- Computational Social Science
- Critical Data Studies
- Data Science
- Economics and Information
- Education Technology
- Ethics, Law and Policy
- Human-Computer Interaction
- Human-Robot Interaction
- Incentives and Computation
- Infrastructure Studies
- Interface Design and Ubiquitous Computing
- Natural Language Processing
- Network Science
- Social Computing and Computer-supported Cooperative Work
- Technology and Equity
The Tech/Law Colloquium speaker for September 19, 2017 will be Woodrow Hartzog, a professor of law and computer science at Northeastern University, where he teaches privacy and data protection law, policy, and ethics. His recent work focuses on the complex problems that arise when personal information is collected by powerful new technologies, stored, and disclosed online.
Talk: Privacy’s Blueprint: The Battle to Control the Design of New Technologies
Catch this talk live or at your convenience here.
Abstract: Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is mainly up to users to protect themselves—even when the odds are deliberately stacked against them.
We should resist this state of affairs. Instead, the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it is value-neutral: only the user decides whether it functions for good or ill. But this is not so. Popular digital tools are designed to expose people and manipulate users into disclosing personal information.
Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. We must develop the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.