Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Data (3)
- Searches (3)
- Warrants (3)
- Carpenter v. United States (2)
- Health data (2)
-
- Medical data (2)
- Technology (2)
- United States Supreme Court (2)
- Administrative searches (1)
- Africa (1)
- Behavior (1)
- Behavioral change (1)
- Big data (1)
- Border searches (1)
- California Consumer Privacy Act (CCPA) (1)
- Cell phones (1)
- Constitutional violations (1)
- Corporations (1)
- Data privacy (1)
- Data privacy laws (1)
- Data protection (1)
- Disclosure (1)
- Due process (1)
- Electronic devices (1)
- Ethics (1)
- Forensic searches (1)
- General Data Protection Regulation (GDPR) (1)
- Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule (1)
- Identification (1)
- Judicial review (1)
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Law
Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker
Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker
Articles
In Carpenter v United States, the Supreme Court struggled to modernize twentieth-century search and seizure precedents for the “Cyber Age.” Twice previously this decade the Court had tweaked Fourth Amendment doctrine to keep pace with advancing technology, requiring a search warrant before the government can either peruse the contents of a cell phone seized incident to arrest or use a GPS tracker to follow a car’s long-term movements.
Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman
Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman
Michigan Journal of Race and Law
As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.
Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …
Privacy Preserving Social Norm Nudges, Yifat Nahmias
Privacy Preserving Social Norm Nudges, Yifat Nahmias
Michigan Technology Law Review
Nudges comprise a key component of the regulatory toolbox. Both the public and private sectors use nudges extensively in various domains, ranging from environmental regulation to health, food and financial regulation. This article focuses on a particular type of nudge: social norm nudges. It discusses, for the first time, the privacy risks of such nudges. Social norm nudges induce behavioral change by capitalizing on people’s desire to fit in with others, on their predisposition to social conformity, and on their susceptibility to the way information is framed. In order to design effective social norm nudges, personal information about individuals and …
Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern
Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern
Michigan Law Review
The Stored Communications Act (“SCA”) arms federal law enforcement agencies with the ability to use a special type of warrant to access users’ electronically stored communications. In some circumstances, SCA warrants can require service providers to bundle and produce a user’s electronically stored communications without ever disclosing the existence of the warrant to the individual user until charges are brought. Users that are charged will ultimately receive notice of the search after the fact through their legal proceedings. Users that are never charged, however, may never know that their communications were obtained and searched. This practice effectively makes the provisions …
Privacy In The Age Of Medical Big Data, W. Nicholson Price Ii, I. Glenn Cohen
Privacy In The Age Of Medical Big Data, W. Nicholson Price Ii, I. Glenn Cohen
Articles
Big data has become the ubiquitous watch word of medical innovation. The rapid development of machine-learning techniques and artificial intelligence in particular has promised to revolutionize medical practice from the allocation of resources to the diagnosis of complex diseases. But with big data comes big risks and challenges, among them significant questions about patient privacy. Here, we outline the legal and ethical challenges big data brings to patient privacy. We discuss, among other topics, how best to conceive of health privacy; the importance of equity, consent, and patient governance in data collection; discrimination in data uses; and how to handle …
Shadow Health Records Meet New Data Privacy Laws, W. Nicholson Price Ii, Margot E. Kaminski, Timo Minssen, Kayte Spector-Bagdady
Shadow Health Records Meet New Data Privacy Laws, W. Nicholson Price Ii, Margot E. Kaminski, Timo Minssen, Kayte Spector-Bagdady
Articles
Large sets of health data can enable innovation and quality measurement but can also create technical challenges and privacy risks. When entities such as health plans and health care providers handle personal health information, they are often subject to data privacy regulation. But amid a flood of new forms of health data, some third parties have figured out ways to avoid some data privacy laws, developing what we call “shadow health records”—collections of health data outside the health system that provide detailed pictures of individual health—that allow both innovative research and commercial targeting despite data privacy rules. Now that space …
Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby
Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby
Michigan Law Review
Under the border search doctrine, courts have upheld the federal government's practice of searching people and their possessions upon entry into or exit from the United States, without any requirement of suspicion, as reasonable under the Fourth Amendment. Since the advent of electronic devices with large storage capacities, courts have grappled with whether this definition of reasonableness continues to apply. So far, courts have consistently characterized “nonforensic” border inspections of electronic devices (for example, paging through photos on a phone) as “routine” searches that, like inspecting luggage brought across international lines, require no suspicion. But there is a circuit split …