The Impact of Monitoring Technology on the Law

  • Pieter Kleve
  • Richard De Mulder
  • Kees van Noortwijk


This article first provides an overview of technology for monitoring and surveillance. From this overview it will become clear that the use of this type of technology is growing fast. At the same time, questions arise regarding its permissibility, in the light of legal and constitutions rights, such as the right to privacy. These questions are addressed here in the context of wider social developments. A conclusion that is reached is that with the increasing importance and use of surveillance technology, ‘monitoring the surveillors’ will become essential as well.


Mobile Phone Criminal Procedure Personal Privacy Monitoring Technology Coercive Measure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [AGAOO5]
    American Government Accountability Office: Information Security, Radio Frequency Identification Technology in the Federal Government, WWW,
  2. [BCCMOO]
    Budowle, B., Carmody, G, Chakraborty, R. & Monson, K. L.: Source attribution of a forensic DNA profile. In: Forensic Science Communications, July 2000, ISSN 1528-8005.Google Scholar
  3. [JeMe94]
    Jensen, M. C. & Meckling, W. H: The Nature of Man. In: Journal of Applied Corporate Finance 1994-2, p. 4–19.Google Scholar
  4. [JHPB97]
    Jam, A. K., Hong, L, Pankanti, S & Bolle, R.: An identity authentication system using fingerprints. In: Proceedings of the IEEE 85 (9) (1997) 1365–1388.CrossRefGoogle Scholar
  5. [Muld98]
    Mulder, R. V. De: The Digital Revolution: From Trias to Tetras Politica. In: Snellen, I. Th.M., Donk, W. B. H. J. van de (Eds.): Public Administration in an Information Age. Handbook, Amsterdam: lOS Press 1998, ISBN 9051993951.Google Scholar
  6. [KerrO3]
    Kerr, O. S.: Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn’t. In: Northwestern University Law Review, Vol. 97, 2003,
  7. [SoloOl]
    Solove, D. J.: Privacy and Power: Computer Databases and Metaphors for Information Privacy’. In: Stanford Law Review, 2001 Vol. 53,

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden 2006

Authors and Affiliations

  • Pieter Kleve
  • Richard De Mulder
  • Kees van Noortwijk

There are no affiliations available

Personalised recommendations