Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman May 2019

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman

Michigan Journal of Race and Law

As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.

Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …


Title 2.0: Discrimination Law In A Data-Driven Society, Bryan Casey Apr 2019

Title 2.0: Discrimination Law In A Data-Driven Society, Bryan Casey

Journal of Law and Mobility

More than a quarter century after civil rights activists pioneered America’s first ridesharing network, the connections between transportation, innovation, and discrimination are again on full display. Industry leaders such as Uber, Amazon, and Waze have garnered widespread acclaim for successfully combatting stubbornly persistent barriers to transportation. But alongside this well-deserved praise has come a new set of concerns. Indeed, a growing number of studies have uncovered troubling racial disparities in wait times, ride cancellation rates, and service availability in companies including Uber, Lyft, Task Rabbit, Grubhub, and Amazon Delivery.

Surveying the methodologies employed by these studies reveals a subtle, but …


Privacy Preserving Social Norm Nudges, Yifat Nahmias Jan 2019

Privacy Preserving Social Norm Nudges, Yifat Nahmias

Michigan Technology Law Review

Nudges comprise a key component of the regulatory toolbox. Both the public and private sectors use nudges extensively in various domains, ranging from environmental regulation to health, food and financial regulation. This article focuses on a particular type of nudge: social norm nudges. It discusses, for the first time, the privacy risks of such nudges. Social norm nudges induce behavioral change by capitalizing on people’s desire to fit in with others, on their predisposition to social conformity, and on their susceptibility to the way information is framed. In order to design effective social norm nudges, personal information about individuals and …


Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby Jan 2019

Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby

Michigan Law Review

Under the border search doctrine, courts have upheld the federal government's practice of searching people and their possessions upon entry into or exit from the United States, without any requirement of suspicion, as reasonable under the Fourth Amendment. Since the advent of electronic devices with large storage capacities, courts have grappled with whether this definition of reasonableness continues to apply. So far, courts have consistently characterized “nonforensic” border inspections of electronic devices (for example, paging through photos on a phone) as “routine” searches that, like inspecting luggage brought across international lines, require no suspicion. But there is a circuit split …