PLSC with title2

BCLT - Gray and Black   GW

The George Washington University Marvin Center
800 21st St NW
Washington, D.C. 20052



Thursday, June 2, 2016

[Thursday Program PDF]


8:30 AM // Breakfast

 Grand Ballroom

9:00 AM // Welcoming Remarks

9:15 AM – 10:30 AM // Workshop 1

Performative Privacy, by Scott Skinner-Thompson, New York University School of Law. Comment by Peter Winn 301
Engineering Humans with Contracts, by Brett Frischmann, Cardozo Law; Evan Selinger, RIT. Comment by Lauren Henry Scholz 302
Designing Privacy Policies, by Ari Waldman, New York Law School. Comment by Bill McGeveran 307
Cost-Benefit Analysis, Precautionary Principles, and Counterterrorism Surveillance, by Katherine Strandburg, NYU School of Law. Comment by Irina Manta 405
Another Shot at Technological Exceptionalism: Legal Constructions of Novelty from Brownies to Drones, by Meg Jones, Georgetown University. Comment by Dan Bouk 310
The Internet of Bodies, by Andrea Matwyshyn, Northeastern/Princeton/Stanford. Comment by Jay Kesan 403
Algorithms and the Law, by Deven Desai, Georgia Institute of Technology, Scheller College of Business; Joshua Kroll, Center for Information Technology Policy, Princeton. Comment by Christo Wilson 407
Critical Data Theory, by Margaret Hu, Washington and Lee School of Law. Comment by Kate Crawford 402-404
The Privacy Policymaking of State Attorneys General, by Danielle Citron, University of Maryland School of Law. Comment by Julie Brill Continental Ballroom

11:00 AM – 12:15 PM // Workshop 2

PrIncipedia: A Privacy Incidents Encyclopedia, by Jessica Staddon, N. C. State; Heather Lipford, UNCC; Bart Knijnenburg, Clemson University. Comment by Anne Washington 302
In the Public Interest – The Privacy Implications of International Business-to-Business Sharing of Cyber-Threat Intelligence, by Clare Sullivan, Law Center, Georgetown University; Eric Burger, Dept Computer Science, Georgetown University. Comment by Alvaro Bedoya 307
UnMarginalizing Workers: How Big Data Drives Lower Wages and How Reframing Labor Law Can Restore Information Parity and Equality in the Workplace, by Nathan Newman, Data Justice. Comment by Peter Swire 405
“I’ll See”: How Surveillance Undermines Privacy By Eroding Trust, by Robert Sloan, Computer Science, UIC; Richard Warner, Chicago-Kent College of Law. Comment by Jocelyn Aqua 310
Technical Standards and Privacy Law, by Aaron Massey, University of Maryland, Baltimore County. Comment by Tara Whalen. 403
The Declining Significance of Home: Privacy “Whilst Quiet” and of No Use to Artists or Anyone, by Anita Allen, University of Pennsylvania. Comment by Danielle Citron 407
Privacy of Public Data, by Kirsten Martin, George Washington University; Helen Nissenbaum, New York University. Comment by Felix Wu 402-404
Privacy and Data Security Harms, by Daniel Solove, GW Law School; Danielle Citron, U. Maryland Law School. Comment by Joel Reidenberg Continental Ballroom

12:15 PM – 2:00 PM // Lunch

(There is no keynote this year.)

Grand Ballroom

2:00 PM – 3:15 PM // Workshop 3

Policy Recommendations for Use of Learning Analytics in Higher Education, by Alan Rubel, University of Wisconsin-Madison; Kyle Jones, University of Wisconsin-Madison. Comment by Elana Zeide


Privacy in Service-Oriented Architectures Or Privacy After the Agile Turn, by Seda Gürses, Princeton; Joris Van Hoboken, NYU. Comment by Deborah Hurley


Plausible Cause, by Kiel Brennan-Marquez, New York University. Comment by Andrew Ferguson


Knowledge and Fourth Amendment Privacy, by Matthew Tokson, Salmon P. Chase College of Law, Northern Kentucky University. Comment by Bryan Choi


The Value of Respect: Reclaiming the Philosophical and Political Foundations of Informed Consent, by Elaine Sedenberg, UC Berkeley School of Information; Anna Lauren Hoffmann, UC Berkeley School of Information. Comment by Luke Stark


Privacy as Europe’s First Amendment, by Bilyana Petkova, EUI. Comment by Samantha Barbas


“Proof of Work”: Learning from Computer Scientific Approaches to Desirable Inefficiency, by Paul Ohm, Georgetown University Law Center; Jonathan Frankle, Georgetown University Law Center. Comment by Arvind Narayan


Limitless Worker Surveillance, by Ifeoma Ajunwa, University of the District of Columbia; Kate Crawford, Microsoft Research; Jason Schultz, NYU Law School. Comment by Cheryl Brown


Bridging the Gap between Computer Science and Legal Approaches to Privacy, by Kobbi Nissim, Center for Research on Computation and Society (Harvard University); Aaron Bembenek; Alexandra Wood, Berkman Center for Internet & Society; Mark Bun, Marco Gaboardi, Urs Gasser, David R. O’Brien, Thomas Steinke, and Salil Vadhan. Comment by Jody Blanke


Who Benefits From Targeted Advertising?, by Veronica Marotta, CMU; Kaifu Zhang, CMU; Alessandro Acquisti, CMU. Comment by Andrew Odlyzko

Continental Ballroom

3:30 PM – 4:45 PM // Workshop 4

Regulatory Data Mandates and Administrative Searches, by Gautam Hans, Center for Democracy & Technology. Comment by Meg Young 301
Online Price Discrimination and EU Data Privacy Law, by Frederik Zuiderveen Borgesius & Joost Poort, IViR Institute for Information Law, Amsterdam. Comment by Andrew Selbst 302
“If these Canadians lived in the United States, how would they protect their privacy? The Functional Equivalence of Privacy Redress Mechanisms in Canada and the US,” by Priscilla Regan, George Mason University; Colin Bennett, University of Victoria, BC; Robin M. Bayley, Linden Consulting. Comment by Bob Gellman 307
Privacy, The Philosopher’s Stone, and the Delusions of ‘Balancing,’ by James Rule, UC Berkeley Law. Comment by Seda Gurses 405
Measuring Privacy Control and Risk from the Users Perspective, by Masooda Bashir, UIUC; Hsiao-Ying Huang, UIUC. Comment by Pam Dixon 310
The Effect of Legislation on Fourth Amendment Protection, by Orin Kerr, George Washington University Law School. Comment by Catherine Crump 403
Privacy at Work: How Customer Tracking Implicates Workers, by Karen Levy, Cornell University / Data & Society Research Institute; Solon Barocas, Princeton University/Data & Society Research Institute. Comment by Mara Einstein 407
Taming the Golem: Challenges of Ethical Algorithmic Decision Making, by Omer Tene, IAPP; Jules Polonetsky, FPF. Comment by Joseph Turow 402-404
The Reputation Engine, by Julie Cohen, Georgetown Law. Comment by Gordon Hull Continental Ballroom

6:00 PM // Reception 

Both the reception and dinner will be at Sequoia Restaurant
Sequoia is located at the Washington Harbour
One can walk there from the Marvin Center (1 mile walk)
3000 K. St. NW, Washington, DC 20007 (202) 944–4200

6:45 PM // Dinner

To change things up, we’ll have several buffets and a mixed seating/standing format so that participants can mingle more easily.

Sequoia Restaurant


Friday, June 3, 2016

[Friday Program PDF]


8:30 AM // Breakfast

Grand Ballroom

9:00 AM – 10:15 AM // Workshop 5

The Upside of Monopolies in Data Privacy Law, by Ignacio Cofone, Yale Law School; Klaus Heine, Erasmus University. Comment by Siona Listokin 301
Where is the harm in a privacy violation? Calculating the damages afforded in privacy cases by the European Court of Human Rights, by Bart Van der Sloot, Institute for Information Law, University of Amsterdam. Comment by Gerald Stegmaier 302
Big Brother is Nudging You – Fundamental Rights and Democratic Principles in the Context of Nudging Strategies, by Eva Beyvers, DFG Research Training Group “Privacy”, University of Passau; Henning Hofmann, DFG Research Training Group “Privacy”, University of Passau. Comment by Anna Slomovic 307
Redefining Cybersecurity, by David Thaw, University of Pittsburgh. Comment by Serge Egelman 405
Privacy Crimes, by Bryce Newell, Tilburg Institute for Law, Technology, and Society (TILT); Bert-Jaap Koops, Tilburg Institute for Law, Technology, and Society (TILT); Ivan Škorvánek, Tilburg Institute for Law, Technology, and Society (TILT); Andrew Roberts, Melbourne Law School, University of Melbourne (Australia); Maša Galič, Tilburg Institute for Law, Technology, and Society (TILT); Tomislav Chokrevski, Tilburg Institute for Law, Technology, and Society (TILT). Comment by Mary Leary 310
Privacy and Court Records: Online Access and the Loss of Practical Obscurity, by David Ardia, UNC School of Law. Comment by Robert Deyling 403
An Expressive Theory of Privacy Intrusions, by Craig Konnoth. Comment by Laura Donohue 407
Privacy’s Blueprint: The Battle to Control the Design of New Technologies, by Woodrow Hartzog, Samford University’s Cumberland School of Law. Comment by Lorrie Cranor 402-404
Privacy and the Future of the Cloud, by Neil Richards, Washington University Law. Comment by Ed McNicholas Continental Ballroom

10:45 AM – 12:00 PM // Workshop 6

CalECPA: Putting Communications Privacy Law Reform in Context, by Susan Freiwald, USF School of Law. Comment by Ron Lee 308
News Readers’ Privacy and Fair Algorithmic Media Practices: Lessons to be Learned from Media Law and Theory, by Natali Helberger, UvA. Comment by Jasmine McNeal 301
The Hidden Human Rights Curriculum of Surveillance Cameras in Schools, by Michael Birnhack, Tel Aviv University; Lotem Perry-Hazan, Haifa University. Comment by Chris Conley 302
A User-Centered Perspective on Algorithmic Personalization, by Alethea Lange, Center for Democracy & Technology; Rena Coen, University of California, Berkeley School of Information; Emily Paul, University of California, Berkeley School of Information; Pavel Vanessa, University of California, Berkeley School of Information; Gautam Hans, Center for Democracy & Technology. Comment by Jeff Jonas 307
OWNED: How the Internet of Things Took Our Property and Privacy (Chapter 5: “Private Property”), by Joshua Fairfield, Washington & Lee University School of Law. Comment by Edina Harbinja 405
Privacy Restrictions and Contextual Harm: A Contribution to Social Theories of Privacy, by Mark MacCarthy, Georgetown University. Comment by Arnold Roosndaal 310
The Credentialing Effect: Psychological Implications of Ubiquitous Capture and Constant Assessment, by Elana Zeide, New York University. Comment by Dawn Schrader 403
Cybersecurity and Internet Stewardship, by Jeffrey Vagle, University of Pennsylvania Law School. Comment by Deirdre Mulligan 407
The Class Differential in Privacy Vulnerability, by Mary Madden, Data & Society Research Institute; Michele Gilman, University of Baltimore; Karen Levy, Cornell University; Alice Marwick, Fordham University. Comment by Seeta Gangadharan 402-404
(Encore) Privacy and Data Security Harms, by Daniel Solove, GW Law School; Danielle Citron, U. Maryland Law School. Comment by Will DeVries Continental Ballroom

12:00 PM – 1:15 PM // Lunch

 Grand Ballroom

1:15 PM – 2:30 PM // Workshop 7

“Substantial Injury” in Information Security Incidents After LabMD, by Reed Rubinstein, Dinsmore; Jon Neiditz, Kilpatrick Townsend. Comment by Ryan Calo 302
Does Rejection of the Third Party Doctrine Change Use of Electronic Surveillance?  Evidence from the Wiretap Reports, by Anne Boustead, Pardee RAND Graduate School. Comment by Brian Owsley 307
Smart Homes Strike Back: A New Hope for the Fourth Amendment, by Joseph Jerome, WilmerHale; Stacey Gray, Future of Privacy Forum. Comment by Jay Stanley 405
A Defense of Privacy as the Central Value Protected by the Fourth Amendment’s Prohibition on Unreasonable Searches, by Christopher Slobogin, Vanderbilt. Comment by Amitai Etzioni 310
“Nobody sees it, nobody gets mad”: Social Media, Privacy, and Personal Responsibility Among Low-SES Youth, by Alice Marwick, Fordham University; Claire Fontaine, Data & Society; Danah Boyd, Data & Society. Comment by Yang Wang 403
Privacy and the Right to Record, by Margot Kaminski, The Ohio State University Moritz College of Law. Comment by Heather Shoenberger 407
Notice After Notice-and-Consent, by Daniel Susser, NYU Information Law Institute. Comment by David Medine 402-404
(Encore) What is Private about ‘Public’ Data?, by Kirsten Martin, George Washington University; Helen Nissenbaum, New York University. Comment by David Gray Continental Ballroom

3:00 PM– 4:15 PM // Workshop 8

Privacy and Remote Sensing Satellites, by Juan Gonzalez Allonca, Universidad de Buenos Aires. Comment by Khaliah Barnes 301
Saving Face: The Screen of Chinese Privacy Law Unfolds, by Jill Bronfman, University of California Hastings College of the Law. Comment by Malavika Jayaram 302
Quantifying Criminal Procedure: How to Unlock the Potential of Big Data in our Criminal Justice System, by Ric Simmons, Moritz College of Law The Ohio State University. Comment by Judge Stephen Smith 307
Platforms and the Privacy Ecosystem: The Construction of Privacy in iOS and Android Development, by Daniel Greene, University of Maryland; Katie Shilton, University of Maryland. Comment by Michael Zimmer 405
Privacy and Accountability in Black-Box Medicine, by Roger Ford, University of New Hampshire School of Law; W. Nicholson Price II, University of Michigan School of Law. Comment by Maya Bernstein 310
Cross-Context Tracking, Cross-Device Tracking, and a Market Definition Test for What Constitutes a Privacy Context, by Peter Swire, GA Tech; Justin Hemmings, GA Tech. Comment by James Grimmelmann 403
Privacy and Power: The Rule of Law in the Information State, by Lisa Austin, University of Toronto Faculty of Law. Comment by Alan Rubel 407
Building Privacy into the Infrastructure: Towards a New Identity Management Architecture, by A. Michael Froomkin, U Miami School of Law. Comment by David Thaw 402-404
Data Driven Discrimination at Work, by Pauline Kim, Washington University School of Law. Comment by Danah Boyd Continental Ballroom