Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Privacy Law
Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman
Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman
Michigan Journal of Race and Law
As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.
Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
Faculty Publications
This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …
Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Returning To A Principled Basis For Data Protection, Gus Hosein
Returning To A Principled Basis For Data Protection, Gus Hosein
Chicago-Kent Law Review
Society must remain conscious of both pragmatic and principle-based rationales for information security rules. The identity card debate in the United Kingdom provides an example of exactly why a governmental information security approach that is sensitive to civil liberties would be the best approach to data protection. In contrast, we should be cautious of a balancing test that places security in parity with civil liberties and, therefore, erroneously allows pragmatism to triumph over principle.
Freedom Of Information And The Eu Data Protection Directive, James Maxeiner
Freedom Of Information And The Eu Data Protection Directive, James Maxeiner
All Faculty Scholarship
The EU Data Protection Directive attempts to balance protection of privacy and freedom of information acquisition. It does this by authorizing Member States to provide exemptions and derogations in their individual legislation.