Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

University of Michigan Law School

Journal of Law and Mobility

Smart cities

Articles 1 - 2 of 2

Full-Text Articles in Law

Data Governance Frameworks For Smart Cities: Key Considerations For Data Management And Use, Jennifer Johnson, Anna Hevia, Rebecca Yergin, Shayan Karbassi, Adira Levine, Jorge Ortiz Jan 2022

Data Governance Frameworks For Smart Cities: Key Considerations For Data Management And Use, Jennifer Johnson, Anna Hevia, Rebecca Yergin, Shayan Karbassi, Adira Levine, Jorge Ortiz

Journal of Law and Mobility

The proliferation of “smart technologies” has created significant opportunities to leverage data to improve everyday life across sectors. In cities around the world, local governments and private enterprises, often partnering together, have launched projects that integrate smart technologies with Internet of Things (“IoT”) capabilities into public spaces in order to promote efficiency, safety, mobility, and innovation. At the same time, smart cities must balance the need for robust data in order to achieve these benefits with public concerns regarding privacy and data use.

This paper examines the key attributes of smart cities, the essential role that data plays in fueling …


Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder Jan 2022

Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder

Journal of Law and Mobility

This paper identifies some of the core privacy considerations raised by smart cities – government surveillance and data security in Part I. Then, Part II proposes a set of core principles for smart cities to consider in the development and deployment of smart cities to address privacy concerns. These principles include: (A) human-centric approaches to smart cities design and implementation, (B) transparency for city residents, (C) privacy by design, (D) anonymization and deidentification, (E) data minimization and purpose specification, (F) trusted data sharing, and (G) cybersecurity resilience.