Main Page: Difference between revisions
Line 20: | Line 20: | ||
|align="center" style="background-color:#E0E0E0;"|'''Introductory Session''' | |align="center" style="background-color:#E0E0E0;"|'''Introductory Session''' | ||
9:00 to 10:30 | 9:00 to 10:30 | ||
|rowspan=" | |rowspan="2" align="center" style="background-color:#CC3333;"|'''The Changing Internet''' | ||
9:00 to 10: | (cybersecurity) | ||
9:00 to 10:00 | |||
|rowspan="3" align="center" style="background-color:#CC3333;"|'''Privacy''' | |rowspan="3" align="center" style="background-color:#CC3333;"|'''Privacy''' | ||
9:00 to 10:30 | 9:00 to 10:30 | ||
Line 34: | Line 35: | ||
|10:00 | |10:00 | ||
| | | | ||
|align="center"|30-minute break | |||
|- | |- | ||
|10:30 | |10:30 | ||
| | | | ||
|align="center"|30-minute break | |align="center"|30-minute break | ||
|rowspan="3" align="center" style="background-color:#CC3333;"|'''Selected IP Issues''' | |||
10:30 to 12:00 | |||
|align="center"|30-minute break | |align="center"|30-minute break | ||
|align="center"|30-minute break | |align="center"|30-minute break | ||
Line 46: | Line 49: | ||
|rowspan="3" align="center" style="background-color:#CC3333;"|'''Open Systems/Access''' | |rowspan="3" align="center" style="background-color:#CC3333;"|'''Open Systems/Access''' | ||
11:00 to 12:30 | 11:00 to 12:30 | ||
|rowspan="2" align="center" style="background-color:#709850;"|'''Youth and Media''' | |rowspan="2" align="center" style="background-color:#709850;"|'''Youth and Media''' | ||
Case Study<br> | Case Study<br> | ||
Line 74: | Line 75: | ||
|1:00 | |1:00 | ||
| | | | ||
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Global Internet''' | |rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Global Internet''' | ||
1:00 to 2:00 | 1:00 to 2:00 | ||
Line 88: | Line 87: | ||
|2:00 | |2:00 | ||
| | | | ||
|rowspan="2" align="center" style="background-color:#709850;"|'''Youth and Media''' | |||
Case Study<br> | |||
2:00 to 3:00 | |||
|rowspan="2" align="center" style="background-color:#FC9B38;"| '''Methodologies''' | |rowspan="2" align="center" style="background-color:#FC9B38;"| '''Methodologies''' | ||
2:00 to 3:00 | 2:00 to 3:00 | ||
Line 94: | Line 96: | ||
| | | | ||
|align="center"|30-minute break | |align="center"|30-minute break | ||
|rowspan="3" align="center" style="background-color:#8142A5;"|'''Looking Ahead''' | |rowspan="3" align="center" style="background-color:#8142A5;"|'''Looking Ahead''' | ||
2:30 to 4:00 | 2:30 to 4:00 | ||
Line 104: | Line 103: | ||
|rowspan="2" align="center" style="background-color:#709850;"|'''GNI/Role of Intermediaries''' | |rowspan="2" align="center" style="background-color:#709850;"|'''GNI/Role of Intermediaries''' | ||
3:00 to 4:00 | 3:00 to 4:00 | ||
|align="center"|30-minute break | |||
|align="center"|30-minute break | |align="center"|30-minute break | ||
|- | |- | ||
|3:30 | |3:30 | ||
| | | | ||
| | |rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Study of the Internet''' | ||
3:30 to 4:30 | |||
|- | |- | ||
|4:00 | |4:00 | ||
Line 123: | Line 122: | ||
|4:30 | |4:30 | ||
| | | | ||
|align="center"|''mid-point check-in'' | |||
|- | |- | ||
|5:00 | |5:00 | ||
| | | | ||
| | | | ||
| | | | ||
|- | |- |
Revision as of 14:40, 13 July 2011
Program Overview
After a five year hiatus, the world-renowned iLaw Program is returning to the Harvard Law School. The Berkman Center’s Internet Law Program (iLaw) was initially launched in 2000 to offer the public a way to learn about national and international legal, economic, and public interest debates surrounding the Internet from leading experts in the field.
The 2011 iLaw Program will engage new topics and revisit older topics within the technology, law and policy, and social science fields over a four-day conference, over September 5-9, 2011. Conference participants will consist of current students from the Harvard Law School (HLS) and the Harvard School of Engineering and Applied Sciences (SEAS), as well as selected researchers, lawyers, executives, faculty members, and technologists from the Harvard community and beyond.
Logistics and Program Agenda
(to be added)
Monday | Tuesday | Wednesday | Thursday | Friday | |
---|---|---|---|---|---|
9:00 | Introductory Session
9:00 to 10:30 |
The Changing Internet
(cybersecurity) 9:00 to 10:00 |
Privacy
9:00 to 10:30 |
Cyber Security
9:00 to 10:30 | |
9:30 | The History of the Internet
9:30 to 10:30 | ||||
10:00 | 30-minute break | ||||
10:30 | 30-minute break | Selected IP Issues
10:30 to 12:00 |
30-minute break | 30-minute break | |
11:00 | Open Systems/Access
11:00 to 12:30 |
Youth and Media
Case Study |
WikiLeaks
Case Study | ||
11:30 | |||||
12:00 | Lunch
12:00 to 1:00 |
Lunch
12:00 to 1:00 | |||
12:30 | Lunch
12:30 to 1:30 |
Lunch
12:30 to 1:30 | |||
1:00 | The Global Internet
1:00 to 2:00 | ||||
1:30 | Online Liberty and FOE
1:30 to 2:30 |
Minds for Sale
1:30 to 2:30 | |||
2:00 | Youth and Media
Case Study |
Methodologies
2:00 to 3:00 | |||
2:30 | 30-minute break | Looking Ahead
2:30 to 4:00 | |||
3:00 | GNI/Role of Intermediaries
3:00 to 4:00 |
30-minute break | 30-minute break | ||
3:30 | The Study of the Internet
3:30 to 4:30 | ||||
4:00 | History of Cyberlaw and Berkman Center
4:00 to 5:00 |
User Innovation
4:00 to 5:00 |
Final BBQ
4:00 to 6:00+ | ||
4:30 | mid-point check-in | ||||
5:00 | |||||
5:30 | |||||
6:00 | Berkman Center Open House
6:00 to 8:00 |
Optional Evening Session
6:00 to 8:00 |
Optional Evening Session
6:00 to 8:00 |
||
6:30 | |||||
7:00 | |||||
7:30 | |||||
8:00 |
Program Materials
(add description of typology here)
The Pillars of iLaw
Network Access and Open Systems
Privacy
Intellectual Property
Cybersecurity
Online Liberty
Digital Humanities
Cross-sectional Modules
History of Cyberlaw
Methodologies
The Global Internet and Internationalization
User Innovation
Examples and Case Studies
Digital Libraries and Archives
Youth and Media
Cloud Computing
Broadband
The Future of the Internet
Minds for Sale
Case Study: WikiLeaks
Case Study: User Innovation
Case Study: GNI/Role of Intermediaries
Case Study: Herdict