Chris Jay Hoofnagle is Professor of Law in Residence at the University of California, Berkeley, School of Law, where he teaches cybersecurity, programming for lawyers, and torts. He is affiliated faculty with the Simons Institute for the Theory of Computing and the Center for Security in Politics. In Spring 2024, Hoofnagle visitied King’s College Department of War Studies.
Hoofnagle’s new book with Golden G. Richard III is Cybersecurity in Context (Wiley forthcoming 2024). Previous works include Law and Policy for the Quantum Age (with Simson Garfinkel, 2022) and Federal Trade Commission Privacy Law and Policy (2016), both with Cambridge University Press.
An elected member of the American Law Institute, Hoofnagle is of counsel to Gunderson Dettmer LLP, a longtime advisor to Palantir Technologies, and a member of the National Academies Intelligence Science and Technology Experts Group (ISTEG).
With Professor Daniel Solove, Hoofnagle founded the Privacy Law Scholars Conference.
In-progress works
-
Military ML: Missing the Target
Are we on the precipice of developing autonomous killer robots; unmanned technologies that will completely dominate conflict, remorselessly, perfectly? Some advocates think so but this article explains why the killer robot view is misplaced and in its misdirection, draws attention away from how militaries are likely to use machine learning (ML) and artificial intelligence (AI)…
-
The Techcons
Revisiting Arthur Leff’s Swindling and Selling Yale Law Professor Arthur Leff wrote a powerful, market-structure analysis of consumer fraud in his 1976 Swindling and Selling. That work is more or less lost to history. Leff explained that con artists attempted to impose a false economy on marks. In a perfect congame, such as the Spanish Prisoner,…
-
What is consumer privacy?
In this essay for a lecture at Stanford University, I attempt to explain consumer privacy as a deterrence theory strategy. I argue that privacy does have methods of analysis, based in fair information practices, while popular use of the term “privacy” is loose, a shibboleth representing uncertain values. This wide-ranging essay then goes on to…
Publications
h-index: 32, i10: 43
Hoofnagle, Chris Jay; III, Golden R. Richard
1st, Wiley, 2024, ISBN: 978-1-394-26244-1.
Abstract | Links | BibTeX | Tags: Cybersecurity, Deterrence Theory, National Security
@book{cybersecurityincontext,
title = {Cybersecurity in Context},
author = {Chris Jay Hoofnagle and Golden R. Richard III},
url = {https://www.wiley.com/en-us/Cybersecurity+in+Context%3A+Technology%2C+Policy%2C+and+Law-p-9781394262441
https://cybersecurityincontext.com/},
isbn = {978-1-394-26244-1},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
publisher = {Wiley},
edition = {1st},
abstract = {Everyone now has a stake in the healthy functioning of computer communications and control networks, in the devices and services dependent on these networks, and by implication, in all of the complicated infrastructure required to keep networks, devices, and services operating.
Cybersecurity in Context explains how cybersecurity has come to encompass these interests, how cybersecurity is conceptualized, and how cybersecurity concerns and rules permeate the public and private sectors.
Written for introductory cybersecurity courses, Cybersecurity in Context outlines the most important forces that have come to shape cybersecurity—from macro-level concerns, such as the security of the state and the operation of an innovative private sector, to micro-level concerns and individual decision-making.
Cybersecurity in Context explains internet technology with hands-on exercises showing how the internet is vulnerable and why software and hardware exploits stubbornly persist.},
keywords = {Cybersecurity, Deterrence Theory, National Security},
pubstate = {published},
tppubtype = {book}
}
Cybersecurity in Context explains how cybersecurity has come to encompass these interests, how cybersecurity is conceptualized, and how cybersecurity concerns and rules permeate the public and private sectors.
Written for introductory cybersecurity courses, Cybersecurity in Context outlines the most important forces that have come to shape cybersecurity—from macro-level concerns, such as the security of the state and the operation of an innovative private sector, to micro-level concerns and individual decision-making.
Cybersecurity in Context explains internet technology with hands-on exercises showing how the internet is vulnerable and why software and hardware exploits stubbornly persist.
Hoofnagle, Chris Jay
Cyberdefending Taiwan: Lessons from Ukraine (Conference Report) Technical Report
2023.
Abstract | Links | BibTeX | Tags: Cybersecurity, National Security
@techreport{taiwan,
title = {Cyberdefending Taiwan: Lessons from Ukraine (Conference Report)},
author = {Chris Jay Hoofnagle},
url = {https://cltc.berkeley.edu/wp-content/uploads/2023/11/Cyber-Defending_Taiwan__Conference_Report.pdf},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
abstract = {Authoritarianism is rising worldwide. Rule of law is declining in most countries. The internet makes possible many rule-by-law intrusions upon civil liberties. The ongoing tension between Taiwan and China is among the most consequential struggles for freedom in the world. Taiwan is a thriving, multi-party democracy, assessed by Freedom House as having freedom in political processes, in the judiciary, and in personal autonomy. If Taiwan were to be subjugated by the Chinese Communist Party (CCP), a nation “profoundly oppressive and…the world’s worst abuser of internet freedom,” it would be a cataclysmic loss of freedom for the Taiwanese, would upset regional efforts to center human rights, and continue the trend of world authoritarianism. It is entirely within Taiwan’s sovereign choice to deepen its civil defense. To better understand Taiwan’s cyber-domain options, the Center for Long Term Cybersecurity (CLTC) convened a one-day symposium, Cyberdefending Taiwan: Lessons from Ukraine, at the University of California, Berkeley, on September 29, 2023. The event focused on the cybersecurity, not the kinetic, aspects of the conflict between Taiwan and China.2 As the title suggests, panelists leveraged lessons from Russia’s February 2022 invasion of Ukraine to inform Taiwan’s posture. This short report summarizes the main takeaways from the event.},
keywords = {Cybersecurity, National Security},
pubstate = {published},
tppubtype = {techreport}
}
Hoofnagle, Chris Jay; Garfinkel, Simson L
Quantum Sensors—Unlike Quantum Computers—Are Already Here Journal Article
In: DefenseOne, 2022.
Abstract | Links | BibTeX | Tags: National Security, Quantum
@article{hoofnagleqsensing2022,
title = {Quantum Sensors—Unlike Quantum Computers—Are Already Here},
author = {Chris Jay Hoofnagle and Simson L Garfinkel},
url = {https://www.defenseone.com/ideas/2022/06/quantum-sensorsunlike-quantum-computersare-already-here/368634/},
year = {2022},
date = {2022-06-27},
urldate = {2022-06-27},
journal = {DefenseOne},
abstract = {Much ink has been spilled about quantum computers, particularly in overblown claims that quantum cryptanalysis will someday shred today’s encryption techniques. But their simpler cousins—quantum sensors—are here now and improving at a rate that demands urgent attention.},
keywords = {National Security, Quantum},
pubstate = {published},
tppubtype = {article}
}
Hoofnagle, Chris Jay; Garfinkel, Simson L
Quantum Cryptanalysis: Hype and Reality Journal Article
In: Lawfare: Hard National Security Choices, 2022.
Abstract | Links | BibTeX | Tags: National Security, Privacy, Quantum
@article{hoofnaglecryptanalysis2022,
title = {Quantum Cryptanalysis: Hype and Reality},
author = {Chris Jay Hoofnagle and Simson L Garfinkel},
url = {https://www.lawfareblog.com/quantum-cryptanalysis-hype-and-reality},
year = {2022},
date = {2022-02-16},
urldate = {2022-02-16},
journal = {Lawfare: Hard National Security Choices},
abstract = {Is society is on the verge of losing all of its secrets to quantum cryptanalysis—possibly to a single geopolitical actor, like China? We confidently assess that this is improbable. Quantum cryptanalysis may indeed be a threat in the distant future, but we believe that the cryptanalytic usefulness of quantum computers will be limited, if they are possible at all. Here we highlight technical, practical, and economic and strategic reasons why cryptanalysis is a boogeyman. Cryptanalysis has occupied too much of the spotlight on quantum computing. That spotlight casts shadows on different, more realistic risks and benefits.},
keywords = {National Security, Privacy, Quantum},
pubstate = {published},
tppubtype = {article}
}
Hoofnagle, Chris Jay; Garfinkel, Simson L
What if quantum computing is a bust? Journal Article
In: Slate Future Tense, 2022.
Abstract | Links | BibTeX | Tags: National Security, Quantum
@article{hoofnaglequantumbust2022,
title = {What if quantum computing is a bust?},
author = {Chris Jay Hoofnagle and Simson L Garfinkel},
url = {https://slate.com/technology/2022/01/quantum-computing-winter-scenario.html},
year = {2022},
date = {2022-01-26},
urldate = {2022-01-26},
journal = {Slate Future Tense},
abstract = {Are we facing a future where governments dominate quantum technologies, and use them to collect and make sense of information about us? Or might the future bring some other landscape, where quantum technologies protect the communications of the average person and quantum sensing helps us diagnose and treat illness?},
keywords = {National Security, Quantum},
pubstate = {published},
tppubtype = {article}
}
Garfinkel, Simson L.; Hoofnagle, Chris J.
ACM TechBrief: Quantum Computing and Simulation Journal Article
In: ACM TechBriefs, 2022.
Abstract | Links | BibTeX | Tags: National Security, Quantum
@article{10.1145/3551664,
title = {ACM TechBrief: Quantum Computing and Simulation},
author = {Simson L. Garfinkel and Chris J. Hoofnagle},
url = {https://dl.acm.org/doi/book/10.1145/3551664},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
journal = {ACM TechBriefs},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
abstract = {Quantum computers have garnered enormous interest and media attention because of their predicted ability to one day crack encryption algorithms that are widely used today. While such machines would have profound impacts within both the public and private sectors, they are not predicted to become a reality for at least a decade or, by some estimates, as many as forty years—if ever. By contrast, powerful quantum simulators are nearly a reality. Their practical applications could be just two years away.},
keywords = {National Security, Quantum},
pubstate = {published},
tppubtype = {article}
}
Hoofnagle, Chris Jay; Garfinkel, Simson L.
Law and Policy for the Quantum Age Book
Cambridge University Press (Open Access Published), 2022.
Abstract | Links | BibTeX | Tags: National Security, Quantum, Strategic Risk
@book{hoofnagle_garfinkel_2021,
title = {Law and Policy for the Quantum Age},
author = {Chris Jay Hoofnagle and Simson L. Garfinkel},
url = {https://cup.org/3kX4JlI},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
publisher = {Cambridge University Press (Open Access Published)},
abstract = {It is often said that quantum technologies are poised to change the world as we know it, but cutting through the hype, what will quantum technologies actually mean for countries and their citizens? In Law and Policy for the Quantum Age, Chris Jay Hoofnagle and Simson L. Garfinkel explain the genesis of quantum information science (QIS) and the resulting quantum technologies that are most exciting: quantum sensing, computing, and communication. This groundbreaking, timely text explains how quantum technologies work, how countries will likely employ QIS for future national defense and what the legal landscapes will be for these nations, and how companies might (or might not) profit from the technology. Hoofnagle and Garfinkel argue that the consequences of QIS are so profound that we must begin planning for them today. This title is available as Open Access on Cambridge Core.},
keywords = {National Security, Quantum, Strategic Risk},
pubstate = {published},
tppubtype = {book}
}
Dempsey, James; Hoofnagle, Chris Jay; Rubinstein, Ira S.; Strandburg, Katherine J.
Breaking the Privacy Gridlock: A Broader Look at Remedies Technical Report
2021.
Abstract | Links | BibTeX | Tags: Deterrence Theory, Privacy, Remedies
@techreport{remedies2021,
title = {Breaking the Privacy Gridlock: A Broader Look at Remedies},
author = {James Dempsey and Chris Jay Hoofnagle and Ira S. Rubinstein and Katherine J. Strandburg},
url = {https://www.lawfareblog.com/broader-look-privacy-remedies
https://www.law.berkeley.edu/wp-content/uploads/2021/04/remedies.pdf},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
journal = {Lawfare: Hard National Security Choices},
abstract = {Divisions over two enforcement issues—private right of action and federal preemption—have long gridlocked the effort to enact federal consumer
privacy legislation. A look at regulatory systems outside the privacy field, however, reveals a complex landscape of enforcement mechanisms and remedies, many of which have not yet received much attention in the privacy debate. Insights from financial services regulation, environmental law, labor law, and other fields may offer ideas for assembling an effective web of enforcement for a federal privacy law.},
keywords = {Deterrence Theory, Privacy, Remedies},
pubstate = {published},
tppubtype = {techreport}
}
privacy legislation. A look at regulatory systems outside the privacy field, however, reveals a complex landscape of enforcement mechanisms and remedies, many of which have not yet received much attention in the privacy debate. Insights from financial services regulation, environmental law, labor law, and other fields may offer ideas for assembling an effective web of enforcement for a federal privacy law.
Cunningham, Bryan; Grant, John; Hoofnagle, Chris Jay
Fighting Insider Abuse After Van Buren Journal Article
In: Lawfare: Hard National Security Choices, 2021.
Abstract | Links | BibTeX | Tags: Cybersecurity, Deterrence Theory, National Security
@article{vanburen2021,
title = {Fighting Insider Abuse After Van Buren},
author = {Bryan Cunningham and John Grant and Chris Jay Hoofnagle},
url = {https://www.lawfareblog.com/fighting-insider-abuse-after-van-buren},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
journal = {Lawfare: Hard National Security Choices},
abstract = {We explain how tools we are familiar with from our various experiences supporting organizations trying to responsibly manage large-scale datasets could be employed to address legitimate threats—both from insiders (employees of an organization holding sensitive information) and outsiders (external hackers or others trying to steal intellectual property or otherwise improperly access information). Such tools are available now in multiple technology platforms, enabling owners of even the most sensitive datasets to manage users’ access to sensitive data; to quickly detect and block improper access; to deter unwanted uses of protected data; and, finally, to compel—or at least “nudge”—users to access systems responsibly. These tools enable institutions—from military and law enforcement agencies to local governments and private-sector companies—to protect sensitive data from misuse.},
keywords = {Cybersecurity, Deterrence Theory, National Security},
pubstate = {published},
tppubtype = {article}
}
Hoofnagle, Chris Jay
The Apple Privacy Debate: Scanning Photos Is in Service of `Human Freedoms’ Journal Article
In: Future of Sex, 2021.
Abstract | Links | BibTeX | Tags: Cybersecurity
@article{apple2021,
title = {The Apple Privacy Debate: Scanning Photos Is in Service of `Human Freedoms'},
author = {Chris Jay Hoofnagle},
url = {https://futureofsex.net/sex-tech/the-apple-privacy-debate-scanning-photos-is-in-service-of-human-freedoms/},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
journal = {Future of Sex},
abstract = {Earlier this month, Apple announced that it will begin reporting users with excessive amount of Child Sex Abuse Materials (CSAM) to the National Center for Missing and Exploited Children (NCMEC). Apple software will scan the hashes of all photos stored in iCloud for matches to NCMEC's database.
This move has stirred up controversy, as pro-privacy advocates claim that this could mark the end of Apple's dedication to user privacy.
As part of the Future of Sex Expert Series, Chris Hoofnagle, Professor of Law in Residence at the University of California, Berkeley, explains why Apple's decision is nuanced, and possibly necessary.},
keywords = {Cybersecurity},
pubstate = {published},
tppubtype = {article}
}
This move has stirred up controversy, as pro-privacy advocates claim that this could mark the end of Apple’s dedication to user privacy.
As part of the Future of Sex Expert Series, Chris Hoofnagle, Professor of Law in Residence at the University of California, Berkeley, explains why Apple’s decision is nuanced, and possibly necessary.
Turow, Joseph; Hoofnagle, Chris Jay
Mark Zuckerberg’s Delusion of Consumer Consent Journal Article
In: The New York Times, 2019.
Abstract | Links | BibTeX | Tags: Privacy
@article{turow_hoofnagle_2019,
title = {Mark Zuckerberg's Delusion of Consumer Consent},
author = {Joseph Turow and Chris Jay Hoofnagle},
url = {https://www.nytimes.com/2019/01/29/opinion/zuckerberg-facebook-ads.html},
year = {2019},
date = {2019-06-05},
urldate = {2019-06-05},
journal = {The New York Times},
publisher = {The New York Times},
abstract = {He said Facebook users want tailored ads. According to our research, that’s not true.},
keywords = {Privacy},
pubstate = {published},
tppubtype = {article}
}
Hoofnagle, Chris Jay; Sloot, Bart; Borgesius, Frederik Zuiderveen
The European Union general data protection regulation: what it is and what it means Journal Article
In: Information & Communications Technology Law, vol. 28, no. 1, pp. 65–98, 2019.
Abstract | Links | BibTeX | Tags: GDPR, Privacy
@article{hoofnagle2019european,
title = {The European Union general data protection regulation: what it is and what it means},
author = {Chris Jay Hoofnagle and Bart Sloot and Frederik Zuiderveen Borgesius},
url = {https://doi.org/10.1080/13600834.2019.1573501
https://www.tandfonline.com/doi/full/10.1080/13600834.2019.1573501},
year = {2019},
date = {2019-01-01},
urldate = {2019-01-01},
journal = {Information & Communications Technology Law},
volume = {28},
number = {1},
pages = {65–98},
publisher = {Routledge},
abstract = {This paper introduces the strategic approach to regulating personal data and the normative foundations of the European Union’s General Data Protection Regulation (‘GDPR’). We explain the genesis of the GDPR, which is best understood as an extension and refinement of existing requirements imposed by the 1995 Data Protection Directive; describe the GDPR’s approach and provisions; and make predictions about the GDPR’s implications. We also highlight where the GDPR takes a different approach than U.S. privacy law. The GDPR is the most consequential regulatory development in information policy in a generation. The GDPR brings personal data into a detailed regulatory regime, that will influence personal data usage worldwide. Understood properly, the GDPR encourages firms to develop information governance frameworks, to in-house data use, and to keep humans in the loop in decision making. Companies with direct relationships with consumers have strategic advantages under the GDPR, compared to third party advertising firms on the internet. To reach these objectives, the GDPR uses big sticks, structural elements that make proving violations easier, but only a few carrots. The GDPR will complicate and restrain some information-intensive business models. But the GDPR will also enable approaches previously impossible under less-protective approaches.},
keywords = {GDPR, Privacy},
pubstate = {published},
tppubtype = {article}
}
Hoofnagle, Chris Jay; Kesari, Aniket; Perzanowski, Aaron
The Tethered Economy Journal Article
In: Geo. Wash. L. Rev., vol. 87, no. 4, pp. 783, 2019.
Abstract | Links | BibTeX | Tags: Antitrust Law, Competition Law, Consumer Protection
@article{hoofnagle2019tethered,
title = {The Tethered Economy},
author = {Chris Jay Hoofnagle and Aniket Kesari and Aaron Perzanowski},
url = {https://www.gwlr.org/the-tethered-economy/
https://www.gwlr.org/wp-content/uploads/2019/10/87-Geo.-Wash.-L.-Rev.-783.pdf},
year = {2019},
date = {2019-01-01},
journal = {Geo. Wash. L. Rev.},
volume = {87},
number = {4},
pages = {783},
abstract = {Imagine a future in which every purchase decision is as complex as choosing a mobile phone. What will ongoing service cost? Is it compatible with other devices you use? Can you move data and applications across devices? Can you switch providers? These are just some of the questions one must consider when a product is “tethered” or persistently linked to the seller. The Internet of Things, but more broadly, consumer products with embedded software, are already tethered.
While tethered products bring the benefits of connection, they also carry its pathologies. As sellers blend hardware and software—as well as product and service—tethers yoke the consumer to a continuous post-transaction relationship with the seller. The consequences of that dynamic will be felt both at the level of individual consumer harms and on the scale of broader, economy-wide effects. These consumer and market-level harms, while distinct, reinforce and amplify one another in troubling ways.
Seller contracts have long sought to shape consumers’ legal rights. But in a tethered environment, these rights may become nonexistent as legal processes are replaced with automated technological enforcement. In such an environment, the consumer-seller relationship becomes extractive, more akin to consumers captive in an amusement park than to a competitive marketplace in which many sellers strive to offer the best product for the lowest price.
At the highest level, consumer protection law is concerned with promoting functioning free markets and insulating consumers from harms stemming from information asymmetries. We conclude by exploring legal options to reduce the pathologies of the tethered economy.},
keywords = {Antitrust Law, Competition Law, Consumer Protection},
pubstate = {published},
tppubtype = {article}
}
While tethered products bring the benefits of connection, they also carry its pathologies. As sellers blend hardware and software—as well as product and service—tethers yoke the consumer to a continuous post-transaction relationship with the seller. The consequences of that dynamic will be felt both at the level of individual consumer harms and on the scale of broader, economy-wide effects. These consumer and market-level harms, while distinct, reinforce and amplify one another in troubling ways.
Seller contracts have long sought to shape consumers’ legal rights. But in a tethered environment, these rights may become nonexistent as legal processes are replaced with automated technological enforcement. In such an environment, the consumer-seller relationship becomes extractive, more akin to consumers captive in an amusement park than to a competitive marketplace in which many sellers strive to offer the best product for the lowest price.
At the highest level, consumer protection law is concerned with promoting functioning free markets and insulating consumers from harms stemming from information asymmetries. We conclude by exploring legal options to reduce the pathologies of the tethered economy.
Hoofnagle, Chris
The Federal Trade Commission’s Inner Privacy Struggle Book Section
In: Selinger, Evan; Polonetsky, Jules; Tene, Omer (Ed.): The Cambridge Handbook of Consumer Privacy, pp. 168, Cambridge University Press, 2018.
Abstract | Links | BibTeX | Tags: Deterrence Theory, FTC, Privacy, Remedies
@incollection{hoofnagle2018federal,
title = {The Federal Trade Commission’s Inner Privacy Struggle},
author = {Chris Hoofnagle},
editor = {Evan Selinger and Jules Polonetsky and Omer Tene},
url = {https://www.cambridge.org/core/books/cambridge-handbook-of-consumer-privacy/federal-trade-commissions-inner-privacy-struggle/F30312531368363CEB1143E25709E09A?},
year = {2018},
date = {2018-01-01},
booktitle = {The Cambridge Handbook of Consumer Privacy},
pages = {168},
publisher = {Cambridge University Press},
abstract = {At the Federal Trade Commission (FTC), all privacy and security matters are assigned to a consumer protection economist from the agency’s Bureau of Economics (BE). The BE is an important yet often ignored element of the FTC. Advocates and others operating before the commission have been inattentive to the BE, choosing to focus instead on persuading commissioners on policy matters, and staff attorneys, on case selection. This chapter shows how the BE’s evaluative role is just as important as attorneys’ case selection role.},
keywords = {Deterrence Theory, FTC, Privacy, Remedies},
pubstate = {published},
tppubtype = {incollection}
}
Hoofnagle, Chris Jay
Facebook in the Spotlight: Dataism vs. Personal Autonomy Journal Article
In: JURIST – Academic Commentary, 2018.
Abstract | Links | BibTeX | Tags: Privacy
@article{hoofnagle2018facebook,
title = {Facebook in the Spotlight: Dataism vs. Personal Autonomy},
author = {Chris Jay Hoofnagle},
url = {https://www.jurist.org/commentary/2018/04/chris-hoofnagle-facebook-dataism/},
year = {2018},
date = {2018-01-01},
journal = {JURIST - Academic Commentary},
abstract = {In this essay I explain the challenges the FTC faces in enforcing its 2012 consent agreement against Facebook and suggest ways it could nonetheless prevail. In the long run, everyone wins if our civil society institutions can police Facebook, including the company itself. While Facebook’s privacy problems have long been dismissed as harmless, advertising-related controversies, all now understand Facebook’s power over our broader information environment. After Brexit, the 2016 U.S. election, and violence in Myanmar, if consumer law fails, we risk turning to more heavy-handed regulatory tools, including cyber sovereignty approaches, with attendant consequences for civil society and internet freedom.},
keywords = {Privacy},
pubstate = {published},
tppubtype = {article}
}
Hoofnagle, Chris Jay
Designing for Consent Journal Article
In: Journal of European Consumer and Market Law, vol. 7, no. 4, pp. 162–171, 2018.
Abstract | Links | BibTeX | Tags: GDPR, Privacy
@article{hoofnagle2018designing,
title = {Designing for Consent},
author = {Chris Jay Hoofnagle},
url = {https://escholarship.org/content/qt09h8k6ms/qt09h8k6ms_noSplash_79430ceb59aaf5daa0509a8ea07fe9d0.pdf},
year = {2018},
date = {2018-01-01},
journal = {Journal of European Consumer and Market Law},
volume = {7},
number = {4},
pages = {162–171},
publisher = {Kluwer Law International},
abstract = {While the General Data Protection Regulation leans away from consent as a mechanism to justify the collection and use of personal data, consent remains a prime mechanism for protecting privacy and limiting marketing in the United States (U. S.). This article summarizes the difficulties businesses face in gaining high-quality consent and sets out the different consent standards in U. S. statutory law. In an exploratory effort, it then shows how companies have designed consent experiences for particularly privacy-invasive devices – home voice assistants and “smart” televisions – through testing and documentation of their function. The article then explains the quality of consent that U. S. law demands in different contexts, and elucidates the limits of consent as a privacy tool in light of the kinds of information-intensive devices that consumers are adopting.},
keywords = {GDPR, Privacy},
pubstate = {published},
tppubtype = {article}
}
Boerman, Sophie C; Helberger, Natali; Noort, Guda; Hoofnagle, Chris Jay
Sponsored Blog Content: What Do the Regulations Say: And What Do Bloggers Say Journal Article
In: J. Intell. Prop. Info. Tech. & Elec. Com. L., vol. 9, pp. 146, 2018.
Abstract | Links | BibTeX | Tags: Consumer Protection
@article{boerman2018sponsored,
title = {Sponsored Blog Content: What Do the Regulations Say: And What Do Bloggers Say},
author = {Sophie C Boerman and Natali Helberger and Guda Noort and Chris Jay Hoofnagle},
url = {https://www.jipitec.eu/archive/issues/jipitec-9-2-2018/4730/JIPITEC_9_2_2018_146_Boerman_et_al},
year = {2018},
date = {2018-01-01},
journal = {J. Intell. Prop. Info. Tech. & Elec. Com. L.},
volume = {9},
pages = {146},
abstract = {Influencer marketing – the use of opinion leaders such as bloggers with many followers and readers to disseminate product messages – is gaining advertisers’ interest. This paper presents the law and self-regulative provisions concerning blog advertising in both Europe and the US and documents the actual practice of disclosing blog advertising: whether and if so how, bloggers disclose influences from advertisers, and how these disclosures align with the regulations in place. The Federal Trade Commission Act and related guides in the US, and self-regulative provisions in Europe urge advertisers and endorsers, such as bloggers, to disclose any commercial relationship. These disclosures should be clear and conspicuous because advertising to consumers should be recognizable as such. Although advertisers increasingly encourage bloggers to promote products, it is unclear whether bloggers comply with disclosure requirements.
To test compliance with disclosure requirements, we performed a content analysis of 200 blog posts drawn from the top-20-ranked sites in the Netherlands and the United States. We found that 65% of the posts mention brands and products. Yet, only 15% of the blog posts provided some commercial sponsorship disclosure. To determine whether posts mentioning brands were organic, unsponsored endorsements, we made repeated attempts to contact authors. Of those that responded, most claimed that their writing was not sponsored, but a small number received remuneration and did not disclose it. Furthermore, among the disclosing bloggers, we found regular problems in their sponsorship disclosures: many only state ‘sponsored’ or ‘affiliated link’; only 1/3 stated the name of the actual sponsor; most require the users to “scroll down,”; and most are in the same font as ordinary text. Our findings raise several regulatory issues; namely, the need for more concrete guidance on disclosure format, and it highlights the difficulty of monitoring compliance with the existing provisions. In so doing, our findings also provide important input for the European Commission’s Regulatory Fitness and Performance exercise, which tackles, among others the Unfair Commercial Practice Directive.},
keywords = {Consumer Protection},
pubstate = {published},
tppubtype = {article}
}
To test compliance with disclosure requirements, we performed a content analysis of 200 blog posts drawn from the top-20-ranked sites in the Netherlands and the United States. We found that 65% of the posts mention brands and products. Yet, only 15% of the blog posts provided some commercial sponsorship disclosure. To determine whether posts mentioning brands were organic, unsponsored endorsements, we made repeated attempts to contact authors. Of those that responded, most claimed that their writing was not sponsored, but a small number received remuneration and did not disclose it. Furthermore, among the disclosing bloggers, we found regular problems in their sponsorship disclosures: many only state ‘sponsored’ or ‘affiliated link’; only 1/3 stated the name of the actual sponsor; most require the users to “scroll down,”; and most are in the same font as ordinary text. Our findings raise several regulatory issues; namely, the need for more concrete guidance on disclosure format, and it highlights the difficulty of monitoring compliance with the existing provisions. In so doing, our findings also provide important input for the European Commission’s Regulatory Fitness and Performance exercise, which tackles, among others the Unfair Commercial Practice Directive.
Hoofnagle, Chris Jay
Facebook and Google are the new data brokers Journal Article
In: Cornell Digital Life Initiative Critical Reflections, 2018.
Abstract | Links | BibTeX | Tags: Privacy
@article{hoofnagle2018facebook2,
title = {Facebook and Google are the new data brokers},
author = {Chris Jay Hoofnagle},
url = {https://www.dli.tech.cornell.edu/post/facebook-and-google-are-the-new-data-brokers#},
year = {2018},
date = {2018-01-01},
journal = {Cornell Digital Life Initiative Critical Reflections},
publisher = {Cornell Digital Life Initiative},
abstract = {Google and Facebook’s claims about data selling are as false as they are adamant. To understand why, one needs to change focus from the platform-advertiser relationship, and concentrate on developer-platform incentives. To grow their platforms, Google and Facebook reward developers—in effect, pay them—with personal information. But even experts in the field miss the point because information practices are opaque and misleading, and because most people experience platforms as consumers rather than developers.},
keywords = {Privacy},
pubstate = {published},
tppubtype = {article}
}
Perzanowski, Aaron; Hoofnagle, Chris Jay
What We Buy When We ‘Buy Now’ Journal Article
In: University of Pennsylvania Law Review, vol. 165, pp. 315, 2017.
Abstract | Links | BibTeX | Tags: Consumer Protection
@article{perzanowski2016we,
title = {What We Buy When We 'Buy Now'},
author = {Aaron Perzanowski and Chris Jay Hoofnagle},
url = {https://scholarship.law.upenn.edu/cgi/viewcontent.cgi?article=9564&context=penn_law_review},
year = {2017},
date = {2017-01-01},
journal = {University of Pennsylvania Law Review},
volume = {165},
pages = {315},
abstract = {This Article presents the results of the first study of the impact of marketing language like the Buy Now button on the beliefs and behavior of digital media consumers. Our data demonstrate that a sizable percentage of consumers is misled with respect to the rights they acquire when they “buy” digital media goods. They mistakenly believe they can keep those goods permanently, lend them to friends and family, give them as gifts, leave them in their wills, resell them, and use them on their devices of choice.},
keywords = {Consumer Protection},
pubstate = {published},
tppubtype = {article}
}
Altaweel, Ibrahim; Hils, Maximillian; Hoofnagle, Chris Jay
Privacy on Adult Websites Proceedings Article
In: Workshop on Technology and Consumer Protection (ConPro’17), co-located with the 38th IEEE Symposium on Security and Privacy, San Jose, CA (2017), 2017.
Abstract | Links | BibTeX | Tags: Privacy
@inproceedings{altaweel2016privacy,
title = {Privacy on Adult Websites},
author = {Ibrahim Altaweel and Maximillian Hils and Chris Jay Hoofnagle},
url = {https://www.ieee-security.org/TC/SPW2017/ConPro/papers/altaweel-conpro17.pdf},
year = {2017},
date = {2017-01-01},
booktitle = {Workshop on Technology and Consumer Protection (ConPro’17), co-located with the 38th IEEE Symposium on Security and Privacy, San Jose, CA (2017)},
abstract = {As it does in polite conversation, pornography goes unmentioned in policy discussions. This paper begins a conversation about this major use of the web, one that is sensitive and could lead to embarrassment or even blackmail of users if publicized. In countries where pornography is illegal, tracking of these behaviors could have profound consequences for users. Viewing such material is legal in the United States, yet authorities may wish to avoid the topic of protecting its consumers.},
keywords = {Privacy},
pubstate = {published},
tppubtype = {inproceedings}
}
For a list of research organized by research theme/question, click here.
Teaching
-
Cybersecurity in Context
New course: Fall 2024! In fall 2024, I will teach Cybersecurity in Context in the Legal Studies program (LS 190). The course will be based on my new textbook with Golden G. Richard III. Course Description Cybersecurity has become instrumental to economic activity and human rights alike. But as digital technologies penetrate almost every aspect…
-
Cybersecurity Courses @ Cal
A growing number of faculty are offering cybersecurity courses at Cal. Consider taking: The Center for Security in Politics offers a graduate certificate in security policy. Many of the electives are open to undergraduates. They include GSPP PP 155/255 Introduction to Security Policy (Professors Janet Napolitano and Daniel Sargent) PPC285 and NUCENG 285C Nuclear Security: The…
-
Computer Programming for Lawyers
Most recent syllabus: Spring 2023. Clients increasingly want their lawyers to understand their products and services on a technical level. Regulators need to understand how their rules will be implemented in code. Lawyers increasingly need tools to automate the process of collecting, organizing, and making sense of impossibly large troves of information. Computer Programming for…
-
Torts (1L)
Welcome to your first year of law school and to torts, a topic as rich as it is traditional in legal education. Torts provides an expansive lens to learn about the American legal system. This course will cover the basics of torts and in the process, the fundamental reasons and principles underlying doctrine. Learning Goals:…
-
Cybersecurity Working Group
We will discuss cybersecurity policy among a group of graduate, professional, and undergraduate students. The FCWG will be led by Andrew Reddie in Fall 2023 and Spring 2024. Chris Hoofnagle will lead it in Spring 2025 Previous syllabi (Fall 2023, Spring 2023, Fall 2022, Fall 2021, Spring 2021, Spring 2020, Spring 2019, Spring 2018, Fall 2017, Spring 2017)
-
Technology for Lawyers Workshop (TLW)
Technology for Lawyers Workshop (TLW) is a self-paced, two-session workshop covering the computer skills most important to success in law school. By working along and doing the exercises, you’ll become a more efficient user of your computer, and in the process, develop Microsoft Word templates you can use for law school assignments. Anyone in the…
-
Inactive Courses
Privacy Law for Technologists Information privacy law profoundly shapes how internet-enabled services may work. Privacy Law for Technologists will translate the regulatory demands flowing from the growing field of privacy, information security, and consumer law to those who are creating interesting and transformative internet-enabled services. The course will meet twice a week, with the first…
Governance
Berkeley has big problems with governance. I have a hypothesis of what has gone wrong and what to do about it.
-
What is the Faculty Budget Forum (FBF)?
The Faculty Budget Forum is Berkeley largest email list for faculty-to-faculty interaction on governance matters.
-
Proposed Principles for Policy Evaluation
All senate committees should consider this framework for policy analysis.
-
Questions for the Vice Chancellor for Administration
In my opinion, some of Berkeley’s biggest problems emerge from the VCA’s portfolio.
-
On Administrative Misalignment
This is my diagnosis of Berkeley’s ills: a problem I call administrative misalignment. Some administrators are not working for Berkeley; they are working for something else. Maybe themselves.
FAQs
What is TLW—the Technology for Lawyers Workshop?
Technology for Lawyers Workshop (TLW) is a self-paced, two-session workshop covering the computer skills most important to success in law school.
By working along and doing the exercises, you’ll become a more efficient user of your computer, and in the process, develop templates you can use for law school assignments.
Session 1 is 40 minutes long, and it focuses on your computer generally and clever uses of the Web.
Session 2 is a deep dive into Microsoft Word. In this session, you will learn how to make proper templates for your legal writing. The session is 90 minutes long.
You can self-enroll here: https://bcourses.berkeley.edu/enroll/YCXH8X
Will you serve on my quals or PhD committee?
Maybe! I am a senate member and member of both the law and information faculties, so I can serve as an outside member in many configurations. Please email me a description of your research agenda, and how you think my participation will benefit your research.
I will not pay attention to a QE or other proceeding on Zoom. Sorry.
I’ve heard about your plantar fasciitis tricks…
Yes, plantar fasciitis is super annoying. Years ago, I found a literature review (can’t find it anymore) that suggested that all interventions for plantar fasciitis were equally inefficacious, and it is a condition that takes about 18 months to heal. Ouch! Furthermore, my foot doctor told me that surgery alleviates the pain but undermines the strength of your foot.
But I discovered a few tricks:
- These boots that one wears overnight to keep your foot tensioned work quickly to alleviate acute pain. Don’t use the sock ones. Use the full size one that looks like a plastic cast for a broken foot. Don’t over tighten it. Just use it so that your foot is angled slightly more than 90 degrees. If you can’t sleep with it, the boot is probably too tight or too aggressively angled.
- Voltaren, a “arthritis pain reliever,” now available over the counter-generic as diclofenac gel, is a godsend. They key is that you can put it on your foot and avoid the digestive complications from oral anti-inflammatories. Voltaren got me running in less than a week.
- Some sports, because of how your foot is angled, do not aggravate the plantar fascia. For instance, downhill skiing is great—your foot is stretched by the ski boot, making it almost like an hours-long treatment. Similarly ice skating does not aggravate my fascia even if done for hours. So you can keep in shape.
- I’ve found that the elliptical trainer doesn’t aggravate plantar fascia, and so you can do it for hours without injury. Don’t buy a cheap elliptical, they’re junk. Don’t trust the reviews either. You need to spend over $1k. The Sole E35 is a solid choice. But my favorite elliptical is the Octane XT and Q series standing ellipticals, which have stride lengths over 20 inches. You can find them on Craig’s List. I bought one used from a commercial gym for about $1k.
- Watch out for watches! I got a new Garmin watch, and it nudged me to run long and longer. I found myself running 10ks every other day, and then ended up with plantar again, putting me back at 2 mile runs…
Don’t overdo it. When I feel pressure in my heel, I know I am close to injuring my plantar fascia. So, for me at least, this is a permanent running injury 🙁
How do you contribute to DEI at Berkeley?
Technology law as a field is not known as being particularly diverse, nor inclusive. In my career at Berkeley, I have taken specific, sustained action to promote women in higher education, to raise awareness of SES issues in technology, and to include underrepresented and minority students in my work. Come by my office hours and I can speak with you in greater detail about these efforts. I’d also love to hear your thoughts about how BCLT can address systemic inequalities.
Recent events have caused me to deepen diversity and inclusion efforts in teaching. I plan to devote more classroom time to the structural causes of exclusion and inequality. For instance, in my technology courses generally, I intend to connect students with the history of Silicon Valley, and the root causes that made the area and its most successful companies homogenous. Few people know that Lockheed was the largest employer in the Valley until the rise of the .com bubble. Lockheed and other defense industrial base companies were male and white dominant (Lockheed was 85% male and 90% white even after equal opportunity laws were enacted). The demands of secrecy surrounding the DIB, the military R&D subject matter, and other factors caused systematic exclusion since the 1940s. Thus, when we think about inclusion in tech today, we have to contemplate addressing decades of disadvantage.
Confronting inequality is also a key element in my pure doctrinal courses, such as torts. I use the Witt/Tani casebook because it starts by situating the institutions of torts, because it explains how key doctrines compensate women and minorities and the poor differently, and because many of the cases selected by Witt and Tani have clear social class or race dynamics. Traditional cases that never received a class analysis—from Vosburg to Palsgraf—are recast in their casebook. My aim is to arm students with these insights so they can critically discuss the tradeoffs and implications of legal policies that promote formal equality or substantive equity.
Where can I find Berkeley Old Style Fonts?
What is the Faculty Budget Forum (FBF)?
The Faculty Budget Forum (FBF) is an email list of about 400 Berkeley faculty members. It is among the largest lateral (department to department) lists we have—the other being Teach-Net. If you are a faculty member, I am happy to add you to FBF. Just email me.
Will you supervise my JSP or JSD (PhD in law)?
Maybe! It is a delight to have a multi-year collaboration with JSP and JSD students. But JSP and JSD degrees require serious commitment because the point is not just for you to learn, but for you to make a new contribution to the literature. When you write your purpose statement, it’s not enough to just identify a topic. You must drill down and identify:
- The intellectual ideas that you want to engage in
- The literature surrounding your proposal, and how your investigation will answer problems not yet explored adequately
- Ideas that are “big enough” to justify a multi-year exploration
- Ideas that are important enough to justify the exploration—after all, you are going to spend years of your life on it 🙂
- The reasons why Berkeley is the right place for this exploration (what faculty/departmental/institutional characteristics of Berkeley are a good match for you)
- The training/experience you have that will make you successful in the research journey
Whom have you mentored at Berkeley?
Despite teaching in a professional program, I’ve had the chance to mentor some graduate students, including:
- Shazeda Ahmed, Berkeley PhD
- Zehra Betul Ayranci, Berkeley PhD, Fox Sports
- James Carney, Joanne Jia, Archana Kulkarni, Cameron Lopez, PrivacyBot Capstone Project (Information)
- Ella Corren, JSP
- Amit Elazari Bar On, head of global cybersecurity, Intel
- Gal Forer, JSD
- Kevin Frazier, USD Law
- Alexi Pfeffer-Gillett, UMD Law
- Grace Gordon, Master of Development Practice
- Arianne Jimenez, Privacy and Public Policy Manager Facebook APAC
- Aniket Kesari, Yale/Berkeley JD/PhD, Fordham Law
- Irene Kamara, Standardising data protection: a European perspective in an interconnected world, Tilburg University (Netherlands)
- Sam Kumkar, EECS
- Morgan Livingston, ISF
- Sylvia Lu, Law
- Rachna Mandalam, ISF
- Nicole van der Meulen, EC3
- Andrew Reddie, UC Berkeley
- Nikita Samarin, EECS
- Ankeet Shankar, Capstone Project (Information)
- Bart van der Sloot, Tilburg University
- Ashkan Soltani, privacy/security researcher
- Eric Winkofsky, JSD
In addition to these students, with Dean Shankar Sastry, I was Co-PI of a program (TRUST SITE REU) with a goal to increase diversity in graduate STEM programs. We hosted scores of undergraduates at Cal, and in some cases, I published papers with these students, including Mika Ayenson (Johns Hopkins University Applied Physics Laboratory), Shannon Canty, Quentin Mayo, and Lauren Thomas.
I’m a prospective student, will you…?
Apologies, I generally do not meet with students unless they are admitted to a program. Similarly, if you are a student at another program, apologies, I cannot supervise or give you advice on your research.
Please know that admissions at Berkeley is handled by a committee and that I have no influence over decisions.
What is your role with the academic senate?
I ran for the UCB Divisional Council in 2022 and won election for the 22-23, and 23-24 years. Known as DIVCO, the body could be thought of as the executive arm of Berkeley’s academic senate. I ran because of concerns about campus priorities and the strategic challenges we face. Berkeley is facing macro constraints including costs of housing and living in the Bay Area that are steadily eroding our competitive posture, and at the same time we lack features that help institutions perform (biggest example: no medical school).
We should be thinking big, with eyes on a 2030–2040 horizon. Some of the ideas I think are worth pursuing include: creating faculty housing like that offered at NYU and Colombia, creating student housing close to campus—even using eminent domain to reform the sleepy properties that surround the campus, rethinking how much of our central campus is devoted to sports infrastructure, building a medical school, and developing campus institutions that can more competitively interact with D/I/H-ARPA.
We should fundamentally rethink how we can use campus resources to compete for and retain faculty. Other schools use campus resources to provide perks for faculty that we simply don’t consider. For instance, we have a fantastic eye clinic at Berkeley—why won’t we offer corrective vision surgery as a retention strategy, or as a privilege connected with earning tenure, or even as a recruitment tool for the best graduate students?
I also ran because in my opinion, Berkeley gets in its own way too often. We literally decide not to do “the right thing” or the strategic thing because of transaction costs we have imposed upon ourselves. We are becoming more process-based and managerial. Just as employees adopt “shadow-IT” to circumvent bad technology decisions, some faculty employ shadow-operations to get their work done.
Senior faculty members spend much of their time now on process and paperwork. We need to formally declare a time-value to faculty member time, and eliminate rules, trainings, and paperwork that 1) excessively impose upon faculty time or 2) are not risk-justified. From reimbursements to CPHS to IACUC to even the merit review process, we have no evaluative method that acts as a ceiling on paperwork and faculty time and we don’t probe the upside/downside risks from process requirements.
Candidate Statement
My governance experience at Cal includes campus-level (CPHS, leading the Center for Long Term Cybersecurity, developing a professional masters in cybersecurity, Senate academic freedom committee) and school-level service (HGA of our cyber program, building space, admissions). I am a former member of the AAUP’s Committee A on Academic Freedom and Tenure and helped it develop policy on protection of electronic communications. I am also a practicing attorney and advisor to companies operating high-risk, high-consequence activities. I have raised money from NSF, from many companies, and I led a grant-making foundation.
My governance philosophy is guided by several high-level principles and concerns: our institution’s competitive posture; a structural perspective on campus challenges (I believe it is important to avoid using policies that impose costs on individuals when the problem being addressed is systemic in nature); the need to protect faculty time and attention from growing compliance, training, and other administrative obligations; and my sense that as an institution, we are becoming too risk adverse.
As a dual appointee in two professional schools (Law & Information), I have worked with many colleagues in the humanities and sciences. One of my goals has been to increase lateral faculty information sharing, and to that end I have helped moderate the Faculty Budget Forum. As a member of DIVCO, I would endeavor to help others understand and contribute to the complex governance landscape of our wonderful campus.
What conflicts of interest do you have?
The University of California recognizes that engagements in the private sector enrich academics’ research and teaching. I teach at professional schools, which tend to encourage teaching and research related to practice challenges. There’s a tradeoff between private sector engagements and benefits to students. For instance, several of my classes are based on client scenarios and my writing is informed by real business needs and constraints.
Norms surrounding conflicts disclosure and regulation is highly disciplinary. In some fields, experts think themselves above conflicts and do not disclose them. In others, such as law, norms of client confidentiality cause some academics to keep their conflicts secret. And some universities allow study sponsors to control the outcomes of research—something that is explicitly prohibited at Cal.
I serve on boards to two companies, Constella Intelligence (cybersecurity intelligence) and Palantir Technologies. I have also served on the boards of non-profits and operated a foundation, but no one seems concerned about those conflicts, and if you ask me in person, I’ll explain why you should be 🙂 Since 2015, I have been of counsel to Gunderson Dettmer LLP, where I advised scores of emerging technology companies and venture clients. The identities of my Gunderson clients are confidential, but I don’t engage in any kind of legal/expert opinion writing, public advocacy, or research for these clients. Instead, I typically help them with discrete legal problems.
My work has been directly or indirectly supported by many technology companies, including Apple, Google, Microsoft, Palantir, and Nokia. I always disclose specific sponsors of my research projects, and all situations where my academic work may be colored by a client or sponsor.
What is the Privacy Law Scholars Conference (PLSC)?
With Dan Solove, I started the Privacy Law Scholars Conference in 2008 (PLSC). The PLSC is a paper workshop for in-progress scholarship related to information privacy. The conference was based on the well-established Intellectual Property Law Scholars Conference and some ideas we borrowed from other conference: long networking breaks, all conversations, an emphasis on collegial and helpful interactions, and no panels. We also adopted the practice of having papers presented by a “commenter”—a designated discussion leader who introduced the paper and then curated the conversation amongst the group. This last innovation is key. It creates a lively dynamic where you don’t have the author droning on and on. It also helps the author understand what the reader actually learned from the paper. Many of the most important articles in the privacy law field were workshopped at PLSC.
I am no longer involved in PLSC, but am proud of what it has become, and am delighted that the model has been deployed elsewhere. There are now PLSCs in Europe, Latin America, and even regional mini-PLSCs in the US.
I am an undergrad/grad, may I take your course?
Probably yes.
Graduate students, you can enroll if my course has a non-Law prefix, such as Info.
Undergraduate students, you can enroll in INFO and Legal Studies (but not LAW) courses with permission. To obtain permission, email me the following information. I typically enroll undergraduates after the graduate registration period.
1. I am an upper-division student [Yes/No]
2. What year?
3. I understand and accept that this is a graduate-level class, with graduate-level materials and pacing. [Yes/No]
4. I understand and accept that participation in class discussion is expected, even if the class is larger than most undergraduate courses that expect this (in grad and law school classes, for example, students participate in discussion in 50-100-person classes). [Yes/No]
5. I would like to take this class because: [Please tell us why you would like to take the class.]
6. I would contribute to this class because: [Please tell us why you would contribute to the class. For example, your major is relevant to topics in the class; you are doing an undergrad thesis on a relevant topic; you worked on relevant issues prior to coming to Berkeley; etc.]
Will you write me a letter of recommendation?
Probably yes 🙂 But I need a few things from you in order to do a great job.
First, faculty need time. A month before the deadline is great.
Second, could you send me the following information:
- The position title and submission information.
- Information about the position
- Your resume or CV
- A short description of your long-term career goals
- In your own words, why you think you are a good fit for the opportunity
- In your own words, why you think the opportunity is a good one
Where can I find your LaTeX templates?
Check out my Github for:
Old school Berkeley letterhead
The 2020 Berkeley formal letterhead
The 2020 Berkeley casual letterhead
What is your AI-compliant email auto-responder message?
Pursuant to Article 52 of the EU AI Act, please be aware that this message comes from a low-risk “AI” system and not a human. All AI systems pose risks, including but not limited to spreading misinformation, causing emotional manipulation, engaging in invidious discrimination, the mis-operation of lethal autonomous weapons systems, the erosion of all human responsibility for decision-making and good judgment, the rendering useless of humanity, and/or a mass extinction event from misaligned superintelligence. Any information produced by this system must be processed with the highest caution. The University of California disclaims any claims or disclaimers made by this system. Do not rely on any information conveyed here without verifying it. You have no rights under Article 22 of the GDPR to object to this system, because sending email to this address is explicit consent to automated processing, including profiling. This system is not pre-registered in China; emails received from this system in China are hereby recalled.