Course Description: Making data widely available to researchers is good policy. It enables replication and validation of scientific findings and maximizes return on research investment. However, data containing sensitive information about individuals cannot be shared openly without appropriate safeguards. An extensive body of statutes, regulations, institutional Read more about Topics in DataTags
Meets: Tuesday/Thursday 11:30AM - 1:00PM in MD 119
Course Description: This course will cover topics in cryptography and data privacy drawn from the theoretical computer science research literature with particular focus on differential privacy -- a mathematical framework for privacy-preserving analysis of datasets, which enables aggregate computations while preventing the leakage of individual-level information.
Prof. Urs Gasser Spring 2014 Seminar Meets: T 5:00pm - 7:00pm 2 classroom credits
Online privacy has become a major issue for Internet users, technology companies, online business, researchers, and policy-makers around the world, as more and more personal information is collected, aggregated, shared, and used across a wide variety of contexts. Policy-makers on both sides of the Atlantic - and globally - have been responsive to concerns expressed by users, consumer organizations, activists, and academics, and Read more about Comparative Online Privacy
The Cyberlaw Clinic, based at the Berkman Center for Internet & Society, engages Harvard Law School students in a wide range of real-world licensing, client counseling, advocacy, litigation, and policy projects and cases, covering a broad spectrum of Internet, new technology, and intellectual property legal issues.
Among many other areas, the Clinic’s work includes counseling and legal guidance regarding complex open access, digital copyright, and fair use issues; litigation, amicus filings, and other advocacy to protect online speech and anonymity; legal Read more about Cyberlaw Clinic
Algorithms to guarantee privacy and authenticity of data during communication and computation. Proofs of security based on precise definitions and assumptions. Topics may include one-way functions, private-key and public-key encryption, digital signatures, pseudorandom generators, zero-knowledge proofs, fully homomorphic encryption, and the role of cryptography in network and systems security.
Prerequisite: Computer Science 121 or Computer Science 124.
How collisions of interests in online space play out in lawsuits or in proposals before legislatures -- controversies involving Google, YouTube, Apple, Microsoft, MySpace. Examines broad questions of social and technology policy through the lens of law and specific lawsuits. Topics: copyright and fair use, peer-to-peer file sharing, digital rights management, and the DMCA; online speech, anonymity, and privacy; citizen journalism and new media; competition and antitrust; pornography, child protection, and online gambling; security, phishing, and spyware.
What is privacy, and how is it affected by recent developments in computer technology? Course critically examines popular concepts of privacy and uses a rigorous analysis of technologies to understand the policy and ethical issues at play. Case studies: RFID, database anonymity, research ethics, wiretapping. Course relies on some technical material, but is open and accessible to all students, especially those with interest in economics, engineering, political science, computer science, sociology, biology, law, government, philosophy.
As smartphones, the internet and an array of personal computing devices have become increasingly ubiquitous in our society, so have such technologies also become either the means or the object of a wide range of criminal activity. Many of the most challenging developments in criminal law and procedure now arise in the context of crimes that involve the internet or computers.
This seminar will explore how technology, and the social and cultural changes it has brought about, challenge our traditional approaches to criminal law and procedure, in particular core Read more about Cybercrime
How can we enable the analysis of datasets with sensitive information about individuals while protecting the privacy of those individuals?
This question is motivated by the vast amounts of data about individuals that are being collected by companies, researchers, and the government (e.g. census data, genomic databases, web-search logs, GPS readings, social network activity). The sharing and analysis of such data can be extremely useful, enabling researchers to Read more about CS 229r: Mathematical Approaches to Data Privacy
This course will explore the complex challenges of effectively representing clients in a wide variety of intellectual property, technology and internet-related disputes.
Using a rich set of cyberlaw-related case studies drawn from recent legal controversies, including targeted case readings, court filings, real-life testimony, deposition videotapes and other demonstrative materials, we will condense and weave together a broad range of experiences lawyers encounter in the actual practice of law in these dynamic fields with the core doctrinal and theoretical Read more about Practical Lawyering in Cyberspace
This course will focus on language-based information security: using programming language techniques and abstractions to specify, reason about, and enforce, information security. Most of the course will focus on information-flow control: controlling the flow of information within a system to enforce strong security guarantees.