PLSC 2017

The 10th annual Privacy Law Scholars Conference occurred on Thursday, June 1st, 2017 and Friday, June 2nd, 2017, was hosted by University of California, Berkeley, with a pre-conference event on Wednesday, May 31st, 2017 sponsored by Microsoft.


PLSC Junior Scholars Award

2017 recipients of the PLSC Junior Scholars Award:

  • Roger Ford, “Data Scams”, citation: TBD
  • Sebastian Benthall, Seda Gürses, Helen Nissenbaum, “Contextual Integrity through the Lenses of Computer Science“, citation: Sebastian Benthall, Seda Gürses and Helen Nissenbaum (2017), “Contextual Integrity through the Lens of Computer Science”, Foundations and Trends® in Privacy and Security: Vol. 2: No. 1, pp 1-69.

International Association of Privacy Professionals Paper Award

2017 recipient of the IAPP Paper Award:

Pre-Conference Event

Pre-PLSC event sponsored by Microsoft. We had a discussion and reception from 6–8:30 PM on May 31st, 2017 with a panel discussion at 6:30 PM led by Danielle Citron and Ryan Calo, joined by Kristen Eichensehr, Amanda Levendowski, and Christian Svanberg.

California Memorial Stadium, University Club, 2227 Piedmont Ave., Berkeley, CA 94720

Conference Agenda

Thursday, June 1st, 2017 (Claremont Hotel)

8:30–9:15 Breakfast, Claremont Ballroom

9:05 Welcoming Remarks

9:15–10:30 Workshop 1

Electronic Monitoring Programs in the Juvenile Justice System, by Catherine Crump, Christina Koningisor, UC Berkeley Law. Comment by Brian OwsleyCabernet
Algorithmic Jim Crow and Extreme Vetting, by Margaret Hu, Washington and Lee School of Law. Comment by Jennifer GranickChardonnay
Empirical Measurement of Perceived Privacy Risk, by Jaspreet Bhatia, Travis Breaux, Carnegie Mellon University. Comment by Ashkan SoltaniAlumni Room
Contextual Integrity through the Lenses of Computer Science, by Sebastian Benthall, NYU Steinhardt; Seda Gürses, Princeton; Helen Nissenbaum, New York University. Comment by Blasé UrMendocino
Algorithmic Civil Rights, by Sonia Katyal, UC Berkeley Law. Comment by Danielle Citron.Monterey
The Needed Redesign of U.S. Privacy Policy Institutions, by David Hyman, Georgetown University Law Center; William Kovacic, George Washington University. Comment by Bob GellmanNapa 1&2
Towards A Data Ethic for the Public Interest, by Joe Jerome, Natasha Duarte, Center for Democracy & Technology; Brenda Leong, Future of Privacy Forum. Comment by Claire SullivanNapa 3
On Extending Minds and Mind Control, by Brett Frischmann, Cardozo Law; Evan Selinger, RIT. Comment by Anna Lauren HoffmanLanai
The Celebrity Stock Market , by Victoria Schwartz, Pepperdine University School of Law. Comment by Amanda ConleySonoma

10:30–11:00 Break

11:00–12:15 Workshop 2

Better Together: Privacy Regulation and Innovation Policy, by Yafit Lev-Aretz, Katherine Strandburg, Grace Ha, NYU School of Law. Comment by BJ ArdCabernet
Equal Protection Privacy, by Scott Skinner-Thompson, University of Colorado School of Law. Comment by danah boydChardonnay
Just Because it Looks Anonymous Doesn’t Make it So: re-identifications of “anonymized” law school data, by Latanya Sweeney, Data Privacy Lab at Harvard University; Michael von Loewenfeldt & Melissa Perry, Kerr & Wagstaffe LLP. Comment by Jane BambauerAlumni Room
Revisiting ‘The Governance of Privacy’, by Colin Bennett, University of Victoria, BC; Charles Raab, University of Edinburgh. Comment by Dennis HirschMendocino
The perfect match? A closer look at the relationship between EU consumer law and data protection law, by Natali Helberger, Frederik Zuiderveen Borgesius,  Institute for Information Law, (IViR) ; Agustin Reyna, European Consumer Organisation – BEUC. Comment by Julie BrillMonterey
Hypernudge or Hyperpush? Personalization, persuasion and privacy in self-tracking technologies, by Marjolein Lanzing, TU Eindhoven. Comment by Daniel SusserNapa 1&2
Protecting Privacy with Fourth Amendment Use Restrictions, by Rebecca Lipman, NYC Law Department. Comment by Richard ReNapa 3
Personalized Learning & Robot Teaching as Public School Infrastructure, by Elana Zeide, New York University. Comment by Allison WoodruffLanai
Big Data and the Dispossession of Preference, by Gordon Hull, University of North Carolina Charlotte. Comment by Lauren WillisSonoma

12:15–1:45 Lunch and Break, Claremont Ballroom

1:45–3:00 Workshop 3

Privacy as Commons: Case Evaluation through the Governing Knowledge Commons Framework, by Madelyn Sanfilippo, Information Law Institute, New York University; Brett Frischmann, Cardozo Law; Katherine Strandburg, NYU School of Law. Comment by Amy Kristin SandersChardonnay
The Myth of Fourth Amendment Circularity, by Matthew Kugler, Northwestern University; Lior Strahilevitz, University of Chicago. Comment by Tim CaseyAlumni Room
The Metacognitive Experience of Privacy Decision-Making: How Subtle Trust Cues Affect Disclosure Decisions and Behavioral Intentions, by James Mourey, DePaul University College of Business; Ari Waldman, New York Law School. Comment by Gaia BernsteinMendocino
Borders and Bits, by Jennifer Daskal, American University Washington College of Law. Comment by Anupam ChanderMonterey
Structuring Transatlantic Data Privacy Law, by Paul Schwartz, UC Berkeley Law; Karl-Nikolaus Peifer, University of Cologne. Comment by Kurt WimmerNapa 1&2
Privacy Interests in Public Spaces, by Kirsten Martin, George Washington University; Helen Nissenbaum, New York University. Comment by Frederik Zuiderveen BorgesiusNapa 3
Disparate Impact in Big Data Policing, by Andrew Selbst, Yale ISP. Comment by Micah AltmanLanai
The Taking Economy: Uber, Information, and Power, by Ryan Calo, University of Washington; Alex Rosenblat, Data & Society. Comment by Terrell McSweenySonoma

3:00–3:30 Break

3:30–4:45 Workshop 4

Differential Privacy: A Primer for a Non-technical Audience, by Kobbi Nissim, Georgetown University; Thomas Steinke, Alexandra Wood,Harvard University; Micah Altman, MIT; Aaron Bembenek, Mark Bun, Harvard University; Marco Gaboardi, SUNY-Buffalo; David R. O’Brien, and Salil Vadhan, Harvard University. Comment by Tara WhalenChardonnay
Reconciling trade and privacy concerns in EU – U.S. context, by Svetlana Yakovleva, Institute for Information Law (IViR), Amsterdam. Comment by Peter SwireAlumni Room
Privacy & the New Behaviorism (Same as the Old Behaviorism), by Luke Stark, Dartmouth College. Comment by Richard WarnerMendocino
Mobile App Privacy Compliance: Automated Technology to Help Regulators, App Stores and Developers, by Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman Sadeh, Steven M. Bellovin, and Joel Reidenberg. Comment by Serge EgelmanMonterey
Undue Influence: Surveillance Technology Company Constraints on Policing, by Elizabeth Joh, UC Davis School of Law. Comment by Christian Wiese SvanbergNapa 1&2
Metadata and its (Dis)contents: Fourth Amendment Doctrine for a Big Data Age, by Kiel Brennan-Marquez, NYU School of Law; Paula Kift, NYU School of Media, Culture and Communications; Helen Nissenbaum, Cornell Tech; Katherine Strandburg, NYU School of Law. Comment by Susan FreiwaldNapa 3
Anti-discriminatory Privacy, by Ignacio Cofone, Yale Law School. Comment by Alan RubelLanai
An Ethical Guide to Research Using Leaked Data, by Anne Boustead, Trey Herr, Belfer Center, Harvard Kennedy School. Comment by Scott MulliganSonoma

5:30–6:30 Reception, Claremont Hotel

6:45–9:00 Dinner, Claremont Ballroom

Friday, June 2nd 2017

8:30–9:15 Breakfast, Claremont Ballroom

9:05 Welcoming Remarks

9:15–10:30 Workshop 5

Alchemy or Chemistry? The Legitimacy of Data Analytics, by Anne Washington, George Mason University. Comment by David RobinsonAlumni Room
Sacred Homes or Glass Houses? Limits on Law Enforcement Surveillance of the Home from the Outside, by Bryce Newell, Bert-Jaap Koops, Ivan Škorvánek, Maša Galič, Tjerk Timan, Tilburg Institute for Law, Technology, and Society (TILT); Andrew Roberts, Melbourne Law School, University of Melbourne. Comment by Steven SmithMendocino
Quantifying the Value of Privacy – More than a Peppercorn? How can you tell?, by Hank Fishkind, Fishkind & Associates, Inc. Comment by Edina HarbinjaMonterey
The Ethics of the Crypto Wars, by Stephanie K. Pell, Richard Schoonhoven, US Military Academy, West Point. Comment by Sharon Bradford FranklinNapa 1&2
Slave to the Algo-Rhythm? Why a ‘right to an explanation’ is probably not the remedy you are looking for, by Lilian Edwards, Strathclyde University; Michael Veale, UCL. Comment by Julie CohenNapa 3
Designing Without Privacy, by Ari Waldman, New York Law School. Comment by Harry SurdenLanai
Why Privacy Matters, by Neil Richards, Washington University Law. Comment by Joshua FairfieldSonoma

10:30–11:00 Break

11:00–12:15 Workshop 6

Toward Origin Privacy, by Sebastian Benthall, NYU Steinhardt; Anupam Datta, Carnegie Mellon University; Michael Tschantz, International Computer Science Institute. Comment by Michael HintzeCabernet
An Empirical Investigation of Cy Pres Awards in Privacy Class Actions, by James Graves, EPIC; Marc Rotenberg, EPIC. Comment by Edward McNicholasChardonnay
Data Scams, by Roger Ford, University of New Hampshire School of Law. Comment by Emily McReynoldsAlumni Room
Private Searches and the Fourth Amendment: Developing an Objective Framework for Agency Analysis in Computer Crime Cases, by Jeff Kosseff, U.S. Naval Academy. Comment by Ron LeeMendocino
The Algorithm Game, by Jane Bambauer, University of Arizona; Tal Zarsky, University of Haifa – Faculty of Law. Comment by Solon BarocasMonterey
The Surveillance Gap, by Michele Gilman, University of Baltimore; Rebecca Green, William & Mary Law School. Comment by Gautham HansNapa 1&2
Encryption Workarounds, by Orin Kerr, George Washington University Law School; Bruce Schneier, Belfer Center for Science and International Affairs, Harvard Kennedy School. Comment by Kristen EichensehrNapa 3
Privacy, Press, and a Right to Be Forgotten in the United States, by Amy Gajda, Tulane Law School. Comment by Alexander TsesisLanai
The Public Information Fallacy, by Woodrow Hartzog, Samford University’s Cumberland School of Law. Comment by Victoria BaranetskySonoma

12:15–1:15 Lunch, Claremont Ballroom

1:15–2:30 Workshop 7

The Interface Between Trade and Privacy: The European Union’s Governance of Transnational Privacy and External Trade, by Kristina Irion and Svetlana Yakovleva, Institute for Information Law (IViR). Comment by Colin BennettCabernet
Recognizing Speakers and Respecting Privacy, by Dorothy J. Glancy, Santa Clara University School of Law; James L. Wayman, San Jose State University. Comment by Anne McKennaChardonnay
Fourth Amendment Anxiety, by Kiel Brennan-Marquez, NYU; Stephen Henderson, The University of Oklahoma. Comment by Jennifer DaskalAlumni Room
Evaluating national “Digital ID” systems on privacy and human rights safeguards, by Nathalie Maréchal, USC. Comment by Pam DixonMendocino
Privacy Protective Research: Facilitating Ethically Responsible Access to Administrative Data, by Omer Tene, IAPP; Jules Polonetsky, FPF; Daniel Goroff, Alfred P. Sloan Foundation. Comment by Katie ShiltonMonterey
The Duty of Data Security, by William McGeveran, University of Minnesota Law School. Comment by David ThawNapa 1&2
Standards of Fairness for Disparate Impact Assessment of Big Data Algorithms, by Mark MacCarthy, Georgetown University. Comment by Tal ZarskyNapa 3
Data Collection and Data Use: Evidence from the Android App Market, by Siona Listokin, George Mason University. Comment by Will DeVriesLanai
Toward the Ethical Engineer: Promoting Ethics Education for Computer Science Students, by John K. Grant, Palantir Technologies. Comment by Lance HoffmannSonoma

2:30–2:45 Short Break

2:45–4:00 Workshop 8

An Exploration of Predictability and Privacy: Meaning and Effect, by Janine Hiller, Virginia Tech; Jody Blanke, Mercer University. Comment by Jocelyn AquaCabernet
Conflict Modeling, by Amanda Levendowski, NYU Law. Comment by Trey HerrChardonnay
How Private Law Can Make Corporate Privacy Policies an Instrument for Regulating Misuse of Personal Data, by Mark P. Gergen, UC Berkeley. Comment by Woodrow HartzogAlumni Room
The Absence of Privacy in the Right to Privacy, by Kirsty Hughes, University of Cambridge. Comment by Priscilla ReganMendocino
Institutionalized Privacy: A Typology of Privacy in Nursing Home Electronic Monitoring Laws, by Karen Levy, Cornell University; Clara Berridge, University of Washington; Lauren Kilgour, Cornell University. Comment by D.R. JonesMonterey
Privacy Localism, by Ira Rubinstein, NYU School of Law. Comment by Jan WhittingtonNapa 1&2
Surveillance and Transparency Since the Sixties, by Sarah Igo, Vanderbilt University. Comment by Neil RichardsNapa 3
Regulating Inscrutable Systems, by Andrew D. Selbst, Yale ISP; Solon Barocas, Microsoft Research/Cornell University. Comment by Rónán KennedyLanai
Uncrunched: Algorithms, Decisionmaking, and Privacy, by Derek Bambauer, University of Arizona. Comment by Felix WuSonoma

4:00 Closing Remarks, Claremont Ballroom