Meets: Tuesday/Thursday 11:30AM - 1:00PM in MD 119
Course Description: This course will cover topics in cryptography and data privacy drawn from the theoretical computer science research literature with particular focus on differential privacy -- a mathematical framework for privacy-preserving analysis of datasets, which enables aggregate computations while preventing the leakage of individual-level information.
The Cyberlaw Clinic, based at the Berkman Center for Internet & Society, engages Harvard Law School students in a wide range of real-world licensing, client counseling, advocacy, litigation, and policy projects and cases, covering a broad spectrum of Internet, new technology, and intellectual property legal issues. Read more about Cyberlaw Clinic
Algorithms to guarantee privacy and authenticity of data during communication and computation. Proofs of security based on precise definitions and assumptions. Topics may include one-way functions, private-key and public-key encryption, digital signatures, pseudorandom generators, zero-knowledge proofs, fully homomorphic encryption, and the role of cryptography in network and systems security.
Prerequisite: Computer Science 121 or Computer Science 124.
How collisions of interests in online space play out in lawsuits or in proposals before legislatures -- controversies involving Google, YouTube, Apple, Microsoft, MySpace. Examines broad questions of social and technology policy through the lens of law and specific lawsuits. Topics: copyright and fair use, peer-to-peer file sharing, digital rights management, and the DMCA; online speech, anonymity, and privacy; citizen journalism and new media; competition and antitrust; pornography, child protection, and online gambling; security, phishing, and spyware. Read more about Freshman Seminar 43z: Cyberspace in Court: Law of the Internet
What is privacy, and how is it affected by recent developments in computer technology? Course critically examines popular concepts of privacy and uses a rigorous analysis of technologies to understand the policy and ethical issues at play. Case studies: RFID, database anonymity, research ethics, wiretapping. Course relies on some technical material, but is open and accessible to all students, especially those with interest in economics, engineering, political science, computer science, sociology, biology, law, government, philosophy. Read more about CS 105: Privacy and Technology
As smartphones, the internet and an array of personal computing devices have become increasingly ubiquitous in our society, so have such technologies also become either the means or the object of a wide range of criminal activity. Many of the most challenging developments in criminal law and procedure now arise in the context of crimes that involve the internet or computers. Read more about Cybercrime
This course will focus on language-based information security: using programming language techniques and abstractions to specify, reason about, and enforce, information security. Most of the course will focus on information-flow control: controlling the flow of information within a system to enforce strong security guarantees.