{"id":1763,"date":"2026-04-14T07:16:16","date_gmt":"2026-04-14T11:16:16","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/?page_id=1763"},"modified":"2026-04-14T07:31:56","modified_gmt":"2026-04-14T11:31:56","slug":"a-system-under-artificially-intelligent-strain-can-hatch-act-enforcement-handle-ai-surveillance","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/in-print\/volume-38-issue-4-fall-2025\/a-system-under-artificially-intelligent-strain-can-hatch-act-enforcement-handle-ai-surveillance\/","title":{"rendered":"A System Under Artificially Intelligent Strain: Can Hatch Act Enforcement Handle AI Surveillance?"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Did anyone truly know what a mouse jiggler device was prior to the COVID-19 pandemic? In the years since, as telework has become increasingly prevalent, people turned to mouse jigglers and other such devices to outsmart surveillance software called \u201ctattleware\u201d<\/span><span style=\"font-weight: 400\"> or \u201cbossware.\u201d<\/span><span style=\"font-weight: 400\"> These devices essentially mimic mouse movement to prevent a computer from entering \u201csleep mode\u201d in order to avoid software that monitors employees\u2019 screen time.<\/span><span style=\"font-weight: 400\"> Surveillance software can monitor a variety of different employee activities, from detailed information on websites, apps, and files accessed, to seeing emails and messages sent by employees\u2014all in real-time.<\/span><span style=\"font-weight: 400\"> When employed to its full capacity, surveillance software can utilize cameras and microphones on employees\u2019 computers to listen and even watch staff at work.<\/span><span style=\"font-weight: 400\"> Add artificial intelligence (AI) to the mix and things only get scarier. AI models are well-suited for the sort of surveillance employers crave\u2014\u201c[t]hey are efficient at counting and identifying the words typed in and websites visited; the number of emails sent; the number of steps taken in a warehouse; the number of bathroom breaks; [and] their length.\u201d<\/span><span style=\"font-weight: 400\"> When employed to its maximum extent, the software is akin to someone looking over an employee\u2019s shoulder throughout the entire workday.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Naturally, this raises troubling privacy concerns for all employees.<\/span><span style=\"font-weight: 400\"> For federal employees specifically, the question of compliance with laws such as the Hatch Act races to the fore. The Hatch Act, designed to prevent political influence by the nation\u2019s federal civil service,<\/span><span style=\"font-weight: 400\">\u00a0 \u00a0 \u00a0 prevents most federal employees from engaging in political activities while \u201con duty\u201d or actively working.<\/span><span style=\"font-weight: 400\"> Even though the government is pursuing a government-wide return to work policy, ad-hoc telework raises the question of what constitutes \u201con duty,\u201d especially if employees intersperse their workday with everyday tasks like running errands.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This note argues that the rise of AI-powered surveillance software will put extreme stress on the Hatch Act\u2019s current enforcement system if employed by the government to monitor federal employees\u2019 compliance with the law. AI software offers a level of comprehensive surveillance of employee actions that is impossible to obtain by traditional means. Despite this increased effectiveness, the use of AI raises concerns about reliability.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u00a0Part I will explore the current state of the Hatch Act by explaining its history, persons and actions covered by the Act, and the enforcement system as it stands today. Additionally, Part I will discuss the connection between the Hatch Act and the <\/span><i><span style=\"font-weight: 400\">Model Rules of Professional Conduct<\/span><\/i><span style=\"font-weight: 400\">, specifically Rule 8.4(c)<\/span><span style=\"font-weight: 400\"> and 8.4(e)<\/span><span style=\"font-weight: 400\"> which emphasize lawyer integrity and the importance of public trust in government.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Part II will explore the use of AI in the workplace and government. Specifically, it will discuss keystroke and facial recognition software as examples of the types of AI programs that would stress the Hatch Act enforcement system. Accuracy concerns inherent in keystroke and facial monitoring software from the private and public sector paint a concerning picture of how use of this software may artificially inflate reported Hatch Act violations.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Part III will discuss the impact of AI surveillance on the Hatch Act enforcement system. A case study of the IRS\u2019 tax return system\u2014which faces stress from its use of automated data-driven software\u2014will highlight the impact that a greater number of Hatch Act claims may have on the Office of Special Counsel (OSC), including how operational capacity considerations affect which claims are pursued.<\/span><\/p>\n<p><a href=\"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/wp-content\/uploads\/sites\/24\/2026\/04\/GT-GJLE250048.pdf\">Keep Reading<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Did anyone truly know what a mouse jiggler device was prior to the COVID-19 pandemic? In the years since, as telework has become increasingly prevalent, people turned to mouse jigglers [&hellip;]<\/p>\n","protected":false},"author":14207,"featured_media":0,"parent":1755,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"abstract.php","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-1763","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/wp-json\/wp\/v2\/pages\/1763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/wp-json\/wp\/v2\/users\/14207"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/wp-json\/wp\/v2\/comments?post=1763"}],"version-history":[{"count":3,"href":"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/wp-json\/wp\/v2\/pages\/1763\/revisions"}],"predecessor-version":[{"id":1779,"href":"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/wp-json\/wp\/v2\/pages\/1763\/revisions\/1779"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/wp-json\/wp\/v2\/pages\/1755"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/legal-ethics-journal\/wp-json\/wp\/v2\/media?parent=1763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}