Digital Colonialism

Kwet first speaks about economic domination, where US Big Tech companies like Uber are dominating the market in the Global South [1]. He laments that usage of these products will "create technological dependencies" leading to "perpetual resource extraction" [2]. It is indeed true that the ...

Challenges with Aadhaar

The case involved the death of an 11 year old girl due to starvation. The government had put in place a new Aadhaar digital identity system and the people had to biometrically verify their identity and register through a "seeding process" to be eligible to claim benefits such as subsidized ...

Big Tech and Surveillance

The "false trade-off" in Solove's words is also known as a false dichotomy. The public is misled into choosing one of two unappealing options when there could be other viable alternatives. Solove believes that the optimal solution may be to grant the government the ability to conduct ...

Big Tech and Persuasion

Zuboff believes that Big Tech has the capability to process large volumes of consumer behavioural data and use that to influence consumer behaviour [1]. According to Zuboff, this data is able to reveal what "a particular individual in a particular time and place was thinking, feeling, and ...

Regulating Recommenders

Cobbe believes that it is important to regulate recommenders because they play a key role in promoting content to a "large audience" and thus has a larger impact [1]. This makes sense considering over 400 hours of video content is uploaded onto Youtube every minute [2], which makes regulating ...

GDPR: Transfer

In Lindqvist, the court concluded that uploading data to a hosting provider within the EU where that data is available for access to anyone outside the EU does not constitute a data transfer [1]. The explanation given was that the page did not have the ability to initiate a transmission of that ...

GDPR: Right to be Forgotten

Jan mentioned that data controllers have to ensure "every instance of their personal data is eliminated across all platforms". I believe that is a bit of an overstatement. I would have probably worded it as "every instance of their personal data where processing is authorized by the controller ...

GDPR: Breach Notification

I think there are areas where LastPass has done well and areas where they fall short. Firstly, LastPass's initial communication on August 25 2022 was sent two weeks after detecting a breach, which is reasonably timely considering they needed time to investigate the incident [1]. EDPB guidelines ...