The 10th annual Privacy Law Scholars Conference occurred on Thursday, June 1st, 2017 and Friday, June 2nd, 2017, was hosted by University of California, Berkeley, with a pre-conference event on Wednesday, May 31st, 2017 sponsored by Microsoft.
Awards
PLSC Junior Scholars Award
2017 recipients of the PLSC Junior Scholars Award:
Roger Ford, “Data Scams”, citation: TBD
Sebastian Benthall, Seda Gürses, Helen Nissenbaum, “Contextual Integrity through the Lenses of Computer Science“, citation: Sebastian Benthall, Seda Gürses and Helen Nissenbaum (2017), “Contextual Integrity through the Lens of Computer Science”, Foundations and Trends® in Privacy and Security: Vol. 2: No. 1, pp 1-69.
International Association of Privacy Professionals Paper Award
Pre-PLSC event sponsored by Microsoft. We had a discussion and reception from 6–8:30 PM on May 31st, 2017 with a panel discussion at 6:30 PM led by Danielle Citron and Ryan Calo, joined by Kristen Eichensehr, Amanda Levendowski, and Christian Svanberg.
California Memorial Stadium, University Club, 2227 Piedmont Ave., Berkeley, CA 94720
Conference Agenda
Thursday, June 1st, 2017 (Claremont Hotel)
8:30–9:15 Breakfast, Claremont Ballroom
9:05 Welcoming Remarks
9:15–10:30 Workshop 1
Electronic Monitoring Programs in the Juvenile Justice System, by Catherine Crump, Christina Koningisor, UC Berkeley Law. Comment by Brian Owsley
Cabernet
Algorithmic Jim Crow and Extreme Vetting, by Margaret Hu, Washington and Lee School of Law. Comment by Jennifer Granick
Chardonnay
Empirical Measurement of Perceived Privacy Risk, by Jaspreet Bhatia, Travis Breaux, Carnegie Mellon University. Comment by Ashkan Soltani
Alumni Room
Contextual Integrity through the Lenses of Computer Science, by Sebastian Benthall, NYU Steinhardt; Seda Gürses, Princeton; Helen Nissenbaum, New York University. Comment by Blasé Ur
Mendocino
Algorithmic Civil Rights, by Sonia Katyal, UC Berkeley Law. Comment by Danielle Citron.
Monterey
The Needed Redesign of U.S. Privacy Policy Institutions, by David Hyman, Georgetown University Law Center; William Kovacic, George Washington University. Comment by Bob Gellman
Napa 1&2
Towards A Data Ethic for the Public Interest, by Joe Jerome, Natasha Duarte, Center for Democracy & Technology; Brenda Leong, Future of Privacy Forum. Comment by Claire Sullivan
Napa 3
On Extending Minds and Mind Control, by Brett Frischmann, Cardozo Law; Evan Selinger, RIT. Comment by Anna Lauren Hoffman
Lanai
The Celebrity Stock Market , by Victoria Schwartz, Pepperdine University School of Law. Comment by Amanda Conley
Sonoma
10:30–11:00 Break
11:00–12:15 Workshop 2
Better Together: Privacy Regulation and Innovation Policy, by Yafit Lev-Aretz, Katherine Strandburg, Grace Ha, NYU School of Law. Comment by BJ Ard
Cabernet
Equal Protection Privacy, by Scott Skinner-Thompson, University of Colorado School of Law. Comment by danah boyd
Chardonnay
Just Because it Looks Anonymous Doesn’t Make it So: re-identifications of “anonymized” law school data, by Latanya Sweeney, Data Privacy Lab at Harvard University; Michael von Loewenfeldt & Melissa Perry, Kerr & Wagstaffe LLP. Comment by Jane Bambauer
Alumni Room
Revisiting ‘The Governance of Privacy’, by Colin Bennett, University of Victoria, BC; Charles Raab, University of Edinburgh. Comment by Dennis Hirsch
Mendocino
The perfect match? A closer look at the relationship between EU consumer law and data protection law, by Natali Helberger, Frederik Zuiderveen Borgesius, Institute for Information Law, (IViR) ; Agustin Reyna, European Consumer Organisation – BEUC. Comment by Julie Brill
Monterey
Hypernudge or Hyperpush? Personalization, persuasion and privacy in self-tracking technologies, by Marjolein Lanzing, TU Eindhoven. Comment by Daniel Susser
Napa 1&2
Protecting Privacy with Fourth Amendment Use Restrictions, by Rebecca Lipman, NYC Law Department. Comment by Richard Re
Napa 3
Personalized Learning & Robot Teaching as Public School Infrastructure, by Elana Zeide, New York University. Comment by Allison Woodruff
Lanai
Big Data and the Dispossession of Preference, by Gordon Hull, University of North Carolina Charlotte. Comment by Lauren Willis
Sonoma
12:15–1:45 Lunch and Break, Claremont Ballroom
1:45–3:00 Workshop 3
Cabernet
Privacy as Commons: Case Evaluation through the Governing Knowledge Commons Framework, by Madelyn Sanfilippo, Information Law Institute, New York University; Brett Frischmann, Cardozo Law; Katherine Strandburg, NYU School of Law. Comment by Amy Kristin Sanders
Chardonnay
The Myth of Fourth Amendment Circularity, by Matthew Kugler, Northwestern University; Lior Strahilevitz, University of Chicago. Comment by Tim Casey
Alumni Room
The Metacognitive Experience of Privacy Decision-Making: How Subtle Trust Cues Affect Disclosure Decisions and Behavioral Intentions, by James Mourey, DePaul University College of Business; Ari Waldman, New York Law School. Comment by Gaia Bernstein
Mendocino
Borders and Bits, by Jennifer Daskal, American University Washington College of Law. Comment by Anupam Chander
Monterey
Structuring Transatlantic Data Privacy Law, by Paul Schwartz, UC Berkeley Law; Karl-Nikolaus Peifer, University of Cologne. Comment by Kurt Wimmer
Napa 1&2
Privacy Interests in Public Spaces, by Kirsten Martin, George Washington University; Helen Nissenbaum, New York University. Comment by Frederik Zuiderveen Borgesius
Napa 3
Disparate Impact in Big Data Policing, by Andrew Selbst, Yale ISP. Comment by Micah Altman
Lanai
The Taking Economy: Uber, Information, and Power, by Ryan Calo, University of Washington; Alex Rosenblat, Data & Society. Comment by Terrell McSweeny
Sonoma
3:00–3:30 Break
3:30–4:45 Workshop 4
Cabernet
Differential Privacy: A Primer for a Non-technical Audience, by Kobbi Nissim, Georgetown University; Thomas Steinke, Alexandra Wood,Harvard University; Micah Altman, MIT; Aaron Bembenek, Mark Bun, Harvard University; Marco Gaboardi, SUNY-Buffalo; David R. O’Brien, and Salil Vadhan, Harvard University. Comment by Tara Whalen
Chardonnay
Reconciling trade and privacy concerns in EU – U.S. context, by Svetlana Yakovleva, Institute for Information Law (IViR), Amsterdam. Comment by Peter Swire
Alumni Room
Privacy & the New Behaviorism (Same as the Old Behaviorism), by Luke Stark, Dartmouth College. Comment by Richard Warner
Mendocino
Mobile App Privacy Compliance: Automated Technology to Help Regulators, App Stores and Developers, by Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman Sadeh, Steven M. Bellovin, and Joel Reidenberg. Comment by Serge Egelman
Monterey
Undue Influence: Surveillance Technology Company Constraints on Policing, by Elizabeth Joh, UC Davis School of Law. Comment by Christian Wiese Svanberg
Napa 1&2
Metadata and its (Dis)contents: Fourth Amendment Doctrine for a Big Data Age, by Kiel Brennan-Marquez, NYU School of Law; Paula Kift, NYU School of Media, Culture and Communications; Helen Nissenbaum, Cornell Tech; Katherine Strandburg, NYU School of Law. Comment by Susan Freiwald
Napa 3
Anti-discriminatory Privacy, by Ignacio Cofone, Yale Law School. Comment by Alan Rubel
Lanai
An Ethical Guide to Research Using Leaked Data, by Anne Boustead, Trey Herr, Belfer Center, Harvard Kennedy School. Comment by Scott Mulligan
Sonoma
5:30–6:30 Reception, Claremont Hotel
6:45–9:00 Dinner, Claremont Ballroom
Friday, June 2nd 2017
8:30–9:15 Breakfast, Claremont Ballroom
9:05 Welcoming Remarks
9:15–10:30 Workshop 5
Cabernet
Chardonnay
Alchemy or Chemistry? The Legitimacy of Data Analytics, by Anne Washington, George Mason University. Comment by David Robinson
Alumni Room
Sacred Homes or Glass Houses? Limits on Law Enforcement Surveillance of the Home from the Outside, by Bryce Newell, Bert-Jaap Koops, Ivan Škorvánek, Maša Galič, Tjerk Timan, Tilburg Institute for Law, Technology, and Society (TILT); Andrew Roberts, Melbourne Law School, University of Melbourne. Comment by Steven Smith
Mendocino
Quantifying the Value of Privacy – More than a Peppercorn? How can you tell?, by Hank Fishkind, Fishkind & Associates, Inc. Comment by Edina Harbinja
Monterey
The Ethics of the Crypto Wars, by Stephanie K. Pell, Richard Schoonhoven, US Military Academy, West Point. Comment by Sharon Bradford Franklin
Napa 1&2
Slave to the Algo-Rhythm? Why a ‘right to an explanation’ is probably not the remedy you are looking for, by Lilian Edwards, Strathclyde University; Michael Veale, UCL. Comment by Julie Cohen
Napa 3
Designing Without Privacy, by Ari Waldman, New York Law School. Comment by Harry Surden
Lanai
Why Privacy Matters, by Neil Richards, Washington University Law. Comment by Joshua Fairfield
Sonoma
10:30–11:00 Break
11:00–12:15 Workshop 6
Toward Origin Privacy, by Sebastian Benthall, NYU Steinhardt; Anupam Datta, Carnegie Mellon University; Michael Tschantz, International Computer Science Institute. Comment by Michael Hintze
Cabernet
An Empirical Investigation of Cy Pres Awards in Privacy Class Actions, by James Graves, EPIC; Marc Rotenberg, EPIC. Comment by Edward McNicholas
Chardonnay
Data Scams, by Roger Ford, University of New Hampshire School of Law. Comment by Emily McReynolds
Alumni Room
Private Searches and the Fourth Amendment: Developing an Objective Framework for Agency Analysis in Computer Crime Cases, by Jeff Kosseff, U.S. Naval Academy. Comment by Ron Lee
Mendocino
The Algorithm Game, by Jane Bambauer, University of Arizona; Tal Zarsky, University of Haifa – Faculty of Law. Comment by Solon Barocas
Monterey
The Surveillance Gap, by Michele Gilman, University of Baltimore; Rebecca Green, William & Mary Law School. Comment by Gautham Hans
Napa 1&2
Encryption Workarounds, by Orin Kerr, George Washington University Law School; Bruce Schneier, Belfer Center for Science and International Affairs, Harvard Kennedy School. Comment by Kristen Eichensehr
Napa 3
Privacy, Press, and a Right to Be Forgotten in the United States, by Amy Gajda, Tulane Law School. Comment by Alexander Tsesis
Lanai
The Public Information Fallacy, by Woodrow Hartzog, Samford University’s Cumberland School of Law. Comment by Victoria Baranetsky
Sonoma
12:15–1:15 Lunch, Claremont Ballroom
1:15–2:30 Workshop 7
The Interface Between Trade and Privacy: The European Union’s Governance of Transnational Privacy and External Trade, by Kristina Irion and Svetlana Yakovleva, Institute for Information Law (IViR). Comment by Colin Bennett
Cabernet
Recognizing Speakers and Respecting Privacy, by Dorothy J. Glancy, Santa Clara University School of Law; James L. Wayman, San Jose State University. Comment by Anne McKenna
Chardonnay
Fourth Amendment Anxiety, by Kiel Brennan-Marquez, NYU; Stephen Henderson, The University of Oklahoma. Comment by Jennifer Daskal
Alumni Room
Evaluating national “Digital ID” systems on privacy and human rights safeguards, by Nathalie Maréchal, USC. Comment by Pam Dixon
Mendocino
Privacy Protective Research: Facilitating Ethically Responsible Access to Administrative Data, by Omer Tene, IAPP; Jules Polonetsky, FPF; Daniel Goroff, Alfred P. Sloan Foundation. Comment by Katie Shilton
Monterey
The Duty of Data Security, by William McGeveran, University of Minnesota Law School. Comment by David Thaw
Napa 1&2
Standards of Fairness for Disparate Impact Assessment of Big Data Algorithms, by Mark MacCarthy, Georgetown University. Comment by Tal Zarsky
Napa 3
Data Collection and Data Use: Evidence from the Android App Market, by Siona Listokin, George Mason University. Comment by Will DeVries
Lanai
Toward the Ethical Engineer: Promoting Ethics Education for Computer Science Students, by John K. Grant, Palantir Technologies. Comment by Lance Hoffmann
Sonoma
2:30–2:45 Short Break
2:45–4:00 Workshop 8
An Exploration of Predictability and Privacy: Meaning and Effect, by Janine Hiller, Virginia Tech; Jody Blanke, Mercer University. Comment by Jocelyn Aqua
Cabernet
Conflict Modeling, by Amanda Levendowski, NYU Law. Comment by Trey Herr
Chardonnay
How Private Law Can Make Corporate Privacy Policies an Instrument for Regulating Misuse of Personal Data, by Mark P. Gergen, UC Berkeley. Comment by Woodrow Hartzog
Alumni Room
The Absence of Privacy in the Right to Privacy, by Kirsty Hughes, University of Cambridge. Comment by Priscilla Regan
Mendocino
Institutionalized Privacy: A Typology of Privacy in Nursing Home Electronic Monitoring Laws, by Karen Levy, Cornell University; Clara Berridge, University of Washington; Lauren Kilgour, Cornell University. Comment by D.R. Jones
Monterey
Privacy Localism, by Ira Rubinstein, NYU School of Law. Comment by Jan Whittington
Napa 1&2
Surveillance and Transparency Since the Sixties, by Sarah Igo, Vanderbilt University. Comment by Neil Richards
Napa 3
Regulating Inscrutable Systems, by Andrew D. Selbst, Yale ISP; Solon Barocas, Microsoft Research/Cornell University. Comment by Rónán Kennedy
Lanai
Uncrunched: Algorithms, Decisionmaking, and Privacy, by Derek Bambauer, University of Arizona. Comment by Felix Wu