Days: Wednesday, May 15th Thursday, May 16th Friday, May 17th
View this program: with abstractssession overviewtalk overview
09:30 | ‘Law, Regulation & Technology’: Prospects and pitfalls for a fledgling field (abstract) |
10:45 | Diverging Legal Development in the Regulation of Data Localization in Southeast Asia (abstract) |
11:15 | How can the experience of the data breach notification obligations in the law of the United States be beneficial for the interpretation of the new personal data breach notification obligations pursuant to GDPR? (abstract) |
10:45 | Market inalienability of personal data and incomputability of the self in the age of digital imbalance (abstract) |
11:15 | Turning Data Protection Upside Down and Placing It on Its Feet (abstract) |
11:45 | A Right to a Rule - On the essence and rationale of the fundamental right to personal data protection (abstract) |
10:45 | Striving for effective control in digital rights enforcement: a dialogue between data protection, competition and consumer law (abstract) |
10:45 | The Chilling Effects of Governance-by-Data on Innovation (abstract) |
11:15 | You Don’t Own Your Tractor: Redefining Ownership in the Internet of Things (abstract) |
11:45 | Evaluating the EC Private Data Sharing Principles: Setting a Mantra for Artificial Intelligence Nirvana? (abstract) |
10:45 | Data justice and indigenous data sovereignty in the context of traditional knowledge and digital libraries: a law & humanities perspective (abstract) |
11:15 | (Big) Data and the North-in-South: Australia’s Informational Imperialism and Digital Colonialism (abstract) |
10:45 | RoboJudge says what? An exploration of capabilities and potential effects of predicting court decisions (abstract) |
11:15 | Regulating Unreality (abstract) |
Privacy is usually protected in the law through proxies. Often, the law uses as proxies certain ‘containers’ of private life, for instance protection of homes and communication channels, which protect these spaces regardless whether the contents are privacy-sensitive in particular cases. Proxies can also be content-related, protecting the substance of private life and using proxies to capture this substance; for instance, data protection law protects all personal data quapersonal data (even if the data are not privacy-relevant) and protects “sensitive” data using as proxy “special categories of data”, while criminal law protects certain categories of secrets and of confidential communications. Both approaches are useful, but neither can capture privacy perfectly: the proxies are only approximations of privacy, often being both too broad (covering also privacy-irrelevant cases) and too narrow (failing to cover certain privacy-relevant cases). This panel – the first of two panels in the context of Bert-Jaap Koops’s VICI project on ‘Privacy in the 21stcentury’ – will discuss the different approaches in law to protecting privacy and the pros and cons of ‘container’ and ‘contents’ approaches, applied to contexts of contemporary privacy challenges.
10:45 | Three approaches to privacy protection: containers, contents, contacts (abstract) |
11:05 | Thinking geologically about privacy protection in cyberspace (abstract) |
11:25 | Responsibility in Personal Data Stores. Imperfections and implications for users, platforms and third parties (abstract) |
Keynote Intellectual Property and Innovation
12:15 | Contesting Algorithms (abstract) |
14:00 | Algorithmic discrimination and the protection of group privacy in European law (abstract) |
14:30 | Anti-discrimination law and, group privacy — Establishing conceptual clarity in face of Big Data challenges (abstract) |
15:00 | The non-personality-trap and the case of group profiling. A feasible solution? (abstract) |
14:00 | PANEL “Protecting against data-driven harms in a data-driven world’ (abstract) |
14:00 | DIGITAL CLEARINGHOUSE PANEL: Governance of data sharing at the interface of data protection, competition and innovation (abstract) |
14:00 | General Freedom of Action and the New Right for Press Publishers (abstract) |
14:30 | Art at the Intersection of AI and Copyright Law (abstract) |
15:00 | Author MIA. Place of journalists in the post-press publishers’ right world. (abstract) |
14:00 | The quest for a B2B sharing economy of data in the EU (abstract) |
14:30 | Algorithmic decision-making, price discrimination, and non-discrimination law (abstract) |
15:00 | Impacts of Data Brokerage and Behavioural Advertising on the Right to Privacy and The Rule of Law (abstract) |
14:00 | Towards transparency by design for AI: How to determine the desirable degree of transparency in AI environments? (abstract) |
14:30 | Ethical by Design? Responsible Research and Innovation using the Moral-IT Deck of Cards (abstract) |
15:00 | Ethical and Responsible Internet of Things: The Edinburgh Initiative (abstract) |
This panel – the second panel in the context of Bert-Jaap Koops’s VICI project on ‘Privacy in the 21stcentury’ – will discuss challenges of safeguarding privacy in the context of surveillance and criminal investigation. A general challenge is how to distinguish between major and minor privacy intrusions, now that classic yardsticks (such as distinctions between private places and public places, or between inside and outside of the body) have become less meaningful to assess the privacy impact of surveillance activities. More specific challenges are, for example, how to safeguard privacy in contexts of computer searches, covert remote searches, surveillance in public space, and access to data stored with service providers. Every jurisdiction faces these challenges, but they come up with different answers and approaches to address them. Comparative outlooks are fruitful for law-makers and researchers who consider these issues within their own jurisdiction, as examples from different countries and cultures may provide inspiration and inspire out-of-the-box thinking. This panel features three perspectives from different jurisdictions and cultures, illustrated with various technological developments in criminal investigation and surveillance.
14:00 | Differentiating between Privacy Infractions (abstract) |
14:30 | Technology, Privacy and Criminal Law: Understanding the Change in the Czech Republic (abstract) |
15:00 | Stratumseind 2.0, Living Labs, and Preserving Privacy in Smart Cities (abstract) |
16:00 | Digital Revolution and Constitutional Change: Data Protection as a Case Study (abstract) |
16:30 | What is an abuse of data subject rights? Fear, facts and fiction about the use of data protection rights in a post-GDPR world (abstract) |
17:00 | The right of access: A genealogy (abstract) |
16:00 | “Alexa, cover your ears!”: an analysis of the application of the GDPR to AI powered Home Assistants. (abstract) |
16:30 | Making Sense of Mobile App Privacy Policies: Unsupervised Machine Learning Topic Extraction Techniques Reveal Content and Structure Patterns (abstract) |
17:00 | The next challenge for data protection law: AI revolution in automated scientific research (abstract) |
16:00 | Digital Clearinghouse PANEL: Challenges of regulating non-monetary price markets (abstract) |
16:00 | Empirical study of the design protection in Europe (abstract) |
16:30 | The case for a single, mandatory and broad EU copyright exception for text and data mining (abstract) |
17:00 | Reconciling user-rights approach in copyright with the current EU copyright framework and CJEU case law (abstract) |
16:00 | A Model for Tort Liability in a World of Driverless Cars: Establishing a Framework for the Upcoming Technology (abstract) |
16:30 | Autonomous Vehicles: Key Elements of a Theoretical Legal Framework (abstract) |
17:00 | Should autonomous cars be liable for the payment of taxes? (abstract) |
16:00 | SUPERVISION OF OFFSHORE OIL AND GAS EXPLORATION AND PRODUCTION AND THE INDEPENDENCE OF THE REGULATORY AUTHORITIES (abstract) |
16:30 | Towards Cross Border Local Energy Communities – a Case for EU Regulation? (abstract) |
17:00 | The citizen as both prosumer of energy and its potential victim: insights from the ‘AnalyzeBasilicata’ case (abstract) |
View this program: with abstractssession overviewtalk overview
09:00 | Diagnosis: Regulatory Disconnection - time to reorganize data protection law? (abstract) |
09:30 | Trust and the Smell of Data: a Postphenomenological Experiment (abstract) |
10:00 | Data protection through work floor democracy: The German and Dutch example (abstract) |
09:00 | Workshop: The Practical Implementation of the EU Data Strategy (abstract) |
09:00 | Towards an optimal regulation for innovative markets? An example of data sharing under PSD2 (abstract) |
09:30 | The Interface between Big Data & Intellectual Property (abstract) |
10:00 | European Regulation of Mobile Platforms (abstract) |
09:00 | Profiling and Chilling Effects: Exploring the Behavioral Mechanisms (abstract) |
09:30 | Nudging the sharing of data in a fair way (abstract) |
09:00 | Right to Explanation and Algorithmic Transparency in the EU Member States Legislations and beyond (abstract) |
09:30 | Problematising ‘Algorithmic Accountability’: Why Shift the Analysis from Function to Form? (abstract) |
09:00 | PANEL: Technology Law as a Coherent Field? (abstract) |
Keynote Data Protection
11:00 | DP:=PDF (abstract) |
11:45 | Radical Visibility (abstract) |
12:15 | The Wiretapping of Things (abstract) |
12:45 | In search of Privacy Action Points: Contemporary Software Engineering Practice and Privacy by Design (abstract) |
11:45 | Personal data transfers in international trade and EU law: A tale of two "necessities" (abstract) |
12:15 | Trade Secrets, models & personal data: conflict in waiting? (abstract) |
12:45 | Economic Drivers Behind “The Law of Everything” (abstract) |
11:45 | Blockchain for the Energy Transition: Rule of Code versus Rule of Law? (abstract) |
12:15 | Smartening up while keeping safe? Advances in smart metering and data protection in EU law (abstract) |
11:45 | Copyright in the Digital Era: Abandoning the Property-Based Model of Protection (abstract) |
12:15 | Ownership norms and creative works in anonymous online communities: a conflict of values with copyright law? (abstract) |
12:45 | Selective Copyright Enforcement: the Difference between A Fan and a Pirate (abstract) |
11:45 | PANEL: Access rights as a research tool (abstract) |
11:45 | Disjunctive Temporal Forms: Fairness, Bias, and Pre-Emptive Algorithmic Decision-Making Systems (abstract) |
12:15 | Legality and Democratic Deliberation in Black Box Policing (abstract) |
12:45 | How to regulate machine-learning algorithms that optimize the law-making itself? (abstract) |
11:45 | PANEL: A General Framework for Identifying Technology-Driven Legal Disruption: the Case of Artificial Intelligence (abstract) |
Keynote Digital Clearinghouse
14:15 | Redesigning regulation for digital platforms (abstract) |
15:00 | Calculating the citizen: the role of equality in automated decision-making in Dutch law enforcement (abstract) |
15:30 | Understanding vs. Accounting for Automated Systems: The Case of the Seattle Surveillance Ordinance (abstract) |
15:00 | Enhanced KYC-AML Compliance via Distributed Ledgers (abstract) |
15:30 | Crypto-assets under European financial law. Where norms' scope and enforcement's reach stop. (abstract) |
15:00 | Blockchain and climate finance law: A perpetual synergy or a one-way street? (abstract) |
15:30 | Digital Technologies for Land Use, Land Use Change and Forestry Reporting under the Paris Agreement - A Game Changer for the Better? (abstract) |
16:00 | Secondary use of sensitive data in observational studies: the impact of the Italian GDPR implementation law on retrospective biomedical research (abstract) |
15:00 | PANEL: European Data Economy and Regulation of Data (abstract) |
15:00 | A Robot in Every Home. Automated Care-Taking and the Constitutional Rights of the Patient in an Aging Population (abstract) |
15:30 | Automated journalism and the Freedom of Information: Ethical and Juridical Problems of the AI in the Press Field (abstract) |
16:00 | Artificial Intelligence and Privacy: An Exploration Through Five Encounters (abstract) |
15:00 | PANEL: Privacy in the times of bulk state surveillance and law enforcement access to citizen’s data (abstract) |
Keynote AI and Responsibility
17:00 | Responsible Artificial Intelligence (abstract) |
View this program: with abstractssession overviewtalk overview
09:00 | Exploring the emergence of GDPR and Cyber security certification (abstract) |
09:00 | Data of Public Undertakings – Towards a Common Framework (abstract) |
09:30 | Data Standardization: Portability and Interoperability in an Interconnected World (abstract) |
10:00 | Data, Innovation and Transatlantic Competition in Finance: The Case of the Access to Account Rule (abstract) |
09:00 | The sense and scope of the protection of Cyber consumers in the French legal system Insights from the mobile wellness applications (abstract) |
09:30 | SAFETY? SECURITY/ TWO CULTURES? Rearticulating safety and security cultures critical infrastructures through the lens of co-production (abstract) |
09:00 | The role of courts in anti-innovative patent enforcement (abstract) |
09:30 | Mind the Gap (abstract) |
09:00 | Dutch big data practices for prevention: measuring the (un)reliability of citizens? (abstract) |
09:30 | Corporate responsibility, empathic technology and the (expected) invasion of privacy: A media analysis of Facebook’s AI suicide prevention program (abstract) |
09:00 | PANEL BotLeg I: Public-private actions against botnets: issues of legitimacy and governance (abstract) |
Keynote Health and Environment
11:00 | Too clever by half? What the regulation of AI might want to learn from environmental law? (abstract) |
11:45 | Personal data management and privacy management: barriers and stepping stones (abstract) |
12:15 | Improving privacy choice through design: How designing for reflection could support privacy self-management (abstract) |
11:45 | PANEL: Data Subjects as Data Controllers (abstract) |
11:45 | Assessing Legal Liability for Harm by Fully Autonomous AI (abstract) |
12:15 | Organising the regulation of algorithms: comparative legal lessons (abstract) |
11:45 | PANEL: Workshop on AI, Robotics and Legal Responsibility in the Age of Big Data (abstract) |
11:45 | PANEL Botleg II: Public-private actions against botnets: improving law and practice (abstract) |
Keynote Justice and the Data Market
14:15 | Beyond Privacy? Protective Optimization Technologies (abstract) |
15:00 | Capturing licence plates: police participation apps from an EU data protection perspective (abstract) |
15:30 | Human rights in personal data processing: An analysis of the French and UK approach (abstract) |
16:00 | Detecting new approaches for a Fundamental Rights Impact Assessment to Automated Decision-Making (abstract) |
15:00 | The Regulation of Online Political Microtargeting in Europe (abstract) |
15:30 | From parallel tracks to overlapping layers: GDPR and e-Commerce Directive towards convergence of legal regimes (abstract) |
16:00 | Personalised pricing and EU law (abstract) |
15:00 | PANEL: To Decentralize Everything, Hash Here: Blockchains and Information Law (abstract) |
15:00 | PANEL : Explaining Responsibly (abstract) |
15:00 | PANEL: Addressing responsibility concerns about AI through the practice approach (abstract) |