The appearance and spread of severe acute respiratory syndrome (SARS)
on a global level raised vital legal and ethical issues. National and international
responses to SARS have profound implications for 3 important ethical values:
privacy, liberty, and the duty to protect the public's health. This article
examines, through legal and ethical lenses, various methods that countries
used in reaction to the SARS outbreak: surveillance and contact tracing, isolation
and quarantine, and travel restrictions. These responses, at least in some
combination, succeeded in bringing the outbreak to an end. The article articulates
a set of legal and ethical recommendations for responding to infectious disease
threats, seeking to reconcile the tension between the public's health and
individual rights to privacy, liberty, and freedom of movement. The ethical
values that inform the recommendations include the precautionary principle,
the least restrictive/intrusive alternative, justice, and transparency. Development
of a set of legal and ethical recommendations becomes even more essential
when, as was true with SARS and will undoubtedly be the case with future epidemics,
scientific uncertainty is pervasive and urgent public health action is required.
Register and get free email Table of Contents alerts, saved searches, PowerPoint downloads, CME quizzes, and more
Subscribe for full-text access to content from 1998 forward and a host of useful features
Activate your current subscription (AMA members and current subscribers)
Purchase Online Access to this article for 24 hours
Country-Specific Mortality and Growth Failure in Infancy and Yound Children and
Association With Material Stature
Use interactive graphics and maps to view and sort country-specific infant and early
dhildhood mortality and growth failure data and their association with maternal
Thank you for submitting a comment on this article. It will be reviewed by JAMA editors. You will be notified when your comment has been published. Comments should not exceed 500 words of text and 10 references.
Do not submit personal medical questions or information that could identify a specific patient, questions about a particular case, or general inquiries to an author. Only content that has not been published, posted, or submitted elsewhere should be submitted. By submitting this Comment, you and any coauthors transfer copyright to the journal if your Comment is posted.
* = Required Field
Disclosure of Any Conflicts of Interest*
Indicate all relevant conflicts of interest of each author below, including all relevant financial interests, activities, and relationships within the past 3 years including, but not limited to, employment, affiliation, grants or funding, consultancies, honoraria or payment, speakers’ bureaus, stock ownership or options, expert testimony, royalties, donation of medical equipment, or patents planned, pending, or issued. If all authors have none, check "No potential conflicts or relevant financial interests" in the box below. Please also indicate any funding received in support of this work. The information will be posted with your response.
Some tools below are only available to our subscribers or users with an online account.
Download citation file:
Web of Science® Times Cited: 69
Customize your page view by dragging & repositioning the boxes below.
More Listings atJAMACareerCenter.com >
and access these and other features:
Enter your username and email address. We'll send you a link to reset your password.
Enter your username and email address. We'll send instructions on how to reset your password to the email address we have on record.
Athens and Shibboleth are access management services that provide single sign-on to protected resources. They replace the multiple user names and passwords necessary to access subscription-based content with a single user name and password that can be entered once per session. It operates independently of a user's location or IP address. If your institution uses Athens or Shibboleth authentication, please contact your site administrator to receive your user name and password.