9/1 Technology as Policy
Winner, "Do Artifacts Have Politics?" Daedalus, Vol. 109, No. 1, Modern Technology: Problem or Opportunity? (Winter, 1980), pp. 121-136 The MIT Press on behalf of American Academy of Arts & Sciences
Latour, Bruno, "The Moral Dilemmas of a Safety-belt"
Lessig, Larry, Code, Chapter 7: "What Things Regulate"
Latour, Bruno, "Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts", Shaping Technology, Bijker, Wiebe E., Law, John. Cambridge: MIT Press, 1992
9/8 The problem of looking at law alone
Surden, Harry, Structural Rights in Privacy. SMU Law Review, Vol. 60, pp. 1605-1629, 2007.
H. Nissenbaum, "Privacy as Contextual Integrity", Washington Law Review Vol 79, No. 1, February 2004: 119-158. Log in with your iSchool username and password; INTRODUCTION AND SECTIONs III and IV (p 136-158)
Radin, Margaret Jane. Regulation by Contract, Regulation by Machine. Journal of Institutional and Theoretical Economics, Vol. 160, pp. 1-15, 2004.
Deirdre K. Mulligan and Aaron J. Burstein. Implementing Copyright Limitations in Rights Expression Languages, Proceedings of the Second ACM Workshop on Digital Rights Management (2002).
Morozov, Evgeny. The 20th century roots of 21st century statecraft. Foreign Policy, September 7, 2010.
9/22 Roles, Boundaries and Tools
First reflection piece due.
Lorrie Faith Cranor & Joseph Reagle, Jr., Designing a Social Protocol: Lessons Learned from the Platform for Privacy Preferences Project
John Morris and Alan Davidson, Public Policy Considerations for Internet Design Decisions
M. Flanagan, D. Howe, and H. Nissenbaum, "Embodying Values in Technology: Theory and Practice", In Information Technology and Moral Philosophy, Jeroen van den Hoven and John Weckert (eds.) Cambridge: Cambridge University Press, 2008.
Log in with your iSchool username and password
9/29 From Law to Code (Requirements)
Adam Barth, Anupam Datta, John C. Mitchell and Helen Nissenbaum, "Privacy and Contextual Integrity: Framework and Applications".
T.D. Breaux, M. Vail and A.I. Ant'on, "Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations," 14th IEEE International Requirements Engineering Conference (RE'06), Minneapolis / St. Paul, Minnesota, pp. 46-35, 11-15 September 2006. Available in email.
Margaret McGaley and J. Paul Gibson, "A Critical Analysis of the Council of Europe Recommendations on e-voting". Available in email. Read Section 4 to the end.
DHS Privacy Threshold Analysis. Familiarize.
DHS Privacy Impact Assessment Template. Familiarize.
DHS Privacy Impact Assessment Update for the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Program; Authentication of e-Passports. August 18, 2006. Available in email.
U.S. Department of State 2006 Summary Privacy Impact Assessment. October 2004. Available in email.
10/13 New Technology, Old Rules
Winn, P., "Judicial Information Management in an Electronic Age: Old Standards, New Challenges", July 24, 2009. Federal Courts Law Review, Forthcoming. (Access through UC Berkeley proxy.)
Familiarize yourself with RECAP.
Refresh: Surden, Harry, Structural Rights in Privacy. SMU Law Review, Vol. 60, pp. 1605-1629, 2007.
Perez, M., Report on Voter Purges, Brennan Center for Justice October 03, 2008. Read § II C and III.
Stuart, G., "Databases, Felons, and Voting: Errors and Bias in the Florida Felons Exclusion List in the 2000 Presidential Elections" (September 2002). KSG Working Paper Series RWP 02-041. Read pp. 22-40
10/27 Geolocation and the W3C (Nick Doty)
Nick Doty, Deirdre K. Mulligan and Erik Wilde. "Privacy Issues of the W3C Geolocation API". February 2010.
W3C Geolocation WG thread on "Intended usage notification". Don't worry about the technical detail, just skim to get some idea of the differing points of view. Note in particular responses from Hixie (Ian Hickson, Google) and Doug Turner (Mozilla). (If you follow the thread into April, you can also see my input.)
Aza Raskin and Arun Ranganathan. "Privacy: A Pictographic Approach". W3C Workshop on Privacy for Advanced Web APIs, July 2010.
Nick Doty and Erik Wilde. "Simple Policy Negotiation for Location Disclosure". W3C Workshop on privacy and data usage control, October 2010.
11/3 Legal Barriers to Oversight
Second reflection piece due.
Hall J.L., "Contractual Barriers to Transparency in Electronic Voting", In Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT'07), 2007.
Levine, D.S., "Secrecy and Unaccountability: Trade Secrets in Our Public Infrastructure", Florida Law Review, Forthcoming. Read pp. 135-145; 162-177; 180-182
"Legal issues facing election officials in an Electronic-voting world", Samuelson Law, Technology & Public Policy Clinic University of California-Berkeley School of Law (Boalt Hall). Read § I, II and III.
11/10 Problems of Identification and Expertise: RFID Documents
Freeman, Jody, Private Parties, Public Functions and the New Administrative Law.
Bamberger, Kenneth A., Regulation as Delegation: Private Firms, Decisionmaking, and Accountability in the Administrative State. Duke Law Journal, Vol. 56, No. 2, p. 377, November 2006. READ §I.C. ONLY (Access through UC Berkeley proxy.)
Citron, Danielle Keats, Technological Due Process. U of Maryland Legal Studies Research Paper No. 2007-26; Washington University Law Review, Vol. 85, pp. 1249-1313, 2007. READ § I.A., II.B.2, III.C.2. (Access through UC Berkeley proxy.)
Review Levine, Hall, Freeman, Citron and Bamberger papers in relation to the various case studies we've looked at (court records, RFID passports, voter purges, voting systems, Geolocation API) or another that is of interest to you.
"Guidelines for Ensuring and Maximizing the Quality, Objectivity, Utility, and Integrity of information Disseminated by Federal Agencies; Republication". Office of Management and Budget. Available in email.
"Protecting Special Interests in the Name of 'Good Science'". Linda Rosenstock. (Reprinted) JAMA, May 24/31, 2006, Vol 295, No. 20. Available in email.
"Transparency in Public Science: Purposes, Reasons, Limits". Sheila Jasanoff. Also available in email.
EPIC v. the Department of Homeland Security. Read relevant sections of the final privacy impact assessment, the operational requirements and the procurement specifications.