DS457/DS657/JD673: Law and Algorithms
Course Overview
This cross-cutting and interdisciplinary course, taught jointly between the School of Law, the faculty of Computing and Data Sciences, and Computer Science investigates the role that algorithms and automated decision-making systems play in law and society. The course connects legal and computational concepts of transparency, fairness, bias, trust, and privacy, though a series of case studies that present recent applications of technology to legal and regulatory situations and explore the challenges in regulating algorithms.
Legal concepts explored will include evidence and expert witnesses, anti-discrimination law concepts of disparate impact and disparate treatment, sectoral information privacy regimes, and public access and transparency laws. Computational concepts explored will include artificial intelligence and machine learning, secure multi-party computation, differential privacy, and zero-knowledge proofs.
Syllabus
This course will meet in LAW 204 in the Law Tower. The syllabus for this course can be found as a PDF here.
Readings
Class 1: Intro to Law and Algorithms (Jan. 20)
Required
Intro to Computational Thinking:
- Kristian Lum & Rumman Chowdhury, What is an “Algorithm?” It Depends Whom You Ask, MIT Tech. Review (Feb. 26, 2021) – read all. (A copy of this is also available from the instructors if you cannot access this website.)
- Gerd Gigerenzer, Ralph Hertwig, Eva van den Broek, Barbara Fasolo, and Konstantinos V. Katsikopoulos, “A 30% Chance of Rain Tomorrow”: How Does the Public Understand Probabilistic Weather Forecasts?, 25 Risk Analysis 623 (2005) — read parts 1, 2, 5, and 6.
- Rebecca Kelly Slaughter, Algorithms and Economic Justice, UCLA Law (2020) – read Section II only
Intro to Law and Legal Thinking
- Andrew Sellars, A Practical Introduction to United States Law for Technologists – Law students can skim, as it will be largely familiar to you already. CS students read all.
Law, Algorithms, and Power:
- Ari Ezra Waldman, Power, Process, and Automated Decision-Making, 88 Fordham L. Rev. 613 (2019) – read Section I only
- Catherine D’Ignazio and Lauren F. Klein, “The Power Chapter,” from Data Feminism (2020) – read sections on “Data Science by Whom?” and “Data Science for Whom?”
Influences and Collisions Across Domains:
- Langdon Winner, Do Artifacts Have Politics?, 109 Daedalus 121 (1980) – read “Technical Arrangements and Forms of Order,” pp. 123–28.
- Joel Reidenberg, Lex Informatica: The Formulation of Policy Rules through Technology, 76 Tex. L. Rev. 553 (1997) – read section III only, pp. 568–76.
- Edward K. Cheng, Fighting Legal Innumeracy, 17 Green Bag 2d 271 (2014) – read section II only.
Optional
The social effect of algorithms:
- Ian Bogost, The Cathedral of Computation, The Atlantic (Jan. 15, 2015)
- Alan R. Wagner, Jason Borenstein, Ayanna Howard, Overtrust in the Robotic Age, Comm. of the ACM (Sept. 2018) "Overtrust in the Robotic Age"
- Madeline Clare Elish, Don’t Call AI “Magic”, Data & Society (Jan. 17, 2018)
The regulation of algorithms:
- Danielle Keats Citron, Technological Due Process, 85 Wash. U.L. Rev. 1249 (2008)
- Tal Zarsky, The Trouble With Algorithmic Decisions, 41 Science, Technology, & Human Values 118 (2016)
- Olivier Sylvain, Regulating AI: The Question Now is No Longer Whether, But How, Balkinization (Dec. 22, 2020)
- Plus many, many more readings to come in subsequent classes!
More introductory law & algorithm readings:
- David Aurebach, The Stupidity of Computers, n+1 (2012)
- Lawrence Solum, Legal Theory Lexicon: The Common Law, Legal Theory Blog (Jan. 31, 2021)
- Daniel Kunin, Jingru Guo, Tyler Dae Devlin, and Daniel Xiang, Seeing Theory: A Visual Introduction to Probability and Statistics
- Rob Kitchin, “Conceptualizing Data,” from The Data Revolution (2014).
Algorithms and power:
- Ruha Benjamin, 2020 Vision: Reimagining the Default Settings of Technology & Society (2020)
Class 2 – The Development and Legal Protection of Software (Jan. 27)
Required
The Problem:
- Lauren Kirchner, Powerful DNA Software Used in Hundreds of Criminal Cases Faces New Scrutiny, The Markup (March 9, 2021) – read all
Introduction to Software Development:
- James Grimmelman (with Solon Barocas), CPU, Esq: Should Law Be More Like Software?, DIMACS Workshop on Co-development of CS and Law (2020) — watch 19:30 through 27:15
- Ken Thompson, Reflections on Trusting Trust, Turing Award Lecture 1984
- All About Software, How does a compiler, interpreter, and CPU work?
Intellectual Property and Software:
- If you are new to field of intellectual property, review these introductory concepts from the Digital Media Law Project: Intellectual Property, Copyright, and Trade Secrets.
- Sonia Katyal, The Paradox of Source Code Secrecy, 104 Cornell L. Rev. 1183 (2019) – read Parts I(C) & I(D) (“The Copyrightability of Software”and “The Continuing Overlap Between Copyright and Trade Secrecy”); the introduction to Part IV (the beginning of “Due Process in an Age of Delegation”) and Part IV(B) (“The Constitutional Cost of Secrecy”).
- Rebecca Wexler, Life, Liberty, and Trade Secrets, 70 Stan. L. Rev. 1343 (2018) – read Part I (“Trade Secrets in the Criminal Justice System”)
The Role of CS Experts in Law Enforcement Procurement:
- Catherine Crump, Surveillance Policy Making by Procurementi, 91 Wash. L. Rev. 1595 (2016) – read introduction to part IV and parts IV(B) and IV(C).
The Role of CS Experts in Criminal Trial:
- Eric S. Lander, Fixing Rule 702: The PCAST Report and Steps to Ensure the Reliability of Forensic Feature-Comparison Methods in the Criminal Courts, 86 Fordham L. Rev. 1661 (2018)
Optional
No Readings Posted YetClass 3 – Putting the TrueAllele Algorithm on Trial (Feb. 3)
Required
TrueAllele on Trial
- People v. Superior Court (Chubbs) (Cal. Ct. App. Jan. 9, 2015) – read excerpt
- State v. Pickett, 246 A.3d 279 (N.J. App. Div. 2021) – read excerpt
Transparency as a Solution and its Critics
- Steven Bellovin, Matt Blaze, Susan Landau, & Brian Owsley, Seeking the Source: Criminal Defendants’ Constitutional Right to Source Code, 17 Ohio State Tech. L.J. 1 (2021) – read section II(D) only, pp. 31–40
- Mike Annany & Kate Crawford, Seeing Without Knowing: Limitations of the Transparency Ideal and its Application to Algorithmic Accountability, 20 New Media & Society 973 (2016) – read “Limits of the transparency ideal” section, pp. 977–82
- Joshua Kroll, Joanna Huey, Solon Barocas, Edward Felten, Joel Reidenberg, David Robinson, & Harlan Yu, Accountable Algorithms, 165 U. Penn. L. Rev. 633 (2017) – read parts II(A) and II(B) only, pp. 657–62
Broader Solutions and Impediments:
- Todd Feathers, Why It’s So Hard to Regulate Algorithms, The Markup (Jan. 4, 2022).
- Andrea Roth, Machine Testimony, 126 Yale L.J. 1972 (2017) – read Section III(A) only, pp. 2023–35
Optional
Briefing Courts on Forensic Technology:
- Brief of Mats Heimdahl and Jenna Matthews as Amicus Curiae, New Jersey v. Pickett (N.J. App. Div. filed Oct. 14, 2020)
Regulatory responses to Forensic Technology
- NIST Publishes Review of DNA Mixture Interpretation Methods, NIST (June 9, 2021)
- IEEE-USA, RFC Response: NIST Internal Report 8351-DRAFT DNA Mixture Interpretation: A NIST Scientific Foundation Review (Nov. 18, 2021)
Transparency
- Rashida Richardson, Jason M. Schultz, and Vincent M. Sutherland, Litigating Algorithms: 2019 Report, AI Now (2019)
Class 4 – The COMPAS Algorithm and the Optimization Paradox (Feb. 10)
Required
Defining Fairness
- Adam Pearce, Measuring Fairness, Google PAIR (2020) – read all
- Deborah Hellman, What is Discrimination, when is it wrong, and why? Plenary talk at the Conference for Fairness, Accountability, and Transparency (2018) – watch the keynote itself (from 3:37–51:15)
History of Risk Prediction
- Andrew G. Ferguson, Policing Predictive Policing, 94 Wash. U. L. Rev. 1109 (2017) – read Section I only
The COMPAS Algorithm
- Julia Angwin & Jeff Larson, Machine Bias, ProPublica (May 23, 2016) – read all
- State v. Loomis, 881 N.W.2d 749 (Wisc. 2016) – read excerpt
The Optimization Paradox
- Julia Angwin & Jeff Larson, Bias in Criminal Risk Scores Is Mathematically Inevitable, Researchers Say, ProPublica (Dec. 30, 2016) – read all
- Karen Hao and Jonathan Stray, Can you make AI fairer than a judge? Play our courtroom algorithm game, MIT Technology Review (2019) – read all, and play with the interactive elements
Optional
Formal models of fairness and optimization:
- Sorelle A. Friedler, Carlos Scheidegger, & Suresh Venkatasubramanian, The (Im)possibility of Fairness: Different Value Systems Require Different Mechanisms For Fair Decision Making, 64 Comm. of the ACM (2021)
- Jon Kleinberg, Sendhil Mullainathan, and Manish Raghavan, Inherent Trade-Offs in the Fair Determination of Risk Scores, 43 ITCS 1 (2017)
A Return to Transparency:
- Jeff Larson, Surya Mattu, Lauren Kirchner and Julia Angwin, How We Analyzed the COMPAS Recidivism Algorithm, ProPublica (May 23, 2016)
Class 5 – Is There a “Right” Way to Use Algorithms in Criminal Sentencing? (Feb. 17)
Required
Human/Algorithm Dissonance:
- Laurel Eckhouse, Kristian Lum, Cynthia Conti-Cook, Julie Ciccolini, Layers of Bias: A Unified Approach for Understanding Problems With Risk Assessment, 46 Crim. Justice & Behavior 185 (2019) – read “Human Judgment is also Biased” (pp. 201–04) only
- Angèle Christin, Alex Rosenblat, and danah boyd, Courts and Predictive Algorithms, Data & Society (Oct. 27, 2015) – read pp. 6–9 (“Using algorithms in the criminal justice system: shifting discretion” and “‘Overrides,’ incarceration, and the role of punishment”) only
- Julia Dressel & Hany Farid, The Dangers of Risk Prediction in the Criminal Justice System, MIT Case Studies in Social and Ethical Responsibilities of Computing (Feb. 10, 2021) – read “Comparing Human and Algorithmic Recidivism Prediction” only
The Data Source Problem:
- Ngozi Okidegbe, Discredited Data: Epistemic Violence, Technology, and the Construction of Expertise (May 2021) – watch 4:53–31:32
What is the right model of “fairness”?
- Sandra G. Mayson, Bias In, Bias Out, 128 Yale L.J. 2219 (2019) – read sections III(B)(2) (pp. 2270–77) and IV(D) (pp. 2294–96) only
- Deborah Hellman, Measuring Algorithmic Fairness, 106 Va. L. Rev. 811 (2020) — read Section II (pp. 834–46) only
- Aziz Huq, Racial Equity in Algorithmic Criminal Justice, 68 Duke L.J. 1043 (2019) – read Section III(D) (1123–1133) only
The bigger picture
- Ben Green, The False Promise of Risk Assessments: Epistemic Reform and the Limits of Fairness, Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency (2020) – read parts 4.1 and 4.2 (pp. 600–02) only
- Chelsea Barabas, Beyond Bias: Re-imagining the Terms of “Ethical AI” in Criminal Law, 12 Geo. J. L. & Mod. Crit. Race Persp. 83 (2020) – read Part VI (pp. 106–11) only
Optional
- Rashida Richardson, Jason M. Schultz, and Kate Crawford, Dirty Data, Bad Predictions: How Civil Rights Violations Impact Police Data, Predictive Policing Systems, and Justice, 94 N.Y.U. L. Rev. 192 (2019)
- Ran Canetti, Aloni Cohen, Nishanth Dikkala, Govind Ramnarayan, Sarah Scheffler, and Adam Smith, From Soft Classifiers to Hard Decisions: How fair can we be?, FAT* (2019)
- Virginia Foggo, John Villasenor, & Pratyush Garg, Algorithms and Fairness, 17 Ohio St. Tech. L.J. 123 (2021)
- Andrew Morgan & Rafael Pass, Paradoxes in Fair Computer-Aided Decision Making (2018)
- Anne Washington, How to Argue with an Algorithm: Lessons from the COMPAS ProPublica Debate, 17 Colo. Tech. L.J. 131 (2018)
- Jon Kleinberg, Himabindu Lakkaraju, Jure Leskovec, Jens Ludwig & Sendhil Mullainathan, Human Decisions and Machine Predictions, 133 Quart. J. of Econ. 237 (2018)
Class 6 – Artificial Intelligence and Anti-Discrimination Laws (Feb. 24)
Required
Intro to AI/ML and its Limits:
- Noah Yonack, A Non-Technical Introduction to Machine Learning, SafeGraph (March 3, 2017) – read all
- Yufeng Guo, The 7 Steps of Machine Learning, Google Cloud – watch all
- Aravind Narayanan, How to Recognize AI Snake Oil (2019) – read all
- https://playground.tensorflow.org/ – Play with the model
Algorithms and Bias
- Timnit Gebru, Race and Gender, in The Oxford Handbook of Ethics of AI (2020) – read following sections, circulated separately:
- "Using Past Data to Determine Future Outcomes Results in Runaway Feedback Loops”
- “AI-Based Tools are Perpetuating Gender Stereotypes”
- “Power Imbalance and the Exclusion of Marginalized Voices in AI”
- “Education in Science and Engineering Needs to Move away from ‘the View from Nowhere’”
- Ruha Benjamin, Race After Technology (2019) – read “Raising Robots,” circulated separately
- Solon Barocas & Andrew Selbst, Big Data’s Disparate Impact, 104 Cal. L. Rev. 671 (2016) – read part I only (pp. 677–92)
Algorithms and Antidiscrimiantion Laws
- Emmanuel Martinez & Lauren Kirchner, The Secret Bias Hidden in Mortgage-Approval Algorithms, The Markup (Aug. 25, 2021)
- Elisa Jillson, Aiming for Truth, Fairness, and Equity in Your Company’s Use of AI, FTC (April 19, 2021) – read all
- Talia Gillis, The Input Fallacy, Minn. L. Rev. (forthcoming 2022) – read section I(C) (pp. 22–29) only
Optional
- Batya Friedman & Helen Nissenbaum, Bias in Computer Systems, 14 ACM Transactions on Info. Sys. 330 (1996)
- Betsy Anne Williams, Catherine Brooks, and Yotam Shmargad, How Algorithms Discriminate Based on Data They Lack: Challenges, Solutions, and Policy Implications, 8 J. Info. Policy 78 (2018)
- Winnie F. Taylor, The ECOA and Disparate Impact Theory: A Historical Perspective, 26 J. L. & Pol’y 575 (2018).
- Example of Reinforcement Learning: Mario
- Brief Introduction to Machine Learning
Class 7 – Can Algorithms Mitigate Bias? (March 3)
Required
Adjustments to models:
- Manish Raghavan, Solon Barocas, Jon Kleinberg, and Karen Levy, Mitigating Bias in Algorithmic Hiring: Evaluating Claims and Practices, FAT* (2020) – read sections 2 and 5 only (pp. 3–5, 13–16)
Adjustments to model evaluations:
- Alfred Ng, Can Auditing Eliminate Bias from Algorithms?, The Markup (Feb. 23, 2021)
- Margaret Mitchell, Simone Wu, Andrew Saldivar, Parker Barnes, Lucy Vasserman, Ben Hutchinson, Elena Spitzer, Inioluwa Deborah Raji, & Timnit Gebru,Model Cards for Model Reporting, FAT* (2019) – read Section 2, Section 3, and Section 4, as well as the example model cards
- Emily Bender, Timnit Gebru, Angelina McMillan-Major, & Margaret Mitchell, On the Dangers of Stochastic Parrots: Can Language Models Be Too Big?i FAccT (2021) – read sections 7 and 8 only
New Laws:
- Kristin Bryan, Federal Lawmakers in House and Senate Introduce Algorithmic Accountability Act of 2022, Nat’l Law Review (Feb. 11, 2022) – read all
- Matthew Jedreski, Erik Mass, K.C. Halm, New York City's Groundbreaking New Law Will Require Audits of AI and Algorithmic Systems That Drive Employment Decisions, Davis Wright Tremaine (Dec. 13, 2021) – read all
Working within existing anti-discrimination law:
- Jason R. Bent, Is Algorithmic Affirmative Action Legal?, 108 Geo. L.J. 803 (2020) – read Section II from intro to end of Section II(D) (pp. 824–41)
- Ifeoma Ajunwa,The Paradox of Automation As Anti-Bias Intervention, 41 Cardozo, L. Rev. 1671 (2020) – read section IV(B) only (pp. 1726–34)
Optional
- Ram Shankar Siva Kumar, Jeffrey Snover, David O’Brien, Kendra Albert, & Salomé Viljoen, Failure Modes in Machine Learning, Microsoft (Nov. 11, 2019)
- Thomas Liao, Rohan Taori, Inioluwa Deborah Raji, Ludwig Schmidt, Are We Learning Yet? A Meta-Review of Evaluation of Failures Across Machine Learning, NeurIPS (2021)
- Shakir Mohamed, Marie-Therese Png & William Isaac, Decolonial AI: Decolonial Theory as Sociotechnical Foresight in Artificial Intelligence, 33 Philosophy & Technology 659 (2020)
- Anupam Chander, The Racist Algorithm?, 115 Mich. L. Rev. 1023 (2017)
- Crystal S. Yang & Will Dobbie, Equal Protection Under Algorithms: A New Statistical and Legal Framework, 119 Mich. L. Rev. 291 (2020)
- Alice Xiang, Reconciling Legal and Technical Approaches to Algorithmic Bias, 88 Tenn. L. Rev. (2020)
- Zach Harned & Hanna Wallach, Stretching Human Laws to Apply to Machines: The Dangers of a “Colorblind” Computer, 47 Fla. St. U. L Rev. 617 (2020)
Class 8 – Vote by Paper, Vote by Mail, Vote by Smartphone (March 17)
Required
Algorithms and Trust:
- Ethan Zuckerman, “The Economics of Mistrust,” in The End of Trust (2018) – read all, circulated separately
- Brian Stanton & Theodore Jensen, Trust and Artificial Intelligence, NIST (March 2021) – read sections 2 and 3 only (pp. 1–6)
Case Study: Voting
- 950 Code of Mass. Reg. Part 50 – read all (These are the regulations issued by the Office of the Secretary of the Commonwealth around certification of voting equipment)
- 950 Code of Mass. Reg. Part 54 – read § 54.02 and § 54.06 only (These are the regulations around local testing and counting of optical-scan ballots.)
- 950 Code of Mass. Reg. Part 52 – read § 52.04 only (These are the regulations around counting of (non-scanning) paper ballots.)
- Cory Doctorow, Voting Machines Didn’t Steal the Election. But Most are Still Terrible Technology., Wash. Post (Feb. 3, 2021) – read all
- Ron Rivest, John Wack On the Notion of "Software Independence" in Voting Systems (2006) - read Sections 1-3
- Svetlana Lowry & Poorvi Vora, Desirable Properties in Voting Systems, NIST (Sept. 25, 2009) – read sections 1 and 2
- Sunoo Park, Michael Specter, Neha Narula, & Ronald Rivest, Going from Bad to Worse: From Internet Voting to Blockchain Voting (2020) – read section 2 only
Optional
- Douglas Jones, A Brief Illustrated History of Voting (2003)
- Holly Ann Garnett & Pam Simpson, American Trust in Voting Technology (2019)
- Kevin Anthony Hoff & Masooda Bashir, Trust in Automation: Integrating Empirical Evidence on Factors That Influence Trust, 57 Human Factors 407 (2015)
- Michael A. Specter, James Koppel, Daniel Weitzner, The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections, USENIX Security (2020)
- Jill Lapore, Rock, Paper, Scissors, New Yorker (Oct. 6, 2008)
Class 9 – How Do We Trust the Vote? (March 24)
Required
Risk Limiting Audits:
- Mark Lindeman & Philip B. Stark, A Gentle Introduction to Risk-limiting Audits (March 2012) – Read all
- El Dorado County 2020 Risk Limiting Audit Summary — Read all
- El Dorado County 2020 Risk Limiting Audit Data — Download spreadsheet and skim
Zero-Knowledge Proofs:
- Kenneth A. Bamberger, Ran Canetti, Shafi Goldwasser, Rebecca Wexler, & Evan Zimmerman, Verification Dilemmas, Law, and The Promise of Zero-Knowledge Proofs, Berkeley Tech. L. J. (forthcoming 2022) -- Read Parts I and III only
Cryptographic Voting Systems:
- Josh Benaloh, Ronald Rivest, Peter Y. A. Ryan, Philip Stark, Vanessa Teague, Poorvi Vora, End-to-End Verifiability (Feb. 2014) – read all
- Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, and Dan S. Wallach, Public Evidence from Secret Ballots (Aug. 2017) – read Parts 3 and 4 only
Limits of Cryptography:
- Matthew Blaze, Cryptography and Elections: Threat or Menace. Real World Cryptography 2019. — Watch talk (22:38–53:00)
Optional
- Andrew C. Eggers, Haritz Garro, and Justin Grimmer, No Evidence for Systematic Voter Fraud: A Guide to Statistical Claims About the 2020 Election, PNAS (2021)
Class 10 – “Privacy,” “Security,” and “Encryption” (March 31)
Required
Legal Concepts of Privacy:
- Daniel Solove, Understanding Privacy (2008) – read chapter entitled “Privacy: A Concept in Disarray”
- Stephen P. Mulligan, Wilson C. Freeman, & Chris D. Linebaugh, Data Protection Law: An Overview, Congressional Research Service (March 25, 2019) – read “Origins of American Privacy Protections (pp. 3–7), the intro to “Federal Data Protection Law” (pp. 7–8), and “Electronic Communications Privacy Act” (pp. 25–29)
Intro to Encryption:
- EFF Surveillance Self-Defense Guide: What Should I Know About Encryption? - read all
- EFF Surveillance Self-Defense Guide: Key Concepts in Encryption - read all
Encryption Policy:
- Danielle Kehl, Andi Wilson, & Kevin Bankston, Doomed to Repeat History? Lessons from the Crypto Wars of the 1990s, New America Foundation (June 2015) – read parts I, II, and III (pp. 2–17)
- Seny Kamara, Crypto For the People (2020) – watch 4:40 to 21:14
Optional
- Scott Skinner-Thompson, Privacy at the Margins (2020)
- James Mickens, There Are No Secrets (2017)
- Philip Rogaway, The Moral Character of Cryptographic Work (2015)
- Orin S. Kerr & Bruce Schneier, Encryption Workarounds, 106 Geo. L. J. 989 (2018)
- Harold Abelson et al., Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications (2015)
- Aloni Cohen & Sunoo Park, Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries, 32 Harv. J. L. & Tech. 169 (2018)
Class 11 – Differential Privacy and The Census (April 7)
Required
Data, Anonymity, and Re-Identification:
- Paul Ohm, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA L. Rev. 1701 (2010) — read introduction only (pp. 1703–06)
Intro to Differential Privacy:
- What Is Differential Privacy?, NIST (July 3, 2019) – watch all (about 3 mins)
- Joseph Near, David Darais, & Kaitlin Boeckl, Differential Privacy for Privacy-Preserving Data Analysis: An Introduction to our Blog Series, NIST (July 27, 2020) – read all
- Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R. O’Brien, Thomas Steinke & Salil Vadhan, Differential Privacy: A Primer for a Non-Technical Audience, 21 Vand. J. Ent. & Tech. L. 209 (2018) — read Part II (pp. 221–225), and Part III (pp. 225–232)
Utility and Privacy in the Census:
- 13 U.S.C. § 9 – read excerpt
- 13 U.S.C. § 141 – read excerpt
- Pub. L. 105-119 § 209 (Nov. 26, 1997) – read excerpt
Use of Differential Privacy in the Census:
- Differential Privacy for Census Data Explained, Nat’l Conference of State Legislatures (last updated Nov. 10, 2021) – read all
- danah boyd, Differential Privacy in the 2020 Decennial Census and Implications for Available Data Products (July 8, 2019) – read “The Production of Census Data Products” (pp. 6–9)
- Miranda Christ, Sarah Radway, & Steve Bellovin, Differential Privacy and Swapping: Examining De-Identification’s Impact on Minority Representation and Privacy Preservation in the U.S. Census (forthcoming 2022) – read parts 1 and 5, circulated separately.
Legal Challenges to Differential Privacy:
Optional
- Disclosure Avoidance for the 2020 Census: An Introduction, U.S. Census Bureau (Nov. 2, 2021)
- Simson Garfinkel, Differential Privacy and the 2020 Census, MIT Case Studies in Social and Ethical Responsibilities of Computing (Jan. 24, 2022)
- Cynthia Dwork & Aaron Roth, The Algorithmic Foundations of Differential Privacy (2014)
- John M. Abowd, “The U.S. Census Bureau Tries to be a Good Data Steward in the 21st Century.” (2019)
- Steven Ruggles, Implications of Differential Privacy for Census Bureau Data and Research (2018)
- Kobbi Nissim, Aaron Bembenek, Alexandra Wood, Mark Bun, Marco Gaboardi, Urs Gasser, David R. O’Brien, Thomas Steinke, & Salil Vadhan, Bridging the Gap Between Computer Science and Legal Notions of Privacy, 31 Harv. J. Law & Tech. 687 (2018)
- Jane R. Bambauer, Krish Muralidhar, & Rathindra Sarathy, Fool’s Gold: an Illustrated Critique of Differential Privacy, 16 Vand. J. Ent. & Tech. L. 701 (2014)
Class 12 – Conducting Analysis Over Secret Data (April 14)
Required
Intro to Secure Multiparty Computation
- Jessica Colarossi & Carlos Soler, What Is Secure Multiparty Computation?, Boston University (Feb. 27, 2019) – watch video
- Yehuda Lindell, A Primer in Secure Multiparty Computation, Unbound (2020) – read “Introduction to Multiparty Computation,” “Mathematical Guarantees of Security,” and “Security Definitions” (pp. 2–6) (For the purposes of this class, you can safely think of '⊕' as meaning '+')
Case Studies:
Boston Women’s Workforce Council
- Azer Bestavros, Andrei Lapets, and Mayank Varia, User-Centric Distributed Solutions for Privacy-Preserving Analytics, Comm. of ACM (Feb. 2017) – read all
- Lucy Qin & Peter Flockhart, From Usability to Secure Computing and Back Again, USENIX (Sept. 30, 2019) – watch from beginning to 5:50
Smartphone-based Contact Tracing
- Ran Canetti, Ari Trachtenberg, and Mayank Varia, Anonymous Collocation Discovery: Harnessing Privacy to Tame the Coronavirus (April 7, 2020) – read sections 1–5 (pp. 1–8)
- Google & Apple, Exposure Notification system: Helping Health Authorities fight COVID-19 (June 23, 2020) – watch all
Google and Mastercard
- Benny Pinkas, Private Set Intersection (2015) – watch 0:40--4:30
- Shannon Liao, Google Reportedly Bought Mastercard Data to Link Online Ads with Offline Purchases, The Verge (Aug. 30, 2018) – read all
When is MPC regulated by information privacy law?
Under the Drivers Privacy Protection Act
- 18 U.S.C. § 2725 – read definition for “personal information”
- 18 U.S.C. § 2721 – read subsection (a) and (b)(5) only
Under the CCPA
- Cal. Civ. Code § 1798.140 – read definitions for “Aggregate Consumer Information,” “Deidentified,” “Personal Information,” and “Sell”
- Cal. Civ. Code § 1798.115 – read all
Under the GDPR
- GDPR Art. 4 – read definitions for “Personal Data” and “Processing”
- GDPR Art. 5 – read al
- GDPR Recital 26 – read all
Class 13 – Law and Algorithms (April 21)
Required
Changes in Governance:
- Andrew Tutt, An FDA for Algorithms, 69 Admin. L. Rev. 83 (2017) – read Section II only (pp. 104–11)
Change in Remedies:
- Tiffany C. Li, Algorithmic Destruction, S.M.U. L. Rev. (forthcoming 2022) – read part IV only (pp. 18–24)
Changes in Design and Power:
- Ngozi Okidegbe, The Democratizing Potential of Algorithms?, Conn. L. Rev. (forthcoming) – read part III only
- Sasha Costanza-Chock, Design Justice (2020) – read the following sections from Chapter 2 (“Design Practices: Nothing About Us Without Us”)
Changes to Professional Duties:
- Neil Richards & Woody Hartzog, A Duty of Loyalty for Privacy Law, 99 Wash. U.L. Rev. 961 (2021) – read Parts III(A) and (B) only (pp. 986–95)
- LBryan H. Choi, Software Professionals, Malpractice Law, and Codes of Ethics, Comm. of ACM (2021)
Optional
- Maranke Wieringa, What to Account for When Accounting for Algorithms, FAT* (2020)
- Jessica Fjeld, Nele Achten, Hannah Hilligoss, Adam Christopher Nagy, and Madhulika Srikumar, Principled Artificial Intelligence: Mapping Consensus in Ethical and Rights-Based Approaches in AI (2020)
- Jessie Finocchiaro, Roland Maio, Faidra Monachou, Gourab K. Patro, Manis Raghaven, Ana-Andreea Stoica, Stratis Tsirtis, Bridging Machine Learning and Mechanism Design towards Algorithmic Fairness, FAccT (2021)
- Margo Kaminski, The Right to Explanation, Explained, 34 Berkeley Tech. L.J. 189 (2018)
- Alicia Solow-Niederman, Administering Artificial Intelligence, 93 S. Cal. L. Rev. 633 (2020)