<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cyber.jotwell.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cyber.jotwell.com/</loc>
		<lastmod>2026-03-10T15:56:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/disruptive-contracting-in-digital-music/</loc>
		<lastmod>2013-11-07T19:48:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-care-and-feeding-of-sticky-defaults-in-information-privacy-law/</loc>
		<lastmod>2013-11-07T19:48:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/from-behind-the-great-wall-foi-in-china-and-about-method/</loc>
		<lastmod>2013-11-07T19:48:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/cyberhealth-computerizing-personalized-comparisons-of-treatment-effectiveness/</loc>
		<lastmod>2013-11-07T19:48:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/if-code-is-law-then-coders-are-lawyers/</loc>
		<lastmod>2013-11-07T19:48:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/auto-reportage-and-the-enlightened-user/</loc>
		<lastmod>2013-11-07T19:49:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/just-a-little-bit-of-history-repeating/</loc>
		<lastmod>2013-11-07T19:49:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-player-of-games/</loc>
		<lastmod>2013-11-07T19:49:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/making-sense/</loc>
		<lastmod>2013-11-07T19:49:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/law-and-borders-revisited/</loc>
		<lastmod>2013-11-07T19:49:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-end-of-notice-and-consent-as-meaningful-privacy-protection/</loc>
		<lastmod>2013-11-07T19:49:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/undiplomatic-immunity/</loc>
		<lastmod>2013-11-07T19:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/regulating-cyberspace-can-online-ever-equal-offline/</loc>
		<lastmod>2013-11-07T19:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/cybersecurity-through-information-theory/</loc>
		<lastmod>2013-11-07T19:49:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/facebook-and-the-fourth-amendment-expecting-any-privacy-may-be-unreasonable/</loc>
		<lastmod>2013-11-07T19:49:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/banana-republic-com/</loc>
		<lastmod>2013-11-07T19:49:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/exploring-legitimacy-in-internet-institutions/</loc>
		<lastmod>2013-11-07T19:49:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/good-faith-scholarship/</loc>
		<lastmod>2013-11-07T19:49:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/juridical-delusions-of-control/</loc>
		<lastmod>2013-11-07T19:49:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/i-always-feel-like-somebodys-watching-me/</loc>
		<lastmod>2013-11-07T19:51:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-cyberart-of-forgetting/</loc>
		<lastmod>2013-11-07T19:51:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/bringing-blurry-online-privacy-into-sharp-relief/</loc>
		<lastmod>2013-11-07T19:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/democratizing-online-life-via-cultural-infrastructure/</loc>
		<lastmod>2013-11-07T19:51:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/17/</loc>
		<lastmod>2013-11-07T19:51:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/joshua-fairfields-the-god-paradox/</loc>
		<lastmod>2013-11-07T19:51:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/call-for-papers/</loc>
		<lastmod>2013-11-07T19:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/jotwell-mission-statement/</loc>
		<lastmod>2013-11-07T19:52:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-cancer-of-the-internet/</loc>
		<lastmod>2013-11-12T16:06:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/whats-so-special-about-information-security/</loc>
		<lastmod>2013-12-13T14:58:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/what-do-people-think-about-copyright/</loc>
		<lastmod>2014-02-24T14:34:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/empirical-link-rot-and-the-alarming-spectre-of-disappearing-law/</loc>
		<lastmod>2014-04-11T10:25:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/good-fences-make-better-data-brokers/</loc>
		<lastmod>2014-04-25T10:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/dont-restrict-my-e-book/</loc>
		<lastmod>2014-07-21T10:25:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/from-google-to-tolstoy-bot-should-the-first-amendment-protect-speech-generated-by-algorithms/</loc>
		<lastmod>2014-09-02T10:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/about-fallacies/</loc>
		<lastmod>2014-10-05T21:08:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/discrimination-by-database/</loc>
		<lastmod>2014-11-04T14:15:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/digital-behavioral-advertising-why-worry/</loc>
		<lastmod>2014-12-03T11:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/theyre-coming-to-get-you-barbara/</loc>
		<lastmod>2015-01-12T11:30:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/meet-the-editors-2009/</loc>
		<lastmod>2015-01-09T17:21:13+00:00</lastmod>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/userphoto/grimmelmann.jpg?1863783965</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/userphoto/froomkin.gif?999072290</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/userphoto/bartow.jpg?1214163578</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/userphoto/hburkert.thumbnail.jpg?555067577</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/2010/07/Crawford_Susan-100x150.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/2010/07/denardis_laura-99x150.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/userphoto/elkiniva.jpg?1628956141</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/userphoto/mgeist.thumbnail.jpg?1829893623</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/userphoto/ikerr.jpg?363560448</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/userphoto/mmadison.jpg?606553846</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/userphoto/pohm.jpg?2126520442</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/2009/10/pasqualefrankJPG2-109x150.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/userphoto/zittrain.jpg?994599790</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/spanking-the-money/</loc>
		<lastmod>2015-02-13T13:37:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/typecastes-big-datas-social-stratifications/</loc>
		<lastmod>2015-03-18T10:30:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/an-intimate-look-at-the-rise-of-data-totalitarianism/</loc>
		<lastmod>2015-04-21T12:48:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/an-offer-you-cant-understand/</loc>
		<lastmod>2015-05-15T10:30:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/free-for-the-taking-or-why-libertarians-are-wrong-about-markets-for-privacy/</loc>
		<lastmod>2015-07-03T13:51:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/free-access-to-law-is-it-here-to-stay-research-publications-of-interest-for-anybody-who-believes-in-the-rule-of-law/</loc>
		<lastmod>2015-07-03T13:52:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/internet-privacy-a-chinese-view/</loc>
		<lastmod>2015-07-14T15:08:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/what-is-a-theorist-for-the-recruitment-of-users-into-online-governance/</loc>
		<lastmod>2015-08-14T10:30:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/who-regulates-the-robots-2/</loc>
		<lastmod>2015-09-29T10:30:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/is-it-fair-to-sell-your-soul/</loc>
		<lastmod>2015-10-29T10:30:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-practice-and-theory-of-secure-data-releases/</loc>
		<lastmod>2015-11-30T11:30:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/data-for-peace-the-future-of-the-internet-of-things/</loc>
		<lastmod>2016-01-07T11:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/international-law-and-step-zero-going-beyond-cyberwar/</loc>
		<lastmod>2016-02-08T11:30:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/ye-shall-inherit-my-magic-sword-post-mortem-ownership-in-virtual-worlds/</loc>
		<lastmod>2016-03-07T11:30:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/innovation-equality-an-uneasy-relationship/</loc>
		<lastmod>2016-04-04T10:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/context-shouldnt-be-everything-online-libel-and-evolving-standards-of-liability/</loc>
		<lastmod>2016-05-04T10:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/how-to-win-at-least-time-in-the-information-power-game/</loc>
		<lastmod>2016-06-03T10:30:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/police-force/</loc>
		<lastmod>2016-07-01T10:30:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/my-favourite-things-the-promise-of-regulation-by-design/</loc>
		<lastmod>2016-07-29T10:30:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/new-app-city/</loc>
		<lastmod>2016-09-13T10:30:45+00:00</lastmod>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/2016/07/taskrabbit-300x128.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/what-is-the-path-to-freedom-online-its-complicated/</loc>
		<lastmod>2016-10-13T10:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/automatic-for-the-people/</loc>
		<lastmod>2016-11-08T11:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/what-is-cyberlaw-or-there-and-back-again/</loc>
		<lastmod>2017-01-01T18:56:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/could-there-be-free-speech-for-electronic-sheep/</loc>
		<lastmod>2017-02-23T11:30:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/back-to-the-essentials/</loc>
		<lastmod>2017-03-24T10:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/make-america-troll-again/</loc>
		<lastmod>2017-04-21T10:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/starting-with-consent/</loc>
		<lastmod>2017-05-19T10:30:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/inspecting-big-datas-warheads/</loc>
		<lastmod>2017-06-20T14:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/disruptive-platforms/</loc>
		<lastmod>2017-07-19T10:30:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/democracy-unchained/</loc>
		<lastmod>2017-08-17T10:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-answer-to-the-machine-is-in-the-rule-of-law/</loc>
		<lastmod>2017-10-02T10:30:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/rules-for-digital-radicals/</loc>
		<lastmod>2017-11-20T20:01:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/from-status-update-to-social-media-contract/</loc>
		<lastmod>2017-11-29T11:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/money-life-understanding-modern-privacy/</loc>
		<lastmod>2018-01-08T11:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/section-formerly-known-cyber/</loc>
		<lastmod>2018-01-08T11:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/governing-new-governors-speech/</loc>
		<lastmod>2018-02-13T11:30:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/new-kids-on-the-blockchain/</loc>
		<lastmod>2018-04-03T10:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/black-box-stigmatic-harms-and-how-to-stop-them/</loc>
		<lastmod>2018-04-17T10:30:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/an-argument-for-the-coherence-of-privacy-law/</loc>
		<lastmod>2018-05-25T00:59:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/power-lest-it-should-be-forgotten/</loc>
		<lastmod>2018-06-19T10:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-difference-engine-perpetuating-poverty-through-algorithms/</loc>
		<lastmod>2018-07-18T10:30:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-gdprs-version-of-algorithmic-accountability/</loc>
		<lastmod>2018-08-16T10:30:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/an-internet-x-ray-machine-for-the-masses/</loc>
		<lastmod>2018-09-04T04:50:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/dont-believe-it-if-you-see-it-deep-fakes-and-distrust/</loc>
		<lastmod>2018-09-27T10:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/copyright-smart-contracts-and-the-blockchain/</loc>
		<lastmod>2018-10-29T10:30:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/extraordinary-popular-delusions-and-the-madness-of-ico-crowdfunding/</loc>
		<lastmod>2018-11-26T14:59:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/fucking-with-the-magic/</loc>
		<lastmod>2019-01-22T11:30:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/data-breach-harms-bringing-in-the-courts-or-leaving-them-out/</loc>
		<lastmod>2019-02-19T11:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-lolcat-theory-of-internet-law/</loc>
		<lastmod>2019-03-25T10:30:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/empathy-democracy-and-the-rule-of-law/</loc>
		<lastmod>2019-05-08T10:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/manipulation-dark-patterns-and-evil-nudges/</loc>
		<lastmod>2019-05-22T10:30:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/democratized-content-and-its-discontents/</loc>
		<lastmod>2019-07-02T10:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-constant-trash-collector-platforms-and-the-paradoxes-of-content-moderation/</loc>
		<lastmod>2019-07-25T10:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/ian-kerr-1965-2019/</loc>
		<lastmod>2019-08-28T19:19:11+00:00</lastmod>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/2019/08/iankerr2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/we-the-north/</loc>
		<lastmod>2019-09-03T13:51:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/when-computer-code-crashes-get-corporeal/</loc>
		<lastmod>2019-10-03T10:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/remembering-ian-kerr/</loc>
		<lastmod>2019-09-27T01:37:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/military-algorithms-and-the-virtues-of-transparency/</loc>
		<lastmod>2019-11-20T11:30:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/trust-decentralization-and-the-blockchain/</loc>
		<lastmod>2019-12-12T11:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/oyez-robot/</loc>
		<lastmod>2020-01-24T11:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-cute-contracts-conundrum/</loc>
		<lastmod>2020-03-10T14:55:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/moderations-excess/</loc>
		<lastmod>2020-03-27T10:30:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-letter-emoji-of-the-law/</loc>
		<lastmod>2020-04-24T12:05:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/old-frauds-in-new-fintech-bottles/</loc>
		<lastmod>2020-06-16T10:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/countermovements-to-reinstate-countervailing-powers/</loc>
		<lastmod>2020-07-17T10:30:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/code-is-more-than-and-less-than-law/</loc>
		<lastmod>2020-08-14T10:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/invisible-holes-in-history/</loc>
		<lastmod>2020-10-01T14:01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/are-data-privacy-laws-trade-barriers/</loc>
		<lastmod>2020-10-30T10:30:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/cyberattacks-accusations-and-the-making-of-international-law/</loc>
		<lastmod>2020-12-02T11:30:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/no-machines-in-the-garden/</loc>
		<lastmod>2021-01-13T11:30:38+00:00</lastmod>
		<image:image>
			<image:loc>https://cyber.jotwell.com/wp-content/uploads/2021/01/SSRN-id3664124-e1609987888463.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-data-economy-is-political/</loc>
		<lastmod>2021-02-12T14:56:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/practical-and-effective-protection-of-human-rights-in-the-era-of-data-driven-tech-understanding-european-constitutional-law/</loc>
		<lastmod>2021-03-15T10:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/content-cartels-and-their-discontents/</loc>
		<lastmod>2021-04-13T10:30:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/illegal-sex-toy-patents/</loc>
		<lastmod>2021-05-12T10:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/gauging-genetic-privacy/</loc>
		<lastmod>2021-06-10T14:10:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/update-of-jotwell-mailing-lists/</loc>
		<lastmod>2021-06-27T17:16:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/whats-the-harm-the-answer-is-many/</loc>
		<lastmod>2021-07-09T10:30:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-ideology-of-bridging-the-digital-divide/</loc>
		<lastmod>2021-08-10T10:30:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/automated-algorithmic-decision-making-systems-and-alprs-in-consumer-lending-transactions/</loc>
		<lastmod>2021-09-24T10:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-law-of-ai/</loc>
		<lastmod>2021-10-25T10:30:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-hotel-california-effect-the-future-of-e-u-data-protection-influence-in-the-u-k/</loc>
		<lastmod>2021-11-23T11:30:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/how-to-regulate-harmful-inferences/</loc>
		<lastmod>2021-12-22T11:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/debunking-the-myth-that-police-body-cams-are-civil-rights-tool/</loc>
		<lastmod>2022-01-28T11:30:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/shifting-the-content-moderation-paradigm/</loc>
		<lastmod>2022-03-01T11:30:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-disconnect-between-upstream-automation-and-legal-protection-against-automated-decision-making/</loc>
		<lastmod>2022-04-07T10:30:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/confronting-surveillance/</loc>
		<lastmod>2022-05-12T10:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/congressional-myopia-in-biomedical-innovation-policy/</loc>
		<lastmod>2022-06-13T10:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-humble-vending-machine/</loc>
		<lastmod>2022-07-13T10:30:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/privacy-depends/</loc>
		<lastmod>2022-08-11T10:30:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/advertising-fraud-is-there-no-alternative/</loc>
		<lastmod>2022-09-23T10:30:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-argument-for-not-closing-accountability-gaps/</loc>
		<lastmod>2022-10-26T19:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/why-bad-privacy-happens-to-good-people/</loc>
		<lastmod>2022-11-02T18:45:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/novel-language-models-as-a-technological-solution-to-the-no-reading-problem/</loc>
		<lastmod>2022-11-28T11:30:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/theres-a-great-big-beautiful-tomorrow-for-pittsburgh/</loc>
		<lastmod>2023-01-04T11:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/surveilling-truckers-and-the-future-of-the-workplace/</loc>
		<lastmod>2023-02-07T11:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-dawn-of-influencer-law/</loc>
		<lastmod>2023-03-09T11:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/trust-trustworthiness-and-misinformation-shared-by-the-government/</loc>
		<lastmod>2023-04-23T15:22:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/what-sts-can-and-cant-do-for-law-and-technology/</loc>
		<lastmod>2023-05-19T10:30:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/words-of-wisdom/</loc>
		<lastmod>2023-06-20T10:30:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/generating-genuine-data-protection/</loc>
		<lastmod>2023-07-25T10:30:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/sexualitys-promise-for-sexual-privacy/</loc>
		<lastmod>2023-08-30T10:30:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/algorithmic-accountability-is-even-harder-than-you-thought/</loc>
		<lastmod>2023-09-28T10:30:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/best-laid-plans-the-challenges-of-implementing-article-17/</loc>
		<lastmod>2023-10-23T10:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/addressing-the-modern-shamanism-of-predictive-inferences/</loc>
		<lastmod>2023-11-27T11:30:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/centering-educational-institutions-as-potential-sources-of-student-privacy-violations/</loc>
		<lastmod>2024-01-05T11:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/risky-speech-systems-tort-liability-for-ai-generated-illegal-speech/</loc>
		<lastmod>2024-02-06T11:30:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/debunking-ais-supposed-fairness-accuracy-tradeoff/</loc>
		<lastmod>2024-03-08T13:50:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/breathing-feminism-into-the-machine/</loc>
		<lastmod>2024-04-03T10:30:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/can-informed-consent-solve-ai-bias/</loc>
		<lastmod>2024-05-07T10:30:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/getting-real-about-protecting-privacy/</loc>
		<lastmod>2024-06-05T10:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/when-law-is-code/</loc>
		<lastmod>2024-07-31T10:30:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/ai-misfeasance-or-ai-malpractice/</loc>
		<lastmod>2024-09-10T10:30:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/policing-patient-privacy/</loc>
		<lastmod>2024-10-08T14:17:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/fixing-the-us-code/</loc>
		<lastmod>2024-11-11T14:40:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/can-the-buyer-beware-state-procurement-of-ai-systems/</loc>
		<lastmod>2024-12-11T11:30:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/state-surveillance-but-from-the-ground-up/</loc>
		<lastmod>2025-02-07T02:42:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/federal-civil-litigation-in-the-age-of-generative-ai/</loc>
		<lastmod>2025-03-03T11:30:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/eu-ict-a-tale-of-regulation-innovation-causation-and-frustration/</loc>
		<lastmod>2025-03-26T14:21:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/products-liability-as-the-pragmatic-first-step-to-a-i-regulation/</loc>
		<lastmod>2025-04-23T10:30:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/centering-the-vulnerable-through-data-protection/</loc>
		<lastmod>2025-05-22T10:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-problem-of-insincere-post-hoc-ai-explanations/</loc>
		<lastmod>2025-06-20T10:30:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/deepfakes-deconstructed/</loc>
		<lastmod>2025-07-18T10:30:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/ai-disgorgement-or-ai-recalls-a-trip-down-remedy-lane/</loc>
		<lastmod>2025-09-03T10:30:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/rummaging-rebooted/</loc>
		<lastmod>2025-10-01T10:30:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/distinguishing-marks/</loc>
		<lastmod>2025-10-31T10:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/the-edge-of-tomorrow/</loc>
		<lastmod>2025-11-28T11:30:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/tech-elites-dont-just-evade-the-state-they-change-it/</loc>
		<lastmod>2026-01-09T12:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/crossroads-privacy-law-and-copyright-law-in-the-age-of-artificial-intelligence/</loc>
		<lastmod>2026-02-09T11:30:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyber.jotwell.com/bringing-society-back-in-how-tech-remakes-social-relations/</loc>
		<lastmod>2026-03-10T15:56:49+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->