About the Program
The LawTech Center at the University of Virginia School of Law focuses on pressing questions in law and technology, including policy concerns, data analysis of legal texts, and the use of technology in the legal profession.
Serving as a locus of faculty research, the center is led by the second-most cited professor in the nation on issues of law and technology, Danielle K. Citron, and intellectual property and trade secret expert Elizabeth A. Rowe. The author of the books “Hate Crimes in Cyberspace” and the forthcoming “The Fight for Privacy: Protecting Dignity, Identity and Law in the Digital Age,” Citron has been deeply involved in reform efforts relating to the regulation of online platforms. Rowe, who is co-author of the first and leading U.S. casebook on trade secrets in addition to a “Nutshell” treatise on trade secrets, has written on the intersection of trade secrets with employment law and technology, as well as the interplay between intellectual property, government policy and innovation.
UVA’s curriculum also benefits from the school’s proximity to the Judge Advocate General’s Legal Center and School, which offers several courses connected to cybersecurity and national security. Virginia’s programs and centers in national security, health law and intellectual property also add to the depth of the course offerings and extracurricular opportunities.
Policy and Regulation
Technology’s impact on everyday lives has raised new areas of concern in law, from the legal responsibilities of online platforms in protecting consumer privacy and data, to managing cybersecurity threats, to the interplay between intellectual property, government policy and innovation. Faculty members are addressing the question of platform governance and regulation from different directions, including moral philosophy and discrimination, privacy and cyber civil rights, criminal justice and antitrust. Their work has common themes — to what extent should powerful intermediaries be subject to regulation? What should regulation look like? What sort of transparency and accountability is feasible and desirable given trade secret protections? Do we need a federal agency devoted to algorithmic governance?
The Data of Legal Texts
Several affiliated faculty members are focused on using computational tools, including artificial intelligence and natural language processing, to reveal insights on laws and how lawyers, jurists and the public interact with them. Other scholars use empirical methods to consider possibilities for criminal justice reform, analyze constitutions around the world and generally look at the law through a different lens.
Technology in the Legal Profession
Technology is also affecting how law is practiced, how judges and juries are making decisions, and how policies get made. The Law School offers courses that teach students about the evolution of legal practice, and professors are researching the impact of what that means for both lawyers and the public.
For too long, cyber abuse has been misunderstood and ignored. The prevailing view is that cyber abuse is not “really real,” though in rare cases...
More
We live in a golden age of student surveillance. Some surveillance is old school: video cameras, school resource officers, and tip lines. Old-school...
More
This article argues that the fact that an action will compound a prior injustice counts as a reason against doing the action. I call this reason The...
More
Section 230 is finally getting the clear-eyed attention that it deserves. No longer is it naive to suggest that we revisit the law that immunizes...
More
Quinta Jurecic
In 2018, Congress rightly highlighted the problem of sex trafficking, which is a moral abomination and vicious scourge. It condemned sites like...
More
Modern antitrust law has come under intense criticism in recent years, with a bipartisan chorus of complaints about the power of technology and...
More
Faculty Director
Danielle K. Citron
Jefferson Scholars Foundation Schenck Distinguished Professor in Law
Caddell and Chapman Professor of Law
Director, LawTech Center
Elizabeth A. Rowe
Henry L. and Grace Doherty Charitable Foundation Professor of Law
Horace W. Goldsmith Research Professor of Law
Director, LawTech Center
For too long, cyber abuse has been misunderstood and ignored. The prevailing view is that cyber abuse is not “really real,” though in rare cases...
More
We live in a golden age of student surveillance. Some surveillance is old school: video cameras, school resource officers, and tip lines. Old-school...
More
This article argues that the fact that an action will compound a prior injustice counts as a reason against doing the action. I call this reason The...
More
Section 230 is finally getting the clear-eyed attention that it deserves. No longer is it naive to suggest that we revisit the law that immunizes...
More
Quinta Jurecic
In 2018, Congress rightly highlighted the problem of sex trafficking, which is a moral abomination and vicious scourge. It condemned sites like...
More
Modern antitrust law has come under intense criticism in recent years, with a bipartisan chorus of complaints about the power of technology and...
More
Now that the Supreme Court has revoked the constitutional right to reproductive autonomy, we must reckon with the risks that our surveillance economy...
More
Violations of intimate privacy can be never ending. As long as nonconsensual pornography and deepfake sex videos remain online, privacy violations...
More
Douglas Spencer
Campaigns’ increasing reliance on data-driven canvassing has coincided with a disquieting trend in American politics: a stark gap in voter turnout...
More
Daniel J. Solove
The requirement of harm has significantly impeded the enforcement of privacy law. In most tort and contract cases, plaintiffs must establish that they...
More
Russia’s invasion of Ukraine has put to the test theories about how cyberattacks fit into conventional war. Contrary to many expectations, cyber...
More
Kathleen Creek
This article examines the complaint that arbitrary algorithmic decisions wrong those whom they affect. It makes three contributions. First, it...
More
Nyja Prior
Artificial intelligence tools (“AI”) have great potential to improve government functions and efficiency. These algorithmic tools, protected by trade...
More
A number of technological and political forces have transformed the once staid and insider dominated notice-and-comment process into a forum for large...
More
In 2021, the United States and other governments formally blamed Russia for a wide-ranging hacking campaign that breached the update process for...
More
Some who should know argue, and I find plausible, that among these aspects of AI, accumulation and organization of data sets is the most significant...
More
Few issues have aroused more interest of late than the role of “platforms” in the economy. The Supreme Court has recently made the what is likely to...
More
Brandon L. Garrett
The present study examined whether a defense rebuttal expert can effectively educate jurors on the risk that the prosecution's fingerprint expert made...
More
Daniel J. Solove
Through the standing doctrine, the U.S. Supreme Court has taken a new step toward severely limiting the effective enforcement of privacy laws. The...
More
Intimate life is under constant surveillance. Firms track people’s periods, hot flashes, abortions, sexual assaults, sex toy use, sexual fantasies...
More
Jennifer L. Doleac
We evaluate the impacts of adopting algorithmic risk assessments as an aid to judicial discretion in felony sentencing. We find that judges' decisions...
More
Daniel Schwarcz
Cyberattacks have the potential to cause simultaneous, very large losses to numerous firms across the globe, thus resulting in a cyber “catastrophe.”...
More
There has been an explosion of concern about use of computers to make decisions – from hiring to lending approvals to setting prison terms – affecting...
More
Ryan Calo
The legitimacy of the administrative state is premised on our faith in agency expertise. Despite their extra-constitutional structure, administrative...
More
When a state seeks to defend itself against a cyberattack, must it first identify the perpetrator responsible? The US policy of “defend forward” and...
More
The process of searching for relevant legal materials is fundamental to legal reasoning. However, despite its enormous practical and theoretical...
More
Bo Cowgill
We examine the microeconomics of using algorithms to nudge decision-makers toward particular social outcomes. We refer to this as "algorithmic social...
More
Brandon L. Garrett
As criminal justice actors increasingly seek to rely on more evidence-informed practices, including risk assessment instruments, they often lack...
More
As Congress considers possible federal regulation of facial recognition technology in the US, it is important to understand the way in which this...
More
Mary Anne Franks
A robust public debate is currently underway about the responsibility of online platforms. We have long called for this discussion, but only recently...
More
Attribution of cyberattacks requires identifying those responsible for bad acts, prominently including states, and accurate attribution is a crucial...
More
Algorithmic decision making is both increasingly common and increasingly controversial. Critics worry that algorithmic tools are not transparent...
More
U.S. constitutional law prohibits the use of sex as a proxy for other traits in most instances. For example, the Virginia Military Institute [VMI] may...
More
Leopoldo Parada
This Essay argues that EU taxpayers may challenge digital services taxes as violations of EU law. Specifically, because they exempt all but the very...
More
Those who wish to control, expose, and damage the identities of individuals routinely do so by invading their privacy. People are secretly recorded in...
More
Mary Anne Franks
Six years after lawmakers first considered the issue of nonconsensual pornography, New York has criminalized the practice. We wholeheartedly support...
More
Natalie Banta
This article is one of the first to explore minors, digital assets, and estate planning. It argues that there are special considerations when it comes...
More
Alicia Solow-Niederman
Artificial intelligence, or AI, promises to assist, modify, and replace human decision-making, including in court. AI already supports many aspects of...
More
U.S. technology companies are increasingly standing as competing power centers that challenge the primacy of governments. This power brings with it...
More
Attribution of state-sponsored cyberattacks can be difficult, but the significant uptick in public attributions in recent years has proven that...
More
Robert Chesney
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability...
More
Every generation’s intimates have their preferred modes of self-disclosure. Not long ago, intimate partners exchanged love letters and mixed tapes...
More
Jonathon Penney
A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual...
More
Neil M. Richards
At the dawn of the Internet’s emergence, the Supreme Court rhapsodized about its potential as a tool for free expression and political liberation. In...
More
A healthy system of shareholder voting is crucial for any regime of corporate law. The proper allocation of governance power is subject to debate, of...
More
Leopoldo Parada
We argue that the high revenue triggers in proposed digital taxes — including the recent Franco-German proposal for a digital advertising tax — may...
More
This article describes Wayfair and provides some cautions about what it means for the U.S. states and the rest of the world, especially Europe. It...
More
Christopher Slobogin
At sentencing, youth can be considered both a mitigating circumstance because of its association with diminished culpability and an aggravating...
More
Daniel J. Solove
In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court...
More
Today, patients emanate increasing quantities of health information. However, not all health data are created equal. Questions regarding technology...
More
Sharon K. Sandeen
Recently, a cacophony of concerns have been raised about the propriety of noncompetition agreements (NCAs) entered into between employers and...
More
Data’s intangibility poses significant difficulties for determining where data is located. The problem is not that data is located nowhere, but that...
More
Calls for public-private partnerships to address U.S. cybersecurity failures have become ubiquitous. But the academic literature and public debate...
More
Scholars and courts generally see the harms of state surveillance as arising from the actual or potential misuse of information. State surveillance...
More
Technology has facilitated both the amount of trade secrets that are now stored electronically, and the rise of cyber intrusions. Together, this has...
More
Josh Goldfoot
Computer crime statutes prohibit accessing a computer without “authorization.” In recent years, this element has attracted considerable controversy...
More
The ‘social cost of carbon’ is an economic concept that represents – in monetary net present value terms – the damages caused by the emission of a ton...
More
How would society react to “the Watcher,” a technology capable of efficiently, unerringly, and immediately reporting the perpetrator of virtually...
More
Recent years have witnessed a dramatic increase in digital information and connected devices, but constant revelations about hacks make painfully...
More
This chapter addresses the appropriate treatment of a person's digital life when the account holder can no longer manage it. As the Internet becomes...
More
Concerns about cyberwar, cyberespionage, and cybercrime have burst into focus in recent years. The United States and China have traded accusations...
More
As part of a symposium on cyberwar, this invited contribution explores the challenges that new technologies pose for international law. Borrowing from...
More
The latest spying craze is the “stalking app.” Once installed on someone’s cell phone, the stalking app provides continuous access to the person’s...
More
Frank Pasquale
Big Data is increasingly mined to rank and rate individuals. Predictive algorithms assess whether we are good credit risks, desirable employees...
More
Frank A. Pasquale
There are several normative theories of jurisprudence supporting our critique of the scored society, which complement the social theory and political...
More
Constitutions are commonly thought to express nations’ highest values. They are near-universally proclaimed in the name of “We the People” and...
More
This Article explores the impact of federal law on a state fiduciary’s management of digital assets. It focuses on the lessons from the Stored...
More
Mary Anne Franks
Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal...
More
David Gray
We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments...
More
Helen Norton
No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group “Kill a...
More
In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras...
More
Helen Norton
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging...
More
Leslie Meltzer Henry
Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains...
More
In tort law, the doctrine of contributory negligence captures conduct by the plaintiff which falls below the standard to which he should conform for...
More
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and...
More
The study of contract law is undergoing a difficult transition as it moves from the theoretical to the empirical. Over the past few decades scholars...
More
Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial...
More
Distinct and complementary procedures for adjudications and rulemaking lie at the heart of twentieth-century administrative law. Due process required...
More
When a trade secret owner discovers its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner...
More
Since September 11, 2001, the Bush administration has repeatedly invoked the state secrets privilege in cases challenging executive conduct in the war...
More
When a trade secret is stolen from its owner and posted on the Internet, the default rule is that it becomes a free for all. By virtue of the fact...
More
Should an employer be able to enjoin an employee from working for a competitor when the employee did not sign a non-competition agreement? Under the...
More
Sometimes technological change is so profound that it rocks the foundations of an entire body of law. Peer-to-peer (P2P) filesharing systems - Napster...
More
Karl M. Manheim
One of the most important features of the architecture of the Internet is the Domain Name System (DNS), which is administered by the Internet...
More
Resident Faculty
Privacy, First Amendment, feminism and the law, civil rights, administrative law
- Named a 2019 MacArthur Fellow for her work on cyberstalking and intimate privacy
- Adviser to then-California Attorney General Kamala Harris on privacy issues and a member of her Cyber Exploitation Task Force (2014-16)
- Vice president of the Cyber Civil Rights Initiative, a nonprofit dedicated to protecting civil rights and liberties in a digital age
- Gave TED talk “How Deepfakes Undermine Truth and Democracy” that has had over 1.9 million views
- Clerked for U.S. District Court Judge Mary Johnson Lowe of the Southern District of New York
Administrative law, civil procedure, computer crime, federal courts, national security law
- Served as an attorney-adviser in the Office of Legal Counsel at the Department of Justice
- Practice appellate litigation privately and for DOJ's National Security Division
- Clerked for Justice Antonin Scalia at the U.S. Supreme Court
International law and litigation, national security, law of war
- Served as White House associate counsel and deputy legal adviser to the National Security Council, 2021-22
- Served as the assistant legal adviser for political-military affairs in the U.S. Department of State’s Office of the Legal Adviser
- Embassy legal adviser at the U.S. embassy in Baghdad in 2005, during Iraq’s constitutional negotiations
- Since joining the Law School in 2012, has been frequently quoted in the national media on topics such as legal justifications for war, the Edward Snowden affair and the use of cyber and drone warfare.
Business law, contract theory, mergers and acquisitions
- Research focuses on problems related to contract theory, business alliances, shareholder litigation and other issues involving the intersection of law and business
- Spent five years as a management consultant with McKinsey & Co., where he served clients on corporate strategy, mergers and marketing; also worked with a New York and a Los Angeles law firmCo-author of a book on business partnership and alliance strategies
- Taught courses as a visiting professor at the Indian School of Business in Hyderabad, India, the University of Auckland in New Zealand, and the University of Trento in Italy
Cybersecurity, foreign relations, international law and national security law
- Clerked for U.S. Supreme Court Justices Sandra Day O’Connor and Sonia Sotomayor and for Judge Merrick Garland of the U.S. Court of Appeals for the D.C. Circuit
- Served as a special assistant to the State Department legal adviser and practiced appellate and national security law, including advising on cybersecurity issues, at Covington & Burling in Washington, D.C.
- Eichensehr’s recent scholarship focuses on the constitutional powers of the president and Congress in foreign relations law, the role of private actors in cybersecurity, and the development of international law to govern state behavior in cyberspace
Affirmative action and equal protection, constitutional law and theory
- Awarded a National Endowment for the Humanities Fellowship for University Teachers in 1999
- Author of the book "When Is Discrimination Wrong?"
- Hellman's work primarily focuses on discrimination and equality. In addition, she writes about the constitutionality of campaign finance laws and the obligations of professional roles, especially in the context of clinical medical research. (Scholarship Profile | Faculty Q&A)
Health policy, LGBTQ rights
- Work focuses on how medicine and medical discourse can be reconfigured to work with law to produce civil rights and justice
- Went to law school to do LGBTQ rights work, and continues to file briefs in the U.S. Supreme Court in major cases
- As deputy solicitor general of California with a docket focused on the U.S. Supreme Court, he has been involved in a broad range of litigation
Comparative and empirical study of public law, courts and legal texts
- Internationally recognized expert in the comparative study of constitutional law, constitutional politics and judicial politics, and a pioneer in the application of empirical social science methods to the study of legal texts
- Scholarship combines qualitative fieldwork on foreign judicial and constitutional systems, quantitative analysis of constitutions and treaties, and regional expertise on Asia
- Ph.D. in political science, Stanford University; his work on courts and constitutions has been featured in media around the world and has been translated into Chinese, Japanese, Spanish, Romanian and Persian
Environmental law and climate change, administrative law
- Clerked for Judge Harry T. Edwards on the U.S. Court of Appeals for the D.C. Circuit
- Founding executive director of the Institute for Policy Integrity at New York University School of Law
- Co-authored "Retaking Rationality: How Cost-Benefit Analysis Can Better Protect the Environment and Our Health." The book became the foundation for a new approach public interest organizations could take in arguing for policies to protect the environment. (Faculty Q&A on related scholarship)
Criminal procedure, federal courts and constitutional law
- Clerked for Judge Brett M. Kavanaugh of the U.S. Court of Appeals for the D.C. Circuit and Justice Anthony M. Kennedy of the U.S. Supreme Court
- His research garnered attention in 2018 as part of an amicus brief he wrote for the Supreme Court case Hughes v. United States
- Runs the blog Re's Judicata and is a member of PrawfsBlog
Constitutional law, antitrust and communications regulation, national security
- Clerked for Judge Frank H. Easterbrook of the U.S. Court of Appeals for the Seventh Circuit
- Practiced with what is now Mayer Brown in Chicago
- Is a U.S. Army Reserve judge advocate, and was a principal editor and contributor for the first three editions of "The Rule of Law Handbook: A Practitioners’ Guide" (2007-09)
- Before he went to law school, Nachbar spent five years as a systems analyst, working for both Andersen Consulting and Hughes Space and Communications.
Legal theory, constitutional theory, procedure, philosophy of law
- His series of articles on constitutional originalism have shaped contemporary thinking about the debate between originalism and constitutional theory
- Editor of Legal Theory Blog, an influential weblog that focuses on developments in contemporary normative and positive legal theory
- Also works on problems of law and technology, including Internet governance, copyright policy and patent law
Criminal law and criminal procedure
- Economist and criminal justice scholar focused on criminal justice reform, including bail, algorithmic risk assessment, misdemeanors and juvenile justice
- Research on bail cited extensively in a landmark federal civil rights decision, O’Donnell v. Harris, and in the media
- Holds a Ph.D. in agricultural and resource economics from the University of California, Berkeley
Intellectual property, law and economics
- Clerked for the Israeli Supreme Court after earning his law degree at Tel Aviv University
- Served as a fellow at Harvard’s Berkman Center for Internet & Society and Olin Center for Law and Economics
- Has presented in several fora, including the Stanford/Yale Junior Faculty Forum; the annual meetings of the American, Canadian and European law and economics associations; and the intellectual property scholars conference. (Story)
Securities, corporate and derivatives law, taboo markets
- Corporate law expert teaches courses on securities, corporate and derivatives law
- A leading thinker on forbidden or contested markets like organ donation
- Prior to academia, practiced in the Commodity & Derivatives Group at Sullivan & Cromwell in New York
Food and drug law, health law, animal law
- Has written, researched and presented extensively about biomedical research, genetics, reproductive technologies, stem cell research, animal biotechnology, health disparities and chronic disease (Faculty Q&A)
- Chair, UVA Embryonic Stem Cell Research Oversight Committee
- Legal advisor to the Health Sciences Institutional Review Board, which is responsible for reviewing all human subject research at UVA involving medically invasive procedures
State, international taxation and policy
- National reporter for the United States to the 2008 IFA Congress on tax discrimination and the 2014 European Associate Tax Law Professors Congress on tax information exchange
- Co-editor of Kluwer's "Series on International Taxation" and a member of the editorial board of the World Tax Journal
- Mason's research focuses on comparative taxation, with an emphasis on EU tax law.
- Amicus brief cited by U.S. Supreme Court in Comptroller of the Treasury of Maryland v. Wynne.
- Has a four-part special report on EU state aids forthcoming in Tax Notes
Intellectual property, patents, administrative law
- Clerked for U.S. Supreme Court Justice Antonin Scalia and for Judge Stephen Williams of the U.S. Court of Appeals for the D.C. Circuit
- Served as an attorney adviser in the Department of Justice’s Office of Legal Counsel
- In the field of intellectual property, Duffy has been identified as one of the 25 most-influential people in the nation by The American Lawyer and one of the 50 most influential people in the world by the U.K. publication Managing Intellectual Property. He was named a legal “visionary” by the Legal Times in 2009 and has been profiled in Businessweek.
Trade secret law, intellectual property, trademark law, patent law
- Co-author of the first and leading U.S. casebook on trade secrets, in addition to a “Nutshell” treatise on trade secrets
- Four of her articles have been named by Thomson Reuters Intellectual Property Review as among the best intellectual property articles of the year
- Member of the American Law Institute and a member of the Leadership Council for The Sedona Conference Rowe, which conducts in-depth study in the areas of antitrust, complex litigation and intellectual property rights to provide nonpartisan consensus-based guidance to courts and attorneys
- Former partner at the law firm of Hale and Dorr in Boston (now WilmerHale), where she practiced complex commercial litigation, including intellectual property and employment litigation
Other Faculty
Courses and Seminars
The following is a list of courses offered/scheduled to be offered during 2019-22. Numbers in parentheses indicate which academic year(s) the courses were offered, i.e., 2020-21 is coded (21), 2021-22 is coded (22) and 2022-23 is coded (23). (SC) stands for short course and (YR) stands for yearlong.
Advanced LawTech (22)
Antitrust in the Digital Economy (SC) (21,22)
Bioethics and the Law Seminar (21,22,23)
Computational Text Analysis for Legal Practice (SC) (22)
Computer Crime Law (21,22)
Copyright Law (21,22,23)
Cryptocurrency Law and Policy (SC) (22,23)
Cryptocurrency Regulation (SC) (21)
Digital Evidence From Theory to Practice (JAG) (21,22,23)
Drug Product Liability Litigation Seminar (21,22,23)
Drug Product Liability Litigation: Principles and Practice (21,22,23)
Electronic Discovery (23)
Energy and Environmental Products Trading and Commodities Regulation (SC) (21,22,23)
Food and Drug Law (22)
Free Speech and the Digital Age (22)
Genetics and the Law (SC) (21,22)
Innovating for Defense (21,22,23)
Internet Law (21,22,23)
Introduction to the Law of Trade Secrets (SC) (21,22,23)
Introduction to Legal Aspects of Cyberspace Operations (JAG) (21,23)
Israeli Business Law and Innovation (SC) (23)
Law and Artificial Intelligence (23)
Law and Ethics of Biotechnology (21,23)
Law and Technology Colloquium (22,23)
Law of Sea, Air and Space Operations (JAG) (21,22,23)
LawTech (21,22,23)
National Security Law (21,22,23)
National Security Law and Practice (SC) (21)
Patent Law (22)
Personal Data Protection in Europe (SC) (23)
Privacy (21,22,23)
Privacy Law and Theory Seminar (22,23)
Quantitative Methods (21,22)
Repugnant Transactions (22,23)
Science and the Courts (SC) (21,22,23)
Startup of a Medtech Company (SC) (21,22,23)
Survey of Patent, Copyright, Trademark (21,22,23)
Taboo Trades (22,23)
Taxing Multinationals in a Global Economy (SC) (22)
Trade Secret Law (23)
Truth, Lies and Statistics for Lawyers (SC) (21,22,23)
Clinics
Advanced Patent and Licensing Clinic (21,22,23)
Entrepreneurial Law Clinic (21,22,23)
Patent and Licensing Clinic (21,22,23)
University of Virginia School of Law professor Danielle Citron, an expert in privacy law who has advanced the idea of intimate privacy as a civil right, has been elected to the American Academy of Arts and Sciences.
Scholars discuss Professor Danielle Citron’s new book, “The Fight for Privacy: Protecting Dignity, Identity and Love in the Digital Age,” which makes the case for understanding intimate privacy as a civil and human right. Panelists include University of Pennsylvania law professor Anita L. Allen, George Washington University law professor Daniel J. Solove, and Northeastern University law and computer science professor Ari E. Waldman. UVA Law professor Deborah Hellman moderated the event and Dean Risa Goluboff introduced the speakers.
Student Organizations
Law, Innovation, Security & Technology
LIST focuses on the novel legal, policy and business problems caused by the recent proliferation of emerging technologies. It educates students about issues in the area; prepares them with practical skills and experience to enter the legal workforce; connects them to a network of mentors, experts and resources; and collaborates with the policy, business and technology communities. Recent areas of focus have included cyber crime, net neutrality and autonomous vehicles, among others. Website
National Security Law Forum
National Security Law Forum connects UVA law students with national security law and broader government issues by hosting speakers, educating students about career opportunities and facilitating student work on national security problems during law school. The forum seeks to produce the next generation of national security law leaders by engaging the school’s faculty, alumni network and connections with the national security community.
Virginia Journal of Law & Technology
UVA Law's only e-journal, VJoLT, provides a forum for students, professors and practitioners to discuss emerging issues at the intersection of law and technology. Recent issues of the journal have included articles on biotechnology, telecommunications, e-commerce, internet privacy and encryption. Website
University of Virginia School of Law students competed in the annual MetaCTF cybersecurity competition for the first time and helped one team win first place in the policy component.
Professor Richard L. Hasen of the University of California, Irvine, discusses his new book, “Cheap Speech: How Disinformation Poisons Our Politics — and How to Cure It.” Professor Danielle Citron moderated the talk. The event was sponsored by the LawTech Center.