Skip to the main content

Privacy & Security

Privacy violations are a serious threat to the health of the Internet and the effective use of technology. We study how people understand their privacy as users of technology, examine and document the risks and opportunities of privacy-related policies at various levels of society, and help build tools and techniques to ensure individual identities and data are protected.

Existing regulatory requirements and privacy practices in common use are not sufficient to address the risks associated with long-term, large-scale data activities.


Practical Approaches to Big Data Privacy Over Time

Our Work 78

News
Apr 10, 2019

The Law and the Digital World

The AGTech Forum at Harvard Law gives state attorneys general a place to learn about technological changes and strategize about how the law can keep up

Insight for Attorney Generals into privacy and emerging technologies More

Event
Mar 5, 2019 @ 12:15 PM

Privacy’s Blueprint

The Battle to Control the Design of New Technologies

PODCAST & VIDEO: The dominant model for regulating privacy focuses on giving people control over their information and regulating data practices. This focus ignores the role that… More

News
Feb 20, 2019

Zittrain and Zuckerberg discuss encryption, ‘information fiduciaries’ and targeted advertisements

CEO visits with students from the University’s Techtopia program and Zittrain’s Internet and Society course

Should Facebook be considered an “information fiduciary” when it comes to the privacy of its clients? More

Event
Feb 19, 2019 @ 12:00 PM

The Smart Enough City

Putting Technology in Its Place to Reclaim Our Urban Future

VIDEO & PODCAST: Why technology is not an end in itself, and how cities can be “smart enough,” using technology to promote democracy and equity. More

News
Feb 5, 2019

Do Not Panic: Vigilance and Obscurantism now in Portuguese

Do Not Panic: Vigilance and Obscurantism is now available in Portuguese after translation by ITS Rio More

News
Feb 5, 2019

Get to Know Berkman Klein Fellow Dragana Kaurin

a spotlight on one of our 2018-2019 BKC Fellows

Dragana's work is committed to "de-colonizing the net" and helping to empower communities worldwide in overcoming language and cultural barriers on the Internet. More

News
Jan 11, 2019

Get to Know Berkman Klein Fellow Jasmine McNealy

a spotlight on one of our 2018-2019 BKC Fellows

McNealy is researching surveillance literacy and anti-surveillance tactics and advocacy in marginalized groups More

News
Jan 11, 2019

Get to Know Berkman Klein Fellow Paola Ricuarte Quijano

a spotlight on one of our 2018-2019 BKC Fellows

On building small scale networks of women in technology for social transformation More

News
Dec 14, 2018

Get to Know Berkman Klein Fellow Rachel Han

a spotlight on one of our 2018-2019 BKC Fellows

Rachel Han is a 2018-2019 Berkman Klein fellow and Director of Business Development at OpenDataSoft, where she focuses on IoT and smart cities initiatives as well as collaborating… More

Publication
Nov 1, 2018

Differential Privacy

A Primer for a Non-Technical Audience

This primer aims to provide a foundation that can guide future decisions when analyzing and sharing statistical data about individuals, informing individuals about the privacy… More

Publication
Oct 18, 2018

Is Privacy Privacy?

How have different technical and normative conceptions of privacy evolved? What are the practical challenges that these divergent approaches pose? More

Event
Oct 9, 2018 @ 12:00 PM

Open Data, Grey Data, and Stewardship

Universities at the Privacy Frontier

Video & Podcast: Universities produce and consume vast amounts of data for research, teaching, service, and operational purposes. While extremely valuable to universities and… More

Event
Sep 25, 2018 @ 12:00 PM

"Click Here to Kill Everybody"

A BKC Book Talk

VIDEO & PODCAST: Bruce Schneier on his new book "Click Here to Kill Everybody" More

Event
Sep 12, 2018 @ 4:00 PM

Book Launch: Big Data, Health Law, and Bioethics

When data from all aspects of our lives can be relevant to our health - from our habits at the grocery store and our Google searches to our FitBit data and our medical records -… More

Publication
Aug 21, 2018

Bridging the Gap between Computer Science and Legal Approaches to Privacy

A look at the gaps that exist between how privacy risks are conceptualized between the fields of law and computer science More

Publication
Aug 3, 2018

A Harm-Reduction Framework for Algorithmic Fairness

Any evaluation of algorithmic fairness must consider a counterfactual analysis of the effects that algorithmic design, implementation, and use have on the well-being of… More

Event
May 8, 2018 @ 12:00 PM

Governance and Regulation in the land of Crypto-Securities (as told by CryptoKitties)

featuring founding members, Dieter Shirley and Alex Shih

Join founding members of the CryptoKitties team, Dieter Shirley and Alex Shih, as they discuss the unique governance, legal, and regulatory challenges of putting cats on the… More

Publication
May 2, 2018

Encryption Policy And Its International Impacts: A Framework For Understanding Extraterritorial Ripple Effects

This paper explores the potential international ripple effects that can occur following changes to domestic encryption policies. More

Event
May 1, 2018 @ 12:00 PM

The Law and Ethics of Digital Piracy

Evidence from Harvard Law School Graduates

When do Harvard law students perceive digital file sharing (and piracy) as fine? More

Event
Apr 3, 2018 @ 12:00 PM

The Right of Publicity

Privacy Reimagined for a Public World

Jennifer E. Rothman discusses her book, The Right of Publicity: Privacy Reimagined for a Public World (Harvard University Press 2018). She challenges the conventional story of the… More

Publication
Mar 12, 2018

Practical Approaches to Big Data Privacy Over Time

This article analyzes how privacy risks multiply as large quantities of personal data are collected over longer periods of time. More

Event
Sep 29, 2017 @ 10:00 AM

How to Watch Them Watching You

Researching Social Media, Online Platforms, and Algorithmic Systems From the Outside

Join us at the University of Michigan for a discussion with Eric Gilbert, Cedric Langbort, Jeff Larson, Casey Pierce, and Christo Wilson on how researchers can navigate and… More

Publication
Sep 13, 2017

Cross-Border Data Access Reform

A Primer on the Proposed U.S.-U.K. Agreement

A brief primer on how cross-border data access requests currently work, options for reform, and major challenges to reform ahead. More

Event
May 3, 2017 @ 12:00 PM

Digital Rights and Online Harassment in the Global South

featuring Berkman Klein Affiliate, Nighat Dad

An inside look at the challenges facing women, human rights defenders, and other internet users in Pakistan, from online harassment to privacy and free expression. More

Event
Apr 27, 2017 @ 12:00 PM

Holding Hospitals Hostage

From HIPAA to Ransomware

For hospitals and healthcare providers, data protection efforts have long been driven by the Health Insurance Portability and Accountability Act. This talk will look at recent… More

Mar 30, 2017 @ 12:00 PM

Using Mobile Phone Data to Map Migration and Disease

Politics, Privacy, and Public Health

Mobile phone data are providing unprecedented insights into human migration and behavior with relevance for containment of epidemics and response to natural disasters, but what… More

Publication
Dec 29, 2016

The Transparency Reporting Toolkit: Guide & Template

for Reporting on U.S. Government Requests for User Information

This guide provides a practical starting point for companies that want to create or improve their transparency reports. More

News
Sep 28, 2016

Berkman Klein’s “Digital Citizenship Learning Playlists” Wins “Digital Media and Learning (DML) Competition” Award

The Berkman Klein Center for Internet & Society at Harvard University is excited to announce that it is one of nine winners of the “6th Digital Media and Learning (DML)… More

Publication
Sep 26, 2016

Privacy and Open Data Research Briefing

This research briefing offers a snapshot of recent developments in the open data and privacy landscape, outlines an action map of various governance approaches to protecting… More

Publication
Sep 26, 2016

Privacy and Cybersecurity Research Briefing

This research briefing aims to translate findings from ongoing Berkman Klein Center privacy and cybersecurity research and activities into practical considerations and takeaways… More

Publication
Sep 26, 2016

Student Privacy and Ed Tech (K-12) Research Briefing

This research briefing builds upon student privacy research and activities, and aims to translate these into practical take-aways.  More

Publication
Jun 29, 2016

Privacy and Student Data

An Overview of Federal Laws Impacting Student Information Collected Through Networked Technologies

Harvard Law School’s Cyberlaw Clinic, based at the Berkman Center for Internet & Society, has prepared this guide to provide a high-level overview of two of the major federal… More

Publication
May 31, 2016

Towards a Modern Approach to Privacy-Aware Government Data Releases

Governments are under increasing pressure to promote transparency, accountability, and innovation by making the data they hold available to the public. Because the data often… More

News
May 3, 2016

Students host mini-symposium on data privacy in the U.S. and the EU

The student-moderated discussion among invited experts focused on bringing data privacy from theory to reality, and included a close look at the strengths and flaws of the current… More

Publication
Mar 31, 2016

Elements of a New Ethical Framework for Big Data Research

The Berkman Center is pleased to announce the publication of a new paper from the Privacy Tools for Sharing Research Data project team. In this paper, Effy Vayena, Urs Gasser,… More

Publication
Feb 16, 2016

Cloudy with a Conflict of Laws

How Cloud Computing Has Disrupted the Mutual Legal Assistance Treaty System and Why It Matters

This paper describes how the fractal complexity of cloud computing’s physical geography has fractured the system of Mutual Legal Assistance Treaties (MLATs) that arose during the… More

Publication
Feb 11, 2016

A Worldwide Survey of Encryption Products

In this paper, which is modeled on a similar effort in 1999 by researchers from George Washington University, Berkman Fellow Bruce Schneier and collaborator Kathleen Seidel… More

Publication
Feb 1, 2016

Don't Panic: Making Progress on the "Going Dark" Debate

This report from the Berkman Center's Berklett Cybersecurity Project offers a new perspective on the "going dark" debate from the discussion, debate, and analyses of an… More

News
Jan 25, 2016

Digital Literacy Resource Platform Goes Live

The Berkman Center and Youth and Media are pleased to announce the launch of the Digital Literacy Resource Platform (DLRP), a new online platform we have designed and incubated as… More

News
Jan 20, 2016

Privacy Tools Project submits comments on proposed revisions to the Common Rule

On January 6, 2016, members of the Privacy Tools for Sharing Research Data project submitted comments in response to the September 2015 notice of proposed rulemaking to revise the… More

Publication
Jan 12, 2016

Between Openness and Privacy in Genomics

In this report, which was published in PLOS Medicine, the authors examine the questions around access to genomic data. They argue that the real breakthrough in reconciling privacy… More

Event
Dec 8, 2015 @ 12:00 PM

State of Student Privacy

with Urs Gasser, Sandra Cortesi, Dalia Topelson Ritvo, Paulina Haduong, and Leah Plunkett

The Berkman Center’s Student Privacy Initiative will be taking stock of our student privacy work to date and exploring future directions. At this luncheon, the Berkman team will… More

Event
Nov 10, 2015 @ 12:00 PM

Bridging the gap between computer science and legal approaches to privacy

with Kobbi Nissim and Alexandra Wood

Can lawyers and computer scientists bridge their very different notions of privacy? More

Event
Sep 29, 2015 @ 12:00 PM

The Mozilla Delphi Cybersecurity Study: Towards a User Centric Cybersecurity Policy Agenda

with Camille François, Josephine Wolff, Andy Ellis, and Bruce Schneier

Join us to learn more about the methodology and findings behind The Mozilla Delphi Cybersecurity study. More

Publication
Jul 30, 2015

Student Privacy: The Next Frontier

Emerging & Future Privacy Issues in K-12 Learning Environments

Building off several prior working meetings which mapped and considered the implications of the new and rapidly evolving ecosystem of networked technology being used with… More

Publication
Apr 7, 2015

Digitally Connected: Global Perspectives on Youth and Digital Media

An ebook presenting diverse views, experiences, and insights on key challenges and opportunities

“Digitally Connected: Global Perspectives on Youth and Digital Media,” is a first-of-its kind collection of essays that offers reflections from diverse perspectives on youth… More

Publication
Mar 27, 2015

Integrating Approaches to Privacy Across the Research Lifecycle: When Is Information Purely Public?

This workshop report, the second in a series, identifies selected questions and explores issues around the meaning of “public” in the context of using data about individuals for… More

Event
Mar 25, 2015 @ 6:00 PM

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

With Berkman Fellow, Bruce Schneier. Moderated by Jonathan Zittrain with special guests, Yochai Benkler, Joe Nye, Sara Watson and Melissa Hathaway.

In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government… More

Publication
Feb 17, 2015

Youth and Online News: Reflections and Perspectives

Youth and Media is pleased to announce the publication of "Youth and Online News: Reflections and Perspectives," a series of short essays written by friends and colleagues that… More

Publication
Dec 16, 2014

Internet Monitor 2014: Reflections on the Digital World

The Internet Monitor project's second annual report—Internet Monitor 2014: Reflections on the Digital World—is a collection of roughly three dozen short contributions that… More

Publication
Aug 3, 2014

Integrating Approaches to Privacy across the Research Lifecycle: Long-term Longitudinal Studies

This paper explores interdisciplinary approaches to privacy in long-term longitudinal studies of human subjects. Long-term longitudinal studies collect, at multiple points over a… More

Event
Jun 3, 2014 @ 12:30 PM

Framing the Law & Policy Picture: A Snapshot of K-12 Cloud-Based Ed Tech & Student Privacy in Early 2014

Leah Plunkett, Alicia Solow-Niederman, and Urs Gasser

The Berkman Center’s Student Privacy Initiative team presents a snapshot of K-12 cloud-based ed tech and student privacy in early 2014 before turning to pragmatic law and policy… More

Publication
Jun 2, 2014

Framing the Law & Policy Picture: A Snapshot of K-12 Cloud-Based Ed Tech & Student Privacy in Early 2014

This paper provides a snapshot of key aspects of a diverse—and heated—law, policy, and implementation debate that is taking place in the rapidly evolving cloud-based ed tech… More

Publication
Jan 15, 2014

K-12 Edtech Cloud Service Inventory

Created for and informed by the co-organized Berkman Center and Consortium for School Networking working meeting on November 19, 2013, this document aims to provide individuals… More

Publication
Jan 15, 2014

Youth Perspectives on Tech in Schools: From Mobile Devices to Restrictions and Monitoring

This research brief, prepared by the Berkman Center’s Youth and Media project for the co-organized Berkman Center and Consortium for School Networking working meeting on student… More

Publication
Jan 15, 2014

Student Privacy and Cloud Computing at the District Level: Next Steps and Key Issues

This report offers recommended next steps and prioritized open issues in the K-12 educational technology (edtech) space, with a special emphasis on two topics: (1) law and policy… More

Publication
Dec 11, 2013

Internet Monitor 2013

Reflections on the Digital World

Internet Monitor 2013: Reflections on the Digital World, the Internet Monitor project's first-ever annual report, is a collection of essays from roughly two dozen experts around… More

Publication
Aug 22, 2013

Teens and Mobile Apps Privacy

58% of American teens have downloaded an app to a cell phone or tablet. More than half of teen apps users have avoided an app due to concerns about sharing their personal… More

Publication
Aug 14, 2013

Where Teens Seek Online Privacy Advice

Many teens ages 12-17 report that they usually figure out how to manage content sharing and privacy settings on their own. Focus group interviews with teens suggest that for their… More

Event
Aug 8, 2013 @ 2:00 PM

Reforming the Foreign Intelligence Surveillance Court

Richard Blumenthal, United States Senator for Connecticut

Senator Richard Blumenthal will deliver an address about proposed legislation to reform the Foreign Intelligence Surveillance Court. Read more about the legislation > More

Publication
May 21, 2013

Teens, Social Media, and Privacy

Teens are sharing more information about themselves on social media sites than they have in the past, but they are also taking a variety of technical and non-technical steps to… More

Publication
Mar 13, 2013

Teens and Technology 2013

Smartphone adoption among American teens has increased substantially and mobile access to the internet is pervasive. One in four teens are “cell-mostly” internet users, who say… More

Publication
Nov 20, 2012

Parents, Teens, and Online Privacy

Parents have a range of concerns about how their children’s online activities might affect their privacy and many have taken steps to monitor their children and encourage online… More

Publication
Sep 17, 2012

Bullying in a Networked Era: A Literature Review

This research update presents an aggregation and summary of recent academic literature on youth bullying. The purpose of this document is to “translate” scholarly research for a… More

Publication
Feb 23, 2012

Youth and Digital Media: From Credibility to Information Quality

Building upon a process- and context-oriented information quality framework, this paper seeks to map and explore what we know about the ways in which young users of age 18 and… More

Publication
Aug 1, 2011

Online Security in the Middle East and North Africa

A Survey of Perceptions, Knowledge, and Practice

The recent surge in digital activism that has helped to shape the Arab spring has been met with stiff resistance by governments in the region intent on reducing the impact of… More

Publication
Oct 14, 2010

2010 Circumvention Tool Usage Report

This paper evaluates the usage of blocking-resistant circumvention tools, simple web proxies, and VPN services and finds that overall usage of circumvention tools is still very… More

Publication
Jun 22, 2010

Sexting: Youth Practices and Legal Implications

This document addresses legal and practical issues related to the practice colloquially known as sexting. It was created by Harvard Law School’s Cyberlaw Clinic, based at the… More

Publication
Jun 15, 2010

Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations

An Exploratory Study by the Berkman Center for Internet & Society at Harvard University, in Collaboration with UNICEF

This paper's main objectives are: to raise awareness about issues related to digital safety for youth in developing nations; to provide a tentative map of these issues and give… More

Publication
Apr 28, 2010

How the COPPA, as Implemented, Is Misinterpreted by the Public: A Research Perspective

Statement to the United States Senate, Subcommittee on Consumer Protection, Product Safety, and Insurance of the Committee on Commerce, Science, and Transportation

Statement by danah boyd, Urs Gasser, and John Palfrey, urging consideration of the gap between the intentions of COPPA and how children and their parents perceive its… More

Publication
Apr 12, 2010

Youth, Privacy and Reputation (Literature Review)

The scope of this literature review is to map out what is currently understood about the intersections of youth, reputation, and privacy online, focusing on youth attitudes and… More

Publication
Feb 24, 2010

Response to FCC Notice of Inquiry 09-94 “Empowering Parents and Protecting Children in an Evolving Media Landscape”

The response synthesizes current research and data on the media practices of youth, focusing on three main areas -- 1) Risky Behaviors and Online Safety, 2) Privacy, Publicity and… More

Publication
May 1, 2009

Youth, Creativity, and Copyright in the Digital Age

This paper describes research findings that show young people operate in the digital realm overwhelmingly ignorant of the rights, and to a lesser degree the restrictions,… More

Publication
Mar 5, 2009

2007 Circumvention Landscape Report: Methods, Uses, and Tools

A large variety of different projects have developed tools that can be used to circumvent Internet filtering, allowing people in filtered countries access to otherwise filtered… More

Publication
Dec 27, 2008

The Public and the Private at the United States Border with Cyberspace

In the twenty-first century, a state can come to know more about each of its citizens via surveillance than ever before in human history. Some states are beginning to exercise… More

Event
Dec 23, 2008 @ 12:30 PM

Watching Google AdWords: The Mysterious Mechanization of Meaning in the Google Brain

Hal Roberts

Google's AdWords system serves ads alongside about a quarter of all web traffic. In the process of serving those ads, Google actively processes the user browsing data in order to… More

Event
Sep 23, 2008 @ 8:00 PM

Born Digital (Cambridge Book Talk & Reception)

by John Palfrey and Urs Gasser

The Berkman Center celebrated the release of John Palfrey and Urs Gasser's "Born Digital: Understanding the First Generation of Digital Natives" at Harvard Law School. More

Publication
Sep 1, 2008

Born Digital: Understanding the First Generation of Digital Natives

Based on original research and advancing new theories, leading internet and technology experts John Palfrey and Urs Gasser offer a sociological portrait of the 'Born Digital'… More


Community 84

The Enterprisers Project

“Liars and Outliers” named a must-read book on security

The Enterprisers Project highlights Bruce Schneier’s Liars and Outliers: Enabling the Trust that Society Needs to Thrive

Jul 15, 2019
Mashable

Apple's iCloud could get Face ID and Touch ID support with iOS 13

Apple is testing new sign-in options for iCloud, but there are privacy concerns

Jul 7, 2019
The New York Times

Smile, Your City Is Watching You

Local governments must protect your privacy as they turn to “smart city” technology.

Jun 27, 2019
The New York Times

We Must Prepare for the Next Pandemic

We’ll have to battle both the disease and the fake news, writes BKC’s Bruce Schneier

Jun 17, 2019
Vice

AI Has Made Video Surveillance Automated and Terrifying

AI can flag people based on their clothing or behavior, identify people's emotions, and find people who are acting "unusual”

Jun 13, 2019
Foreign Policy

AI Can Thrive in Open Societies

The belief that China’s surveillance gives it an advantage is misleading—and dangerous, argues Bruce Schneier

Jun 13, 2019
Boston Review

Democracy’s Dilemma: Forum Response

Henry Farrell and BKC’s Bruce Schneier write a Forum Response to reactions to their earlier essay

Jun 12, 2019
Bloomberg

Microsoft Wants More Security Researchers to Hack Into Its Cloud

As Microsoft works on cloud security, it’s looking to attract `White Hat’ hackers with rewards and legal guarantees.

Jun 7, 2019
Slate

Should Researchers Be Allowed to Use YouTube Videos and Tweets?

A new paper used YouTubers’ voices to guess what they looked like. Was it ethical? Casey Fiesler weighs in.

Jun 3, 2019
Canadian Underwriter

Huawei a small part of an ‘insurmountably hard problem’ of cybersecurity

The controversy over telecommunications equipment from Chinese manufacturer Huawei is just the tip of a large cyber risk iceberg, Bruce Schneier warns.

May 22, 2019
TechTarget

Surveillance technology under fire, amid growing societal concerns

As San Francisco halts city use of facial recognition technology, CIOs could see more regulatory actions against surveillance technology -- and more limits on their use of data.

May 21, 2019
Wired

We Are Tenants on Our Own Devices

While are benefits of “smart” technology, they also afford companies significant control over the devices.

May 20, 2019
Wired

Some US Cities Are Moving into Real-Time Facial Surveillance

Gretchen Greene lends insight into the adoption of facial recognition technology in police departments across the U.S.

May 17, 2019
Medium

The Bizarre Accuracy of Online Ads

A Case Study of Trackers on the Internet

Ad tracking services are disturbingly effective.

May 17, 2019
World Refugee Council

Data Protection and Digital Agency for Refugees

How the vast amount of data collected from refugees is gathered, stored and shared today

May 15, 2019
Medium

Enveloped in Suspicion

Envelopes are one of those banal objects of everyday life we seldom think much about. They are, however, an ancient — and at one time controversial — privacy technology.

May 14, 2019
OxPol

Measuring Censorship On Mobile App Stores

Billions of users interact with and download apps on major app stores on a daily basis. It is important for them to know why certain apps that they might have been using, or would…

May 3, 2019
The New York Times

Think You’re Discreet Online? Think Again

Thanks to “data inference” technology, companies know more about you than you disclose.

Apr 21, 2019
Crossroads

Facial recognition is the plutonium of AI

"It's dangerous, racializing, and has few legitimate uses; facial recognition needs regulation and control on par with nuclear waste."

Apr 17, 2019
Boston Globe

Can predictive policing help stamp out racial profiling?

Some algorithms assume crime in one location leads to others nearby. Others identify specific people most likely to be involved in violence. Both can lead to discrimination.

Apr 17, 2019
arXiv

Towards Formalizing the GDPR's Notion of Singling Out

Defining predicate singling out, a new type of privacy attack intended to capture the concept of singling out appearing in the General Data Protection Regulation (GDPR).

Apr 15, 2019
Redtail

A Talk with Smart City Skeptic, Ben Green

Ben Green's work as a data scientist in city governments informed his critical view of the "smart city" tech that could influence city life and society for decades to come.

Apr 14, 2019
StateScoop

'Smart city' technology alone cannot solve social problems, author argues

Ben Green argues that cities are adopting “smart” technology without thinking through the political ramifications of the technology.

Apr 12, 2019
The Guardian

Julian Assange's charges are a direct assault on press freedom, experts warn

Academics and campaigners condemned large chunks of the indictment that they said went head-to-head with basic activities of journalism protected by the first amendment of the US…

Apr 12, 2019
The Boston Globe

So There Are People Behind Alexa’s Curtain. Will Anyone Care?

Making smart speakers and technologies smarter, but what about privacy?

Apr 11, 2019
BKC Medium

Thoughts on personal data vs non-personal data

How the government, or regulators, can start thinking about privacy and the data economy

Apr 4, 2019
USA Today

Anyone can easily hack into your phone.

Just ask Amazon CEO Jeff Bezos

Five tips to secure your phone - it might not keep a foreign country determined to strike away, but it will strengthen your security.

Apr 1, 2019
the Hill

AirDrop used for sexual harassment on public transit

An unsolicited picture shared over Apple's AirDrop leads to questions over how the technology is governed.

Mar 30, 2019
Wired

Machines Shouldn’t Have to Spy On Us to Learn

How do we expand the benefits of machine learning, while protecting privacy?

Mar 25, 2019
How We Get to Next

Scientists Like Me Are Studying Your Tweets—Are You OK With That?

"Public" data ethics: Best practices for social media researchers

Anything “public” on social media may be fair game, but researchers should be more ethical about using that data

Mar 19, 2019
Just Security

A Legislative Shot at Internet of Things Security

A recently unveiled proposal for regulating the Internet of Things in the US falls short in some areas, but could make some significant strides towards advancing the status quo

Mar 19, 2019
Fast Company

What Mark Zuckerberg’s new vision could really mean for privacy and propaganda

Some critics worry the new privacy push is also a way to dodge regulation and avoid moderating content: “The devil is in the details.”

Mar 11, 2019
Metropolis

Cities Are Not Technology Problems: What Smart Cities Companies Get Wrong

Many companies equate new technology with innovation, but actual innovation in cities means using tech in concert with bureaucracy, on-the-ground awareness, and challenging political choices.

Innovation can mean more than just "use new technology."

Mar 4, 2019
Fast Company

Here are the data brokers quietly buying and selling your personal information

You’ve probably never heard of many of the data firms registered under a new law, but they’ve heard a lot about you.

Mar 2, 2019
Dark Reading

9 Years After: From Operation Aurora to Zero Trust

How the first documented nation-state cyberattack is changing security today.

Change is a constant in the security industry, and being willing to change as needed is one of the key growth factors in any business — large or small.

Feb 20, 2019
Annals of Internal Medicine

Are Requirements to Deposit Data in Research Repositories Compatible With the GDPR?

The requirements of the GDPR are increasingly coming into conflict with the requirements of research communities

Feb 19, 2019
KCBS

Are Data Dividends Really a Good Idea?

Christine Borgman comments on the feasibility of California's "data dividends" proposal

Feb 14, 2019
The Hill

Machines don’t necessarily fix our biases, they mirror them.

We should not trust an algorithm unless it can be reviewed and audited in meaningful ways.

Feb 13, 2019
Recode

Can Big Tech be fixed?

The US might get a federal privacy bill this year

Feb 13, 2019
EdSurge

The Tech Industry is Hijacking School Data. But Decentralized Systems Can Change That.

When it comes to children’s school data we should ask who controls it, what is it worth and how will it impact their lives.

Feb 13, 2019
Just Security

Election Security

Questions for the House Homeland Security Hearing

Should Congress and federal agencies be sharing and receiving more with platforms like Facebook to aid them in enforcing better moderation policies?

Feb 12, 2019
Newsday

Change how Facebook uses our data

Scandals underscore the need to regulate use of customers' information

"Facebook needs to change how it handles user data and personal information."

Feb 11, 2019
Economic and Political Weekly

On WhatsApp, Rumours, and Lynchings

In the last decade, India has seen multiple rounds of communal violence in which rumour and information technology played a role

Feb 9, 2019
Working Paper

A User-Focused Transdisciplinary Research Agenda for AI-Enabled Health Tech Governance

A research agenda for stakeholders to proactively collaborate and design AI technologies that work with users to improve their health and wellbeing

Feb 4, 2019
Wired

Facebook Hires Up Three of Its Biggest Privacy Critics

Through three new hires, Facebook may be giving real decisionmaking power to people who deeply understand the ways in which the social media site and its family of apps undermine…

Jan 30, 2019
Harvard Law Today

Big Data, Health Law, and Bioethics

Faculty Books in Brief

"We are in the early stages of the health care system’s encounter with big data, the editors write, with the benefits and perils uncertain."

Jan 29, 2019
Cyberlaw Clinic

Clinic Files Amicus Brief for Former Magistrate Judges re: Surveillance Orders

The Cyberlaw Clinic filed an amicus brief supporting a BuzzFeed News journalist's petition to unseal applications and orders for pen registers, trap and trace devices, tracking…

Jan 28, 2019
#GoodID

African countries must work together for Good ID

Berkman Klein Fellow Titi Akinsanmi discusses how policy for digital ID could develop in 2019 and what she hopes to see globally and on the African continent.

Jan 28, 2019
Linux Journal

Is Privacy a Right?

The story we tell about our right to privacy an interesting one, but distracts us away from work that needs to be done. 

Jan 23, 2019
ECT News Network

Dutch Doc Wins 'Forget My Suspension' Case

Google must remove search results about medical regulators' conditional suspension of a Dutch physician in the first "right to be forgotten" case of its kind in the European Union.

Jan 23, 2019
Mashable

DuckDuckGo's private searches will pull up Apple Maps results

The recent partnership between privacy-focused search tool Duck Duck Go and Apple has an uncertain implications for the future of privacy on the engine.

Jan 15, 2019
Bloomberg

Artificial Intelligence vs. the Hackers

Machine-learning algorithms watch hackers’ behavior and adapt to their evolving tactics.

A profile of "Data Cowboy" Ram Shankar Siva Kumar, who trains security algorithms

Jan 3, 2019
Washington Post

It’s time to try something different on Internet privacy

"US lawmakers need to embrace a different approach to Internet privacy based around the concept of trust, rather than the failed concepts of notice and choice."

Dec 20, 2018
Reuters

Book Review: The attack of the killer fridges has begun

The world is ever more connected via the internet, from cars and power grids to home appliances and toys. That means ever more things are dangerously hackable.

Dec 14, 2018
NextGov

Upcoming Bill Would Lock Down Agencies' Internet-Connected Devices

A new bill "leverages federal purchasing power to create pro-security market pressure and … serves as a model for the implementation of similar standards elsewhere."

Dec 6, 2018
New York Times

To Reduce Privacy Risks, the Census Plans to Report Less Accurate Data

Guaranteeing people’s confidentiality has become more of a challenge, but some scholars worry that the new system will impede research.

Dec 5, 2018
Ribbon Farm

The Digital Maginot Line

We are immersed in an evolving, ongoing conflict: an Information World War in which state actors, terrorists, and ideological extremists leverage the social infrastructure…

Nov 28, 2018
Motherboard

The Most Damaging Election Disinformation Campaign Came From Donald Trump, Not Russia

The Kremlin has been focused on undermining trust in American democracy and elections, but Donald Trump and the Republicans have done it better than Russia ever could.

Nov 19, 2018
Wired

Surveillance Kills Freedom By Killing Experimentation

How surveillance hurts our democratic values

Nov 16, 2018
Schneier on Security

Information Attacks against Democracies

The same fake news techniques that benefit autocracies by making everyone unsure about political alternatives undermine democracies by making people question the common political…

Nov 15, 2018
Boston 25 News

Unlocking your phone’s secrets

Devices give access to those willing to pay up

David O’Brien on tools used by law enforcement to crack into suspects' personal digital devices

Nov 13, 2018
CNN

We need stronger cybersecurity laws for the Internet of Things

Making Internet-connected devices more secure will require smarter regulations

Nov 9, 2018
Podcast

How Youth Are Reinventing Instagram and Why Having Multiple Accounts Is Trending

Our Youth & Media team looked at how teens are using social media to figure out who they are.

Nov 2, 2018
SSRN

Common-Knowledge Attacks on Democracy

Scaling up computer security arguments to the level of the state, so that the entire polity is treated as an information system with associated attack surfaces and threat models,…

Oct 29, 2018
CBC Spark

Restaurants have strict standards to protect customers. Tech platforms don't

Online tech platforms should become “information fiduciaries”

Oct 26, 2018
The Atlantic

Nobody’s Cellphone Is Really That Secure

All phones are vulnerable to hacking

Oct 26, 2018
ICDPPC

Debating Ethics & Privacy

BKC shares insights on privacy with governments at the International Conference of Data Protection and Privacy Commissioners

Oct 26, 2018
Just Security

Conscientious Objectors and Whistleblowers

Sentencing Should Recognize First Amendment Interests

Mailyn Fidler writes about First Amendment interests in a recent case regarding whistleblowing.

Oct 18, 2018
SSRN

Acquisitions in the third party tracking industry

competition and data protection aspects

A role for antitrust authorities in the third party tracking industry

Oct 18, 2018
Everyday Matters

Don’t Leave It All to Facebook

The U.S. Should Do More To Protect Our Data Privacy

Who makes sure that companies collecting your personal data operate in ways that benefit, rather than exploit, you?

Oct 12, 2018
Medium

Stop Saying Privacy in Dead

Privacy still exists. You just have to know where to look for it so you know what to fight for.

Oct 11, 2018
New York Times

Internet Hacking Is About to Get Much Worse

If our devices, information, and institutions are to remain secure, smart government regulation is inevitable

Oct 11, 2018
Council on Foreign Relations

Three Problems with India’s Draft Data Protection Bill

India is attempting to create a complex new framework for data protection that will require firms to physically host user data, but they might be moving too fast.

Oct 3, 2018
Harvard Gazette

Why your online data isn’t safe

To really prioritize user privacy would also mean to compromise an underlying business model that has been very successful

Oct 2, 2018
Harvard Law Today

Big questions raised by big data

Berkman Klein Executive Director Urs Gasser, spoke about the legal and ethical risks and implications of using big data for health at the book launch for Big Data, Health Law, and…

Sep 20, 2018
Harvard Business Review

Platforms Should Become Information Fiduciaries

Internet companies need "information fiduciaries" to ensure that the consumer's best interest is kept at heart.

Sep 19, 2018
Consumer Reports

Warning Kids About Digital Privacy Doesn't Work. Here's What Does.

Sandra Cortesi, director of the Youth and Media project and fellow at BKC, is quoted in this Consumer Reports article on tips for talking to children about digital privacy.

Aug 28, 2018
Washington Post

Don’t fear the TSA cutting airport security. Be glad that they’re talking about it.

Despite largely negative media coverage of the subject, it is a good thing that TSA is brainstorming ways to optimize security in airports

Aug 7, 2018
SAGE Journals

The Surveillant Consumer

Exploring the emergence of consumer surveillance

Jul 25, 2018
Medium

You Are Entering an Ephemeral Bio-allowed Data Capture Zone

Regulating, not banning, facial recognition technology

Jul 23, 2018
Intelligence Squared

Blockchain: Quantum leap forward or digital snake oil?

Faculty Associate Primavera De Filippi joins a debate discussing Blockchain, what it is, and whether it is deserving of its current hype.

Jul 2, 2018
Medium

Why personal agency matters more than personal data

Privacy is an effect of personal agency, projected by personal tech and personal expressions of intent that others can respect without working at it

Jun 23, 2018
Medium

Regarding the usage of surveillance equipment in the City of Boston

It is urgent that Boston develop policies that comprehensively account for what surveillance means today.

Jun 19, 2018

Projects, Programs, and Tools 08

Assembly

Assembly is a collaboration with the MIT Media Lab that explores different modes of education, collaboration, and development. More

Berklett Cybersecurity

The Berklett Cybersecurity project is a unique forum for discussing true and important, and often novel, facts, and perspectives, and achieving surprising consensus on enduring… More

Privacy Initiatives

The Berkman Klein Center has long been home to a number of cross-disciplinary initiatives that investigate privacy and privacy-relevant questions in the digitally networked… More

Privacy Tools for Sharing Research Data

This project seeks to further the tremendous value that can come from collecting, analyzing, and sharing data while more fully protecting individual privacy. More

Youth and Media

Youth and Media (YaM) encompasses an array of research, advocacy, and development initiatives around youth (age 12-18) and digital technology. More

Past

SocialPhysics.org

The goal of SocialPhysics is to give people more control over their digital identities: their online identities, personal information and social relationships. More

Past

Student Privacy Initiative

The Student Privacy Initiative-- part of the Center's growing suite of Privacy Initiatives-- aims to surface, identify, and evaluate central privacy issues and opportunities that… More

Past

Surveillance

The Surveillance project is drawing a map of the different forms and impacts of surveillance online. Funded by the MacArthur Foundation and run in collaboration with our partner… More


People 75

Ifeoma Ajunwa

Faculty Associate

Solon Barocas

Faculty Associate

Fernando Bermejo

Faculty Associate

Christine L. Borgman

Faculty Associate

Herbert Burkert

Faculty Associate

Aloni Cohen

Affiliate

Ron A. Dolin

Affiliate

Judith Donath

Fellows Advisory Board

Andy Ellis

Affiliate

Urs Gasser

Director

Eszter Hargittai

Fellows Advisory Board

Woodrow Hartzog

Faculty Associate

Mako Hill

Faculty Associate

Malavika Jayaram

Faculty Associate

John Kelly

Affiliate

Beth Kolko

Faculty Associate

Greg Leppert

Affiliate

Harry Lewis

Faculty Associate

Colin Maclay

Fellows Advisory Board

David Malan

Faculty Associate

Catharina Maracke

Faculty Associate

James Mickens

Faculty Associate

Mary Minow

Affiliate

Matt Olsen

Affiliate

Leah Plunkett

Faculty Associate

Wendy Seltzer

Fellows Advisory Board

Aaron Shaw

Faculty Associate

Ben Sobel

Affiliate

Luke Stark

Affiliate

Zeynep Tufekci

Faculty Associate

Joana Varon

Affiliate

Gili Vidan

Affiliate

David Weinberger

Fellows Advisory Board

Ethan Zuckerman

Fellows Advisory Board