Menu Close

Washington and Lee Law Review - Roundtables

Roundtable

by Wayne R. Barnes

This symposium has revolved around Professor Calhoun’s article, which posits that it is completely legitimate, in proposing laws and public policies, to argue for them in the public square based on overtly religious principles. In my initial response, I took issue with his argument that no reasons justify barring faith-based arguments from the public square argument. In fact, I do find reasons justifying the prohibition of “faith-based,” or Christian, arguments in the public square—and, in fact, I find such reasons within Christianity itself. This is because what is being publicly communicated in Christian political argumentation is that if citizens comply with certain laws being proposed (i.e., they behave in the legally-argued way), it will cohere with Christian principles, and thereby gain them favor with God. Or, more simply, “if I do these things, it will please God.” This “works-based” favor with God is a completely incorrect view of orthodox Christian doctrine, which subscribes to salvation by faith alone. Christian-based political argumentation runs counter to the Christian gospel, because it gets itself tangled up into law, or works, as something that can be done in order to gain greater favor with God. It is, in fact, at odds with the Gospel. Professor Calhoun, in his reply to my article, has availed himself of this opportunity to demonstrate why his views on overt Christian political advocacy have changed since first holding a position similarly to mine over twenty-five years ago, and that he now believes Christian theology poses no problem to the advocacy he promotes. His first argument is that such advocacy will be seen not as promising eternal favor with God, but merely the staving off of immediate calamity or judgment from God in this life; I question whether this is how such advocacy will be perceived, but caution that this message, too, is quite probably wrong, as well. His second argument is that laws make man conscious of sin and can indeed bring one to faith in God; I point out that the scriptures on consciousness of sin are referencing the Mosaic law handed down directly by God through Moses, not secular laws passed by secular states. His third argument is that God actually decrees good works or behavior by Christians as part of a missional plan to reach unbelievers for the faith; however, I point out that what is sought from the unbelievers is not the replication of the observed works (as is the case with decreed secular law), but rather an encouragement to come to genuine faith in God. I conclude by remaining convinced that overt Christian political argumentation, in Christian terms, is more harmful than beneficial.

Roundtable

by Samuel W. Calhoun

This Essay responds to comments by Wayne Barnes, Ian Huyett, and David Smolin on my prior Article, Separation of Church and State: Jefferson, Lincoln, and the Reverend Martin Luther King, Jr., Show It Was Never Intended to Separate Religion from Politics. Part II, although noting a few disagreements with Huyett and Smolin, principally argues that they strengthen the case for the appropriateness of religious arguments in the public square. Part III evaluates Wayne Barnes’s contention that Christian doctrine requires separating religion from politics.

Roundtable

by Ian Huyett

In his address, Professor Calhoun used American Christian abolitionism to illustrate the beneficial role that religion can play in political debate. Surveying the past two millennia, I argue that Christian political thought has protected liberty in every era of the church’s dramatic history. Along the way, I rebut critics—from the left and right—who urge that Christianity’s political influence has been unhelpful or harmful. I also seek to show that statements like “religion has no place in politics” are best understood as expressions of arbitrary bias.

Roundtable

by David M. Smolin

Political and philosophical theorists have often advocated for the exclusion of some or all religious perspectives from full participation in politics. Such approaches create criteria—such as public accessibility, public reason, or secular rationale—to legitimate such exclusion. During the 1990s I argued, as an evangelical Christian, against such exclusionary theories, defending the rights to full and equal political participation by evangelical Christians, traditionalist Roman Catholics, and any others who would be restricted by such criteria.

 

Roundtable

by Wayne R. Barnes

Professor Calhoun, in his Article around which this symposium is based, has asserted that it is permissible for citizens to publicly argue for laws or public policy solutions based on explicitly religious reasons. Calhoun candidly admits that he has “long grappled” with this question (as have I, though he for longer), and, in probably the biggest understatement in this entire symposium, notes that Professor Kent Greenawalt identified this as “a particularly significant, debatable, and highly complex problem.” Is it ever. I have a position that I will advance in this article, but I wish to acknowledge at the outset that this is a difficult and complicated issue. It intersects with issues of constitutional law, theology, political theory, jurisprudence, philosophy, law and morality—and that’s just off the top of my head. As soon as one issue is addressed, twelve others raise their head and confound. I am also mindful that Professor Calhoun has been grappling with this issue for far longer than I have. I respect him and his thoughtful treatment of this issue immensely. Part of my trepidation in addressing this subject is that, as will be seen in this response, Professor Calhoun once held a very similar opinion on this issue as me. However, he has evolved beyond it, whereas I (to date) have not. The structure of this online symposium is that Professor Calhoun will have a chance to respond in writing to the points I make in this Article, and I will then have the opportunity to reflect and respond to his reply. I look forward to the exchange, and I know that I will be enriched for having participated in the dialogue.

Roundtable

by Jeremy Berkowitz, Michael Mangold & Stephen Sharon

In recent years, well-known cyber breaches have placed growing pressure on organizations to implement proper privacy and data protection standards. Attacks involving the theft of employee and customer personal information have damaged the reputations of well-known brands, resulting in significant financial costs. As a result, governments across the globe are actively examining and strengthening laws to better protect the personal data of its citizens. The General Data Protection Regulation (GDPR) updates European privacy law with an array of provisions that better protect consumers and require organizations to focus on accounting for privacy in their business processes through “privacy-by-design” and “privacy by default” principles. In the US, the National Privacy Research Strategy (NPRS), makes several recommendations that reinforce the need for organizations to better protect data.

In response to these rapid developments in privacy compliance, data flow mapping has emerged as a valuable tool. Data flow mapping depicts the flow of data through a system or process, enumerating specific data elements handled, while identifying the risks at different stages of the data lifecycle.

This Article explains the critical features of a data flow map and discusses how mapping may improve the transparency of the data lifecycle, while recognizing the limitations in building out data flow maps and the difficulties of maintaining updated maps. The Article then explores how data flow mapping may support data collection, transfer, storage, and destruction practices pursuant to various privacy regulations. Finally, a hypothetical case study is presented to show how data flow mapping was used by an organization to stay compliant with privacy rules and to improve the transparency of information flows.

Roundtable

by Chetan Gupta

This paper examines the hypothesis that it may be possible for individual actors in a marketplace to drive the adoption of particular privacy and security standards. It aims to explore the diffusion of privacy and security technologies in the marketplace. Using HTTPS, Two-Factor Authentication, and End-to-End Encryption as case studies, it tries to ascertain which factors are responsible for successful diffusion which improves the privacy of a large number of users. Lastly, it explores whether the FTC may view a widely diffused standard as a necessary security feature for all actors in a particular industry.

Based on the case studies chosen, the paper concludes that while single actors/groups often do drive the adoption of a standard, they tend to be significant players in the industry or otherwise well positioned to drive adoption and diffusion. The openness of a new standard can also contribute significantly to its success. When a privacy standard becomes industry dominant on account of a major actor, the cost to other market participants appears not to affect its diffusion.

A further conclusion is that diffusion is also easiest in consumer facing products when it involves little to no inconvenience to consumers, and is carried out at the back end, yet results in tangible and visible benefits to consumers, who can then question why other actors in that space are not implementing it. Actors who do not adopt the standard may also potentially face reputational risks on account of non-implementation, and lose out on market share.

Roundtable

by Ivan L. Sucharski & Philip Fabinger

To prepare for the age of the intelligent, highly connected, and autonomous vehicle, a new approach to concepts of granting consent, managing privacy, and dealing with the need to interact quickly and meaningfully is needed. Additionally, in an environment where personal data is rapidly shared with a multitude of independent parties, there exists a need to reduce the information asymmetry that currently exists between the user and data collecting entities. This Article rethinks the traditional notice and consent model in the context of real-time communication between vehicles or vehicles and infrastructure or vehicles and other surroundings and proposes a re-engineering of current privacy concepts to prepare for a rapidly approaching digital future. In this future, multiple independent actors such as vehicles or other machines may seek personal information at a rate that makes the traditional informed consent model untenable.

This Article proposes a two-step approach: As an attempt to meet and balance user needs for a seamless experience while preserving their rights to privacy, the first step is a less static consent paradigm able to better support personal data in systems which use machine based real-time communication and automation. In addition, the article proposes a radical re-thinking of the current privacy protection system by sharing the vision of “Privacy as a Service” as a second step, which is an independently managed method of granular technical privacy control that can better protect individual privacy while at the same time facilitating high-frequency communication in a machine-to-machine environment.

Roundtable

by Molly Jackman & Lauri Kanerva

Increasingly, companies are conducting research so that they can make informed decisions about what products to build and what features to change.These data-driven insights enable companies to make responsible decisions that will improve peoples’ experiences with their products. Importantly, companies must also be responsible in how they conduct research. Existing ethical guidelines for research do not always robustly address the considerations that industry researchers face. For this reason, companies should develop principles and practices around research that are appropriate to the environments in which they operate,taking into account the values set out in law and ethics. This paper describes the research review process designed and implemented at Facebook, including the training employees receive, and the steps involved in evaluating proposed research. We emphasize that there is no one-size-fits-all model of research review that can be applied across companies, and that processes should be designed to fit the contexts in which the research is taking place. However, we hope that general principles can be extracted from Facebook’s process that will inform other companies as they develop frameworks for research review that serve their needs.

css.php