Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Constitutional Law (2)
- Civil Rights and Discrimination (1)
- Economics (1)
- Health Law and Policy (1)
- Inequality and Stratification (1)
-
- Labor Economics (1)
- Labor and Employment Law (1)
- Law and Race (1)
- Law and Society (1)
- Public Affairs, Public Policy and Public Administration (1)
- Public Policy (1)
- Race and Ethnicity (1)
- Science and Technology Law (1)
- Science and Technology Policy (1)
- Science and Technology Studies (1)
- Social and Behavioral Sciences (1)
- Sociology (1)
Articles 1 - 3 of 3
Full-Text Articles in Law
Pandemic Surveillance Discrimination, Christian Sundquist
Pandemic Surveillance Discrimination, Christian Sundquist
Articles
The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …
The Death Of Privacy?, A. Michael Froomkin
The Death Of Privacy?, A. Michael Froomkin
Articles
The rapid deployment of privacy-destroying technologies by governments and businesses threatens to make informational privacy obsolete. The first part of this article describes a range of current technologies to which the law has yet to respond effectively. These include: routine collection of transactional data, growing automated surveillance in public places, deployment of facial recognition technology and other biometrics, cell-phone tracking, vehicle tracking, satellite monitoring, workplace surveillance, Internet tracking from cookies to "clicktrails", hardware-based identifiers, intellectual property-protecting "snitchware," and sense-enhanced searches that allow observers to see through everything from walls to clothes. The cumulative and reinforcing effect of these technologies may …
The Metaphor Is The Key: Cryptography, The Clipper Chip, And The Constitution, A. Michael Froomkin
The Metaphor Is The Key: Cryptography, The Clipper Chip, And The Constitution, A. Michael Froomkin
Articles
No abstract provided.