Home

Use our global calendar of privacy events to locate an event near you.

 

FILTER BY

Mar
28
Tue
ANA Advertising Law & Public Policy Conference @ Washington, DC
Mar 28 – Mar 29 all-day
ANA Advertising Law & Public Policy Conference @ Washington, DC | Washington | District of Columbia | United States

As the world shrinks and digital takes control, effective advertising lawyers are not just building the bridge between creative freedom and consumer protection, they have increasingly become embedded in the marketing process, from beginning to end. Lawyers are now partners to CMOs, brand managers, and creative directors. That’s not an easy position. However, armed with the right knowledge, today’s marketing lawyer is a valued member of the team. This conference, now in its 13th year, will show senior practitioners and C-suite executives how to join hands to facilitate the creation of effective, successful marketing campaigns using all available tools.

Continuing Legal Education (CLE) credit will be offered.

The hashtag for this event is #ANAAdLaw.

Mar
29
Wed
RightsCon Brussels @ Brussels
Mar 29 – Mar 31 all-day
RightsCon Brussels @ Brussels | Bruxelles | Bruxelles | Belgium

Access Now is proud to bring you the sixth installment of RightsCon, the world’s leading event on the future of the internet. Together we are shaping the global conversation about how to keep the internet open, free, and secure.

At RightsCon Silicon Valley 2016, we brought together more than 1,100 attendees from 84 countries and more than 500 organizations. This upcoming Spring 2017 in Brussels, Belgium we’re gathering the global digital rights community in the heart of European politics and policymaking to host our most impactful RightsCon yet.

Together at RightsCon Brussels 2017, we’ll tackle the most pressing issues at the intersection of technology and human rights. If you have an idea for something you’d like to see happening there, tell us about it!

Mar
30
Thu
Privacy and Cloud Security: Risks, Opportunities and Compliance @ Brussels
Mar 30 – Mar 31 all-day
Privacy and Cloud Security: Risks, Opportunities and Compliance @ Brussels | Bruxelles | Bruxelles | Belgium
This course will enable you to understand the concepts of security, risk and privacy compliance, as they apply to the various cloud computing environments. It provides you with a structured guide on how to successfully move data into a cloud service provider while gaining assurance that security of that data will not be compromised, privacy rules will be complied with and cloud service agreements will be fit for the purposes.

Learning outcomes
At the end of the training course, you will have a good knowledge of the key security, privacy and contractual issues to consider when engaging with a cloud service provider; you will understand the concepts of security, privacy, compliance and risk, as they apply to cloud computing. You have learned how to underpin the security and privacy concepts with that of an enterprise cloud computing environment; appreciate the unique security and privacy risks, challenges and opportunities cloud computing provides: and you will be prepared to react should a security and privacy incident occur within your cloud computing environment.

Big Data: Understanding Algorithmic Power @ Lexington
Mar 30 @ 10:00 am – 3:00 pm
Big Data: Understanding Algorithmic Power @ Lexington | Lexington | Virginia | United States

This symposium will explore the legal and ethical implications of big data discrimination and algorithmic-derived discrimination. Recent reports have indicated that big data tools and algorithmic-driven decision making protocols can be used to isolate, analyze, and discriminate against individuals based on race, gender, religion, voting habits, residency, consumer behaviors, health status, and other data characteristics. This Symposium aims to deepen the conversation on the impact of the growth of algorithmic-centered power in the private and public sectors.

Hosted by:

  • Journal of Civil Rights and Social Justice, Washington and Lee University School of Law

Cosponsored by:

  • Provost’s Office, Washington and Lee University
  • Class of 1960 Institute for Honor
  • Frances Lewis Law Center, Washington and Lee University School of Law
  • Mudd Center for Ethics, Washington and Lee University
  • Washington and Lee Black Law Students Association
  • Future of Privacy Forum
  • Data & Society Research Institute

SYMPOSIUM AGENDA

10:00 – 10:10 am
Welcome

Brant J. Hellwig, Dean, Washington and Lee University School of Law

10:10 – 11:30 am Panel Discussion
BIG DATA ETHICS IN RESEARCH METHODS

Moderator:

Victoria Shannon Sahani, Associate Professor of Law, Washington and Lee School of Law

Panelists:

Deven Desai, Associate Professor, Law and Ethics Program, Scheller College of Business, Georgia Tech

Mark Van Hollebeke, Privacy Practitioner-in-Residence at Data & Society Research Institute, Senior Privacy Strategist, Microsoft

Janine Hiller, Professor of Business Law, Department of Finance, Pamplin College of Business, Virginia Tech

Jules Polonetsky, CEO, Future of Privacy Forum

Kevin Werbach, Associate Professor of Legal Studies and Business Ethics, The Wharton School, University of Pennsylvania

11:30 – 11:45 am 
Break

11:45 am – 12:40 pm 
Lunch and Keynote

IntroductionMargaret Hu, Associate Professor of Law, Washington and Lee University School of Law

Keynote: Charlton McIlwain, Associate Dean of Faculty Development & Diversity, and Associate Professor of Media, Culture and Communication, Steinhardt School, New York University

12:40 – 12:50 pm
Break

12:50 – 2:00 pm Panel Discussion
UNDERSTANDING BIG DATA DISCRIMINATION

Moderator:

Anjanette (Angie) Raymond, Assistant Professor of Business Law and Ethics, Kelley School of Business, Indiana University and Adjunct Assistant Professor of Law, Indiana University Maurer School of Law

Panelists:

Dennis Hirsch, Professor of Law and Director, Program on Data and Governance, Ohio State University Moritz College of Law and Professor of Law, Capital University Law School [via Skype]

Anne Washington, Assistant Professor, Schar School of Policy and Government, George Mason University

Christopher Wolf, Partner, Hogan Lovells & Founder, Future of Privacy Forum

2:00 – 2:10 pm 
Break

2:10 – 3:20 pm Panel Discussion
IMPACT OF BIG DATA-CENTERED & ALGORITHMIC-CENTERED POWER

Moderator:

Rachel Levinson-Waldman, Senior Counsel, Liberty and National Security Program, Brennan Center for Justice, New York University School of Law

Panelists:

Jessica Eaglin, Assistant Professor of Law, Indiana University Maurer School of Law

Joshua Fairfield, Professor of Law, Washington and Lee University School of Law

Margaret Hu, Associate Professor of Law, Washington and Lee University School of Law

Amos Jones, Associate Professor of Law, Campbell University Norman Adrian Wiggins School of Law

3:20 – 3:30 pm 
Closing Remarks

Charli Gibbs-Tabler, Symposium Editor, Journal of Civil Rights and Social Justice, Washington and Lee University School of Law

“Seminar in Identity, Privacy and Security” Course Poster Session @ Toronto
Mar 30 @ 12:30 pm – 2:00 pm
"Seminar in Identity, Privacy and Security" Course Poster Session @ Toronto | Toronto | Ontario | Canada

Please join us at a poster session celebrating the final projects of
the IPSI course “Seminar in Identity, Privacy and Security”.  This
year’s final projects cover a wide range of topics on current
practices and emerging applications within the cyber physical and
social system, which include privacy and security issues related to
the smart grid, health informatics and cloud computing. Students will
provide an in-depth discussion on potential solutions for the issues,
such as policy changes and technical implementations. Refreshments
will be served.

Mar
31
Fri
weROBOT 2017 @ New Haven
Mar 31 – Apr 1 all-day
weROBOT 2017 @ New Haven | New Haven | Connecticut | United States

We Robot fosters conversations between the people designing, building, and deploying robots and the people who design or influence the legal and social structures in which robots will operate.

This conference will build on a growing body of scholarship exploring how the increasing sophistication and autonomous decision-making capabilities of robots and their widespread deployment everywhere from the home, to hospitals, to public spaces, to the battlefield disrupts existing legal regimes or requires rethinking policy issues. We are particularly interested this year in “solutions,” i.e., projects with a normative or practical thesis aimed at helping to resolve questions around contemporary and anticipated robotic applications.

picoCTF high school computer security competition @ Online
Mar 31 @ 12:00 pm – Apr 14 @ 5:00 pm
picoCTF high school computer security competition @ Online

picoCTF – a free, online computer security competition for students grades 6-12 – is coming March 31, 2017! The game is designed for total beginners *and* experts alike, and over 30,000 people have already played. Students can pre-register today on our website (https://picoctf.com/). Please take a moment to watch our orientation video (https://picoctf.com/about).

Overview
picoCTF is a computer security competition open to students grades 6-12. The competition is a series of challenges where students must reverse engineer, break, hack, decrypt, or do whatever it takes to solve the problem. The competition is open from March 31st to April 14th, 2017. Everything is exclusively on the Internet and completely free. Registration will not close until the end of the competition, and there is no penalty for registering later.

Eligibility
Anyone can play, but only eligible individuals will be able to win and receive prizes. An individual is eligible if they are attending a school in the United States and are a 6th to 12th grade student.

Prizes
We have received over $30,000 for prizes this year! Specific amounts cannot be announced at this time as we are finalizing funding with our sponsors.

Competing
Once the competition begins, participants will be able to log into picoctf.com using the username and password provided at registration. If participants have forgotten their username or password, a reset function will be available once competition opens.

Organization
To accommodate the diverse backgrounds participating in picoCTF, the competition is organized into four levels each significantly more difficult than the last. Level 1 is targeted at students with no programming experience but apt at using a computer. Level 2 is for students with introductory programming experience, perhaps in languages such as Visual Basic or Alice. Level 3 targets AP Computer Science students with a stronger background in programming. Level 4 features a diverse set of problems ranging from difficult to mind-bogglingly difficult.

Levels
A team need not solve every challenge in a level before unlocking the next level. The problems in each level have been designed such that a new level can be unlocked even while avoiding entire categories (e.g. cryptography).

Playing the Game
Similar to the preview, competition challenges will be presented in the context of a story-driven game. The *game* requires a modern web browser and a reasonably powerful computer to play. Each challenge is worth a fixed number of points. A competitor earns the respective number of points regardless of the progress of other teams. Scores are calculated independent of time, but time will be used as a tie breaker.

Hints and Lectures
Some problems have associated hints. Hints can contain text, links, and even entire video lectures relevant to solving the problem.

Restrictions
While there are no limitations on the resources or tools that you can use, only students can solve challenges. Others can only facilitate in solving problems (e.g. helping setup tools and providing resources). Additionally, competitors may not interfere with the progress of other competitors or the competition infrastructure. Breaking any of these rules will result in disqualification and notification of the affiliated school.

Sponsors
We would like to thank our diamond sponsor, Cognizant, for helping make picoCTF possible.

Contact
Any questions should be directed to [email protected]. Or, if it’s easier, you can chat with us on Twitter or Facebook.

Apr
4
Tue
2017 HoTSoS Symposium and Bootcamp @ Hanover
Apr 4 – Apr 5 all-day
2017 HoTSoS Symposium and Bootcamp @ Hanover | Hanover | Maryland | United States

HoTSoS is a research event centered on the Science of Security, which aims to address the fundamental problems of security in a principled manner.

The 2017 HoTSoS event, scheduled for April 4-5, 2017 in Hanover, Maryland, will bring together researchers from diverse disciplines to promote advancement of work related to the science of security. The conference will feature a mix of invited talks, panels, tutorials, and refereed papers to be published by ACM.

The Science of Security (SoS) emphasizes the advancement of research methods as well as the development of new research results. This dual focus is intended to improve both the confidence we gain from scientific results and also the capacity and efficiency through which we address increasingly technical problems.

Tech, Law Enforcement, and Overseas Data: How Current Law is Hurting Law Enforcement and the U.S. Economy @ Washington, DC
Apr 4 @ 4:00 pm – 5:00 pm
Tech, Law Enforcement, and Overseas Data: How Current Law is Hurting  Law Enforcement and the U.S. Economy @ Washington, DC | Washington | District of Columbia | United States

U.S. technology companies are global leaders in providing cloud computing services for users around the world. This innovation is a critical underpinning of the 21st Century U.S. economy and job growth. However, technology companies are increasingly threatened by the current legal framework that lacks clarity about the application of various national laws, creating conflicting requirements for cloud service providers to turn over customers’ data.

At the same time, law enforcement efforts in the U.S. and around the world are increasingly frustrated by difficulties in accessing data located across borders. At the heart of this problem, outdated laws establish barriers in accessing data based on the location of where it happens to be. Meanwhile, the Mutual Legal Assistance Treaty (MLAT) system and other data sharing agreements no longer provide for efficient access to critical data stored across national boundaries.

The current system is bad for both U.S. economic growth and law enforcement.

Join us for a discussion, along with remarks by Senator Orrin Hatch (R-UT), about what’s wrong with the current system, and how Congress needs to act to update the legal framework to help U.S. companies better compete across national borders and facilitate law enforcement access to data that is needed for critical investigations.

Refreshments will be served.

Featuring Remarks by Senator Orrin Hatch (R-UT)

Panel Speakers:

  • Jen Daskal:Associate Professor of Law, American University Washington College of Law (WCL)
  • David Lieber:Senior Privacy Policy Counsel, Google
  • Greg Nojeim, Director, Freedom, Security & Technology Project,Center for Democracy & Technology (CDT)
  • David LeDuc: Senior Director of Public Policy, SIIA(Moderator)

 

Please RSVP for this Discussion

 

This event is designed to be widely attended and in compliance with all Congressional Ethics rules.

This event will be provided at no cost by the
Software & Information Industry Association.

About SIIA
SIIA is an umbrella association representing 800+ technology, data and media companies globally. Industry leaders work through SIIA’s divisions to address issues and challenges that impact their industry segments with the goal of driving innovation and growth for the industry and each member company. This is accomplished through in-person and online business development opportunities, peer networking, corporate education, intellectual property protection and government relations. For more information, visit our website.

Apr
5
Wed
National Privacy & Data Governance Congress @ Calgary
Apr 5 – Apr 7 all-day
National Privacy & Data Governance Congress @ Calgary | Calgary | Alberta | Canada

The National Privacy & Data Governance Congress takes a refreshingly practical approach to explore leading issues at the crossroads of privacy, security, law and technology. Speakers focus on practical solutions and examples, and real-life case studies — rather than relying on theoretical models, or reciting statistical and performance data that’s publicly available elsewhere. Breakouts and plenary sessions are longer than at most conferences, and formal presentations are shorter — and that gives you time to ask questions and get real, unscripted answers. The Congress is much more than plenary sessions and workshops. It is a meeting place where delegates and speakers have the chance to reconnect with colleagues from public and private institutions, federal, provincial and territorial governments, industry, academia and regulatory authorities — to make new connections, share ideas, and enhance individual skills. Network with privacy, security, compliance and data governance professionals from industry and government. Enjoy workshop, breakout, keynote and plenary sessions. And get a clearer view of how privacy, security, law and technology intersect and why that matters to you and your organization. You will receive solid content and be spared from listening to vendor pitches. After all, you’re attending to learn, and we don’t think there’s good value in thinly-veiled sales pitches. But we do think that delegates and speakers who attend the Congress should be able to attend the entire Congress. That’s why all workshops, meals, plenary and breakout sessions are included in the conference registration fee. Read More at www.pacc-ccap.ca/congress.

Subscribe to receive updates from FPF