Hammering Square Pegs into Round Holes

The Geographical Scope of Application of the EU Right to be Delisted

In this paper, Michel Reymond explores the extraterritorial effects of the Google Spain decision rendered in May 2014 by the European Court of Justice. Through a methodology inspired by private international law, the author examines the geographical reach of the so-called ‘Right to be Forgotten,’ which is more correctly identified as a ‘Right to be Delisted.’

15 Sep 2016

Culture Change and Digital Technology: The NYPD under Commissioner William Bratton, 2014-2016

This white paper explores NYPD's adoption of Twitter and an ideation platform called IdeaScale that was aimed at allowing community members to nominate "quality of life" issues for resolution by the police. It examines the department's pivot to Facebook as an interactive communications platform following its experience with IdeaScale...

12 Sep 2016

Sep 6 2016 5:00pm to Sep 6 2016 5:00pm

Why the Internet Matters

an interactive discussion with Prof. Jonathan Zittrain, Berkman Klein Center Faculty Chair

If you’re interested in connecting with the Berkman Klein Center's research, community, and events, or are just generally interested in digital technologies and their impact on society, please join us for this talk!

Announcing the Release of “The Internet and You,” New Educational Resources for Elementary School-Age Students

Featuring Ruff Ruffman: Humble Media Genius from PBS, “The Internet and You” provides interactive lesson plans about digital privacy, search engines, online advertising, and the creation of positive online experiences that can be used in schools, after-school programs, and beyond.

The Berkman Klein Assembly Pilot Program 2017

Calling Developers and Tech Industry Professionals

The Berkman Klein Center for Internet & Society at Harvard University is excited to announce the Berkman Klein Assembly, an innovative pilot program that will experiment with different modes of education, collaboration, and development to work towards solving some of the tough problems at the intersections of code and policy in digital security. 

Pages