Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Privacy Law

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman May 2019

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman

Michigan Journal of Race and Law

As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.

Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …


What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer Jan 2016

What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer

University of Michigan Journal of Law Reform

This Note examines the challenges of corporate cyberdefense and suggests an approach to mitigate them. Part I outlines the background of the corporate cyberdefense quandary and various cyberdefense strategies. Part II explores the current landscape of cybersecurity law in the United States and the regulatory infrastructure that governs cybercrimes. Part II also surveys case law that illustrates the legal loopholes and ambiguities corporations face when implementing cybersecurity measures. Finally, Part III argues that the proposed active defense model fails to comport with practical concerns and established legal principles. This Note’s comparative analysis of common law ‘defense of property’ principles and …


Tax Competition And The Case Of Bank Secrecy Rules: New Trends In International Tax Law, Linneu De Albuquerque Mello Jan 2012

Tax Competition And The Case Of Bank Secrecy Rules: New Trends In International Tax Law, Linneu De Albuquerque Mello

SJD Dissertations

The current integration of world markets has led to an increase in the competition for businesses in addition to the competition for passive investments that already existed. In addition, the current financial crisis led countries to search for additional sources of revenue in order to work within their budget constraints. As tax is an area where such competition is more visible, it has also generated an effort – mainly from industrialized countries and international organizations – to curb tax practices deemed harmful to world economy. Bank secrecy rules and lack of transparency are aspects of these "harmful" tax practices. This …


Transgovernmental Networks Vs. Democracy: The Case Of The European Information Privacy Network, Francesca Bignami Jan 2005

Transgovernmental Networks Vs. Democracy: The Case Of The European Information Privacy Network, Francesca Bignami

Michigan Journal of International Law

The perspective offered by this Article is twofold. The emergence of transgovernmental networks gives rise to two questions, one causal and the other normative. First, how do we explain transnational cooperation through networks? Why do governments and regulators choose to establish networks rather than retain virtually limitless discretion over policymaking, conditioned only by international legal obligations? Based on the author’s examination of the records of the intergovernmental negotiations on the Data Protection Directive, this Article concludes that one precondition for fettering national discretion through networks is common preferences among governments on the substance of the policy to be administered. Compared …


Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien Jun 2002

Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien

Michigan Telecommunications & Technology Law Review

Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …