Agenda – PLSC 2017

Privacy Law Scholars Conference 2017
Claremont Hotel
Thursday, June 1st, 2017

8:30–9:15 Breakfast Claremont Ballroom

9:05 Welcoming Remarks

9:15–10:30 Workshop 1

Electronic Monitoring Programs in the Juvenile Justice System, by Catherine Crump, Berkeley Law School; Christina Koningisor, UC Berkeley. Comment by Brian Owsley Cabernet
Algorithmic Jim Crow and Extreme Vetting, by Margaret Hu, Washington and Lee School of Law. Comment by Jennifer Granick Chardonnay
Empirical Measurement of Perceived Privacy Risk, by Travis Breaux, Carnegie Mellon University; Jaspreet Bhatia, Carnegie Mellon University. Comment by Ashkan Solanti Alumni Room
Contextual Integrity through the Lenses of Computer Science, by Sebastian Benthall, NYU Steinhardt; Seda Gürses, Princeton; Helen Nissenbaum, New York University. Comment by Blasé Ur Mendocino
Civil Rights in an Algorithmic Age, by Sonia Katyal, UC Berkeley Law. Comment by Danielle Citron. Monterey
The Needed Redesign of U.S. Privacy Policy Institutions, by William Kovacic, George Washington University; David Hyman, Georgetown University Law Center. Comment by Bob Gellman Napa 1&2
A Data Ethic for the Public Interest, by Joe Jerome, Center for Democracy & Technology; Natasha Duarte, Center for Democracy & Technology; Brenda Leong, Future of Privacy Forum. Comment by Claire Sullivan Napa 3
On mind extension and control, by Brett Frischmann, Cardozo Law; Evan Selinger, RIT. Comment by Anna Lauren Hoffman Lanai
The Incorporated Man: The Celebrity Stock Market , by Victoria Schwartz, Pepperdine University School of Law. Comment by Amanda Conley Sonoma

10:30–11:00 Break

11:00–12:15 Workshop 2

Privacy Regulation and Innovation, by Grace Ha, NYU School of Law; Yafit Lev-Aretz, NYU School of Law; Katherine Strandburg, NYU School of Law. Comment by BJ Ard Cabernet
Equal Protection Privacy, by Scott Skinner-Thompson, New York University School of Law. Comment by danah boyd Chardonnay
Just Because it Looks Anonymous Doesn’t Make it So: re-identifications of “anonymized” law school data, by Latanya Sweeney, Data Privacy Lab at Harvard University. Comment by Jane Bambauer Alumni Room
Revisiting ‘The Governance of Privacy’, by Colin Bennett, University of Victoria, BC; Charles  Raab, University of Edinburgh. Comment by Dennis Hirsch Mendocino
The perfect match?  A closer look at the relationship between  EU consumer law and data protection law , by Natali  Helberger, UvA; Frederik Zuiderveen Borgesius, IViR Institute for Information Law, Amsterdam; Agustin Reyna, European Consumer Organisation – BEUC. Comment by Julie Brill Monterey
Meddlesome Technologies: Personalization, persuasion and privacy in self-tracking technologies, by Marjolein Lanzing, TU Eindhoven. Comment by Daniel Susser Napa 1&2
Fourth Amendment Use Restrictions, by Rebecca Lipman, NYC Law Department. Comment by Richard Re Napa 3
Personalization, Prediction, and Permanent Records: The Promise and Peril of Big-Data Driven Education, by Elana Zeide, New York University. Comment by Allison Woodruff Lanai
Big Data: Accumulation and Privacy, by Gordon Hull, University of North Carolina Charlotte. Comment by Lauren Willis Sonoma

12:15–1:45 Lunch and Break Claremont Ballroom

1:45–3:00 Workshop 3

Camera Power (Cambridge University Press, forthcoming 2017), by Mary Fan, University of Washington School of Law. Comment by Allyson Haynes Stuart Cabernet
Exploring Privacy as Commons, by Madelyn Sanfilippo, Information Law Institute, New York University; Brett Frischmann, Cardozo Law; Katherine Strandburg, NYU School of Law. Comment by Amy Kristin Sanders Chardonnay
The Myth of Fourth Amendment Circularity, by Matthew Kugler, Northwestern University; Lior Strahilevitz, University of Chicago. Comment by Tim Casey Alumni Room
Intuition and Trust in Online Disclosure, by James Mourey, DePaul University College of Business; Ari Waldman, New York Law School. Comment by Gaia Bernstein Mendocino
Data’s Differences, by Jennifer Daskal, American University Washington College of Law. Comment by Anupam Chander Monterey
Structuring International Data Privacy Law, by Paul Schwartz, UC Berkeley Law, and Karl-Nikolaus Peifer, University of Cologne. Comment by Kurt Wimmer Napa 1&2
What is Private about ‘Public Spaces’, by Kirsten Martin, George Washington University; Helen Nissenbaum, New York University. Comment by Frederik Zuiderveen Borgesius Napa 3
Disparate Impact in Big Data Policing, by Andrew Selbst, Yale ISP. Comment by Micah Altman Lanai
The Taking Economy, by Ryan Calo, University of Washington; Alex Rosenblat, Data & Society. Comment by Terrell McSweeny Sonoma

3:00–3:30 Break

3:30–4:45 Workshop 4

Differential Privacy: A Primer for a Non-technical Audience, by Alexandra Wood, Berkman Klein Center for Internet & Society; Kobbi Nissim, Georgetown University; Micah Altman, MIT Libraries; Aaron Bembenek, Harvard University. Comment by Tara Whalen Cabernet
International Trade and the Privacy of Individuals: Reconciling the Irreconcilable?, by Svetlana  Yakovleva, Institute for Information Law (IvIR). Comment by Peter Swire Chardonnay
Privacy & the New Behaviorism (Same as the Old Behaviorism), by Luke Stark, Dartmouth College. Comment by Richard Warner Alumni Room
Mobile App Privacy Compliance: Automated Technology to Help Regulators, App Stores and Developers, by Sebastian Zimmeck, Peter Story, Ziqi Wang, Sushain Cherivirala, Jongkyu Baek, Norman Sadeh, Carnegie Mellon University. Comment by Serge Egelman Mendocino
Undue Influence: Surveillance Technology Company Constraints on Policing, by Elizabeth Joh, UC Davis School of Law. Comment by Christian Wiese Svanberg Monterey
Metadata and its (Dis)contents: Fourth Amendment Doctrine for a Big Data Age, by Kiel Brennan-Marquez, NYU School of Law; Paula Kift, NYU School of Media, Culture and Communications; Helen Nissenbaum, Cornell Tech; Katherine Strandburg, NYU School of Law. Comment by Susan Freiwald Napa 1&2
Anti-discriminatory Privacy, by Ignacio Cofone, Yale Law School. Comment by Alan Rubel Napa 3
An Ethical Guide to Research Using Leaked Data, by Anne Boustead, Belfer Center, Harvard Kennedy School; Trey Herr, Belfer Center, Harvard Kennedy School. Comment by Scott Mulligan Lanai
Playing with the Data, by Paul Ohm, Georgetown University Law Center; David Lehr, Georgetown University Law Center. Comment by Deven Desai Sonoma

TBD Reception Claremont Hotel

TBD Dinner Claremont Ballroom

Friday, June 2nd 2017

8:30–9:15 Breakfast Claremont Ballroom

9:05 Welcoming Remarks

9:15–10:30 Workshop 5

Alchemy or chemistry? Policy implications of data science epistemology, by Anne Washington, George Mason University. Comment by David Robinson Cabernet
Sacred Homes or Glass Houses? Limits on Law Enforcement Surveillance of the Home from the Outside, by Bryce Newell, Bert-Jaap Koops, Ivan Škorvánek, Maša Galič, Tilburg Institute for Law, Technology, and Society (TILT); Andrew Roberts, Melbourne Law School, University of Melbourne (Australia); Tjerk Timan, Tilburg Institute for Law, Technology, and Society (TILT). Comment by Steven Smith Chardonnay
Towards Identity Bankruptcy, by A Michael Froomkin, U Miami School of Law. Comment by Nizan Packin Alumni Room
The Absence of Privacy in the Right to Privacy, by Kirsty Hughes, University of Cambridge. Comment by Beate Roessler Mendocino
Quantifying the Value of Privacy – More than a Peppercorn?  How can you tell?, by Hank Fishkind, Fishkind & Associate, Inc.. Comment by Edina Harbinja Monterey
The Ethics of the Crypto Wars, by Richard Schoonhoven, Stephanie K. Pell, US Military Academy, West Point. Comment by Sharon Bradford Franklin Napa 1&2
Slave to the Algo-Rhythm? , by Lilian Edwards, Strathclyde University; Michael Veale, UCL. Comment by Julie Cohen Napa 3
Designing Without Privacy, by Ari Waldman, New York Law School. Comment by Harry Surden Lanai
Why Privacy Matters, by Neil Richards, Washington University Law. Comment by Joshua Fairfield Sonoma

10:30–11:00 Break

11:00–12:15 Workshop 6

Origin Privacy, by Sebastian Benthall, NYU Steinhardt; Michael Tschantz, International Computer Science Institute; Anupam Datta, Carnegie Mellon University. Comment by Michael Hintze Cabernet
An Empirical Investigation of Cy Pres Awards in Privacy Class Actions, by James Graves, EPIC; Marc Rotenberg, EPIC. Comment by Edward McNicholas Chardonnay
Data Scams, by Roger Ford, University of New Hampshire School of Law. Comment by Emily McReynolds Alumni Room
Private Searches and the Fourth Amendment: Developing an Objective Framework for Agency Analysis in Computer Crime Cases, by Jeff Kosseff, U.S. Naval Academy. Comment by Ron Lee Mendocino
Dancing with Algorithms: How the Law Can Foster Good Decisions by Proxy, by Jane Bambauer, University of Arizona; Tal  Zarsky , University of Haifa – Faculty of Law. Comment by Solon Barocas Monterey
The Surveillance Gap, by Michele Gilman, University of Baltimore; Rebecca  Green, William & Mary Law School. Comment by Gautham Hans Napa 1&2
Encryption Workarounds, by Orin Kerr, George Washington University Law School; Bruce Schneier, Belfer Center for Science and International Affairs, Harvard Kennedy School. Comment by Kristen Eichensehr Napa 3
Privacy, Press, and a Right to Be Forgotten in the United States, by Amy Gajda, Tulane Law School. Comment by Alexander Tsesis Lanai
The Public Information Fallacy, by Woodrow Hartzog, Samford University’s Cumberland School of Law. Comment by Victoria Baranetsky Sonoma

12:15–1:15 Lunch Claremont Ballroom

1:15–2:30 Workshop 7

The Interface Between Trade and Privacy: The European Union’s Governance of Transnational Privacy and External Trade, by Kristina Irion, Institute for Information Law. Comment by Colin Bennett Cabernet
Recognizing Speakers and Respecting Privacy, by Dorothy Glancy, Santa Clara University School of Law; James Wayman, San Jose State University. Comment by Anne McKenna Chardonnay
Closed-Door Law Enforcement and Fourth Amendment Anxiety, by Stephen Henderson, The University of Oklahoma; Kiel Brennan-Marquez, NYU. Comment by Jennifer Daskal Alumni Room
 Evaluating national “Digital ID” systems on privacy and human rights safeguards, by Nathalie Maréchal, USC. Comment by Pam Dixon Mendocino
Privacy Protective Research: Facilitating Ethically Responsible Access to Administrative Data, by Omer Tene, IAPP; Jules Polonetsky, FPF; Daniel Goroff, Alfred P. Sloan Foundation. Comment by Katie Shilton Monterey
The Duty of Data Security, by William McGeveran, University of Minnesota Law School. Comment by David Thaw Napa 1&2
Standards of Fairness for Disparate Impact Assessment of Big Data Algorithms, by Mark MacCarthy, Georgetown University. Comment by Tal Zarsky Napa 3
Is Data Collection Different Than Data Use? , by Siona Listokin, George Mason University. Comment by Will DeVries Lanai
Towards the Ethical Engineer:  Giving Coders the Tools They Need to Take Responsibility for What They Build, by John Grant, Palantir Technologies. Comment by Lance Hoffmann Sonoma

2:30–2:45 Short Break

2:45–4:00 Workshop 8

An Exploration of Privacy and Predictability: Meaning and Effect, by Janine Hiller, Virginia Tech; Jody Blanke, Mercer University. Comment by Jocelyn Aqua Cabernet
Conflict Modeling, by Amanda Levendowski, NYU Law. Comment by Trey Herr Chardonnay
How Private Law Can Make Privacy Policies a More Effective Instrument for Collective Private Ordering, by Mark Gergen, UC Berkeley. Comment by Woodrow Hartzog Alumni Room
Care on Camera: How State “Granny Cam” Laws Balance Privacy Interests in Care Settings, by Karen Levy, Cornell University; Clara Berridge, University of Washington. Comment by D.R. Jones Mendocino
Privacy Localism, by Ira Rubinstein, NYU School of Law. Comment by Jan Whittington Monterey
Surveillance and Transparency Since the Sixties, by Sarah Igo, Vanderbilt University. Comment by Neil Richards Napa 1&2
Taking Explanation Seriously in Law and Machine Learning, by Andrew Selbst, Yale ISP; Solon Barocas, Microsoft Research/Cornell University. Comment by Rónán Kennedy Napa 3
Uncrunched: Algorithms, Decisionmaking, and Privacy, by Derek Bambauer, University of Arizona. Comment by Felix Wu Lanai
The Institutional Crisis of Cybersecurity, by Jeffrey Vagle, University of Pennsylvania Law School. Comment by Nora Draper Sonoma

4:00 Closing Remarks Claremont Ballroom