Agenda – PLSC 2017

 

Thursday, June 1st, 2017

8:30–9:15 Breakfast, Claremont Ballroom

9:05 Welcoming Remarks

9:15–10:30 Workshop 1

Electronic Monitoring Programs in the Juvenile Justice System, by Catherine Crump, Christina Koningisor, UC Berkeley Law. Comment by Brian Owsley Cabernet
Algorithmic Jim Crow and Extreme Vetting, by Margaret Hu, Washington and Lee School of Law. Comment by Jennifer Granick Chardonnay
Empirical Measurement of Perceived Privacy Risk, by Jaspreet Bhatia, Travis Breaux, Carnegie Mellon University. Comment by Ashkan Soltani Alumni Room
Contextual Integrity through the Lenses of Computer Science, by Sebastian Benthall, NYU Steinhardt; Seda Gürses, Princeton; Helen Nissenbaum, New York University. Comment by Blasé Ur Mendocino
Algorithmic Civil Rights, by Sonia Katyal, UC Berkeley Law. Comment by Danielle Citron. Monterey
The Needed Redesign of U.S. Privacy Policy Institutions, by David Hyman, Georgetown University Law Center; William Kovacic, George Washington University. Comment by Bob Gellman Napa 1&2
Towards A Data Ethic for the Public Interest, by Joe Jerome, Natasha Duarte, Center for Democracy & Technology; Brenda Leong, Future of Privacy Forum. Comment by Claire Sullivan Napa 3
On Extending Minds and Mind Control, by Brett Frischmann, Cardozo Law; Evan Selinger, RIT. Comment by Anna Lauren Hoffman Lanai
The Celebrity Stock Market , by Victoria Schwartz, Pepperdine University School of Law. Comment by Amanda Conley Sonoma

10:30–11:00 Break

11:00–12:15 Workshop 2

Better Together: Privacy Regulation and Innovation Policy, by Yafit Lev-Aretz, Katherine Strandburg, Grace Ha, NYU School of Law. Comment by BJ Ard Cabernet
Equal Protection Privacy, by Scott Skinner-Thompson, University of Colorado School of Law. Comment by danah boyd Chardonnay
Just Because it Looks Anonymous Doesn’t Make it So: re-identifications of “anonymized” law school data, by Latanya Sweeney, Data Privacy Lab at Harvard University; Michael von Loewenfeldt & Melissa Perry, Kerr & Wagstaffe LLP. Comment by Jane Bambauer Alumni Room
Revisiting ‘The Governance of Privacy’, by Colin Bennett, University of Victoria, BC; Charles Raab, University of Edinburgh. Comment by Dennis Hirsch Mendocino
The perfect match? A closer look at the relationship between EU consumer law and data protection law, by Natali Helberger, Frederik Zuiderveen Borgesius, IViR Institute for Information Law, Amsterdam; Agustin Reyna, European Consumer Organisation – BEUC. Comment by Julie Brill Monterey
Hypernudge or Hyperpush? Personalization, persuasion and privacy in self-tracking technologies, by Marjolein Lanzing, TU Eindhoven. Comment by Daniel Susser Napa 1&2
Protecting Privacy with Fourth Amendment Use Restrictions, by Rebecca Lipman, NYC Law Department. Comment by Richard Re Napa 3
Personalized Learning & Robot Teaching as Public School Infrastructure, by Elana Zeide, New York University. Comment by Allison Woodruff Lanai
Big Data and the Dispossession of Preference, by Gordon Hull, University of North Carolina Charlotte. Comment by Lauren Willis Sonoma

12:15–1:45 Lunch and Break, Claremont Ballroom

1:45–3:00 Workshop 3

  Cabernet
Privacy as Commons: Case Evaluation through the Governing Knowledge Commons Framework, by Madelyn Sanfilippo, Information Law Institute, New York University; Brett Frischmann, Cardozo Law; Katherine Strandburg, NYU School of Law. Comment by Amy Kristin Sanders Chardonnay
The Myth of Fourth Amendment Circularity, by Matthew Kugler, Northwestern University; Lior Strahilevitz, University of Chicago. Comment by Tim Casey Alumni Room
The Metacognitive Experience of Privacy Decision-Making: How Subtle Trust Cues Affect Disclosure Decisions and Behavioral Intentions, by James Mourey, DePaul University College of Business; Ari Waldman, New York Law School. Comment by Gaia Bernstein Mendocino
Borders and Bits, by Jennifer Daskal, American University Washington College of Law. Comment by Anupam Chander Monterey
Structuring Transatlantic Data Privacy Law, by Paul Schwartz, UC Berkeley Law, and Karl-Nikolaus Peifer, University of Cologne. Comment by Kurt Wimmer Napa 1&2
Privacy Interests in Public Spaces, by Kirsten Martin, George Washington University; Helen Nissenbaum, New York University. Comment by Frederik Zuiderveen Borgesius Napa 3
Disparate Impact in Big Data Policing, by Andrew Selbst, Yale ISP. Comment by Micah Altman Lanai
The Taking Economy: Uber, Information, and Power, by Ryan Calo, University of Washington; Alex Rosenblat, Data & Society. Comment by Terrell McSweeny Sonoma

3:00–3:30 Break

3:30–4:45 Workshop 4

  Cabernet
Differential Privacy: A Primer for a Non-technical Audience, by Kobbi Nissim, Georgetown University; Thomas Steinke, Alexandra Wood,Harvard University; Micah Altman, MIT; Aaron Bembenek, Mark Bun, Harvard University; Marco Gaboardi, SUNY-Buffalo; David R. O’Brien, and Salil Vadhan, Harvard University. Comment by Tara Whalen Chardonnay
Reconciling trade and privacy concerns in EU – U.S. context, by Svetlana Yakovleva, Institute for Information Law (IvIR). Comment by Peter Swire Alumni Room
Privacy & the New Behaviorism (Same as the Old Behaviorism), by Luke Stark, Dartmouth College. Comment by Richard Warner Mendocino
Mobile App Privacy Compliance: Automated Technology to Help Regulators, App Stores and Developers, by Sebastian Zimmeck, Peter Story, Ziqi Wang, Sushain Cherivirala, Jongkyu Baek, Norman Sadeh, Carnegie Mellon University. Comment by Serge Egelman Monterey
Undue Influence: Surveillance Technology Company Constraints on Policing, by Elizabeth Joh, UC Davis School of Law. Comment by Christian Wiese Svanberg Napa 1&2
Metadata and its (Dis)contents: Fourth Amendment Doctrine for a Big Data Age, by Kiel Brennan-Marquez, NYU School of Law; Paula Kift, NYU School of Media, Culture and Communications; Helen Nissenbaum, Cornell Tech; Katherine Strandburg, NYU School of Law. Comment by Susan Freiwald Napa 3
Anti-discriminatory Privacy, by Ignacio Cofone, Yale Law School. Comment by Alan Rubel Lanai
An Ethical Guide to Research Using Leaked Data, by Anne Boustead, Trey Herr, Belfer Center, Harvard Kennedy School. Comment by Scott Mulligan Sonoma

5:30–6:30 Reception, Claremont Hotel

6:45–9:00 Dinner, Claremont Ballroom

 

Friday, June 2nd 2017

8:30–9:15 Breakfast, Claremont Ballroom

9:05 Welcoming Remarks

9:15–10:30 Workshop 5

  Cabernet
  Chardonnay
Alchemy or Chemistry? The Legitimacy of Data Analytics, by Anne Washington, George Mason University. Comment by David Robinson Alumni Room
Sacred Homes or Glass Houses? Limits on Law Enforcement Surveillance of the Home from the Outside, by Bryce Newell, Bert-Jaap Koops, Ivan Škorvánek, Maša Galič, Tilburg Institute for Law, Technology, and Society (TILT); Andrew Roberts, Melbourne Law School, University of Melbourne (Australia); Tjerk Timan, TILT. Comment by Steven Smith Mendocino
Quantifying the Value of Privacy – More than a Peppercorn? How can you tell?, by Hank Fishkind, Fishkind & Associates, Inc.. Comment by Edina Harbinja Monterey
The Ethics of the Crypto Wars, by Stephanie K. Pell, Richard Schoonhoven, US Military Academy, West Point. Comment by Sharon Bradford Franklin Napa 1&2
Slave to the Algo-Rhythm? Why a ‘right to an explanation’ is probably not the remedy you are looking for, by Lilian Edwards, Strathclyde University; Michael Veale, UCL. Comment by Julie Cohen Napa 3
Designing Without Privacy, by Ari Waldman, New York Law School. Comment by Harry Surden Lanai
Why Privacy Matters, by Neil Richards, Washington University Law. Comment by Joshua Fairfield Sonoma

10:30–11:00 Break

11:00–12:15 Workshop 6

Toward Origin Privacy, by Sebastian Benthall, NYU Steinhardt; Anupam Datta, Carnegie Mellon University; Michael Tschantz, International Computer Science Institute. Comment by Michael Hintze Cabernet
An Empirical Investigation of Cy Pres Awards in Privacy Class Actions, by James Graves, EPIC; Marc Rotenberg, EPIC. Comment by Edward McNicholas Chardonnay
Data Scams, by Roger Ford, University of New Hampshire School of Law. Comment by Emily McReynolds Alumni Room
Private Searches and the Fourth Amendment: Developing an Objective Framework for Agency Analysis in Computer Crime Cases, by Jeff Kosseff, U.S. Naval Academy. Comment by Ron Lee Mendocino
The Algorithm Game, by Jane Bambauer, University of Arizona; Tal Zarsky, University of Haifa – Faculty of Law. Comment by Solon Barocas Monterey
The Surveillance Gap, by Michele Gilman, University of Baltimore; Rebecca Green, William & Mary Law School. Comment by Gautham Hans Napa 1&2
Encryption Workarounds, by Orin Kerr, George Washington University Law School; Bruce Schneier, Belfer Center for Science and International Affairs, Harvard Kennedy School. Comment by Kristen Eichensehr Napa 3
Privacy, Press, and a Right to Be Forgotten in the United States, by Amy Gajda, Tulane Law School. Comment by Alexander Tsesis Lanai
The Public Information Fallacy, by Woodrow Hartzog, Samford University’s Cumberland School of Law. Comment by Victoria Baranetsky Sonoma

12:15–1:15 Lunch, Claremont Ballroom

1:15–2:30 Workshop 7

The Interface Between Trade and Privacy: The European Union’s Governance of Transnational Privacy and External Trade, by Kristina Irion and Svetlana Yakovleva, Institute for Information Law (IvIR). Comment by Colin Bennett Cabernet
Recognizing Speakers and Respecting Privacy, by Dorothy J. Glancy, Santa Clara University School of Law; James L. Wayman, San Jose State University. Comment by Anne McKenna Chardonnay
Fourth Amendment Anxiety, by Kiel Brennan-Marquez, NYU; Stephen Henderson, The University of Oklahoma. Comment by Jennifer Daskal Alumni Room
Evaluating national “Digital ID” systems on privacy and human rights safeguards, by Nathalie Maréchal, USC. Comment by Pam Dixon Mendocino
Privacy Protective Research: Facilitating Ethically Responsible Access to Administrative Data, by Omer Tene, IAPP; Jules Polonetsky, FPF; Daniel Goroff, Alfred P. Sloan Foundation. Comment by Katie Shilton Monterey
The Duty of Data Security, by William McGeveran, University of Minnesota Law School. Comment by David Thaw Napa 1&2
Standards of Fairness for Disparate Impact Assessment of Big Data Algorithms, by Mark MacCarthy, Georgetown University. Comment by Tal Zarsky Napa 3
Data Collection and Data Use: Evidence from the Android App Market, by Siona Listokin, George Mason University. Comment by Will DeVries Lanai
Toward the Ethical Engineer: Promoting Ethics Education for Computer Science Students, by John K. Grant, Palantir Technologies. Comment by Lance Hoffmann Sonoma

2:30–2:45 Short Break

2:45–4:00 Workshop 8

An Exploration of Predictability and Privacy: Meaning and Effect, by Janine Hiller, Virginia Tech; Jody Blanke, Mercer University. Comment by Jocelyn Aqua Cabernet
Conflict Modeling, by Amanda Levendowski, NYU Law. Comment by Trey Herr Chardonnay
How Private Law Can Make Corporate Privacy Policies an Instrument for Regulating Misuse of Personal Data, by Mark P. Gergen, UC Berkeley. Comment by Woodrow Hartzog Alumni Room
The Absence of Privacy in the Right to Privacy, by Kirsty Hughes, University of Cambridge. Comment by Priscilla Regan Mendocino
Institutionalized Privacy: A Typology of Privacy in Nursing Home Electronic Monitoring Laws, by Karen Levy, Cornell University; Clara Berridge, University of Washington; Lauren Kilgour, Cornell University. Comment by D.R. Jones Monterey
Privacy Localism, by Ira Rubinstein, NYU School of Law. Comment by Jan Whittington Napa 1&2
Surveillance and Transparency Since the Sixties, by Sarah Igo, Vanderbilt University. Comment by Neil Richards Napa 3
Regulating Inscrutable Systems, by Andrew D. Selbst, Yale ISP; Solon Barocas, Microsoft Research/Cornell University. Comment by Rónán Kennedy Lanai
Uncrunched: Algorithms, Decisionmaking, and Privacy, by Derek Bambauer, University of Arizona. Comment by Felix Wu Sonoma

4:00 Closing Remarks, Claremont Ballroom