Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Law
Ethical Ai In American Policing, Elizabeth E. Joh
Ethical Ai In American Policing, Elizabeth E. Joh
Notre Dame Journal on Emerging Technologies
We know there are problems in the use of artificial intelligence in policing, but we don’t quite know what to do about them. One can also find many reports and white papers today offering principles for the responsible use of AI systems by the government, civil society organizations, and the private sector. Yet, largely missing from the current debate in the United States is a shared framework for thinking about the ethical and responsible use of AI that is specific to policing. There are many AI policy guidance documents now, but their value to the police is limited. Simply repeating …
Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury
Police Body-Worn Camera Policy: Balancing The Tension Between Privacy And Public Access In State Law, Kyle J. Maury
Notre Dame Law Review
Body camera implementation remains in its infancy stage. As such,
there is a dearth of legal scholarship analyzing the policy considerations associated
with body cameras. Instead of raising the issues involved and assessing
arguments for and against implementation, this Note assumes body cameras
are a force for good and are here to stay for the long haul. Consequently, the
goal of this Note is to analyze various issues involved in administering body
cameras against a backdrop of recently enacted state legislation—focusing
specifically on the tension between protecting privacy interests while also
ensuring public access to recordings. This Note examines these …
Chasing Bits Across Borders, Patricia L. Bellia
Chasing Bits Across Borders, Patricia L. Bellia
Journal Articles
As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …