PLSC 2025 Conference History Page

Back to PLSC 2025 Conference Information

Historical PLSC 2025 Workshop Schedule

* Hybrid Sessions

DAY 1: May 29, 2025
8:30AM BREAKFAST
9:00-9:10AM Welcome – Ari Ezra Waldman – Shapiro Courtyard
9:10-9:20AM Logistics – Mark McKenna – Shapiro Courtyard
9:30-10:45AM SESSION 1 ROOM PAPER SUMMARY
Aliza Hochman Bloom
A “Superpredator” Sequel? Unpacking Police Enforcement of the Juvenile Curfew
Commentator: Kiel Brennan-Marquez
1310 This Article explores two cities’ recent experiences enforcing a juvenile curfew. These ordinances compound police discretion for increased interactions that are harmful and open additional channels of criminal liability in the present and future.
Nathan Reitinger
Measured Failures of Robots.txt: Legal and Empirical Insights for Regulating Robots
Commentator: Madiha Choksi
2357 Should robots.txt regulate AI-purposed scrapers? No. Robots.txt encourages problems under web scraping doctrine and, as empirical data shows, is not practical for all but the top 1% of websites. The Article ends with a proposal to fix robots.txt.
Woodrow Hartzog & Mark McKenna
Taking Scale Seriously in Technology Law
Commentator: Julie E. Cohen
1457 This article explores the role of scale-the relationship between the amount of an activity and its associated costs and benefits-in technology and privacy law. We argue that law should distinguish between “scale is more” and “scale is different.”
Steve Bellovin & Shreya Kochar
Beyond Creepiness: Using Predictive Privacy to Measure Privacy Harms
Commentator: Jennifer Urban
1420 A demonstration of harm is necessary for standing in Federal court, but showing harm from a privacy breach is hard. We used a new privacy model, synthetic data, surveys, and machine learning to show that there is such harm.
Ronald Coleman
Human Confrontation
Commentator: Yan Fang
2442 Increasing automation of law enforcement poses a potentially existential threat to the confrontation rights of criminal defendants. This Article responds by calling for a framework based on human confrontation.
Ari Ezra Waldman
Challenging Technology Expertise
Commentator: Andrew Selbst
1430 Amidst a growing technological oligarchy, this paper identifies and challenges a fundamental assumption of much law and technology scholarship and policy–namely, that knowing how technology works is necessary to regulate technology effectively.
Peter Ormerod
Regulating Data Monetization
Commentator: Eric Null
2467 A structural approach to data governance should target how companies transform data into money.
Evelyn Malavé
Treatment Sentences
Commentator: Felix Wu
2483 This Article analyzes the requirement that defendants attend drug treatment programs as part of a non-incarceratory sentence, revealing how treatment requirements operate with little oversight while at the same time exposing defendants to punitive, racist, and ableist treatment practices.
Ignacio Cofone & Eric Hehman
Reasonable Expectations of Privacy: An Empirical Evaluation
Commentator: Laura Moy
2448* Judges have been using an armchair sense of what people expect for Fourth Amendment protection. We test those expectations.
Rachel Hong, Jevan Hutson, William Agnew, Imaad Huda, Tadayoshi Kohno & Jamie Morgenstern
A Common Pool of Privacy Problems: Legal and Technical Lessons from a Large-Scale Web-Scraped Machine Learning Dataset
Commentator: Inyoung Cheong
2477 We investigate the contents of web-scraped data for training AI systems through conducting a legally-grounded dataset audit. We find significant presence of personal data despite sanitization efforts and explore their legal privacy implications.
10:45-11:15AM BREAK
11:15AM-12:30PM SESSION 2 ROOM PAPER SUMMARY
Nila Bala
Policing Children's Data
Commentator: Jessica Eaglin
1310 This Article analyzes how law enforcement obtains children's digital evidence and how parents frequently enable access to data. It proposes treating children's data more like their bodies or DNA-deserving of protection from parental consent.
Jake Goldenfein, Emma Finlay, Kean Birch & Anetta Proskurovs’ka
The Judicial Configuration of Data Value
Commentator: Gloria González Fuster
2477 There is no simple way to measure the financial value of personal data. This paper interrogates how damages in data breach and unauthorized disclosure cases participate in the configuration of personal data as an legal-economic object.
Jayshree Sarathy & danah boyd
What Makes Data Work, Work? Exploring the Politics of U.S. Public-Sector Data Access via Federal Statistical Research Data Centers
Commentator: Meg Jones
1430 We study U.S. Federal Statistical Research Data Centers (RDCs), showing how efforts to democratize data access through RDCs ignore key dynamics of data sharing such as relationships and gifting dynamics.
Mateusz Grochowski
The Inverse Commodification: Consent as a Currency
Commentator: Nora Ni Loideain
2442 This paper looks into the paradoxical role of consent in the data economy. While consent was originally intended to decommodify data and restore autonomy of data subjects, in practice, it has itself become a commodity.
Michele Gilman
From Home Visit to Robo-Adjudication: The Algorithmic Injustice of Automated Welfare Fraud Detection
Commentator: Madalyn Wasilczuk
2467 Welfare fraud detection algorithms are accusing innocent, needy claimants of fraud and depriving them of support, while allowing criminal syndicates to steal billions in public benefits. Legal and technical reforms are urgent.
Yan Fang
Between Officer and Bouncer Logics: How Internet Technology Companies Navigate User Crime
Commentator: Karen Levy
1420 This article draws on in-depth interviews and sociolegal scholarship on organizations to examine how internet technology companies manage online safety through two sets of enforcement logics: public safety and private safety.
Johanna Gunawan & Colin Gray
Dark Patterns and the Design Difference
Commentator: Steve Bellovin
2483 This work considers what makes the design phenomena of dark patterns deserving of distinct approaches and mitigations, framing their differences around asymmetries of scale, mediative control, and relational norms.
Christina Lee
Beyond Algorithmic Disgorgement: Remedying Algorithmic Harms
Commentator: Nina-Simone Edwards
2357 In this paper, I explore the question of when an algorithmic remedy is appropriate, particularly given the complex algorithmic supply chain in which all AI systems exist, by examining the remedy of algorithmic disgorgement and its limitations.
Rohan Grover
Standardizing Privacy*
Commentator: Ryan Calo
2448* Efforts to standardize privacy through non-regulatory agencies such as NIST, while framed as participatory and democratic, effectively legitimize corporate influence by exploiting blurry boundaries between technical and legal expertise.
Ngozi Okidegbe
Rethinking Algorithmic Governance
Commentator: Katrina Geddes
1457 The paper focuses on why communities should have a veto over the state’s use of algorithms in criminal legal decision-making
12:30-2:00PM LUNCH
12:45-1:45PM Plenary Panel
What's Happening in California Privacy Law?
1430 Jennifer Urban, California Privacy Protection Agency Chair
Jonathan Porat, California State Chief Technology Officer
Khari Johnson, Technology Reporter, CalMatters
Moderator: Andrew Selbst
2:00-3:15PM SESSION 3 ROOM PAPER SUMMARY
Orin Kerr
Data Scanning and the Fourth Amendment
Commentator: Christina Koningisor
1430 Lower courts have recently divided on an important question of Fourth Amendment law: When the government searches through a massive database, what determines the scope the search? The database size, the filter setting, or the raw output?
Peter Swire & Samm Sacks
The New Intersection of Privacy and National Security: Personal Data as a Dual Use Technology*
Commentator: Nikita Aggarwal
2448* The U.S. has started to regulate personal data as a “dual use” technology, with both civilian and military uses, especially as to China. This paper brings together the national security and privacy literatures, showing convergence and divergence.
Anastasia Karagianni & Alessandra Calvi
Exploring Gender Dimensions in High-Risk AI Systems: Moving Towards a Gender Impact Assessment within the EU AI Act
Commentator: Jevan Hutson
2442 This paper examines the gendered implications of high-risk AI systems and advocates for a Gender Impact Assessment within the EU AI Act to mitigate biases and ensure fairness.
Eleanor Birrell, Jessica Tong & Liam Bayer
Developer and End User Interpretations of Data Minimization
Commentator: Sarah Rajtmajer
2477 This work empirically evaluates how various data minimization requirements draw from U.S. state privacy laws are interpreted by two key groups of stakeholders: developers and users.
Julie E. Cohen
Oligarchy, State, and Cryptopia
Commentator: Jeffrey Vagle
1420 Developing an account of tech oligarchy within contemporary political economy has become a project of considerable urgency. This essay undertakes that project.
Richmond Wong & Deirdre Mulligan
Interrogating the Role of Design in Governance-by-Design Initiatives
Commentator: Will DeVries
2467 We review recent governance-by-design initiatives, focusing on privacy related legislation, to develop a framework describing multiple ways to conceptualize “design”. We then discuss how these conceptions map onto different regulatory approaches.
Hannah Bloch-Wehba
Information Law Pluralism
Commentator: Elettra Bietti
1457 This paper argues that the boundary between transparency and substantive regulation is increasingly porous, and recasts information law as a way of securing rights to access and use information.
Ayelet Gordon-Tapiero, Kobbi Nissim, Katrina Ligett & Muhammad Saad
On the Rival Nature of Data Use in the Context of Privacy
Commentator: Benjamin Sobel
2483 The paper will explore broad policy principles to promote the use of data as a rival good within particular settings (e.g., data used for statistical research or data which is not in the public domain) by relying on Elinor Ostrom's work.
Kiel Brennan-Marquez, Julia Simon-Kerr & Carly Zubrzycki
Bullshit Explanations
Commentator: Alicia Solow-Niederman
1310 Generative AI poses the inverse of a "black box" problem. Soon, explanations of AI-assisted decisions will be easy to conjure, but they will be (in Frankfurt’s sense) “bullshit”-frustrating legal regimes that condition authority on reason-giving.
Nizan Packin
Pretextual Privacy Theory: When Privacy Enables Adversaries
Commentator: Edward McNicholas
2357 This paper explores how privacy-enhancing technologies can inadvertently empower adversaries, posing national security risks, using cases like TikTok and Tornado Cash, which highlight the tension between privacy rights and other conflicting interests
3:15-3:45PM BREAK
3:45-5:00PM SESSION 4 ROOM PAPER SUMMARY
Ji Seon Song, Wendy A. Bach & Madalyn Wasilczuk
The Interdisciplinary Policing of Pregnancy Criminalization
Commentator: Christopher Morten
1457 Using an original dataset of pregnancy criminalization cases brought after Dobbs, this article argues that the intersection of healthcare privacy and criminal procedure has failed to protect the civil liberties of pregnant people.
Amina Abdu & Abigail Jacobs
AI Evaluations and the Standards Metaphor*
Commentator: Pauline Kim
2448* This paper examines how the rhetoric of standards-making is used to characterize AI evaluations in policy settings. We discuss how the language of standards is used to legitimize the authority of evaluations–and their creators–to govern AI.
Paul Ohm & Susan Freiwald
Superwarrants
Commentator: Peter Ormerod
1430 Some rules, most notably in the Wiretap Act, impose standards for government surveillance that go above and beyond the Fourth Amendment's probable cause warrant. These "superwarrant" requirements are underutilized and undertheorized, until now!
Woodrow Hartzog, Neil Richards & Jordan Francis
Privacy's Autonomy Thicket: Disentangling Choice, Consent, and Control
Commentator: Christopher Millard
1420 In this paper we argue that choice, consent, and control mean different things but are too often conflated in privacy law. We argue the goal for privacy law should be meaningful life choices unburdened by unreasonable privacy risk.
Yafit Lev-Aretz & Aileen Nielsen
Privacy Law’s Dynamic Disequilibria
Commentator: Elana Zeide
2357 While privacy agents remained a legal thought experiment for years, state laws are now granting them real legal force. Our empirical study examines consumer attitudes toward their adoption amid weak enforcement and likely corporate resistance.
Ido Sivan-Sevilla, Pooja Pandey & Ellie Hill
Privacy Intermediation For/Against Accountability: A Comparative Analysis of Accountability Powers Across Formal & Informal US Privacy Watchdogs
Commentator: Emily McReynolds
2483 In light of corporate and government threats to privacy, formal and informal watchdogs have emerged. The paper comparatively assesses their accountability powers to realize the limits and opportunities in holding threat actors into account.
Nina-Simone Edwards
Surveillance and the Exploitation of the Vulnerable
Commentator: Kendra Albert
2467 Surveillance technologies manipulate individuals' unique complexities, targeting intersecting vulnerabilities to amplify harm. This paper evaluates and proposes solutions for inadequate legal frameworks.
Elettra Bietti & Anne Bellon
Technological Capture
Commentator: Salome Viljoen
1310 Our paper empirically maps the influence tech companies exert against agencies such as the FTC and EU Commission. "Technological capture" consists in companies' ability to influence regulators through informational and architectural advantages.
Erika Douglas
Missing Transactional Privacy Law
Commentator: Bill McGeveran
2477 Corporate mergers and acquisitions sell our personal information en masse, yet are neglected in privacy enforcement. This article challenges that inattention, theoretically and empirically, using the privacy policies of targets in big tech deals.
Emine Akar
Emotional Artificial Intelligence and Emotional Privacy
Commentator: Daniel Susser
2442 Emotional AI is quietly tracking and shaping our emotions. This paper explores the risks of ’emotional privacy’ breaches and how we can safeguard autonomy in an AI-driven world.
5:15-7:00PM RECEPTION • SHAPIRO COURTYARD
DAY 2: May 30, 2025
8:30AM BREAKFAST
9:00-9:10AM Intros – Mark McKenna – Shapiro Courtyard
9:15-10:30AM SESSION 5 ROOM PAPER SUMMARY
Marc Canellas
Challenging Carceral Software
Commentator: Orin Kerr
2442 Carceral software generates powerful evidence in criminal cases falsely presented as objective and reliable. This Article presents a new framework shifting the statutory and Constitutional challenges from forensic disciplines to the software itself.
Orla Lynskey
Deliberative Data Governance*
Commentator: Julia Powles
2448* How can we move beyond individual decision-making about data to an approach grounded in the public interest? This article probes relevant meanings of 'public interest' and critically examines governance models for 'public interest' data processing.
Wanling Su
Encrypted Assembly
Commentator: Gautam Hans
2477 Video calling platforms with end-to-end encryption have fundamentally transformed how Americans exercise their right to assembly.
Jessica Eaglin
The Problem-Solving Court as Technology
Commentator: Stav Zeitouni
1430 This article describes and analyzes these court-driven diversion programs as a networked information technology. It demonstrates why and how this framework opens new avenues for critical legal analysis in criminal law and law and technology.
Paul Ohm & Meg Leta Jones
The Possible Impossible
Commentator: Jay Conrad
1457 Many complain that tech regulation imposes severe burdens on regulated companies. It turns out, they are wrong.
Matthew Kugler, Lior Strahilevitz, Marshini Chetty, Chirag Mahapatra & Yaretzi Ulloa
Can Consumers Protect Themselves Against Privacy Dark Patterns?
Commentator: Nathan Reitenger
1420 Using a mockup of a video streaming website, we show that people instructed to choose privacy protective options during account creation are still unable to fully resist dark patterns.
Alicia Solow-Niederman
AI and Doctrinal Collapse
Commentator: Jake Goldenfein
1310 Data acquisition in AI starkly exposes an underlying legal pathology: “Doctrinal collapse.” As distinct regimes like IP and privacy overlap, their doctrinal and normative boundaries lose coherence. Collapse is permitted by internal legal structures, and it facilitates exploitation by sophisticated actors. Left unchecked, collapse enables private power and threatens law’s public governance function.
Margot Hanley, Solon Barocas & Daniel Susser
Operationalizing Neuroprivacy
Commentator: John Davisson
2357 In 2024, two U.S. states revised their privacy laws to regulate consumer neurotech, sparking debates on whether to regulate neural data or inferences of mental states. This article examines competing ideas for how best to operationalize neuroprivacy.
Sarah Rajtmajer & Brett Frischmann
A Defense of Demonstrably Informed Consent in Privacy Governance
Commentator: Ron Lee
2483 We propose a new legal standard of demonstrably informed consent and describe experimental work testing friction-in-design mechanisms that would operationalize that legal requirement.
Victoria Schwartz
AI Influencers and Revisiting the Right of Publicity
Commentator: Melodi Dincer
2467 Does the right of publicity apply to virtual and AI influencers and should it? What does the answer tell us about the applicability of the right of publicity beyond humans.
10:30-11:00AM BREAK
11:00AM-12:15PM SESSION 6 ROOM PAPER SUMMARY
Zina Makar
Carceral Interference
Commentator: Kate Weisburd
1430 Digital technology is increasingly replacing traditional modes of surveillance in carceral spaces. This article advances an alternative test for protecting the privacy rights of prisoners and prisoner-adjacent individuals.
Mihailis Diamantis, Chen Sun & Rishab Nithyanand
Information About Data
Commentator: Brett Frischmann
2357 Privacy enforcement relies on an overlooked and often false premise-that firms know what their own data practices are. This paper reports a new study assessing whether firms have such knowledge and proposes a disclosure regime that could help.
Inyoung Cheong
Human-Centered First Amendment Framework for AI Regulation
Commentator: Marc Blitz
2467 To address AI systems' unprecedented ability to influence human cognition, this Article proposes a human-centered First Amendment framework that protects collective human freedom to think, speak, and listen over corporations' speech rights.
Jordan Wallace-Wolf
Less Fisher, More Doe: Non-Testimonial Mental Content and a New Rule for Unlocking Digital Devices
Commentator: Zahra Takhshid
2442 Can a criminal defendant be compelled to unlock their digital device? With their fingerprint? What about a password? This question has been addressed, but the range of developed answers is narrow. This paper offers a new position.
Jeffrey Vagle
AI's Ex Ante/Ex Post Problem
Commentator: Katherine Strandburg
1457 When considering how to regulate, choosing their method and timing is critical. AI technologies make this problematic, as the means by which they are built and operate are highly complex, creating difficult ex ante/ex post regulation questions.
Seema Patel
The Law of Worker Data Privacy Harms*
Commentator: Victoria Schwartz
2448* AI-driven technologies extract, analyze, and monetize non-unionized low-wage workers' data (“worker datafication”), imposing significant, often imperceptible harms, including substantial privacy harms. Can privacy law help solve the problem?
Elettra Bietti
How (Not) to Regulate Attention Platform Business Models
Commentator: Jennifer King
1420 I describe the business model of platforms that capture and monetize attention and data for profit. I argue that current analytical and legal tools for addressing attention capture and attention disorders are inadequate and offer alternatives.
Andrew Miller
Invisible Allies: Algorithmic Consumer Profiling and the Rise of New Group Harms
Commentator: Maria Angel
1310 AI-driven consumer profiling generates new and invisible patterns of inequality, raising serious concerns for distributive justice and democratic deliberation. Countermeasures should focus on helping harmed parties find each other and act in concert.
Imana Basileal, Zeyu Shen, John Heidemann & Aleksandra Korolova
External Evaluation of Discrimination Mitigation Efforts in Meta's Ad Delivery
Commentator: Anne Washington
2477 We evaluate Meta’s Variance Reduction System (VRS), a fairness intervention system deployed following settlement with U.S. DOJ. We show VRS increases advertiser costs, limits ad reach, and can fail to improve access to opportunity ads.
Nicole Ozer
What Happened to Privacy Law – Getting on the Path to True Privacy Protection in the United States
Commentator: Allyson Haynes Stuart
2483 What can we learn from privacy work in the 1970s to help understand the current state of privacy law and build the movement energy and create the climate to move privacy law in a truly powerful direction to protect people and promote rights.
12:15-1:45PM LUNCH
1:00-1:30PM Celebratory Announcements & Awards – Shapiro Courtyard
1:45-3:00PM SESSION 7 ROOM PAPER SUMMARY
Justin Curl
Judging Binary Searches: Four Essential Questions
Commentator: Susan Freiwald
2483 Every judge should ask and answer four questions about the use of a binary search technique to understand its full implications: (1) Who knows about its use? (2) What happens when it errs? (3) How often is it applied? (4) To whom is it applied?
Jevan Hutson, Cedric Whitney & Jay Conrad
Forget Me Not? Machine Unlearning's Implications for Privacy Law
Commentator: Alessandra Calvi
1420 This article examines if privacy laws’ goals can align with the technical realities of machine unlearning in generative AI and proposes a framework for incorporating machine unlearning into broader privacy-preserving interventions.
Artur Pericles Lima Monteiro
Structural Constitutionalism for Platforms
Commentator: Wayne Unger
2467 There is wide agreement that platforms are too powerful. But reformers either anoint the new governors or forsake governance. This paper explores how political constitutionalism and federalism can redistribute platform power while enabling governance
Brenda Dvoskin
The Erotic Interest in Privacy
Commentator: Scott Skinner-Thompson
1457 Why does sexual privacy matter? This paper highlights how sexual privacy creates and sustain erotic meaning. It argues that sexual privacy is one of the legal conditions for a rich and fair sexual life.
Glencora Borradaile, Alex LeClerc & Kelsy Kretschmer
Contextual Intent: Privacy Considerations of Social Movement Groups
Commentator: Kate Sim
1430 What is a privacy success? When it comes to social movements, we should go beyond simply whether a technology is used or not so that we can explore factors leading to or away from meeting a group's privacy needs.
Arti Walker-Peddakotla
The Obfuscation of Surveillance
Commentator: Mihailis Diamantis
2442 The Article proposes a new paradigm of “acquiescence through obfuscation” to describe the mechanisms that private security corporations use to gain municipal officials’ approval towards the enactment of carceral surveillance.
Chinmayi Sharma, Thomas Kadri & Sam Adler
Brokering Safety*
Commentator: Carleen Zubrzycki
2448* The current web of privacy laws places the burden on abuse victims to stop data brokers from sharing their personal information with their abusers. This Article proposes and defends a centralized opt-out solution.
María P. Angel
Breaking Up with Privacy: The FTC’s Shift to Commercial Surveillance and its Reimagined Role in Data Governance
Commentator: Andrew Miller
1310 The FTC’s shift from “privacy” to “commercial surveillance” signals a strategic reframing of reg. priorities that began before Khan’s tenure. This Article traces its origins and potential to reshape the FTC's role despite recent leadership changes.
Yaseen Hashmi
The Primacy of the Face & The Right of Publicity
Commentator: Mark McKenna
2477 By historicizing assumptions about how the face visually represents the self, I argue that image privacy protections also protect the agency at the core of ethical self-making.
Jordan Francis
The Necessity Paradox: Navigating Tensions in New Substantive Data Minimization Standards in Privacy Legislation
Commentator: Deirdre Mulligan
2357 This paper explores an ongoing legislative shift in state privacy laws from notice-and-choice towards substantive data minimization rules that limit the collection of personal data to what is necessary to provide a requested product or service.
3:00-3:30PM BREAK
3:30-4:45PM SESSION 8 ROOM PAPER SUMMARY
Jonathan Kerr
Regulating Digital Data Retention and Reuse in Criminal Cases
Commentator: Jordan Wallace Wolf
2442 This paper makes the case that in an age where the seizure and retention of digital information by law enforcement in criminal investigations is routine, the Fourth Amendment requires regulations on how this is stored and used post-collection.
Hao Huang
Detector and Interpreter: Two Roles of Individuals in the Enforcement of Data Privacy Law
Commentator: Alexis Shore Ingber
1430 This paper examines how individuals, despite weak incentives and limited remedies, participate in private enforcement under Chinese data privacy law by acting as detectors of violations and interpreters of law, and explores the pragmatic reasons behind this design.
Jordan Birnholtz & Matthew Kugler
True Threats, Public Safety, and Free Speech: An Empirical Analysis of Counterman’s Consequences
Commentator: Kirsten Martin
1420 Scholars expected the Supreme Court’s Counterman decision to undermine public safety while expanding protections for caustic political speech. This first empirical study finds these concerns have largely not materialized, but uncertainty remains.
Sabriyya Pate
Platform Liability for Platform Manipulation
Commentator: Hannah Bloch-Wehba
1310 What does the law have to say about corporate liability for social media platforms that facilitate platform manipulation (ex. romance and investor scams) through platform designs?
Angel Diaz
The Public Harms of Private Surveillance
Commentator: Brenda Dvoskin
2357 This is a project about private surveillance and the transformation of the public sphere. It uses a public nuisance framework to assess how private surveillance can interfere with substantive freedom and equality in the use of public roads.
Ella Corren & Kenneth Bamberger
Untangling Privacy and Competition
Commentator: Orla Lynskey
1457 The Article argues that competition law’s analysis systematically privileges corporate interests and privacy concerns are only credited in competition analysis when doing so promotes the competitiveness of privacy-eviscerating surveillance markets.
Xiaowei Yu & Robin Kar
The Contractual Death and Rebirth of Privacy
Commentator: Charlotte Tschider
2467 Extending ideas in Pseudo-Contract and Shared Meaning Analysis (Harvard Law Review), we propose a distinctive and critical common law solution to privacy challenges, which operates by returning contract law/interpretation to a more traditional form.
David Sella-Villa
Third Party Privacy and the Limits of Artificial Intelligence Regulation*
Commentator: Peter Swire
2448* This paper argues that the EU AI Act fails to adequately protect the privacy of third parties. This paper proposes integrating local democratic decision-making into AI regulation to give affected communities a voice in privacy protection.regulating da
Lauren Chambers, Dan Bateyko & Jared Katzman
Mapping Funding Landscapes of Civil Society and Public Interest Technologies: Voids, Trends, and Stakes
Commentator: Alan Butler
2477 As tech workers' discomfort with Big Tech grows, many are moving into 'public interest tech' initiatives, often in the nonprofit sector. But where does the money come from? We look into strategies, networks, patterns, traps, & norms for PIT funding.
4:15-5:15PM Closing Remarks – Shapiro Courtyard

Conference Participants

First NameLast NameInstitution
AminaAbduUniversity of Michigan
RedietAbebeELLIS Institute, Tuebingen, Germany
SamAdlerFordham Law School
NikitaAggarwalUniversity of Miami School of Law
WilliamAgnewCarnegie Mellon University
ShazedaAhmedUCLA
EmineAkarKing’s College London
KendraAlbertAlbert Sellars LLP
NatashaAmlaniPerkins Coie
María P.AngelYale Law School – Information Society Project (ISP)
ArthiAnnaduraiVanderbilt Law School
AshlynAskeUniversity of Washington School of Law
WendyBachUniversity of Tennessee
iltaffbalaGeorgetown University Law Center
NilaBalaUC Davis School of Law
PrithikaBalakrishnanUC Law San Francisco
DanBateykoCornell University
LiamBayerPomona College
StevenBellovinColumbia University Computer Science
ElettraBiettiNortheastern University
JordanBirnholtzNorthwestern Law
EleanorBirrellPomona College
CherylBlackJack C. Massey College of Business
JuliaBlairCalifornia Office of Cradle-to-Career Data
MarcBlitzOklahoma City University School of Law
HannahBloch-WehbaTexas A&M University School of Law
AlizaBloomNortheastern University School of Law
MirandaBogenCenter for Democracy & Technology
GlencoraBorradaileOregon State University
KielBrennan-MarquezUniversity of Connecticut School of Law
CaitlinBurkeStanford University
AlanButlerElectronic Privacy Information Center (epic.org)
RyanCaloUniversity of Washington
AlessandraCalviVrije Universiteit Brussel / CY Cergy Paris Universite
MarcCanellasMaryland Office of the Public Defender
JamesCaridi-DoyleRAND
LaurenChambersUC Berkeley School of Information
InyoungCheongPrinceton University
Madiha ZahrahChoksiCornell Tech
IgnacioCofoneUniversity of Oxford
JulieCohenGeorgetown Law
Ronald J.ColemanNYU Law
JayConradUniversity of Washington; Georgetown University Law Center
EllaCorrenBar-Ilan University Faculty of Law
SamCournoyerSheppard Mullin
CatherineCrumpUniversity of California, Berkeley, School of Law
RachelCummingsColumbia University
JustinCurlHarvard Law School
JohnDavissonElectronic Privacy Information Center
MarjorieDela CruzWestern Governer’s University/ Washington County Cooperative Library Services
RebeccaDelfinoLMU Loyola Law School Los Angeles
Wesley HanwenDengCarnegie Mellon University
LeaDespotisWashington University in St. Louis School of Law
WillDeVriesGoogle
MihailisDiamantisUniversity of Iowa
AngelDiazUSC Gould School of Law
MelodiDincerUCLA Law – Institute for Technology, Law and Policy
DavidDinielliYale Law School
Ana PaulaDos SantosUniversity of the Pacific, McGeorge School of Law
ErikaDouglasTemple University, Beasley School of Law
RyanDurrieWashington University School of Law
BrendaDvoskinWashington University in St. Louis
JessicaEaglinCornell Law School
Nina-SimoneEdwardsGeorgetown University Law Center
NasserEledrooColor Of Change / Independent
NasserEledroosColor Of Change / Independent
YanFangBoston College Law School
EmmaFinlayMelbourne Law School
MarcuFloreaUniversity of Groningen
JordanFrancisFuture of Privacy Forum
SusanFreiwaldUniversity of San Francisco School of Law
BrettFrischmannVillanova University
FannaGamalUCLA School of Law
KatrinaGeddesNYU Law/Cornell Tech
SaraGeogheganElectronic Privacy Information Center
MohsenGhasemizadeUniversity of Vermont
MicheleGilmanUniversity of Baltimore Law School
JonathanGingerichRutgers Law School
SueGlueckself-employed (formerly Microsoft)
JakeGoldenfeinUniversity of Melbourne
GloriaGonzález FusterVrije Universiteit Brussel (VUB)
JoshuaGreenbergCornell University
MateuszGrochowskiTulane University School of Law
WendyGrossmann/a
RohanGroverUniversity of Southern California
JohannaGunawanMaastricht University
MargotHanleyDuke University
GautamHansCornell Law School
WoodrowHartzogBoston University School of Law
YaseenHashmiGeorgetown University Law Center
JohnHeidemannUSC-ISI
MichaelHintzeHintze Law PLLC
KyleHoganMIT
RachelHongUniversity of Washington
HaoHuangUniversity of California, Berkeley, School of Law
JevanHutsonUniversity of Washington School of Law
Alexis ShoreIngberUniversity of Michigan School of Information
AbigailJacobsUniversity of Michigan
PalakJainBoston University
KhariJohnsonCalMatters/University of Virginia
MegJonesGeorgetown University
RobinKarUniversity of Illinois College of Law
AnastasiaKaragianniVrije Universiteit Brussels
RihokoKawaiGW law/ Toyo University
JonathanKerrUniversity of Baltimore
OrinKerrStanford Law School
MehtabKhanCleveland State College of Law
PerlaKhattarNotre Dame Law School
PaulineKimWashington University School of Law
JenniferKingStanford University
SophieKlitgaardUCLA
ShreyaKocharColumbia University
LoganKoepkeUpturn
ChristinaKoningisorUC Law San Francisco
TianqiKouPenn State University
LinseyKrolikSanta Clara University School of Law
MatthewKuglerNorthwestern Pritzker School of Law
ChristinaLeeGeorge Washington University Law School
RonLeeArnold & Porter
AbbyLemertYale Law School
YafitLev-AretzCUNY
KarenLevyCornell University
KatrinaLigettHUJI
Artur PericlesLima MonteiroYale Law School & Jackson School
OrlaLynskeyUCL laws
LanceMabryIDEM
ZinaMakarUniversity of Baltimore School of Law
JackMaketaYale University
EvelynMalaveSt. John’s University School of Law
GianclaudioMalgieriLeiden University
KirstenMartinUniversity of Notre Dame
WilliamMcGeveranUniversity of Minnesota Law School
MarkMcKennaUCLA School of Law
EdwardMcNicholasRopes & Gray / George Washington University (adjunct)
EmilyMcReynoldsAdobe
ChristopherMillardQueen Mary University of London
AndrewMillerYale Law School
ChristopherMortenColumbia Law School
LauraMoyGeorgetown Law
DeirdreMulliganUC Berkeley
NóraNi LoideainInformation Law and Policy Centre, IALS
KobbiNissimGeorgetown University
EricNullCenter for Democracy & Technology
PaulOhmGeorgetown Law
NgoziOkidegbeBoston University
PeterOrmerodVillanova University Charles Widger School of Law
LaythanOweisGeorgetown University Law Center
NicoleOzerHarvard Kennedy School
NizanPackinCUNY
PoojaPandeyUniversity of Maryland
SabriyyaPateColumbia Law School
Seema N.PatelUC College of the Law, San Francisco (formerly UC Hastings)
VeronicaPaternolliUniversità di Verona
JonathanPoratState of CA
JuliaPowlesUWA Tech & Policy Lab
SarahRajtmajerThe Pennsylvania State University
NathanReitingerNorthwestern (Pritzker)
NeilRichardsWashington University Law
DavidRudolphLieff Cabraser Heimann & Bernstein, LLP/University of California College of the Law, San Francisco
MuhammadSaadGeorgetown University
JayshreeSarathyNortheastern University
SarahSchefflerCarnegie Mellon University
ViolaSchmidTechnische Universität Darmstadt
JoelSchmidtThe Legal Aid Society
DawnSchraderCornell University
VictoriaSchwartzPepperdine Caruso School of Law
AndrewSelbstUCLA School of Law
DavidSella-VillaJoseph F. Rice School of Law at the University of South Carolina
ChinmayiSharmaFordham Law School
ZhibinShenColumbia University in the City of New York
KateSimChildren’s Online Safety & Privacy Research Program
ScottSkinner-ThompsonUniversity of Colorado
BenjaminSobelCornell Tech
DanielSoloveGeorge Washington University Law School
AliciaSolow-NiedermanGW Law
KatherineStrandburgNew York University School of Law
KaiStrandmoeBirkbeck, University of London
AllysonStuartCharleston School of Law
WanlingSuIndiana
ChenSunUniversity of Iowa
SimonSunNational Yang Ming Chiao Tung University School of Law
DanielSusserCornell University
Christian WieseSvanbergDLA Piper – Copenhagen
PeterSwireGeorgia Tech School of Cybersecurity and Privacy
CelineTakatsunoTech Matters | University of the Pacific
ZahraTakhshidUniversity of Denver
ShauhinTaleshUniversity of California, Irvine
VictoriaTangBoston University School of Law
AyeletTapieroHebrew University
ShreyaTewariNACDL
YuanTianUCLA
CharlotteTschiderLoyola University Chicago School of Law
WayneUngerQuinnipiac University School of Law
JenniferUrbanBerkeley Law
JeffreyVagleGeorgia State University College of Law
SivaVaidhyanathanUniversity of Virginia
AmeliaVancePublic Interest Privacy Center and William & Mary Law School
SalomeViljoenUniversity of Michigan
AriWaldmanUniversity of California, Irvine
ArtiWalker-PeddakotlaUniversity of Wisconsin Law
jordanWallace-Wolfuniversity of Arkansas Little Rock
SarahWangNew York University
AnneWashingtonNew York University
MadalynWasilczukUniversity of South Carolina Joseph F. Rice School of Law
KateweisburdUC Law SF
PeterWinnU.S. Department of Justice
RichmondWongGeorgia Institute of Technology
AllisonWoodruffGoogle
FelixWuCardozo School of Law
XiaoweiYuThe University of Illinois
ElanaZeideUniversity of Nebraska
StavZeitouniUC Berkeley
TianyiZhuPeking University
AlessiaZornettaUCLA
carleenzubrzyckiuniversity of connecticut school of law
CobunZweifel-KeeganIAPP