispensed with his argument, noting that Evers had forwarded thе e-mail to fifty-one recipients at his peril that one of them would disclose his wrongdoing.
Id.
at 370,
The Court next asked whether defendant had a privacy interest in the subscriber information stored at AOL headquarters in Virginia.
Ibid.
Without reaching the substantive question under New Jersey law, the Court acknowledged that “[n]o purpose would be served by applying New Jersey’s constitutional stan
*401
dards to people and places over which the sovereign power of the state has no power or control.”
Id.
at 371,
The New Jersey Wiretapping and Electronic Surveillance Control Act (‘Wiretap Act”), N.J.S.A. 2A:156A-1 to -34, offers additional support for concluding that internet users have a reasonable expectation of privacy in their own subscriber information kept by an ISP. The Wiretap Act provides for disclosure of subscriber information, including name, address, telephone number, and means of payment, only when a law enforcement agency obtains “a grand jury or trial subpoena or when the State Commission of Investigation issues a subpoena.” N.J.S.A. 2A:156A-29(f). The Legislature’s decision to proteсt disclosure of ISP information absent a subpoena is consistent with the privacy protection we recognize today.
One additional point bears mention about the right to privacy in ISP subscriber information: the reasonableness of the privacy interest may change as technology evolves. A
reasonable
expectation of privacy is required to establish a protected privacy interest.
Hempele, supra,
120
N.J.
at 200,
*402 The availability of IP Address Locator Websites has not altered that expectation because they reveal the name and address of service providers but not individual users. Should that reality change over time, the reasonableness of the expectation of privacy in Internet subscriber information might change as well. For example, if one day new software allowed individuals to type IP addresses into a “reverse directory” and identify the name of a user—as is possible with reverse telephone directories—today’s ruling might need to be reexamined.
C.
We turn next to the type of protection ISP subscriber information should receive in the face of legitimate investigative needs. The Appellate Division found that “some means of proper judicial process” was necessary but did not specify what level.
Reid, supra,
389
N.J.Super.
at 575,
Reid argues that, at a minimum, a valid grand jury subpoena issued on notice to the subscriber is required. The ACDL submits that a grand jury subpoena with contemporaneous notice is required. The ACLU contends that the State should satisfy a heightened standard in criminal cases either by obtaining judicial approval or giving notice to the target of the investigation so that the target can challenge a subpoena. All three argue that subscriber information is deserving of greater protection than bank records. They all also cite to a stаndard in the civil arena for discovery of information held by an ISP. 4 In addition, all three *403 argue that an individual subscriber has a greater incentive than an ISP in challenging a request by the State for subscriber information.
Recent case law informs our discussion. In
McAllister, supra,
this Court concluded that issuance of a grand jury subpoena to obtain bank records, upon a showing of relevance, satisfies the constitutional protection against improper government intrusion. 184
N.J.
at 36,
In
McAllister,
the Court rejected arguments similar to those advanced in this case. In declining to adopt a heightened standard of probable cause to support the issuance of a grand jury subpoena, the Court found guidance in the words of Chief Justice Weintraub, writing in
In re Addonizio,
53
N.J.
107,
[A grand jury’s] power to investigate would be feeble indeed if the grand jury had to know at the outset everything needed to arrest a man or to invade his home. Nor would it serve the public interest to stay a probe until the grand jury reveals what it has or what it seeks. Such disclosures could defeat the inquiry and impede the apprehension of the culprit. This is one of the reasons why the law cloaks the grand juiy investigation with secrecy.
[Ibid]
Since
Addonizio,
“New Jersey courts have consistently affirmed the expansive investigatory power of grand juries.”
McAllister, supra,
184
N.J.
at 34,
More recently, in
Domicz, supra,
this Court determined that acquiring electric utility records with a grand jury subpoena was proper under our Constitution. 188
N.J.
at 297,
Utility records expose less information about a person’s private life than either bank records or subscriber information. But we see no material difference between bank records and ISP subscriber information and decline to treat them differently. They reveal comparably detailed information about one’s private affairs and are entitled to comparable protection under our law. In both cases, a grand jury subpoena based on a relevancy standard is sufficient to meet constitutional concerns.
In addition, as in
McAllister,
we decline to adopt a requirement that notice be provided to account holders whose information is subpoenaed.
See
184
N.J.
at 37-40,
As we noted in
Addonizio
and
McAllister,
“[o]ur grand jury process—bounded by relevancy and safeguarded by secrecy—
*405
conforms to our jurisprudence,” and “[t]he New Jersey Constitution does not require more.”
McAllister, supra,
184
N.J.
at 42,
D.
The police in this case used a defective municipal subpoena to obtain Reid’s ISP subscriber information from Comcast. We turn now to the consequences that flow from this violation of her rights.
Violations of constitutionally protected rights implicate the exclusionary rule. Under the exclusionary rule, the State may not introduce evidence obtained unlawfully by the police; evidence discovered, directly or indirectly, as a result of a constitutional violation must be suppressed.
State v. Lee,
190
N.J.
270, 277-78,
The subscriber information Comcast disclosed lies at the core of the indictment against Reid. Without it, she would not have been identified. It is therefore difficult in this case to see how the pending indictment can survive suppression. By contrast, in
Hunt, supra,
introduction of the toll billing records was “too
*406
insignificant to have had any bearing” on the trial and was therefore harmless error. 91
N.J.
at 350,
Suppression under the circumstances present here does not mean that the evidence is lost in its entirety. Comcast’s records existed independently of the faulty process the police followed. And unlike a confession coerced from a defendant in violation of her constitutional rights, the record does not suggest that police conduct in this case in any way affected the records Comcast kept. As a result, the records can be reliably reproduced and lawfully reacquired through a proper grand jury subpoena.
This outcome is readily apparent if viewed in the context of а motion to quash. Had Comcast sought to quash the municipal court subpoena, the trial court would have granted that relief for the same reasons it gave at the motion to suppress. At that point, nothing would have prevented the police from seeking the subscriber information from Comcast a second time, this time armed with an appropriate grand jury subpoena.
See State v. Bodtmann,
239
N.J.Super.
33, 46 n. 10,
The record in this ease includes a police report prepared before the police sought the defective municipal subpoena. According to the report, Reid’s employer, Mr. Wilson, relayed to police that
*407
someone used a computer to change his company’s password and shipping address with his suppliers, that Reid was the only employee who knew the password, and that he and Reid had argued earlier in the day before she walked out of the office. Further, before the municipal subpoena was obtained, Wilson’s supplier relayed the specific IP address of the computer that had accessed the supplier’s website and chаnged Wilson’s company’s username, password, and shipping address. Under any reasonable interpretation, the subscriber information attached to that particular IP address bore “some possible relationship” to the investigation underway.
See McAllister, supra,
184
N.J.
at 34,
All of the above information remains untainted by the results of the defective municipal subpoena. Therefore, the State may attempt to reacquire Comcast’s records with a proper grand jury subpoena limited to seeking subscriber information for the IP address in question. 6
To recap, the trial court properly suppressed the subscriber information obtained, and the State may not proceed with the pending indictment absent proof that the indictment has a sufficient basis without relying on the suppressed evidence. Alternatively, the State may move to dismiss the pending indictment, reserve a proper grand jury subpoena on Comcast, and seek a new indictment.
IV.
For the above reasons, we modify and affirm the judgment of the Appellate Division and remand to the Law Division for further proceedings consistent with this opinion.
*408 For modification and affirmance/remandrnent—Chief Justice RABNER, Justices LONG, LaVECCHIA, ALBIN, WALLACE, RIVERA-SOTO and HOENS—7.
Opposed—None.
Notes
Websites providing this service include: GeoBytes IP Address Locator Tool, http://www.geobytes.com/IpLocator.htm; IP-address.com, http://www.ip-adress. com/ipaddresstolocation/; and IP Address Location, http://www.ipaddress location.org/.
Users, of course, may waive their expectation of confidentiality in any number of ways. People routinely identify themselves on a website when they make a purchase or complete a survey. Likewise, employees often waive any privacy interests in their use of work-related computers as a condition of employment. No such waiver occurred here.
We decline to adopt the “informational privacy" standard outlined by the Appellate Division.
See Reid, supra,
389
N.J.Super.
at 570,
Defendant and amici argue that the State should at least be required to satisfy the standard set forth in
Dendrite Int’l, Inc. v. John Doe No. 3,
342
N.J.Super.
134,
The Wiretap Act does not provide an adequate remedy. Under the Act, an aggrieved person challenging the interception of content information—such as the contents of an intercepted wire, electronic, or oral communication intercepted unlawfully—may bring a motion to suppress. N.J.S.A. 2A:156A-21. But an aggrieved customer whose subscriber information was obtained without a grand jury subpoena, as required by N.J.S.A. 2A:156A-29, may only recover civil damages and attorney’s fees. N.J.S.A. 2A-156A-32 & -34.
Reid and the amici curiae also raise questions about the breadth of the municipal court subpoena served on Comcast. Comcast provided only subscriber information in response, but Reid and the amici argue the subpoena sought additional information that would have required a court order under the Wiretap Act. In light of our ruling, we need not resolve that claim.
