Home

Use our global calendar of privacy events to locate an event near you.

 

FILTER BY

May
23
Tue
GSMA Mobile 360 Series – Privacy & Security @ The Hague
May 23 – May 24 all-day
GSMA Mobile 360 Series – Privacy & Security @ The Hague | Den Haag | Zuid-Holland | Netherlands

Are data privacy and security your top corporate priorities? Find out why they should be on 23-24 May, 2017 in The Hague, Netherlands.

The GSMA, in cooperation with The Hague Security Delta and The Municipality of The Hague, is hosting the second annual Mobile 360 – Privacy & Security event to address the inevitable challenges that enterprises face with digital transformation. This event will address these challenges and focus on building digital-oriented businesses on trust, security and privacy. Across two days, these topics will be highlighted through keynotes, panel discussions, workshops, and technology demonstrations.

Space is limited; register today at www.mobile360series.com.

.

GDPR: DPIAs and Risk @ Online
May 23 @ 12:00 pm – 1:00 pm

9:00AM-10:00AM PT / 12:00PM-1:00PM ET

Register NOW for this webinar, as our speakers will discuss:

  • How to determine when a DPIA is required under GDPR
  • Risk assessment – evaluating likelihood and severity
  • Evaluating safeguards and other measures to mitigate the risks
  • Related risk assessment considerations under GDPR, such as legitimate interests and breach notifications

*Can’t make the webinar? Register anyway! We’ll send you a followup email with the slides and recording after the webinar!*


TRUSTe Webinar FAQs

Click here for answers to the most commonly asked webinar related questions!

MARTY ABRAMS
Executive Director & Chief Strategist, Information Accountability Foundation (IAF)
Martin Abrams has 35 years of experience as an information and consumer policy innovator. Multi-stakeholder collaboration has been a key for Abrams in developing practical solutions to dilemmas in information policy. His most recent work has been on big data governance and privacy compliance driven by demonstrable data stewardship. For the past five years, he has led the Global Accountability Project, which has refined the accountability principle that is part of various data protection laws and guidance documents. Abrams has also provided leadership in other policy areas. He worked on multi-layered privacy notices, which changed the way policy makers and organisations thought about privacy transparency. His work is generally reflected in new laws and regulatory guidance in jurisdictions from Asia, across Europe and in the Americas. He has led educational seminars on almost every continent and has been a key advisor to four International Conference of Data Protection and Privacy Commissioners. He has been deeply involved in the development of the APEC Cross Border Privacy Rules and has also been involved with the OECD Working Party on Information Security and Privacy.
HILARY WANDALL
General Counsel & Chief Data Governance Officer, TRUSTe
Hilary is General Counsel and Chief Data Governance Officer at TRUSTe. Previously, she led the Merck Privacy Office and the company’s global privacy program since 2004. She led Merck’s initiative to become the first health care company and second multinational to achieve APEC Cross Border Privacy Rules (CBPR) certification and the first company to achieve CBPR certification of its entire privacy program. Since 2014, Hilary has served on the Executive Committee of the Board of Directors of the International Association of Privacy Professionals, and in 2016 was elected Board Chairman. Hilary received her law degree and MBA from Temple University, Master of Bioethics from the University of Pennsylvania, and Bachelor of Science in Biology from Moravian College. She holds the CIPP/US, CIPP/EU and CIPM certifications.
May 2017 Privacy Lab – Privacy on the Blockchain: An Introduction to Zcash @ San Francisco
May 23 @ 5:30 pm – 7:30 pm
May 2017 Privacy Lab - Privacy on the Blockchain: An Introduction to Zcash @ San Francisco | San Francisco | California | United States

Zcash is the first open-source and decentralized cryptocurrency offering strong privacy in the form of shielded transactions, which are made possible by a novel form of zero-knowledge cryptography called zk-SNARKs. Like Bitcoin, Zcash payments are published on a public blockchain, except the sender, recipient, and amount of a transaction may remain fully private. In this talk, we will provide an uncomplicated overview of Zcash, how it works, the history of the protocol and its conception by a talented group of academics, cryptographers and scientists in the original “Zerocoin” paper, what’s happened since it finally launched in late 2016, and what’s in store for the future of ZEC. We’ll also look at the current state of the network and discuss the remarkable way we generated the public parameters required to construct and verify shielded transactions, in the so-called parameter generation ceremony.

Our speaker is Kevin Gallagher, DevOps Engineer for Zcash Company (@ageis)

May
24
Wed
Planning for the Future: A Conference About Identity Theft @ Washington, DC
May 24 all-day
Planning for the Future: A Conference About Identity Theft @ Washington, DC | Washington | District of Columbia | United States

CONSTITUTION CENTER

400 7th St SW, Washington, DC 20024 | Directions & Nearby

EVENT DESCRIPTION

Ten years ago, President Bush launched a new era in the fight against identity theft by issuing an executive order establishing the Identity Theft Task Force, which the Commission co-chaired. In the ensuing ten years, great strides have been made to combat identity theft but it remains a significant problem for American consumers. Last calendar year, the Federal Trade Commission received nearly 500,000 identity theft complaints and the Department of Justice reports that in 2014 17.6 million individuals – 7% of all U.S. residents age 16 and older – were victims of one or more incidents of identity theft.

On May 24, 2017, the Federal Trade Commission will host an all-day conference to take a comprehensive look at how identity theft has evolved over the last decade and what we can do to address this challenge in the future.

The unauthorized disclosure of personal information can result in identity theft and other frauds. Data breaches, lost equipment, and insiders have made sensitive consumer information available for identity thieves to use in a variety of ways. Because consumers often reuse their usernames and passwords, identity thieves with access to this information may have access to additional consumer accounts. Identity thieves are using the information they obtain to perpetrate fraud against consumers, businesses and the government; obtain employment and medical care; and hide from law enforcement.

Identity theft can have ramifications beyond financial harm. For example, consumers may be denied access to crucial services or medical care. Identity theft can also pose a threat to public safety, particularly when used to create fraudulent identity documents that facilitate criminal activity or enable individuals to hide from law enforcement.

The conference will gather input from academics, business and industry representatives, government experts and consumer advocates. We’ll look at the current state of identity theft, examine potential future challenges, and discuss how to address these issues. The conference will be open to the public and take place at the FTC’s Constitution Center building, 400 7th St., S.W., Washington, DC. The FTC invites comment from the public on the issues.

The event will address questions such as:

  • What types of information do identity thieves steal? How do identity thieves obtain this information? What can the private sector and government do to inhibit access to this information?
  • How much of this information comes from the dark or deep web? What types of information is available? How do these markets operate? How much does it cost identity thieves to obtain this information? How have these markets changed in recent years? How will these markets change in the next few years?
  • How do identity thieves use this information? How have identity theft related frauds evolved? What are some of the potential new frauds? How do we quantify the magnitude and the impact on consumers, businesses, and the government?
  • What threats to public safety can result from identity theft? How will these threats evolve? What can be done to protect against these threats?
  • How are identity thieves utilizing synthetic identities? What are the challenges associated with identifying synthetic identities? Are current identity monitoring tools effective in notifying individuals that a synthetic identity associated with some of their information exists?
  • Are certain populations more vulnerable to identity theft? What can the private sector and the government do to protect these vulnerable populations? How do we quantify the magnitude and the impact on these vulnerable populations?
  • What resources are available to help identity theft victims? What are the limitations of these resources? What additional tools are needed to protect individuals from becoming victims of identity theft, mitigating the harm caused by identity theft, and restoring individuals’ identities? What is the role of the private sector, non-profits, academia, and the government in developing these tools?
  • How effective are current monitoring and restoration services? How will these services evolve?
  • How can the private sector, non-profits, academia, and government work together to address all these issues?

The conference will be available online via webcast. A webcast link will be added to this page on the day of the event.

CONTACT
If you have questions about the workshop, please email [email protected](link sends e-mail) or contact John Krebs at (202) 326-2692.

Boston Bar Association’s Inaugural Privacy & Cybersecurity Conference @ Boston
May 24 @ 9:00 am – 4:00 pm
Boston Bar Association’s Inaugural Privacy & Cybersecurity Conference @ Boston | Boston | Massachusetts | United States

The Boston Bar Association’s inaugural Privacy Conference will bring together attorneys from private practice and in-house legal departments to network and discuss key topics and trends in privacy and cybersecurity.

This full-day conference will cover a wide range of topics from data breach response and litigation to compliance and transactional issues. Panelists will discuss new developments in the legal and regulatory landscape, while providing strategies to effectively prepare and respond to your client’s needs and offer insights into challenges and opportunities ahead.

May
25
Thu
2017 International Workshop on Privacy Engineering – IWPE’17 @ San Jose
May 25 all-day
2017 International Workshop on Privacy Engineering – IWPE'17 @ San Jose | San Jose | California | United States

Abstract and paper submission deadlines have been extended. Check here the new dates.

Privacy engineering research has never been a more timely endeavor. Ongoing news reports regarding global surveillance programs, massive personal data breaches in corporate databases, and notorious examples of personal tragedies due to privacy violations have intensified societal demands for privacy-friendly systems. In response, current legislative and standardization processes worldwide are seeking to strengthen individuals’ privacy by introducing legal and organizational frameworks that personal data collectors and processors must follow. As a result, engineers are increasingly expected to build and maintain systems that preserve privacy and comply with data protection standards in different ICT domains (such as health, energy, transportation, social computing, law enforcement, and public services) and on different infrastructures and architectures (such as cloud, grid, or mobile computing).

Although there is a consensus on the benefits of an engineering approach to privacy, few concrete proposals exist for models, methodologies, techniques and tools to support engineers and organizations in this endeavor. Work that focuses on helping organizations and software developers to identify and adopt appropriate privacy engineering methods, techniques and tools in their daily practices is also missing. Furthermore, it is difficult to systematically evaluate whether the systems developed using privacy engineering methodologies comply with legal frameworks, provide necessary technical assurances, and fulfill users’ privacy requirements.

Clearly, more research is needed in developing methods that can help translate legal and normative concepts, as well as user expectations, into systems requirements. There is also a growing need for techniques and tools to support organizations and engineers in developing and maintaining (socio-)technical systems that meet these requirements. In an effort to close the gaps in research, the topics of IWPE’17 include all aspects of privacy engineering, ranging from its theoretical foundations, engineering approaches and support infrastructures to its practical application in projects of different scales.

Specifically, we are seeking the following kinds of papers:
1) technical solution papers that illustrate a novel formalism, method or other research finding with preliminary evaluation;
2) experience and practice papers that describe a case study, challenge or lessons learned in a specific domain;
3) early evaluations of tools and techniques that support engineering tasks in privacy requirements, design, implementation, testing, etc.;
4) interdisciplinary studies or critical reviews of existing privacy engineering concepts, methods and frameworks;
5) vision papers that take a clear position informed by evidence based on a thorough literature review.

Workshop on Technology and Consumer Protection (ConPro ’17) @ San Jose
May 25 all-day
Workshop on Technology and Consumer Protection (ConPro ’17) @ San Jose | San Jose | California | United States

Advances in technology come with countless benefits for society, but these advances sometimes introduce new risks as well. Various characteristics of technology, including its increasing complexity, may present novel challenges in understanding its impact and addressing its risks. Regulatory agencies have broad jurisdiction to protect consumers against certain harmful practices (typically called “deceptive and unfair” practices in the United States), but sophisticated technical analysis may be necessary to assess practices, risks, and more. Moreover, consumer protection covers an incredibly broad range of issues, from substantiation of claims that a smartphone app provides advertised health benefits to the adequacy of practices for securing sensitive customer data.

The Workshop on Technology and Consumer Protection (ConPro ’17) will explore computer science topics with an impact on consumers. This workshop has a strong security and privacy slant, with an overall focus on ways in which computer science can prevent, detect, or address the potential for technology to deceive or unfairly harm consumers. Attendees will skew towards academic and industry researchers but will include researchers from government agencies with a consumer protection mission, including the Federal Trade Commission—the U.S. government’s primary consumer protection body. Research advances presented at the workshop may help improve the lives of consumers, and discussions at the event may help researchers understand how their work can best promote consumer welfare given laws and norms surrounding consumer protection.

For more information, see the call for papers.

May
29
Mon
32nd International Conference on ICT Systems Security and Privacy Protection – IFIP SEC 2017 @ Rome
May 29 – May 31 all-day
32nd International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2017 @ Rome | Roma | Lazio | Italy

Welcome to the IFIP International Information Security and Privacy Conference Web Site. The SEC conferences are a series of well-established international conferences on Security and Privacy. SEC is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 (TC-11).

The 10th World Information Security Education Conference – WISE10 (hosted by IFIP WG 11.8) is co-located with IFIP SEC 2017. It will take place between Monday May 29th an Wednesday May 31st. Please visit the WISE10 website for more details.

The IFIP WG11.4 Workshop – iNetSec on “Open Problems in Network Security” is co-located with IFIP SEC 2017. It will take place between Tuesday May 30th and Wednesday May 31st 2017, which will be included in the schedule of the IFIP SEC conference program. Please visit the iNetSec website for the call for paper.

The conference will be hosted at the National Research Council of Italy (CNR) that is located in Rome, Piazzale Aldo Moro 7 (zipcode 00185, Rome, Italy), in the city centre of Rome, and near the main train station (Termini). The place is in front of the main University in Rome (“La Sapienza”).

GDPR Countdown event – the 1st conference dedicated to Privacy in Luxembourg @ Luxembourg
May 29 @ 10:00 am – 8:00 pm
GDPR Countdown event - the 1st conference dedicated to Privacy in Luxembourg @ Luxembourg | Luxembourg | District de Luxembourg | Luxembourg

MGSI and NautaDutilh are pleased to invite you to the first show entirely dedicated to data protection in Luxembourg.

Come and meet with experts on this day and prepare your compliance before the implementation of the general regulations on data protection, May 25, 2018!

Program (10 a.m. to 8 p.m.)

Keynotes, conferences, workshops
European Privacy Seal presentation Sebastian Meissner, Head of the Certification Authority EuroPriSe (FR)
Feedback customer experience – gap analysis Johan Bierebeeck, Finance & Performance Director at Editus
Panel Discussion
Closing Cocktail

Official launch of new EuroPriSe certification service MGSI
MGSI is the first company in Luxembourg to offer legal services and expert technical EuroPriSe.

Price: Free

Places limited, registration subject to approval

May
30
Tue
Eighteenth Annual Institute on Privacy and Data Security Law
May 30 – May 31 all-day
Eighteenth Annual Institute on Privacy and Data Security Law

The New York location is sold out, but there is still room to register for the Live Webcast on May 30-31, 2017.  To register, click on the Webcast tab above to navigate to the Webcast page.

Why You Should Attend       

This program focuses on current critical issues of information privacy, cybersecurity and data protection faced by all companies.  The Internet and evolving mobile and virtualized information technologies, wired and wireless, have prompted the development of powerful tools for the collection, processing, storage and use of personal information.   More than ever, businesses are becoming digital and data driven.  These trends create a wide range of compliance risk and liability issues regarding corporate rights to use personal information.  They also raise the stakes for protecting such data in increasingly challenging risk environments, ranging from internal vulnerabilities to criminal cyberhackers and other persistent threats.  Legislators, regulators and the courts are rapidly developing new law and compliance obligations to address the privacy and security implications of expanding information economy and its continuously evolving risks.  This annual conference focuses on these developments with the goal of keeping attorneys and other privacy professionals informed and up-to-date in this complex and dynamic area of laws and regulations.

What You Will Learn

  • The roots of privacy law in the U.S. and around the world
  • A discussion of the risks and challenges of the Internet of Things & Big Data
  • Current consumer privacy enforcement priorities of the FTC and state attorneys general
  • How to manage privacy and cybersecurity risk in business deals
  • Latest developments in workplace privacy law, including employee surveillance trends and how to establish an employee training program
  • Ethical and cyber-risk management issues for lawyers in using information technology
  • What you need to know about cyber insurance
  • Litigation issues: how to avoid them and manage them once you’re in
  • The impact of GDPR & Privacy Shield
  • Key developments in global privacy
  • Hear directly from CPOs, CISOs and CCOs  

Special Features

  • Step-by-step analysis of a cyber-attack using a cyber-attack simulation
  • Earn one hour of CLE Ethics credit
  • Earn Continuing Privacy Education credit

 

PLI Group Discounts

Groups of 4-14 from the same organization, all registering at the same time, for a PLI program scheduled for presentation at the same site, are entitled to receive a group discount. For further discount information, please contact [email protected] or call (800) 260-4PLI.

PLI Can Arrange Group Viewing to Your Firm

Contact the Groupcasts Department via email at [email protected] for more details.

Cancellations

All cancellations received 3 business days prior to the program will be refunded 100%. If you do not cancel within the allotted time period, payment is due in full. You may substitute another individual to attend the program at any time.

Subscribe to receive updates from FPF