Main Page: Difference between revisions
Line 21: | Line 21: | ||
9:00 to 10:30 | 9:00 to 10:30 | ||
|rowspan="2" align="center" style="background-color:#CC3333;"|'''The Changing Internet''' | |rowspan="2" align="center" style="background-color:#CC3333;"|'''The Changing Internet''' | ||
(cybersecurity) | (cybersecurity)<br> | ||
9:00 to 10:00 | 9:00 to 10:00 | ||
|rowspan="3" align="center" style="background-color:#CC3333;"|''' | |rowspan="3" align="center" style="background-color:#CC3333;"|'''Digital Humanities''' | ||
9:00 to 10:30 | 9:00 to 10:30 | ||
|rowspan="2" align="center" style="background-color:#CC3333;"|'''Privacy''' | |||
(Short Pillar) | |||
9:00 to 10:00 | |||
|- | |- | ||
|9:30 | |9:30 | ||
Line 35: | Line 36: | ||
|10:00 | |10:00 | ||
| | | | ||
|align="center"|30-minute break | |||
|align="center"|30-minute break | |align="center"|30-minute break | ||
|- | |- | ||
Line 43: | Line 45: | ||
10:30 to 12:00 | 10:30 to 12:00 | ||
|align="center"|30-minute break | |align="center"|30-minute break | ||
|align="center"|30 | |rowspan="3" align="center" style="background-color:#709850;"|'''Privacy''' | ||
(Roundtable)<br> | |||
10:30 to 12:00 | |||
|- | |- | ||
|11:00 | |11:00 | ||
Line 49: | Line 53: | ||
|rowspan="3" align="center" style="background-color:#CC3333;"|'''Open Systems/Access''' | |rowspan="3" align="center" style="background-color:#CC3333;"|'''Open Systems/Access''' | ||
11:00 to 12:30 | 11:00 to 12:30 | ||
|rowspan="2" align="center" style="background-color:#709850;"|''' | |rowspan="2" align="center" style="background-color:#709850;"|'''Digital Libraries, Archives, and Rights Registries''' | ||
Case Study<br> | Case Study<br> | ||
11:00 to 12:00 | 11:00 to 12:00 | ||
|- | |- | ||
|11:30 | |11:30 | ||
Line 61: | Line 62: | ||
|12:00 | |12:00 | ||
| | | | ||
|rowspan="2" align="center"|Lunch | |||
12:00 to 1:00 | |||
|rowspan="2" align="center"|Lunch | |rowspan="2" align="center"|Lunch | ||
12:00 to 1:00 | 12:00 to 1:00 | ||
Line 68: | Line 71: | ||
|12:30 | |12:30 | ||
| | | | ||
|rowspan="2" align="center"|Lunch | |rowspan="2" align="center"|Lunch | ||
12:30 to 1:30 | 12:30 to 1:30 | ||
Line 75: | Line 76: | ||
|1:00 | |1:00 | ||
| | | | ||
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''User Innovation''' | |||
1:00 to 2:00 | |||
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Global Internet''' | |rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Global Internet''' | ||
1:00 to 2:00 | |||
|rowspan="2" align="center"|'''Student Finale''' | |||
1:00 to 2:00 | 1:00 to 2:00 | ||
|- | |- | ||
Line 81: | Line 86: | ||
| | | | ||
|rowspan="2" align="center" style="background-color:#CC3333;"|'''Online Liberty and FOE''' | |rowspan="2" align="center" style="background-color:#CC3333;"|'''Online Liberty and FOE''' | ||
1:30 to 2:30 | 1:30 to 2:30 | ||
|- | |- | ||
Line 90: | Line 93: | ||
Case Study<br> | Case Study<br> | ||
2:00 to 3:00 | 2:00 to 3:00 | ||
|rowspan="2" align="center" style="background-color:# | |rowspan="2" align="center" style="background-color:#CC3333;"|'''Cooperation''' | ||
2:00 to 3:00 | |||
|rowspan="2" align="center" style="background-color:#709850;"|'''''Minds for Sale''''' | |||
2:00 to 3:00 | 2:00 to 3:00 | ||
|- | |- | ||
Line 96: | Line 101: | ||
| | | | ||
|align="center"|30-minute break | |align="center"|30-minute break | ||
|- | |- | ||
|3:00 | |3:00 | ||
Line 105: | Line 108: | ||
|align="center"|30-minute break | |align="center"|30-minute break | ||
|align="center"|30-minute break | |align="center"|30-minute break | ||
|rowspan="2" align="center" style="background-color:#8142A5;"|'''Looking Ahead''' | |||
3:00 to 4:00 | |||
|- | |- | ||
|3:30 | |3:30 | ||
Line 110: | Line 115: | ||
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Study of the Internet''' | |rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Study of the Internet''' | ||
3:30 to 4:30 | 3:30 to 4:30 | ||
|rowspan="3" align="center" style="background-color:#709850;"|'''Mutual Aid (intro)''' | |||
and<br> | |||
'''The Future of the Internet (panel)'''<br> | |||
3:30 to 5:00 | |||
|- | |- | ||
|4:00 | |4:00 | ||
| | | | ||
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''History of Cyberlaw and Berkman Center''' | |rowspan="2" align="center" style="background-color:#FC9B38;"|'''History of Cyberlaw and Berkman Center''' | ||
4:00 to 5:00 | 4:00 to 5:00 | ||
|rowspan="4" align="center" style="background-color:#E0E0E0;"|'''Final BBQ''' | |rowspan="4" align="center" style="background-color:#E0E0E0;"|'''Final BBQ''' | ||
Line 125: | Line 132: | ||
|- | |- | ||
|5:00 | |5:00 | ||
| | |||
| | | | ||
| | | | ||
Line 161: | Line 169: | ||
| | | | ||
|} | |} | ||
<center>''Schedule last updated July 13, | <center>''Schedule last updated July 13, 4PM''</center> | ||
==Program Materials== | ==Program Materials== |
Revision as of 15:06, 13 July 2011
Program Overview
After a five year hiatus, the world-renowned iLaw Program is returning to the Harvard Law School. The Berkman Center’s Internet Law Program (iLaw) was initially launched in 2000 to offer the public a way to learn about national and international legal, economic, and public interest debates surrounding the Internet from leading experts in the field.
The 2011 iLaw Program will engage new topics and revisit older topics within the technology, law and policy, and social science fields over a four-day conference, over September 5-9, 2011. Conference participants will consist of current students from the Harvard Law School (HLS) and the Harvard School of Engineering and Applied Sciences (SEAS), as well as selected researchers, lawyers, executives, faculty members, and technologists from the Harvard community and beyond.
Logistics and Program Agenda
(to be added)
Monday | Tuesday | Wednesday | Thursday | Friday | |
---|---|---|---|---|---|
9:00 | Introductory Session
9:00 to 10:30 |
The Changing Internet
(cybersecurity) |
Digital Humanities
9:00 to 10:30 |
Privacy
(Short Pillar) 9:00 to 10:00 | |
9:30 | The History of the Internet
9:30 to 10:30 | ||||
10:00 | 30-minute break | 30-minute break | |||
10:30 | 30-minute break | Selected IP Issues
10:30 to 12:00 |
30-minute break | Privacy
(Roundtable) | |
11:00 | Open Systems/Access
11:00 to 12:30 |
Digital Libraries, Archives, and Rights Registries
Case Study | |||
11:30 | |||||
12:00 | Lunch
12:00 to 1:00 |
Lunch
12:00 to 1:00 |
Lunch
12:00 to 1:00 | ||
12:30 | Lunch
12:30 to 1:30 | ||||
1:00 | User Innovation
1:00 to 2:00 |
The Global Internet
1:00 to 2:00 |
Student Finale
1:00 to 2:00 | ||
1:30 | Online Liberty and FOE
1:30 to 2:30 | ||||
2:00 | Youth and Media
Case Study |
Cooperation
2:00 to 3:00 |
Minds for Sale
2:00 to 3:00 | ||
2:30 | 30-minute break | ||||
3:00 | GNI/Role of Intermediaries
3:00 to 4:00 |
30-minute break | 30-minute break | Looking Ahead
3:00 to 4:00 | |
3:30 | The Study of the Internet
3:30 to 4:30 |
Mutual Aid (intro)
and | |||
4:00 | History of Cyberlaw and Berkman Center
4:00 to 5:00 |
Final BBQ
4:00 to 6:00+ | |||
4:30 | mid-point check-in | ||||
5:00 | |||||
5:30 | |||||
6:00 | Berkman Center Open House
6:00 to 8:00 |
Optional Evening Session
6:00 to 8:00 |
Optional Evening Session
6:00 to 8:00 |
||
6:30 | |||||
7:00 | |||||
7:30 | |||||
8:00 |
Program Materials
(add description of typology here)
The Pillars of iLaw
Network Access and Open Systems
Privacy
Intellectual Property
Cybersecurity
Online Liberty
Digital Humanities
Cross-sectional Modules
History of Cyberlaw
Methodologies
The Global Internet and Internationalization
User Innovation
Examples and Case Studies
Digital Libraries and Archives
Youth and Media
Cloud Computing
Broadband
The Future of the Internet
Minds for Sale
Case Study: WikiLeaks
Case Study: User Innovation
Case Study: GNI/Role of Intermediaries
Case Study: Herdict