Back to PLSC 2025 Conference Information
Historical PLSC 2025 Workshop Schedule
* Hybrid Sessions
| DAY 1: May 29, 2025 | |||
| 8:30AM BREAKFAST | |||
| 9:00-9:10AM Welcome – Ari Ezra Waldman – Shapiro Courtyard | |||
| 9:10-9:20AM Logistics – Mark McKenna – Shapiro Courtyard | |||
| 9:30-10:45AM SESSION 1 | ROOM | PAPER SUMMARY | |
| Aliza Hochman Bloom A “Superpredator” Sequel? Unpacking Police Enforcement of the Juvenile Curfew Commentator: Kiel Brennan-Marquez |
1310 | This Article explores two cities’ recent experiences enforcing a juvenile curfew. These ordinances compound police discretion for increased interactions that are harmful and open additional channels of criminal liability in the present and future. | |
| Nathan Reitinger Measured Failures of Robots.txt: Legal and Empirical Insights for Regulating Robots Commentator: Madiha Choksi |
2357 | Should robots.txt regulate AI-purposed scrapers? No. Robots.txt encourages problems under web scraping doctrine and, as empirical data shows, is not practical for all but the top 1% of websites. The Article ends with a proposal to fix robots.txt. | |
| Woodrow Hartzog & Mark McKenna Taking Scale Seriously in Technology Law Commentator: Julie E. Cohen |
1457 | This article explores the role of scale-the relationship between the amount of an activity and its associated costs and benefits-in technology and privacy law. We argue that law should distinguish between “scale is more” and “scale is different.” | |
| Steve Bellovin & Shreya Kochar Beyond Creepiness: Using Predictive Privacy to Measure Privacy Harms Commentator: Jennifer Urban |
1420 | A demonstration of harm is necessary for standing in Federal court, but showing harm from a privacy breach is hard. We used a new privacy model, synthetic data, surveys, and machine learning to show that there is such harm. | |
| Ronald Coleman Human Confrontation Commentator: Yan Fang |
2442 | Increasing automation of law enforcement poses a potentially existential threat to the confrontation rights of criminal defendants. This Article responds by calling for a framework based on human confrontation. | |
| Ari Ezra Waldman Challenging Technology Expertise Commentator: Andrew Selbst |
1430 | Amidst a growing technological oligarchy, this paper identifies and challenges a fundamental assumption of much law and technology scholarship and policy–namely, that knowing how technology works is necessary to regulate technology effectively. | |
| Peter Ormerod Regulating Data Monetization Commentator: Eric Null |
2467 | A structural approach to data governance should target how companies transform data into money. | |
| Evelyn Malavé Treatment Sentences Commentator: Felix Wu |
2483 | This Article analyzes the requirement that defendants attend drug treatment programs as part of a non-incarceratory sentence, revealing how treatment requirements operate with little oversight while at the same time exposing defendants to punitive, racist, and ableist treatment practices. | |
|
Ignacio Cofone & Eric Hehman Reasonable Expectations of Privacy: An Empirical Evaluation Commentator: Laura Moy |
2448* | Judges have been using an armchair sense of what people expect for Fourth Amendment protection. We test those expectations. | |
| Rachel Hong, Jevan Hutson, William Agnew, Imaad Huda, Tadayoshi Kohno & Jamie Morgenstern A Common Pool of Privacy Problems: Legal and Technical Lessons from a Large-Scale Web-Scraped Machine Learning Dataset Commentator: Inyoung Cheong |
2477 | We investigate the contents of web-scraped data for training AI systems through conducting a legally-grounded dataset audit. We find significant presence of personal data despite sanitization efforts and explore their legal privacy implications. | |
| 10:45-11:15AM BREAK | |||
| 11:15AM-12:30PM SESSION 2 | ROOM | PAPER SUMMARY | |
| Nila Bala Policing Children's Data Commentator: Jessica Eaglin |
1310 | This Article analyzes how law enforcement obtains children's digital evidence and how parents frequently enable access to data. It proposes treating children's data more like their bodies or DNA-deserving of protection from parental consent. | |
| Jake Goldenfein, Emma Finlay, Kean Birch & Anetta Proskurovs’ka The Judicial Configuration of Data Value Commentator: Gloria González Fuster |
2477 | There is no simple way to measure the financial value of personal data. This paper interrogates how damages in data breach and unauthorized disclosure cases participate in the configuration of personal data as an legal-economic object. | |
| Jayshree Sarathy & danah
boyd What Makes Data Work, Work? Exploring the Politics of U.S. Public-Sector Data Access via Federal Statistical Research Data Centers Commentator: Meg Jones |
1430 | We study U.S. Federal Statistical Research Data Centers (RDCs), showing how efforts to democratize data access through RDCs ignore key dynamics of data sharing such as relationships and gifting dynamics. | |
| Mateusz Grochowski The Inverse Commodification: Consent as a Currency Commentator: Nora Ni Loideain |
2442 | This paper looks into the paradoxical role of consent in the data economy. While consent was originally intended to decommodify data and restore autonomy of data subjects, in practice, it has itself become a commodity. | |
| Michele Gilman From Home Visit to Robo-Adjudication: The Algorithmic Injustice of Automated Welfare Fraud Detection Commentator: Madalyn Wasilczuk |
2467 | Welfare fraud detection algorithms are accusing innocent, needy claimants of fraud and depriving them of support, while allowing criminal syndicates to steal billions in public benefits. Legal and technical reforms are urgent. | |
| Yan Fang Between Officer and Bouncer Logics: How Internet Technology Companies Navigate User Crime Commentator: Karen Levy |
1420 | This article draws on in-depth interviews and sociolegal scholarship on organizations to examine how internet technology companies manage online safety through two sets of enforcement logics: public safety and private safety. | |
| Johanna Gunawan & Colin
Gray Dark Patterns and the Design Difference Commentator: Steve Bellovin |
2483 | This work considers what makes the design phenomena of dark patterns deserving of distinct approaches and mitigations, framing their differences around asymmetries of scale, mediative control, and relational norms. | |
| Christina Lee Beyond Algorithmic Disgorgement: Remedying Algorithmic Harms Commentator: Nina-Simone Edwards |
2357 | In this paper, I explore the question of when an algorithmic remedy is appropriate, particularly given the complex algorithmic supply chain in which all AI systems exist, by examining the remedy of algorithmic disgorgement and its limitations. | |
| Rohan Grover Standardizing Privacy* Commentator: Ryan Calo |
2448* | Efforts to standardize privacy through non-regulatory agencies such as NIST, while framed as participatory and democratic, effectively legitimize corporate influence by exploiting blurry boundaries between technical and legal expertise. | |
| Ngozi Okidegbe Rethinking Algorithmic Governance Commentator: Katrina Geddes |
1457 | The paper focuses on why communities should have a veto over the state’s use of algorithms in criminal legal decision-making | |
| 12:30-2:00PM LUNCH | |||
| 12:45-1:45PM Plenary Panel What's Happening in California Privacy Law? |
1430 | Jennifer Urban, California Privacy Protection Agency Chair Jonathan Porat, California State Chief Technology Officer Khari Johnson, Technology Reporter, CalMatters Moderator: Andrew Selbst |
|
| 2:00-3:15PM SESSION 3 | ROOM | PAPER SUMMARY | |
| Orin Kerr Data Scanning and the Fourth Amendment Commentator: Christina Koningisor |
1430 | Lower courts have recently divided on an important question of Fourth Amendment law: When the government searches through a massive database, what determines the scope the search? The database size, the filter setting, or the raw output? | |
| Peter Swire
& Samm Sacks The New Intersection of Privacy and National Security: Personal Data as a Dual Use Technology* Commentator: Nikita Aggarwal |
2448* | The U.S. has started to regulate personal data as a “dual use” technology, with both civilian and military uses, especially as to China. This paper brings together the national security and privacy literatures, showing convergence and divergence. | |
| Anastasia Karagianni & Alessandra
Calvi Exploring Gender Dimensions in High-Risk AI Systems: Moving Towards a Gender Impact Assessment within the EU AI Act Commentator: Jevan Hutson |
2442 | This paper examines the gendered implications of high-risk AI systems and advocates for a Gender Impact Assessment within the EU AI Act to mitigate biases and ensure fairness. | |
| Eleanor Birrell, Jessica Tong & Liam
Bayer Developer and End User Interpretations of Data Minimization Commentator: Sarah Rajtmajer |
2477 | This work empirically evaluates how various data minimization requirements draw from U.S. state privacy laws are interpreted by two key groups of stakeholders: developers and users. | |
| Julie E. Cohen Oligarchy, State, and Cryptopia Commentator: Jeffrey Vagle |
1420 | Developing an account of tech oligarchy within contemporary political economy has become a project of considerable urgency. This essay undertakes that project. | |
| Richmond Wong & Deirdre Mulligan Interrogating the Role of Design in Governance-by-Design Initiatives Commentator: Will DeVries |
2467 | We review recent governance-by-design initiatives, focusing on privacy related legislation, to develop a framework describing multiple ways to conceptualize “design”. We then discuss how these conceptions map onto different regulatory approaches. | |
| Hannah Bloch-Wehba Information Law Pluralism Commentator: Elettra Bietti |
1457 | This paper argues that the boundary between transparency and substantive regulation is increasingly porous, and recasts information law as a way of securing rights to access and use information. | |
| Ayelet Gordon-Tapiero, Kobbi Nissim, Katrina
Ligett & Muhammad Saad On the Rival Nature of Data Use in the Context of Privacy Commentator: Benjamin Sobel |
2483 | The paper will explore broad policy principles to promote the use of data as a rival good within particular settings (e.g., data used for statistical research or data which is not in the public domain) by relying on Elinor Ostrom's work. | |
| Kiel Brennan-Marquez, Julia Simon-Kerr &
Carly Zubrzycki Bullshit Explanations Commentator: Alicia Solow-Niederman |
1310 | Generative AI poses the inverse of a "black box" problem. Soon, explanations of AI-assisted decisions will be easy to conjure, but they will be (in Frankfurt’s sense) “bullshit”-frustrating legal regimes that condition authority on reason-giving. | |
| Nizan Packin Pretextual Privacy Theory: When Privacy Enables Adversaries Commentator: Edward McNicholas |
2357 | This paper explores how privacy-enhancing technologies can inadvertently empower adversaries, posing national security risks, using cases like TikTok and Tornado Cash, which highlight the tension between privacy rights and other conflicting interests | |
| 3:15-3:45PM BREAK | |||
| 3:45-5:00PM SESSION 4 | ROOM | PAPER SUMMARY | |
| Ji Seon Song, Wendy A. Bach & Madalyn Wasilczuk The Interdisciplinary Policing of Pregnancy Criminalization Commentator: Christopher Morten |
1457 | Using an original dataset of pregnancy criminalization cases brought after Dobbs, this article argues that the intersection of healthcare privacy and criminal procedure has failed to protect the civil liberties of pregnant people. | |
| Amina Abdu & Abigail Jacobs AI Evaluations and the Standards Metaphor* Commentator: Pauline Kim |
2448* | This paper examines how the rhetoric of standards-making is used to characterize AI evaluations in policy settings. We discuss how the language of standards is used to legitimize the authority of evaluations–and their creators–to govern AI. | |
| Paul Ohm & Susan Freiwald Superwarrants Commentator: Peter Ormerod |
1430 | Some rules, most notably in the Wiretap Act, impose standards for government surveillance that go above and beyond the Fourth Amendment's probable cause warrant. These "superwarrant" requirements are underutilized and undertheorized, until now! | |
| Woodrow Hartzog, Neil Richards & Jordan
Francis Privacy's Autonomy Thicket: Disentangling Choice, Consent, and Control Commentator: Christopher Millard |
1420 | In this paper we argue that choice, consent, and control mean different things but are too often conflated in privacy law. We argue the goal for privacy law should be meaningful life choices unburdened by unreasonable privacy risk. | |
| Yafit Lev-Aretz & Aileen
Nielsen Privacy Law’s Dynamic Disequilibria Commentator: Elana Zeide |
2357 | While privacy agents remained a legal thought experiment for years, state laws are now granting them real legal force. Our empirical study examines consumer attitudes toward their adoption amid weak enforcement and likely corporate resistance. | |
| Ido Sivan-Sevilla, Pooja Pandey & Ellie
Hill Privacy Intermediation For/Against Accountability: A Comparative Analysis of Accountability Powers Across Formal & Informal US Privacy Watchdogs Commentator: Emily McReynolds |
2483 | In light of corporate and government threats to privacy, formal and informal watchdogs have emerged. The paper comparatively assesses their accountability powers to realize the limits and opportunities in holding threat actors into account. | |
| Nina-Simone Edwards Surveillance and the Exploitation of the Vulnerable Commentator: Kendra Albert |
2467 | Surveillance technologies manipulate individuals' unique complexities, targeting intersecting vulnerabilities to amplify harm. This paper evaluates and proposes solutions for inadequate legal frameworks. | |
| Elettra Bietti & Anne
Bellon Technological Capture Commentator: Salome Viljoen |
1310 | Our paper empirically maps the influence tech companies exert against agencies such as the FTC and EU Commission. "Technological capture" consists in companies' ability to influence regulators through informational and architectural advantages. | |
| Erika Douglas Missing Transactional Privacy Law Commentator: Bill McGeveran |
2477 | Corporate mergers and acquisitions sell our personal information en masse, yet are neglected in privacy enforcement. This article challenges that inattention, theoretically and empirically, using the privacy policies of targets in big tech deals. | |
| Emine Akar Emotional Artificial Intelligence and Emotional Privacy Commentator: Daniel Susser |
2442 | Emotional AI is quietly tracking and shaping our emotions. This paper explores the risks of ’emotional privacy’ breaches and how we can safeguard autonomy in an AI-driven world. | |
| 5:15-7:00PM RECEPTION • SHAPIRO COURTYARD | |||
| DAY 2: May 30, 2025 | |||
| 8:30AM BREAKFAST | |||
| 9:00-9:10AM Intros – Mark McKenna – Shapiro Courtyard | |||
| 9:15-10:30AM SESSION 5 | ROOM | PAPER SUMMARY | |
| Marc Canellas Challenging Carceral Software Commentator: Orin Kerr |
2442 | Carceral software generates powerful evidence in criminal cases falsely presented as objective and reliable. This Article presents a new framework shifting the statutory and Constitutional challenges from forensic disciplines to the software itself. | |
| Orla Lynskey Deliberative Data Governance* Commentator: Julia Powles |
2448* | How can we move beyond individual decision-making about data to an approach grounded in the public interest? This article probes relevant meanings of 'public interest' and critically examines governance models for 'public interest' data processing. | |
| Wanling Su Encrypted Assembly Commentator: Gautam Hans |
2477 | Video calling platforms with end-to-end encryption have fundamentally transformed how Americans exercise their right to assembly. | |
| Jessica Eaglin The Problem-Solving Court as Technology Commentator: Stav Zeitouni |
1430 | This article describes and analyzes these court-driven diversion programs as a networked information technology. It demonstrates why and how this framework opens new avenues for critical legal analysis in criminal law and law and technology. | |
| Paul Ohm & Meg Leta Jones The Possible Impossible Commentator: Jay Conrad |
1457 | Many complain that tech regulation imposes severe burdens on regulated companies. It turns out, they are wrong. | |
| Matthew Kugler, Lior Strahilevitz, Marshini Chetty, Chirag Mahapatra & Yaretzi Ulloa Can Consumers Protect Themselves Against Privacy Dark Patterns? Commentator: Nathan Reitenger |
1420 | Using a mockup of a video streaming website, we show that people instructed to choose privacy protective options during account creation are still unable to fully resist dark patterns. | |
| Alicia Solow-Niederman AI and Doctrinal Collapse Commentator: Jake Goldenfein |
1310 | Data acquisition in AI starkly exposes an underlying legal pathology: “Doctrinal collapse.” As distinct regimes like IP and privacy overlap, their doctrinal and normative boundaries lose coherence. Collapse is permitted by internal legal structures, and it facilitates exploitation by sophisticated actors. Left unchecked, collapse enables private power and threatens law’s public governance function. | |
| Margot Hanley, Solon Barocas & Daniel
Susser Operationalizing Neuroprivacy Commentator: John Davisson |
2357 | In 2024, two U.S. states revised their privacy laws to regulate consumer neurotech, sparking debates on whether to regulate neural data or inferences of mental states. This article examines competing ideas for how best to operationalize neuroprivacy. | |
| Sarah Rajtmajer & Brett Frischmann A Defense of Demonstrably Informed Consent in Privacy Governance Commentator: Ron Lee |
2483 | We propose a new legal standard of demonstrably informed consent and describe experimental work testing friction-in-design mechanisms that would operationalize that legal requirement. | |
| Victoria Schwartz AI Influencers and Revisiting the Right of Publicity Commentator: Melodi Dincer |
2467 | Does the right of publicity apply to virtual and AI influencers and should it? What does the answer tell us about the applicability of the right of publicity beyond humans. | |
| 10:30-11:00AM BREAK | |||
| 11:00AM-12:15PM SESSION 6 | ROOM | PAPER SUMMARY | |
| Zina Makar Carceral Interference Commentator: Kate Weisburd |
1430 | Digital technology is increasingly replacing traditional modes of surveillance in carceral spaces. This article advances an alternative test for protecting the privacy rights of prisoners and prisoner-adjacent individuals. | |
| Mihailis Diamantis, Chen Sun & Rishab
Nithyanand Information About Data Commentator: Brett Frischmann |
2357 | Privacy enforcement relies on an overlooked and often false premise-that firms know what their own data practices are. This paper reports a new study assessing whether firms have such knowledge and proposes a disclosure regime that could help. | |
| Inyoung Cheong Human-Centered First Amendment Framework for AI Regulation Commentator: Marc Blitz |
2467 | To address AI systems' unprecedented ability to influence human cognition, this Article proposes a human-centered First Amendment framework that protects collective human freedom to think, speak, and listen over corporations' speech rights. | |
| Jordan Wallace-Wolf Less Fisher, More Doe: Non-Testimonial Mental Content and a New Rule for Unlocking Digital Devices Commentator: Zahra Takhshid |
2442 | Can a criminal defendant be compelled to unlock their digital device? With their fingerprint? What about a password? This question has been addressed, but the range of developed answers is narrow. This paper offers a new position. | |
| Jeffrey Vagle AI's Ex Ante/Ex Post Problem Commentator: Katherine Strandburg |
1457 | When considering how to regulate, choosing their method and timing is critical. AI technologies make this problematic, as the means by which they are built and operate are highly complex, creating difficult ex ante/ex post regulation questions. | |
| Seema Patel The Law of Worker Data Privacy Harms* Commentator: Victoria Schwartz |
2448* | AI-driven technologies extract, analyze, and monetize non-unionized low-wage workers' data (“worker datafication”), imposing significant, often imperceptible harms, including substantial privacy harms. Can privacy law help solve the problem? | |
| Elettra Bietti How (Not) to Regulate Attention Platform Business Models Commentator: Jennifer King |
1420 | I describe the business model of platforms that capture and monetize attention and data for profit. I argue that current analytical and legal tools for addressing attention capture and attention disorders are inadequate and offer alternatives. | |
| Andrew Miller Invisible Allies: Algorithmic Consumer Profiling and the Rise of New Group Harms Commentator: Maria Angel |
1310 | AI-driven consumer profiling generates new and invisible patterns of inequality, raising serious concerns for distributive justice and democratic deliberation. Countermeasures should focus on helping harmed parties find each other and act in concert. | |
| Imana Basileal, Zeyu Shen, John Heidemann &
Aleksandra Korolova External Evaluation of Discrimination Mitigation Efforts in Meta's Ad Delivery Commentator: Anne Washington |
2477 | We evaluate Meta’s Variance Reduction System (VRS), a fairness intervention system deployed following settlement with U.S. DOJ. We show VRS increases advertiser costs, limits ad reach, and can fail to improve access to opportunity ads. | |
| Nicole Ozer What Happened to Privacy Law – Getting on the Path to True Privacy Protection in the United States Commentator: Allyson Haynes Stuart |
2483 | What can we learn from privacy work in the 1970s to help understand the current state of privacy law and build the movement energy and create the climate to move privacy law in a truly powerful direction to protect people and promote rights. | |
| 12:15-1:45PM LUNCH | |||
| 1:00-1:30PM Celebratory Announcements & Awards – Shapiro Courtyard | |||
| 1:45-3:00PM SESSION 7 | ROOM | PAPER SUMMARY | |
| Justin Curl Judging Binary Searches: Four Essential Questions Commentator: Susan Freiwald |
2483 | Every judge should ask and answer four questions about the use of a binary search technique to understand its full implications: (1) Who knows about its use? (2) What happens when it errs? (3) How often is it applied? (4) To whom is it applied? | |
| Jevan Hutson, Cedric Whitney & Jay
Conrad Forget Me Not? Machine Unlearning's Implications for Privacy Law Commentator: Alessandra Calvi |
1420 | This article examines if privacy laws’ goals can align with the technical realities of machine unlearning in generative AI and proposes a framework for incorporating machine unlearning into broader privacy-preserving interventions. | |
| Artur Pericles Lima Monteiro Structural Constitutionalism for Platforms Commentator: Wayne Unger |
2467 | There is wide agreement that platforms are too powerful. But reformers either anoint the new governors or forsake governance. This paper explores how political constitutionalism and federalism can redistribute platform power while enabling governance | |
| Brenda Dvoskin The Erotic Interest in Privacy Commentator: Scott Skinner-Thompson |
1457 | Why does sexual privacy matter? This paper highlights how sexual privacy creates and sustain erotic meaning. It argues that sexual privacy is one of the legal conditions for a rich and fair sexual life. | |
| Glencora Borradaile, Alex LeClerc & Kelsy
Kretschmer Contextual Intent: Privacy Considerations of Social Movement Groups Commentator: Kate Sim |
1430 | What is a privacy success? When it comes to social movements, we should go beyond simply whether a technology is used or not so that we can explore factors leading to or away from meeting a group's privacy needs. | |
| Arti Walker-Peddakotla The Obfuscation of Surveillance Commentator: Mihailis Diamantis |
2442 | The Article proposes a new paradigm of “acquiescence through obfuscation” to describe the mechanisms that private security corporations use to gain municipal officials’ approval towards the enactment of carceral surveillance. | |
| Chinmayi Sharma, Thomas Kadri & Sam
Adler Brokering Safety* Commentator: Carleen Zubrzycki |
2448* | The current web of privacy laws places the burden on abuse victims to stop data brokers from sharing their personal information with their abusers. This Article proposes and defends a centralized opt-out solution. | |
| María P. Angel Breaking Up with Privacy: The FTC’s Shift to Commercial Surveillance and its Reimagined Role in Data Governance Commentator: Andrew Miller |
1310 | The FTC’s shift from “privacy” to “commercial surveillance” signals a strategic reframing of reg. priorities that began before Khan’s tenure. This Article traces its origins and potential to reshape the FTC's role despite recent leadership changes. | |
| Yaseen Hashmi The Primacy of the Face & The Right of Publicity Commentator: Mark McKenna |
2477 | By historicizing assumptions about how the face visually represents the self, I argue that image privacy protections also protect the agency at the core of ethical self-making. | |
| Jordan Francis The Necessity Paradox: Navigating Tensions in New Substantive Data Minimization Standards in Privacy Legislation Commentator: Deirdre Mulligan |
2357 | This paper explores an ongoing legislative shift in state privacy laws from notice-and-choice towards substantive data minimization rules that limit the collection of personal data to what is necessary to provide a requested product or service. | |
| 3:00-3:30PM BREAK | |||
| 3:30-4:45PM SESSION 8 | ROOM | PAPER SUMMARY | |
| Jonathan Kerr Regulating Digital Data Retention and Reuse in Criminal Cases Commentator: Jordan Wallace Wolf |
2442 | This paper makes the case that in an age where the seizure and retention of digital information by law enforcement in criminal investigations is routine, the Fourth Amendment requires regulations on how this is stored and used post-collection. | |
| Hao Huang Detector and Interpreter: Two Roles of Individuals in the Enforcement of Data Privacy Law Commentator: Alexis Shore Ingber |
1430 | This paper examines how individuals, despite weak incentives and limited remedies, participate in private enforcement under Chinese data privacy law by acting as detectors of violations and interpreters of law, and explores the pragmatic reasons behind this design. | |
| Jordan Birnholtz & Matthew Kugler True Threats, Public Safety, and Free Speech: An Empirical Analysis of Counterman’s Consequences Commentator: Kirsten Martin |
1420 | Scholars expected the Supreme Court’s Counterman decision to undermine public safety while expanding protections for caustic political speech. This first empirical study finds these concerns have largely not materialized, but uncertainty remains. | |
| Sabriyya Pate Platform Liability for Platform Manipulation Commentator: Hannah Bloch-Wehba |
1310 | What does the law have to say about corporate liability for social media platforms that facilitate platform manipulation (ex. romance and investor scams) through platform designs? | |
| Angel Diaz The Public Harms of Private Surveillance Commentator: Brenda Dvoskin |
2357 | This is a project about private surveillance and the transformation of the public sphere. It uses a public nuisance framework to assess how private surveillance can interfere with substantive freedom and equality in the use of public roads. | |
| Ella Corren & Kenneth Bamberger Untangling Privacy and Competition Commentator: Orla Lynskey |
1457 | The Article argues that competition law’s analysis systematically privileges corporate interests and privacy concerns are only credited in competition analysis when doing so promotes the competitiveness of privacy-eviscerating surveillance markets. | |
| Xiaowei Yu & Robin Kar The Contractual Death and Rebirth of Privacy Commentator: Charlotte Tschider |
2467 | Extending ideas in Pseudo-Contract and Shared Meaning Analysis (Harvard Law Review), we propose a distinctive and critical common law solution to privacy challenges, which operates by returning contract law/interpretation to a more traditional form. | |
| David Sella-Villa Third Party Privacy and the Limits of Artificial Intelligence Regulation* Commentator: Peter Swire |
2448* | This paper argues that the EU AI Act fails to adequately protect the privacy of third parties. This paper proposes integrating local democratic decision-making into AI regulation to give affected communities a voice in privacy protection.regulating da | |
| Lauren Chambers, Dan Bateyko & Jared
Katzman Mapping Funding Landscapes of Civil Society and Public Interest Technologies: Voids, Trends, and Stakes Commentator: Alan Butler |
2477 | As tech workers' discomfort with Big Tech grows, many are moving into 'public interest tech' initiatives, often in the nonprofit sector. But where does the money come from? We look into strategies, networks, patterns, traps, & norms for PIT funding. | |
| 4:15-5:15PM Closing Remarks – Shapiro Courtyard | |||
Conference Participants
| First Name | Last Name | Institution |
|---|---|---|
| Amina | Abdu | University of Michigan |
| Rediet | Abebe | ELLIS Institute, Tuebingen, Germany |
| Sam | Adler | Fordham Law School |
| Nikita | Aggarwal | University of Miami School of Law |
| William | Agnew | Carnegie Mellon University |
| Shazeda | Ahmed | UCLA |
| Emine | Akar | King’s College London |
| Kendra | Albert | Albert Sellars LLP |
| Natasha | Amlani | Perkins Coie |
| María P. | Angel | Yale Law School – Information Society Project (ISP) |
| Arthi | Annadurai | Vanderbilt Law School |
| Ashlyn | Aske | University of Washington School of Law |
| Wendy | Bach | University of Tennessee |
| iltaff | bala | Georgetown University Law Center |
| Nila | Bala | UC Davis School of Law |
| Prithika | Balakrishnan | UC Law San Francisco |
| Dan | Bateyko | Cornell University |
| Liam | Bayer | Pomona College |
| Steven | Bellovin | Columbia University Computer Science |
| Elettra | Bietti | Northeastern University |
| Jordan | Birnholtz | Northwestern Law |
| Eleanor | Birrell | Pomona College |
| Cheryl | Black | Jack C. Massey College of Business |
| Julia | Blair | California Office of Cradle-to-Career Data |
| Marc | Blitz | Oklahoma City University School of Law |
| Hannah | Bloch-Wehba | Texas A&M University School of Law |
| Aliza | Bloom | Northeastern University School of Law |
| Miranda | Bogen | Center for Democracy & Technology |
| Glencora | Borradaile | Oregon State University |
| Kiel | Brennan-Marquez | University of Connecticut School of Law |
| Caitlin | Burke | Stanford University |
| Alan | Butler | Electronic Privacy Information Center (epic.org) |
| Ryan | Calo | University of Washington |
| Alessandra | Calvi | Vrije Universiteit Brussel / CY Cergy Paris Universite |
| Marc | Canellas | Maryland Office of the Public Defender |
| James | Caridi-Doyle | RAND |
| Lauren | Chambers | UC Berkeley School of Information |
| Inyoung | Cheong | Princeton University |
| Madiha Zahrah | Choksi | Cornell Tech |
| Ignacio | Cofone | University of Oxford |
| Julie | Cohen | Georgetown Law |
| Ronald J. | Coleman | NYU Law |
| Jay | Conrad | University of Washington; Georgetown University Law Center |
| Ella | Corren | Bar-Ilan University Faculty of Law |
| Sam | Cournoyer | Sheppard Mullin |
| Catherine | Crump | University of California, Berkeley, School of Law |
| Rachel | Cummings | Columbia University |
| Justin | Curl | Harvard Law School |
| John | Davisson | Electronic Privacy Information Center |
| Marjorie | Dela Cruz | Western Governer’s University/ Washington County Cooperative Library Services |
| Rebecca | Delfino | LMU Loyola Law School Los Angeles |
| Wesley Hanwen | Deng | Carnegie Mellon University |
| Lea | Despotis | Washington University in St. Louis School of Law |
| Will | DeVries | |
| Mihailis | Diamantis | University of Iowa |
| Angel | Diaz | USC Gould School of Law |
| Melodi | Dincer | UCLA Law – Institute for Technology, Law and Policy |
| David | Dinielli | Yale Law School |
| Ana Paula | Dos Santos | University of the Pacific, McGeorge School of Law |
| Erika | Douglas | Temple University, Beasley School of Law |
| Ryan | Durrie | Washington University School of Law |
| Brenda | Dvoskin | Washington University in St. Louis |
| Jessica | Eaglin | Cornell Law School |
| Nina-Simone | Edwards | Georgetown University Law Center |
| Nasser | Eledroo | Color Of Change / Independent |
| Nasser | Eledroos | Color Of Change / Independent |
| Yan | Fang | Boston College Law School |
| Emma | Finlay | Melbourne Law School |
| Marcu | Florea | University of Groningen |
| Jordan | Francis | Future of Privacy Forum |
| Susan | Freiwald | University of San Francisco School of Law |
| Brett | Frischmann | Villanova University |
| Fanna | Gamal | UCLA School of Law |
| Katrina | Geddes | NYU Law/Cornell Tech |
| Sara | Geoghegan | Electronic Privacy Information Center |
| Mohsen | Ghasemizade | University of Vermont |
| Michele | Gilman | University of Baltimore Law School |
| Jonathan | Gingerich | Rutgers Law School |
| Sue | Glueck | self-employed (formerly Microsoft) |
| Jake | Goldenfein | University of Melbourne |
| Gloria | González Fuster | Vrije Universiteit Brussel (VUB) |
| Joshua | Greenberg | Cornell University |
| Mateusz | Grochowski | Tulane University School of Law |
| Wendy | Grossman | n/a |
| Rohan | Grover | University of Southern California |
| Johanna | Gunawan | Maastricht University |
| Margot | Hanley | Duke University |
| Gautam | Hans | Cornell Law School |
| Woodrow | Hartzog | Boston University School of Law |
| Yaseen | Hashmi | Georgetown University Law Center |
| John | Heidemann | USC-ISI |
| Michael | Hintze | Hintze Law PLLC |
| Kyle | Hogan | MIT |
| Rachel | Hong | University of Washington |
| Hao | Huang | University of California, Berkeley, School of Law |
| Jevan | Hutson | University of Washington School of Law |
| Alexis Shore | Ingber | University of Michigan School of Information |
| Abigail | Jacobs | University of Michigan |
| Palak | Jain | Boston University |
| Khari | Johnson | CalMatters/University of Virginia |
| Meg | Jones | Georgetown University |
| Robin | Kar | University of Illinois College of Law |
| Anastasia | Karagianni | Vrije Universiteit Brussels |
| Rihoko | Kawai | GW law/ Toyo University |
| Jonathan | Kerr | University of Baltimore |
| Orin | Kerr | Stanford Law School |
| Mehtab | Khan | Cleveland State College of Law |
| Perla | Khattar | Notre Dame Law School |
| Pauline | Kim | Washington University School of Law |
| Jennifer | King | Stanford University |
| Sophie | Klitgaard | UCLA |
| Shreya | Kochar | Columbia University |
| Logan | Koepke | Upturn |
| Christina | Koningisor | UC Law San Francisco |
| Tianqi | Kou | Penn State University |
| Linsey | Krolik | Santa Clara University School of Law |
| Matthew | Kugler | Northwestern Pritzker School of Law |
| Christina | Lee | George Washington University Law School |
| Ron | Lee | Arnold & Porter |
| Abby | Lemert | Yale Law School |
| Yafit | Lev-Aretz | CUNY |
| Karen | Levy | Cornell University |
| Katrina | Ligett | HUJI |
| Artur Pericles | Lima Monteiro | Yale Law School & Jackson School |
| Orla | Lynskey | UCL laws |
| Lance | Mabry | IDEM |
| Zina | Makar | University of Baltimore School of Law |
| Jack | Maketa | Yale University |
| Evelyn | Malave | St. John’s University School of Law |
| Gianclaudio | Malgieri | Leiden University |
| Kirsten | Martin | University of Notre Dame |
| William | McGeveran | University of Minnesota Law School |
| Mark | McKenna | UCLA School of Law |
| Edward | McNicholas | Ropes & Gray / George Washington University (adjunct) |
| Emily | McReynolds | Adobe |
| Christopher | Millard | Queen Mary University of London |
| Andrew | Miller | Yale Law School |
| Christopher | Morten | Columbia Law School |
| Laura | Moy | Georgetown Law |
| Deirdre | Mulligan | UC Berkeley |
| Nóra | Ni Loideain | Information Law and Policy Centre, IALS |
| Kobbi | Nissim | Georgetown University |
| Eric | Null | Center for Democracy & Technology |
| Paul | Ohm | Georgetown Law |
| Ngozi | Okidegbe | Boston University |
| Peter | Ormerod | Villanova University Charles Widger School of Law |
| Laythan | Oweis | Georgetown University Law Center |
| Nicole | Ozer | Harvard Kennedy School |
| Nizan | Packin | CUNY |
| Pooja | Pandey | University of Maryland |
| Sabriyya | Pate | Columbia Law School |
| Seema N. | Patel | UC College of the Law, San Francisco (formerly UC Hastings) |
| Veronica | Paternolli | Università di Verona |
| Jonathan | Porat | State of CA |
| Julia | Powles | UWA Tech & Policy Lab |
| Sarah | Rajtmajer | The Pennsylvania State University |
| Nathan | Reitinger | Northwestern (Pritzker) |
| Neil | Richards | Washington University Law |
| David | Rudolph | Lieff Cabraser Heimann & Bernstein, LLP/University of California College of the Law, San Francisco |
| Muhammad | Saad | Georgetown University |
| Jayshree | Sarathy | Northeastern University |
| Sarah | Scheffler | Carnegie Mellon University |
| Viola | Schmid | Technische Universität Darmstadt |
| Joel | Schmidt | The Legal Aid Society |
| Dawn | Schrader | Cornell University |
| Victoria | Schwartz | Pepperdine Caruso School of Law |
| Andrew | Selbst | UCLA School of Law |
| David | Sella-Villa | Joseph F. Rice School of Law at the University of South Carolina |
| Chinmayi | Sharma | Fordham Law School |
| Zhibin | Shen | Columbia University in the City of New York |
| Kate | Sim | Children’s Online Safety & Privacy Research Program |
| Scott | Skinner-Thompson | University of Colorado |
| Benjamin | Sobel | Cornell Tech |
| Daniel | Solove | George Washington University Law School |
| Alicia | Solow-Niederman | GW Law |
| Katherine | Strandburg | New York University School of Law |
| Kai | Strandmoe | Birkbeck, University of London |
| Allyson | Stuart | Charleston School of Law |
| Wanling | Su | Indiana |
| Chen | Sun | University of Iowa |
| Simon | Sun | National Yang Ming Chiao Tung University School of Law |
| Daniel | Susser | Cornell University |
| Christian Wiese | Svanberg | DLA Piper – Copenhagen |
| Peter | Swire | Georgia Tech School of Cybersecurity and Privacy |
| Celine | Takatsuno | Tech Matters | University of the Pacific |
| Zahra | Takhshid | University of Denver |
| Shauhin | Talesh | University of California, Irvine |
| Victoria | Tang | Boston University School of Law |
| Ayelet | Tapiero | Hebrew University |
| Shreya | Tewari | NACDL |
| Yuan | Tian | UCLA |
| Charlotte | Tschider | Loyola University Chicago School of Law |
| Wayne | Unger | Quinnipiac University School of Law |
| Jennifer | Urban | Berkeley Law |
| Jeffrey | Vagle | Georgia State University College of Law |
| Siva | Vaidhyanathan | University of Virginia |
| Amelia | Vance | Public Interest Privacy Center and William & Mary Law School |
| Salome | Viljoen | University of Michigan |
| Ari | Waldman | University of California, Irvine |
| Arti | Walker-Peddakotla | University of Wisconsin Law |
| jordan | Wallace-Wolf | university of Arkansas Little Rock |
| Sarah | Wang | New York University |
| Anne | Washington | New York University |
| Madalyn | Wasilczuk | University of South Carolina Joseph F. Rice School of Law |
| Kate | weisburd | UC Law SF |
| Peter | Winn | U.S. Department of Justice |
| Richmond | Wong | Georgia Institute of Technology |
| Allison | Woodruff | |
| Felix | Wu | Cardozo School of Law |
| Xiaowei | Yu | The University of Illinois |
| Elana | Zeide | University of Nebraska |
| Stav | Zeitouni | UC Berkeley |
| Tianyi | Zhu | Peking University |
| Alessia | Zornetta | UCLA |
| carleen | zubrzycki | university of connecticut school of law |
| Cobun | Zweifel-Keegan | IAPP |