SlideShare a Scribd company logo
1 of 2
Download to read offline
Hosted by the Berkeley Center for Law & Technology and
the George Washington University Law School
with generous support from
UC Berkeley School of Law certifies that today’s activity has been
approved for 5.0 hours CLE credit by the State Bar of California
friday, june 3, 2016
privacy law
scholars conference
t h e 9 t h a n n u a l
George Washington University Marvin Center
800 21st Street, NW
Washington, DC 20052
law.berkeley.edu/plsc.htm
8:30 AM	 -	 9:00 AM		 Breakfast (Grand Ballroom)
9:00 AM	 -	 10:15 AM		 Workshop Session #5 // 1.25 HR
10:15 AM	 -	 10:45 AM		 Break
10:45 AM	 -	 12:00 PM		 Workshop Session #6 // 1.25 HR
12:00 PM	 -	 1:15 PM		 Lunch (Grand Ballroom)
1:15 PM	 -	 2:30 PM		 Workshop Session #7 // 1.25 HR
2:30 PM	 -	 3:00 PM		 Break
3:00 PM	 -	 4:15 PM		 Workshop Session #8 // 1.25 HR
4:15 PM	 -	 4:25 PM		 Closing Remarks (Continental Ballroom)
AGENDA
Author & Title Comment Room
Ignacio Cofone & Klaus Heine - The Upside of Monopolies in Data Privacy Law Siona Listokin 301
Bart Van der Sloot - Where is the harm in a privacy violation? Calculating the
damages afforded in privacy cases by the European Court of Human Rights
Gerald
Stegmaier
302
Eva Beyvers & Henning Hofmann - Big Brother is Nudging You – Fundamental
Rights and Democratic Principles in the Context of Nudging Strategies
Anna Slomovic 307
David Thaw - Redefining Cybersecurity Serge Egelman 405
Bryce Newell, Bert-Jaap Koops, Ivan Škorvánek, Andrew Roberts, Maša
Galič, & Tomislav Chokrevski - Privacy Crimes
Mary Leary 310
David Ardia - Privacy and Court Records: Online Access and the Loss of
Practical Obscurity
Robert Deyling 403
Craig Konnoth - An Expressive Theory of Privacy Intrusions Laura Donohue 407
Woodrow Hartzog - Privacy’s Blueprint: The Battle to Control the Design of New
Technologies
Lorrie Cranor 402-404
Neil Richards - Privacy and the Future of the Cloud Ed McNicholas
Continental
Ballroom
Author & Title Comment Room
Susan Freiwald - CalECPA: Putting Communications Privacy Law Reform in
Context
Ron Lee 308
Natali Helberger - News Readers’ Privacy and Fair Algorithmic Media Practices:
Lessons to be Learned from Media Law and Theory
Jasmine McNeal 301
Michael Birnhack & Lotem Perry-Hazan - The Hidden Human Rights
Curriculum of Surveillance Cameras in Schools
Chris Conley 302
Alethea Lange, Rena Coen, Emily Paul, Pavel Vanessa, & Gautam Hans -
A User-Centered Perspective on Algorithmic Personalization
Jeff Jonas 307
Joshua Fairfield - OWNED: How the Internet of Things Took Our Property and
Privacy (Chapter 5: “Private Property”)
Edina Harbinja 405
Mark MacCarthy - Privacy Restrictions and Contextual Harm: A Contribution to
Social Theories of Privacy
Arnold
Roosndaal
310
Elana Zeide - The Credentialing Effect: Psychological Implications of Ubiquitous
Capture and Constant Assessment
Dawn Schrader 403
Jeffrey Vagle - Cybersecurity and Internet Stewardship Deirdre Mulligan 407
Mary Madden, Michele Gilman, Karen Levy, & Alice Marwick - The Class
Differential in Privacy Vulnerability
Seeta
Gangadharan
402-404
Daniel Solove & Danielle Citron - (Encore) Privacy and Data Security Harms Will DeVries
Continental
Ballroom
Author & Title Comment Room
Juan Gonzalez Allonca - Privacy and Remote Sensing Satellites Khaliah Barnes 301
Jill Bronfman - Saving Face: The Screen of Chinese Privacy Law Unfolds
Malavika
Jayaram
302
Ric Simmons - Quantifying Criminal Procedure: How to Unlock the Potential of
Big Data in our Criminal Justice System
Judge Stephen
Smith
307
Daniel Greene & Katie Shilton - Platforms and the Privacy Ecosystem: The
Construction of Privacy in iOS and Android Development
Michael Zimmer 405
Roger Ford & W. Nicholson Price II - Privacy and Accountability in Black-Box
Medicine
Maya Bernstein 310
Peter Swire & Justin Hemmings - Cross-Context Tracking, Cross-Device
Tracking, and a Market Definition Test for What Constitutes a Privacy Context
James
Grimmelmann
403
Lisa Austin - Privacy and Power: The Rule of Law in the Information State Alan Rubel 407
A. Michael Froomkin - Building Privacy into the Infrastructure: Towards a New
Identity Management Architecture
David Thaw 402-404
Pauline Kim - Data Driven Discrimination at Work Danah Boyd
Continental
Ballroom
Author & Title Comment Room
Reed Rubinstein & Jon Neiditz - “Substantial Injury” in Information Security
Incidents After LabMD
Ryan Calo 302
Anne Boustead - Does Rejection of the Third Party Doctrine Change Use of
Electronic Surveillance? Evidence from the Wiretap Reports
Brian Owsley 307
Joseph Jerome & Stacey Gray - Smart Homes Strike Back: A New Hope for the
Fourth Amendment
Jay Stanley 405
Christopher Slobogin - A Defense of Privacy as the Central Value Protected by
the Fourth Amendment’s Prohibition on Unreasonable Searches
Amitai Etzioni 310
Alice Marwick, Claire Fontaine & Danah Boyd - “Nobody Sees it, Nobody Gets
Mad”: Social Media, Privacy, and Personal Responsibility Among Low-SES Youth
Yang Wang 403
Margot Kaminski - Privacy and the Right to Record
Heather
Shoenberger
407
Daniel Susser - Notice After Notice-and-Consent David Medine 402-404
Kirsten Martin & Helen Nissenbaum - (Encore) What is Private about ‘Public’
Data?
David Gray
Continental
Ballroom

More Related Content

Similar to Privacy Law Scholars Conference 2016

Suny faculty senate
Suny faculty senateSuny faculty senate
Suny faculty senate
SUNY Oneonta
 
Citation Network Analysis for the United States Court of Appeals of Federal C...
Citation Network Analysis for the United States Court of Appeals of Federal C...Citation Network Analysis for the United States Court of Appeals of Federal C...
Citation Network Analysis for the United States Court of Appeals of Federal C...
Yuching Kuo
 
programme-of-event
programme-of-eventprogramme-of-event
programme-of-event
Maria Murphy
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard
 
The-Morgan-Kaufmann-Series-in-Data-Management-Systems-Jiawei-Han-Micheline-Ka...
The-Morgan-Kaufmann-Series-in-Data-Management-Systems-Jiawei-Han-Micheline-Ka...The-Morgan-Kaufmann-Series-in-Data-Management-Systems-Jiawei-Han-Micheline-Ka...
The-Morgan-Kaufmann-Series-in-Data-Management-Systems-Jiawei-Han-Micheline-Ka...
DrGnaneswariG
 

Similar to Privacy Law Scholars Conference 2016 (20)

Ownership, intellectual property, and governance considerations for academic ...
Ownership, intellectual property, and governance considerations for academic ...Ownership, intellectual property, and governance considerations for academic ...
Ownership, intellectual property, and governance considerations for academic ...
 
UNT: Scientific Data Management and Sharing
UNT: Scientific Data Management and SharingUNT: Scientific Data Management and Sharing
UNT: Scientific Data Management and Sharing
 
4th EDPD 2014 European Data Protection Days
4th EDPD 2014 European Data Protection Days4th EDPD 2014 European Data Protection Days
4th EDPD 2014 European Data Protection Days
 
Introduction to the Social Data on the Web Workshop
Introduction to the Social Data on the Web WorkshopIntroduction to the Social Data on the Web Workshop
Introduction to the Social Data on the Web Workshop
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
Suny faculty senate
Suny faculty senateSuny faculty senate
Suny faculty senate
 
Intellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and ChallengesIntellectual Property in Big Data Era: Opportunities and Challenges
Intellectual Property in Big Data Era: Opportunities and Challenges
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
 
Citation Network Analysis for the United States Court of Appeals of Federal C...
Citation Network Analysis for the United States Court of Appeals of Federal C...Citation Network Analysis for the United States Court of Appeals of Federal C...
Citation Network Analysis for the United States Court of Appeals of Federal C...
 
Episode 3(4): Wrapping up the Web and the history of cognitive technologies -...
Episode 3(4): Wrapping up the Web and the history of cognitive technologies -...Episode 3(4): Wrapping up the Web and the history of cognitive technologies -...
Episode 3(4): Wrapping up the Web and the history of cognitive technologies -...
 
DR2013 Data Science Panel Introduction
DR2013 Data Science Panel IntroductionDR2013 Data Science Panel Introduction
DR2013 Data Science Panel Introduction
 
programme-of-event
programme-of-eventprogramme-of-event
programme-of-event
 
Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014
 
Differential Privacy for Information Retrieval
Differential Privacy for Information RetrievalDifferential Privacy for Information Retrieval
Differential Privacy for Information Retrieval
 
Dataverse in the Universe of Data by Christine L. Borgman
Dataverse in the Universe of Data by Christine L. BorgmanDataverse in the Universe of Data by Christine L. Borgman
Dataverse in the Universe of Data by Christine L. Borgman
 
#Glen legal19 legal leaders it forum 2019
#Glen legal19   legal leaders it forum 2019#Glen legal19   legal leaders it forum 2019
#Glen legal19 legal leaders it forum 2019
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
 
Data_Warehousing_and_Data_Minng_Text_Book.pdf
Data_Warehousing_and_Data_Minng_Text_Book.pdfData_Warehousing_and_Data_Minng_Text_Book.pdf
Data_Warehousing_and_Data_Minng_Text_Book.pdf
 
The-Morgan-Kaufmann-Series-in-Data-Management-Systems-Jiawei-Han-Micheline-Ka...
The-Morgan-Kaufmann-Series-in-Data-Management-Systems-Jiawei-Han-Micheline-Ka...The-Morgan-Kaufmann-Series-in-Data-Management-Systems-Jiawei-Han-Micheline-Ka...
The-Morgan-Kaufmann-Series-in-Data-Management-Systems-Jiawei-Han-Micheline-Ka...
 
Examples of how to inspire the next generation to pursue computational chemis...
Examples of how to inspire the next generation to pursue computational chemis...Examples of how to inspire the next generation to pursue computational chemis...
Examples of how to inspire the next generation to pursue computational chemis...
 

Privacy Law Scholars Conference 2016

  • 1. Hosted by the Berkeley Center for Law & Technology and the George Washington University Law School with generous support from UC Berkeley School of Law certifies that today’s activity has been approved for 5.0 hours CLE credit by the State Bar of California friday, june 3, 2016 privacy law scholars conference t h e 9 t h a n n u a l George Washington University Marvin Center 800 21st Street, NW Washington, DC 20052 law.berkeley.edu/plsc.htm
  • 2. 8:30 AM - 9:00 AM Breakfast (Grand Ballroom) 9:00 AM - 10:15 AM Workshop Session #5 // 1.25 HR 10:15 AM - 10:45 AM Break 10:45 AM - 12:00 PM Workshop Session #6 // 1.25 HR 12:00 PM - 1:15 PM Lunch (Grand Ballroom) 1:15 PM - 2:30 PM Workshop Session #7 // 1.25 HR 2:30 PM - 3:00 PM Break 3:00 PM - 4:15 PM Workshop Session #8 // 1.25 HR 4:15 PM - 4:25 PM Closing Remarks (Continental Ballroom) AGENDA Author & Title Comment Room Ignacio Cofone & Klaus Heine - The Upside of Monopolies in Data Privacy Law Siona Listokin 301 Bart Van der Sloot - Where is the harm in a privacy violation? Calculating the damages afforded in privacy cases by the European Court of Human Rights Gerald Stegmaier 302 Eva Beyvers & Henning Hofmann - Big Brother is Nudging You – Fundamental Rights and Democratic Principles in the Context of Nudging Strategies Anna Slomovic 307 David Thaw - Redefining Cybersecurity Serge Egelman 405 Bryce Newell, Bert-Jaap Koops, Ivan Škorvánek, Andrew Roberts, Maša Galič, & Tomislav Chokrevski - Privacy Crimes Mary Leary 310 David Ardia - Privacy and Court Records: Online Access and the Loss of Practical Obscurity Robert Deyling 403 Craig Konnoth - An Expressive Theory of Privacy Intrusions Laura Donohue 407 Woodrow Hartzog - Privacy’s Blueprint: The Battle to Control the Design of New Technologies Lorrie Cranor 402-404 Neil Richards - Privacy and the Future of the Cloud Ed McNicholas Continental Ballroom Author & Title Comment Room Susan Freiwald - CalECPA: Putting Communications Privacy Law Reform in Context Ron Lee 308 Natali Helberger - News Readers’ Privacy and Fair Algorithmic Media Practices: Lessons to be Learned from Media Law and Theory Jasmine McNeal 301 Michael Birnhack & Lotem Perry-Hazan - The Hidden Human Rights Curriculum of Surveillance Cameras in Schools Chris Conley 302 Alethea Lange, Rena Coen, Emily Paul, Pavel Vanessa, & Gautam Hans - A User-Centered Perspective on Algorithmic Personalization Jeff Jonas 307 Joshua Fairfield - OWNED: How the Internet of Things Took Our Property and Privacy (Chapter 5: “Private Property”) Edina Harbinja 405 Mark MacCarthy - Privacy Restrictions and Contextual Harm: A Contribution to Social Theories of Privacy Arnold Roosndaal 310 Elana Zeide - The Credentialing Effect: Psychological Implications of Ubiquitous Capture and Constant Assessment Dawn Schrader 403 Jeffrey Vagle - Cybersecurity and Internet Stewardship Deirdre Mulligan 407 Mary Madden, Michele Gilman, Karen Levy, & Alice Marwick - The Class Differential in Privacy Vulnerability Seeta Gangadharan 402-404 Daniel Solove & Danielle Citron - (Encore) Privacy and Data Security Harms Will DeVries Continental Ballroom Author & Title Comment Room Juan Gonzalez Allonca - Privacy and Remote Sensing Satellites Khaliah Barnes 301 Jill Bronfman - Saving Face: The Screen of Chinese Privacy Law Unfolds Malavika Jayaram 302 Ric Simmons - Quantifying Criminal Procedure: How to Unlock the Potential of Big Data in our Criminal Justice System Judge Stephen Smith 307 Daniel Greene & Katie Shilton - Platforms and the Privacy Ecosystem: The Construction of Privacy in iOS and Android Development Michael Zimmer 405 Roger Ford & W. Nicholson Price II - Privacy and Accountability in Black-Box Medicine Maya Bernstein 310 Peter Swire & Justin Hemmings - Cross-Context Tracking, Cross-Device Tracking, and a Market Definition Test for What Constitutes a Privacy Context James Grimmelmann 403 Lisa Austin - Privacy and Power: The Rule of Law in the Information State Alan Rubel 407 A. Michael Froomkin - Building Privacy into the Infrastructure: Towards a New Identity Management Architecture David Thaw 402-404 Pauline Kim - Data Driven Discrimination at Work Danah Boyd Continental Ballroom Author & Title Comment Room Reed Rubinstein & Jon Neiditz - “Substantial Injury” in Information Security Incidents After LabMD Ryan Calo 302 Anne Boustead - Does Rejection of the Third Party Doctrine Change Use of Electronic Surveillance? Evidence from the Wiretap Reports Brian Owsley 307 Joseph Jerome & Stacey Gray - Smart Homes Strike Back: A New Hope for the Fourth Amendment Jay Stanley 405 Christopher Slobogin - A Defense of Privacy as the Central Value Protected by the Fourth Amendment’s Prohibition on Unreasonable Searches Amitai Etzioni 310 Alice Marwick, Claire Fontaine & Danah Boyd - “Nobody Sees it, Nobody Gets Mad”: Social Media, Privacy, and Personal Responsibility Among Low-SES Youth Yang Wang 403 Margot Kaminski - Privacy and the Right to Record Heather Shoenberger 407 Daniel Susser - Notice After Notice-and-Consent David Medine 402-404 Kirsten Martin & Helen Nissenbaum - (Encore) What is Private about ‘Public’ Data? David Gray Continental Ballroom