Main Page: Difference between revisions

From Internet Law Program 2011
Jump to navigation Jump to search
Line 21: Line 21:
9:00 to 10:30
9:00 to 10:30
|rowspan="2" align="center" style="background-color:#CC3333;"|'''The Changing Internet'''
|rowspan="2" align="center" style="background-color:#CC3333;"|'''The Changing Internet'''
(cybersecurity)
(cybersecurity)<br>
9:00 to 10:00
9:00 to 10:00
|rowspan="3" align="center" style="background-color:#CC3333;"|'''Privacy'''
|rowspan="3" align="center" style="background-color:#CC3333;"|'''Digital Humanities'''  
9:00 to 10:30
|rowspan="3" align="center" style="background-color:#CC3333;"|'''Cyber Security'''
9:00 to 10:30
9:00 to 10:30
|rowspan="2" align="center" style="background-color:#CC3333;"|'''Privacy'''
(Short Pillar)
9:00 to 10:00
|-
|-
|9:30
|9:30
Line 35: Line 36:
|10:00
|10:00
|&nbsp;
|&nbsp;
|align="center"|30-minute break
|align="center"|30-minute break
|align="center"|30-minute break
|-
|-
Line 43: Line 45:
10:30 to 12:00
10:30 to 12:00
|align="center"|30-minute break
|align="center"|30-minute break
|align="center"|30-minute break
|rowspan="3" align="center" style="background-color:#709850;"|'''Privacy'''
(Roundtable)<br>
10:30 to 12:00
|-
|-
|11:00
|11:00
Line 49: Line 53:
|rowspan="3" align="center" style="background-color:#CC3333;"|'''Open Systems/Access'''
|rowspan="3" align="center" style="background-color:#CC3333;"|'''Open Systems/Access'''
11:00 to 12:30
11:00 to 12:30
|rowspan="2" align="center" style="background-color:#709850;"|'''Youth and Media'''
|rowspan="2" align="center" style="background-color:#709850;"|'''Digital Libraries, Archives, and Rights Registries'''
Case Study<br>
Case Study<br>
11:00 to 12:00
11:00 to 12:00
|rowspan="3" align="center" style="background-color:#709850;"|'''WikiLeaks'''
Case Study<br>
11:00 to 12:30
|-
|-
|11:30
|11:30
Line 61: Line 62:
|12:00
|12:00
|&nbsp;
|&nbsp;
|rowspan="2" align="center"|Lunch
12:00 to 1:00
|rowspan="2" align="center"|Lunch
|rowspan="2" align="center"|Lunch
12:00 to 1:00
12:00 to 1:00
Line 68: Line 71:
|12:30
|12:30
|&nbsp;
|&nbsp;
|rowspan="2" align="center"|Lunch
12:30 to 1:30
|rowspan="2" align="center"|Lunch
|rowspan="2" align="center"|Lunch
12:30 to 1:30
12:30 to 1:30
Line 75: Line 76:
|1:00
|1:00
|&nbsp;
|&nbsp;
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''User Innovation'''
1:00 to 2:00
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Global Internet'''
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Global Internet'''
1:00 to 2:00
|rowspan="2" align="center"|'''Student Finale'''
1:00 to 2:00
1:00 to 2:00
|-
|-
Line 81: Line 86:
|&nbsp;
|&nbsp;
|rowspan="2" align="center" style="background-color:#CC3333;"|'''Online Liberty and FOE'''
|rowspan="2" align="center" style="background-color:#CC3333;"|'''Online Liberty and FOE'''
1:30 to 2:30
|rowspan="2" align="center" style="background-color:#709850;"|'''''Minds for Sale'''''
1:30 to 2:30
1:30 to 2:30
|-
|-
Line 90: Line 93:
Case Study<br>
Case Study<br>
2:00 to 3:00
2:00 to 3:00
|rowspan="2" align="center" style="background-color:#FC9B38;"| '''Methodologies'''
|rowspan="2" align="center" style="background-color:#CC3333;"|'''Cooperation'''
2:00 to 3:00
|rowspan="2" align="center" style="background-color:#709850;"|'''''Minds for Sale'''''
2:00 to 3:00
2:00 to 3:00
|-
|-
Line 96: Line 101:
|&nbsp;
|&nbsp;
|align="center"|30-minute break
|align="center"|30-minute break
|rowspan="3" align="center" style="background-color:#8142A5;"|'''Looking Ahead'''
2:30 to 4:00
|-
|-
|3:00
|3:00
Line 105: Line 108:
|align="center"|30-minute break
|align="center"|30-minute break
|align="center"|30-minute break
|align="center"|30-minute break
|rowspan="2" align="center" style="background-color:#8142A5;"|'''Looking Ahead'''
3:00 to 4:00
|-
|-
|3:30
|3:30
Line 110: Line 115:
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Study of the Internet'''
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Study of the Internet'''
3:30 to 4:30
3:30 to 4:30
|rowspan="3" align="center" style="background-color:#709850;"|'''Mutual Aid (intro)'''
and<br>
'''The Future of the Internet (panel)'''<br>
3:30 to 5:00
|-
|-
|4:00
|4:00
|&nbsp;
|&nbsp;
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''History of Cyberlaw and Berkman Center'''
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''History of Cyberlaw and Berkman Center'''
4:00 to 5:00
|rowspan="2" align="center" style="background-color:#FC9B38;"|'''User Innovation'''
4:00 to 5:00
4:00 to 5:00
|rowspan="4" align="center" style="background-color:#E0E0E0;"|'''Final BBQ'''
|rowspan="4" align="center" style="background-color:#E0E0E0;"|'''Final BBQ'''
Line 125: Line 132:
|-
|-
|5:00
|5:00
|&nbsp;
|&nbsp;
|&nbsp;
|&nbsp;
|&nbsp;
Line 161: Line 169:
|
|
|}
|}
<center>''Schedule last updated July 13, 3PM''</center>
<center>''Schedule last updated July 13, 4PM''</center>


==Program Materials==
==Program Materials==

Revision as of 16:06, 13 July 2011

iLaw Wiki Navigation
Pillar Themes of iLaw
Open Systems/Access · Online Liberty and FOE
The Changing Internet: Cybersecurity · Intellectual Property
Digital Humanities · Cooperation · Privacy
Cross-sectional Themes of iLaw
The History of the Internet
The Global Internet · Interoperability
The Study of the Internet: New Methods for New Technologies
The Future of the Internet
Case Studies
Digital Libraries, Archives, and Rights Registries
Exploring the Arab Spring · Minds for Sale
User Innovation · Mutual Aid
Misc
Program Schedule · Program Logistics
Evening Events · Student Projects · Participation
Old iLaw Videos · Mid-Point Check-in

Program Overview

After a five year hiatus, the world-renowned iLaw Program is returning to the Harvard Law School. The Berkman Center’s Internet Law Program (iLaw) was initially launched in 2000 to offer the public a way to learn about national and international legal, economic, and public interest debates surrounding the Internet from leading experts in the field.

The 2011 iLaw Program will engage new topics and revisit older topics within the technology, law and policy, and social science fields over a four-day conference, over September 5-9, 2011. Conference participants will consist of current students from the Harvard Law School (HLS) and the Harvard School of Engineering and Applied Sciences (SEAS), as well as selected researchers, lawyers, executives, faculty members, and technologists from the Harvard community and beyond.

Logistics and Program Agenda

(to be added)

DRAFT Program Agenda
  Monday Tuesday Wednesday Thursday Friday
9:00   Introductory Session

9:00 to 10:30

The Changing Internet

(cybersecurity)
9:00 to 10:00

Digital Humanities

9:00 to 10:30

Privacy

(Short Pillar) 9:00 to 10:00

9:30   The History of the Internet

9:30 to 10:30

10:00   30-minute break 30-minute break
10:30   30-minute break Selected IP Issues

10:30 to 12:00

30-minute break Privacy

(Roundtable)
10:30 to 12:00

11:00 Open Systems/Access

11:00 to 12:30

Digital Libraries, Archives, and Rights Registries

Case Study
11:00 to 12:00

11:30  
12:00   Lunch

12:00 to 1:00

Lunch

12:00 to 1:00

Lunch

12:00 to 1:00

12:30   Lunch

12:30 to 1:30

1:00   User Innovation

1:00 to 2:00

The Global Internet

1:00 to 2:00

Student Finale

1:00 to 2:00

1:30   Online Liberty and FOE

1:30 to 2:30

2:00   Youth and Media

Case Study
2:00 to 3:00

Cooperation

2:00 to 3:00

Minds for Sale

2:00 to 3:00

2:30   30-minute break
3:00   GNI/Role of Intermediaries

3:00 to 4:00

30-minute break 30-minute break Looking Ahead

3:00 to 4:00

3:30   The Study of the Internet

3:30 to 4:30

Mutual Aid (intro)

and
The Future of the Internet (panel)
3:30 to 5:00

4:00   History of Cyberlaw and Berkman Center

4:00 to 5:00

Final BBQ

4:00 to 6:00+

4:30   mid-point check-in
5:00        
5:30        
6:00   Berkman Center Open House

6:00 to 8:00

Optional Evening Session

6:00 to 8:00

Optional Evening Session

6:00 to 8:00

6:30
7:00
7:30
8:00
Schedule last updated July 13, 4PM

Program Materials

(add description of typology here)

The Pillars of iLaw

Network Access and Open Systems
Privacy
Intellectual Property
Cybersecurity
Online Liberty
Digital Humanities

Cross-sectional Modules

History of Cyberlaw
Methodologies
The Global Internet and Internationalization
User Innovation

Examples and Case Studies

Digital Libraries and Archives
Youth and Media
Cloud Computing
Broadband
The Future of the Internet
Minds for Sale
Case Study: WikiLeaks
Case Study: User Innovation
Case Study: GNI/Role of Intermediaries
Case Study: Herdict