BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//104.21.2.183//NONSGML kigkonsult.se iCalcreator 2.26.9//
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-FROM-URL:https://privacycalendar.org
X-WR-TIMEZONE:America/New_York
BEGIN:VTIMEZONE
TZID:America/New_York
X-LIC-LOCATION:America/New_York
BEGIN:STANDARD
DTSTART:20201101T020000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RDATE:20211107T020000
TZNAME:EST
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20210314T020000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RDATE:20220313T020000
TZNAME:EDT
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:ai1ec-1905@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:
DESCRIPTION:Organizations are trying to  better understand how to use legit
 imate interests as a lawful basis for processing under the GDPR.\nDate: Ma
 y 9\, 2018     Time: 10:00 am EDT\nNymity and the FPF (Future of Privacy F
 orum) released an important study on legitimate interests under the GDPR t
 o wide acclaim: Processing Personal Data on the Basis of Legitimate Intere
 sts Under the GDPR. In this webinar\, our panelists will discuss specific 
 cases that have been decided at the national level by DPAs and Courts from
  the European Economic Area (EEA) and the most relevant cases where the Co
 urt of Justice of the European Union interpreted and applied the “legitima
 te interests” ground.\nJoin us to gain valuable insight concerning over 40
  cases examined representing a wide variety of data processing activities 
 from over 15 countries\, such as:\n\nUsing key-logger software for employe
 e monitoring\nUse of GPS tracking data for private investigations\nDisclos
 ing health data for litigation purposes\nDisclosing personal data for debt
  collection purposes\nSending emails without consent for electoral purpose
 s\nPublishing the sale price of homes that are no longer on the market\nRe
 cording employee misconduct\n\nAll of the cases discussed are found in the
  Nymity Research™ legal compliance software solution which contains over 2
 5\,000 References\, including English translations of foreign documents.
DTSTART;TZID=America/New_York:20180509T100000
DTEND;TZID=America/New_York:20180509T110000
SEQUENCE:0
SUMMARY:Legitimate Interests under the GDPR: Findings\, Case Studies and Gu
 idance
URL:https://privacycalendar.org/event/legitimate-interests-gdpr-findings-ca
 se-studies-guidance/
X-COST-TYPE:free
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 018/04/0b9341b830004af0ff2d36468ddd0c90-150x82.jpg\;150\;82\;1\,medium\;ht
 tps://privacycalendar.org/wp-content/uploads/2018/04/0b9341b830004af0ff2d3
 6468ddd0c90-300x71.jpg\;300\;71\;1\,large\;https://privacycalendar.org/wp-
 content/uploads/2018/04/0b9341b830004af0ff2d36468ddd0c90.jpg\;346\;82\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2018/04/0b9341b830004af0ff2d36468ddd0c90-300x71.jpg' width
 ='300' height='71' /></div><p>Organizations are trying to  better understa
 nd how to use legitimate interests as a lawful basis for processing under 
 the GDPR.</p>\n<p><strong>Date: May 9\, 2018     Time: 10:00 am EDT</stron
 g></p>\n<p>Nymity and the FPF (Future of Privacy Forum) released an import
 ant study on legitimate interests under the GDPR to wide acclaim: Processi
 ng Personal Data on the Basis of Legitimate Interests Under the GDPR. In t
 his webinar\, our panelists will discuss specific cases that have been dec
 ided at the national level by DPAs and Courts from the European Economic A
 rea (EEA) and the most relevant cases where the Court of Justice of the Eu
 ropean Union interpreted and applied the “legitimate interests” ground.</p
 >\n<p>Join us to gain valuable insight concerning over 40 cases examined r
 epresenting a wide variety of data processing activities from over 15 coun
 tries\, such as:</p>\n<ul>\n<li>Using key-logger software for employee mon
 itoring</li>\n<li>Use of GPS tracking data for private investigations</li>
 \n<li>Disclosing health data for litigation purposes</li>\n<li>Disclosing 
 personal data for debt collection purposes</li>\n<li>Sending emails withou
 t consent for electoral purposes</li>\n<li>Publishing the sale price of ho
 mes that are no longer on the market</li>\n<li>Recording employee miscondu
 ct</li>\n</ul>\n<p><strong><em>All of the cases discussed are found in the
  Nymity Research™ legal compliance software solution which contains over 2
 5\,000 References\, including English translations of foreign documents.</
 em></strong></p>\n</BODY></HTML>
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-1994@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:TrustArc\; https://www.trustarc.com/events/webinar-schedule/
DESCRIPTION:Consent management remains a hot topic and has generated a lot 
 of questions and uncertainty.\n\n\n\nThe GDPR has raised the bar with new 
 requirements on companies to justify their use of EU personal data. And wh
 ile relying on consent is not the only legal option available\, it’s succe
 ssfully put GDPR at the top of every inbox as consumers have been submerge
 d in emails from companies urging them to “stay in touch” or “not miss out
 ”. Are these emails really necessary? What do I need to include in my priv
 acy notice or consent form? What kind of records do I need if a regulator 
 asks?\nWith a divergence of opinion\, consent management remains a hot top
 ic and has generated a lot of questions and uncertainty.\n\n\n\n\n\n\nRegi
 ster now for this webinar where we will review:\n\n\n\n\nThe GDPR requirem
 ents on determining the legal basis for processing\nThe most recent guidan
 ce from regulators on seeking consent\nSample consent forms\, legitimate i
 nterests assessments and other best practice examples\n\n\n\n\nCan’t make 
 it? Register anyway – we’ll automatically send you an email with both the 
 slides and recording after the webinar!\nTrustArcWebinar FAQs: Click here 
 for answers to the most commonly asked webinar related questions.\n#trusta
 rcGDPRevents\n\n\n\nTickets: https://info.trustarc.com/managing-consents-l
 egitimate-interests-under-gdpr.html.
DTSTART;TZID=America/New_York:20180627T090000
LOCATION:Online
SEQUENCE:0
SUMMARY:Privacy Insight Series Webinar – Managing Consent and Legitimate In
 terests Under the GDPR
URL:https://privacycalendar.org/event/privacy-insight-series-webinars/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 017/07/TrustArc_SocialMedia_wTagline_Master-150x150.jpg\;150\;150\;1\,medi
 um\;https://privacycalendar.org/wp-content/uploads/2017/07/TrustArc_Social
 Media_wTagline_Master-300x300.jpg\;300\;300\;1\,large\;https://privacycale
 ndar.org/wp-content/uploads/2017/07/TrustArc_SocialMedia_wTagline_Master.j
 pg\;751\;751\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2017/07/TrustArc_SocialMedia_wTagline_Master-300x300.jpg' 
 width='300' height='300' /></div><div class='mainCopySection sectionWithSe
 perator'>\n<div id='subhead-id' class='subhead mktoText'>\n<div>Consent ma
 nagement remains a hot topic and has generated a lot of questions and unce
 rtainty.</div>\n</div>\n<div id='bodyCopy1-id' class='bodyCopy mktoText'>
 \n<div>\n<p>The GDPR has raised the bar with new requirements on companies
  to justify their use of EU personal data. And while relying on consent is
  not the only legal option available\, it’s successfully put GDPR at the t
 op of every inbox as consumers have been submerged in emails from companie
 s urging them to “stay in touch” or “not miss out”. Are these emails reall
 y necessary? What do I need to include in my privacy notice or consent for
 m? What kind of records do I need if a regulator asks?</p>\n<p>With a dive
 rgence of opinion\, consent management remains a hot topic and has generat
 ed a lot of questions and uncertainty.</p>\n</div>\n</div>\n</div>\n<div c
 lass='bulletList sectionWithSeperator'>\n<div id='listTitle-id' class='lis
 tTitle mktoText'>\n<div></div>\n<div>Register now for this webinar where w
 e will review:</div>\n</div>\n<div id='bodyCopy2-id' class='bodyCopy mktoT
 ext'>\n<div>\n<ul>\n<li>The GDPR requirements on determining the legal bas
 is for processing</li>\n<li>The most recent guidance from regulators on se
 eking consent</li>\n<li>Sample consent forms\, legitimate interests assess
 ments and other best practice examples</li>\n</ul>\n</div>\n<div></div>\n<
 div>\n<p>Can’t make it? Register anyway – we’ll automatically send you an 
 email with both the slides and recording after the webinar!</p>\n<p>TrustA
 rcWebinar FAQs: <a id='' href='https://info.trustarc.com/rs/846-LLZ-652/im
 ages/TrustArc%20Webinar%20FAQs.pdf' target='_blank' rel='noopener'>Click h
 ere</a> for answers to the most commonly asked webinar related questions.<
 /p>\n<p>#trustarcGDPRevents</p>\n</div>\n</div>\n</div>\n<p>Tickets: <a cl
 ass='ai1ec-ticket-url-exported' href='https://info.trustarc.com/managing-c
 onsents-legitimate-interests-under-gdpr.html'>https://info.trustarc.com/ma
 naging-consents-legitimate-interests-under-gdpr.html</a>.</p></BODY></HTML
 >
X-TICKETS-URL:https://info.trustarc.com/managing-consents-legitimate-intere
 sts-under-gdpr.html
X-INSTANT-EVENT:1
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2005@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:Internet Education Foundation\; https://www.neted.org/
DESCRIPTION:Tickets: https://www.eventbrite.com/e/carpenter-how-scotus-defi
 nes-constitutional-privacy-in-the-digital-age-tickets-46883379450.
DTSTART;TZID=America/New_York:20180629T120000
DTEND;TZID=America/New_York:20180629T130000
GEO:+38.887107;-77.010475
LOCATION:Rayburn House Office Bldg\, Room 2237 @ Rayburn House Office Build
 ing\, 45 Independence Ave SW\, Washington\, DC 20515\, USA
SEQUENCE:0
SUMMARY:Carpenter: How SCOTUS Defines Constitutional Privacy In The Digital
  Age- SCOTUS Tech
URL:https://privacycalendar.org/event/carpenter-scotus-defines-constitution
 al-privacy-digital-age-scotus-tech/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 018/06/scotus-tech-150x150.jpg\;150\;150\;1\,medium\;https://privacycalend
 ar.org/wp-content/uploads/2018/06/scotus-tech-300x72.jpg\;300\;72\;1\,larg
 e\;https://privacycalendar.org/wp-content/uploads/2018/06/scotus-tech-1024
 x246.jpg\;1024\;246\;1\,full\;https://privacycalendar.org/wp-content/uploa
 ds/2018/06/scotus-tech.jpg\;1272\;306\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2018/06/scotus-tech-300x72.jpg' width='300' height='72' />
 </div><p>Tickets: <a class='ai1ec-ticket-url-exported' href='https://www.e
 ventbrite.com/e/carpenter-how-scotus-defines-constitutional-privacy-in-the
 -digital-age-tickets-46883379450'>https://www.eventbrite.com/e/carpenter-h
 ow-scotus-defines-constitutional-privacy-in-the-digital-age-tickets-468833
 79450</a>.</p></BODY></HTML>
X-TICKETS-URL:https://www.eventbrite.com/e/carpenter-how-scotus-defines-con
 stitutional-privacy-in-the-digital-age-tickets-46883379450
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-1993@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:https://www.isaca.org/pages/default.aspx
DESCRIPTION:Tickets: https://zoom.us/meeting/register/02482c5c25d063997c24e
 00bf0acd2b8.
DTSTART;TZID=America/New_York:20180712T140000
SEQUENCE:0
SUMMARY:ISACA Cyber-Chats
URL:https://privacycalendar.org/event/isaca-cyber-chats/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 018/06/ISACA-150x150.png\;150\;150\;1\,medium\;https://privacycalendar.org
 /wp-content/uploads/2018/06/ISACA-300x105.png\;300\;105\;1\,large\;https:/
 /privacycalendar.org/wp-content/uploads/2018/06/ISACA-1024x358.png\;1024\;
 358\;1\,full\;https://privacycalendar.org/wp-content/uploads/2018/06/ISACA
 .png\;1200\;419\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2018/06/ISACA-300x105.png' width='300' height='105' /></di
 v><p>Tickets: <a class='ai1ec-ticket-url-exported' href='https://zoom.us/m
 eeting/register/02482c5c25d063997c24e00bf0acd2b8'>https://zoom.us/meeting/
 register/02482c5c25d063997c24e00bf0acd2b8</a>.</p></BODY></HTML>
X-TICKETS-URL:https://zoom.us/meeting/register/02482c5c25d063997c24e00bf0ac
 d2b8
X-INSTANT-EVENT:1
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2046@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:Georgetown Law\; https://www.law.georgetown.edu/privacy-technology-
 center/events/color-of-surveillance-2017/
DESCRIPTION:Across our country’s history – from the surveillance of the Sep
 aratists we now know as Pilgrims in 16th and 17th century England\, to fed
 eral house raids and interrogations of early Mormons in the Utah Territory
  in the 19th century\, to the 20thcentury surveillance of Jewish\, Muslim\
 , Quaker\, and Sikh communities\, to modern post-9/11 surveillance systems
  –government monitoring has long had a deep and disparate impact on Americ
 an religious minorities.\nThe Color of Surveillance: Government Monitoring
  of American Religious Minorities will trace that history\, and ask hard q
 uestions about what it means: Is modern surveillance consistent with the i
 ntentions of the American founders – or\, for that matter\, the events tha
 t precipitated the migration of English Separatists to the New World on th
 e Mayflower? Do modern counterterrorism initiatives appropriately protect 
 civil rights and civil liberties? How are local communities\, advocates\, 
 and artists responding to these challenges?\nNow in its third year\, The C
 olor of Surveillance\, organized by the Center on Privacy & Technology at 
 Georgetown Law\, convenes academic\, policy and government experts alongsi
 de local and community activists and artists. Prior speakers have included
  the Pulitzer-winning biographers of Martin Luther King\, Jr. and W.E.B. D
 uBois\, Guggenheim award-winning artists\, and the general counsel of the 
 Federal Bureau of Investigation.\n\nWelcome & Introduction to The Color of
  Surveillance: Government Monitoring of Religious Minorities\n8:45 – 9:00a
 m\nDean William Treanor\, Georgetown Law\nAlvaro Bedoya\, Center on Privac
 y & Technology at Georgetown Law\n\nElizabeth I to the Early 20th Century
 \n9:00 – 10:15am\n“Hunted”: 16th & 17th Century Surveillance of Pilgrims\n
 John Coffey\, University of Leicester\nIs the United States a Christian Na
 tion?\nBrooke Allen\, Bennington College\n“Mohammedan Barbarism”: The Camp
 aign Against Early Mormons\nJ. Spencer Fluhman\, Brigham Young University
 \nThe Military Intelligence Division and American Jews\nAlvaro Bedoya\, Ce
 nter on Privacy & Technology at Georgetown Law\nThe FBI and the Moorish Sc
 ience Temple of America\nSylvester A. Johnson\, Virginia Tech\n\nBREAK\n10
 :15 – 10:30am\n\n\nThe 1960s to the Aftermath of 9/11\n10:30 – 12:05pm\nJ.
  Edgar Hoover\, Black Clergy\, and Martin Luther King\, Jr.\nLerone A. Mar
 tin\, PhD\, Danforth Center on Religion and Politics at Washington Univers
 ity in St. Louis\nThe Feeling of Being Watched: A Filmmaker’s Response\nAs
 sia Boundaoui\, The Inverse Surveillance Project\nRabia Boundaoui\nXiangno
 ng (George) Wang (moderator)\, Center on Privacy & Technology at Georgetow
 n Law\nPost-9/11 Watchlists\nHina Shamsi\, ACLU National Security Project
 \nCommunity Reflections\nMembers of the Center for Media Justice’s Nationa
 l Delegation of MASA Community Activists\n\n\nLUNCH BREAK\n12:05 – 1:00pm
 \n\n\nLife in Affected Communities\n1:00 – 2:45pm\nA Conversation on Count
 ering Violent Extremism\nFaiza Patel\, Brennan Center for Justice\nAyaan D
 ahir\, Young Muslim Collective\nEric Rosand\, The Prevention Project\nWill
 iam Braniff\, START\, University of Maryland\nAlvaro Bedoya (moderator)\, 
 Center on Privacy & Technology at Georgetown Law\n“Mosque Crawlers” and th
 e Raza and Hassan cases\nAsad Dandia\, NYU Graduate Student\nFarhaj Hassan
 \, Muslims United For Justice\nLaura Moy (moderator)\, Center on Privacy &
  Technology at Georgetown Law\n“If they should come for us”: A Poet’s Resp
 onse\nFatimah Asghar\nRenata Barreto (moderator)\, Center on Privacy & Tec
 hnology at Georgetown Law\n\nBREAK\n2:45 – 3:00pm\n\n\nCommunity Action\n3
 :00 – 5:25pm\nOrganizing after Raza\nFahd Ahmed\, DRUM – Desis Rising Up &
  Moving\nStopping the Digital Muslim Ban: A Case Study\nRachel Levinson-Wa
 ldman\, Brennan Center for Justice\nNatasha Duarte\, Center for Democracy 
 & Technology\nYolanda C. Rondon\, American-Arab Anti-Discrimination Commit
 tee\nSteven Renderos\, Center for Media Justice\nHarrison Rudolph (moderat
 or)\, Center on Privacy & Technology at Georgetown Law\nOrganizing in Sili
 con Valley\nMaya Berry\, Arab American Institute\nMichelle Miller\, Cowork
 er.org\nJameson Spivack (moderator)\, Center on Privacy & Technology at Ge
 orgetown Law\nOrganizing Locally\nBrian Hofer\, Oakland Privacy\nReligious
  Surveillance and Intersectionality\nBrandi Collins-Dexter\, Color Of Chan
 ge\n“Stealth Wear”: An Artist’s Response\nAdam Harvey\n\nClosing Remarks\n
 5:25 – 5:30pm\nReception to follow in Hart lobby\n\n\nSpeakers:\n\nFahd Ah
 med of Desis Rising Up and Moving\, a grassroots organizer on the issues o
 f racial profiling\, immigrant justice\, and police accountability\nProfes
 sor Brooke Allen of Bennington College\, author of Moral Minority: Our Ske
 ptical Founding Fathers\, a New York Times notable book\nPoet Fatimah Asgh
 ar\, author of If They Come For Us & co-creator of the Emmy-nominated web 
 series Brown Girls\nWilliam Braniff of the National Consortium for the Stu
 dy of Terrorism and Responses to Terrorism (START)\, studies CVE and alter
 native counterterrorism approaches\nFilmmaker Assia Boundaoui\, director o
 f The Feeling of Being Watched\, a “riveting” account (New York Times) of 
 surveillance of a suburban Muslim community in the 1990s\nProfessor John C
 offey of the University of Leicester\, a scholar of Tudor and Stuart-era s
 urveillance of the Puritans we now know as Pilgrims\nBrandi Collins-Dexter
  of Color Of Change\, a civil rights advocate on media\, environmental jus
 tice\, and economic issues\nAyaan Dahir of the Minneapolis Young Muslims C
 ollective\, a Somali American youth leader and civil liberties advocate\nA
 sad Dandia\, M.A. candidate in Middle Eastern Studies at New York Universi
 ty and plaintiff in the Raza v. NYPD case\nNatasha Duarte of the Center fo
 r Democracy & Technology\, author of Mixed Messages: The Limits of Automat
 ed Social Media Analysis\nProfessor Spencer Fluhman of Brigham Young Unive
 rsity\, author of “An ‘American Mahomet’: Joseph Smith\, Mohammad\, and th
 e Problem of Prophets in Antebellum America”\nArtist Adam Harvey\, creator
  of Stealth Wear\, a clothing collection “inspired by traditional Islamic 
 dress… reimagined in the context of drone warfare”\nSyed Farhaj Hassan\, a
  Sergeant in the U.S. Army Reserve and lead plaintiff in the Hassan v. Cit
 y of New York case\nBrian Hofer of Oakland Privacy and the Privacy Advisor
 y Commission of the City of Oakland\, an advocate for local anti-surveilla
 nce legislation\nProfessor Sylvester Johnson of Virginia Tech’s Center for
  the Humanities\, co-editor of The FBI and Religion: Faith and National Se
 curity before and after 9/11\nRachel Levinson-Waldman of the Brennan Cente
 r for Justice\, co-coordinator of the Immigrant Surveillance Working Group
 \nProfessor Lerone Martin of the John C. Danforth Center on Religion and P
 olitics\, a scholar on the FBI’s mobilization of African American clergy t
 o discredit Dr. Martin Luther King\, Jr.\nMichelle Miller of coworker.org\
 , leading facilitator of tech sector employee activism and mobilization\nF
 aiza Patel of the Brennan Center for Justice\, author of an in-depth criti
 que of federal CVE programs\nSteven Renderos of the Center for Media Justi
 ce\, co-organizer of a grassroots petition to IBM opposing the company’s i
 nterest in ICE’s “Digital Muslim Ban”\nYolanda Rondon of the American-Arab
  Anti-Discrimination Committee\, a civil rights attorney critical of DHS s
 urveillance initiatives\nEric Rosand of the Prevention Project: Organizing
  Against Violent Extremism\, a non-resident Senior Fellow at Brookings\, a
 nd a former State Department senior CVE official\nHina Shamsi of the Ameri
 can Civil Liberties Union\, which is challenging watchlists as unfair and 
 discriminatory\n\nTickets: https://www.eventbrite.com/e/color-of-surveilla
 nce-government-monitoring-of-religious-minorities-tickets-44923937707?mc_e
 id=d57dc607c8&mc_cid=dc8261e2cf.
DTSTART;TZID=America/New_York:20180719T083000
DTEND;TZID=America/New_York:20180719T171500
GEO:+38.897891;-77.012792
LOCATION:Georgetown University Law Center @ 600 New Jersey Ave NW\, Washing
 ton\, DC 20001\, USA
SEQUENCE:0
SUMMARY:The Color of Surveillance: Government Monitoring of Religious Minor
 ities
URL:https://privacycalendar.org/event/color-surveillance-government-monitor
 ing-religious-minorities/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 018/07/Color-of-Surveillance-150x150.jpg\;150\;150\;1\,medium\;https://pri
 vacycalendar.org/wp-content/uploads/2018/07/Color-of-Surveillance-300x150.
 jpg\;300\;150\;1\,large\;https://privacycalendar.org/wp-content/uploads/20
 18/07/Color-of-Surveillance.jpg\;800\;400\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2018/07/Color-of-Surveillance-300x150.jpg' width='300' hei
 ght='150' /></div><p>Across our country’s history – from the surveillance 
 of the Separatists we now know as Pilgrims in 16th and 17th century Englan
 d\, to federal house raids and interrogations of early Mormons in the Utah
  Territory in the 19th century\, to the 20thcentury surveillance of Jewish
 \, Muslim\, Quaker\, and Sikh communities\, to modern post-9/11 surveillan
 ce systems –government monitoring has long had a deep and disparate impact
  on American religious minorities.</p>\n<p><em>The Color of Surveillance: 
 Government Monitoring of American Religious Minorities</em> will trace tha
 t history\, and ask hard questions about what it means: Is modern surveill
 ance consistent with the intentions of the American founders – or\, for th
 at matter\, the events that precipitated the migration of English Separati
 sts to the New World on the Mayflower? Do modern counterterrorism initiati
 ves appropriately protect civil rights and civil liberties? How are local 
 communities\, advocates\, and artists responding to these challenges?</p>
 \n<p>Now in its third year\, <em>The Color of Surveillance</em>\, organize
 d by the Center on Privacy & Technology at Georgetown Law\, convenes acade
 mic\, policy and government experts alongside local and community activist
 s and artists. Prior speakers have included the Pulitzer-winning biographe
 rs of Martin Luther King\, Jr. and W.E.B. DuBois\, Guggenheim award-winnin
 g artists\, and the general counsel of the Federal Bureau of Investigation
 .</p>\n<hr />\n<p><strong>Welcome & Introduction to <i>The Color of Survei
 llance: Government Monitoring of Religious Minorities<br />\n</i>8:45 – 9:
 00am</strong></p>\n<p>Dean William Treanor\, Georgetown Law<br />\nAlvaro 
 Bedoya\, Center on Privacy & Technology at Georgetown Law</p>\n<hr />\n<p>
 <strong>Elizabeth I to the Early 20th Century<br />\n9:00 – 10:15am</stron
 g></p>\n<p><strong>“Hunted”: 16th & 17th Century Surveillance of Pilgrims<
 /strong><br />\nJohn Coffey\, University of Leicester</p>\n<p><strong>Is t
 he United States a Christian Nation?</strong><br />\nBrooke Allen\, Bennin
 gton College</p>\n<p><strong>“Mohammedan Barbarism”: The Campaign Against 
 Early Mormons</strong><br />\nJ. Spencer Fluhman\, Brigham Young Universit
 y</p>\n<p><strong>The Military Intelligence Division and American Jews</st
 rong><br />\nAlvaro Bedoya\, Center on Privacy & Technology at Georgetown 
 Law</p>\n<p><strong>The FBI and the Moorish Science Temple of America</str
 ong><br />\nSylvester A. Johnson\, Virginia Tech</p>\n<hr />\n<p><strong>B
 REAK<br />\n10:15 – 10:30am</p>\n<p></strong></p>\n<hr />\n<p><strong>The 
 1960s to the Aftermath of 9/11<br />\n10:30 – 12:05pm</strong></p>\n<p><st
 rong>J. Edgar Hoover\, Black Clergy\, and Martin Luther King\, Jr.</strong
 ><br />\nLerone A. Martin\, PhD\, Danforth Center on Religion and Politics
  at Washington University in St. Louis</p>\n<p><strong><i>The Feeling of B
 eing Watched</i>: A Filmmaker’s Response</strong><br />\nAssia Boundaoui\,
  The Inverse Surveillance Project<br />\nRabia Boundaoui<br />\nXiangnong 
 (George) Wang (moderator)\, Center on Privacy & Technology at Georgetown L
 aw</p>\n<p><strong>Post-9/11 Watchlists</strong><br />\nHina Shamsi\, ACLU
  National Security Project</p>\n<p><strong>Community Reflections</strong><
 br />\nMembers of the Center for Media Justice’s National Delegation of MA
 SA Community Activists<strong></p>\n<p></strong></p>\n<hr />\n<p><strong>L
 UNCH BREAK<br />\n12:05 – 1:00pm</p>\n<p></strong></p>\n<hr />\n<p><strong
 >Life in Affected Communities<br />\n1:00 – 2:45pm</strong></p>\n<p><stron
 g>A Conversation on Countering Violent Extremism</strong><br />\nFaiza Pat
 el\, Brennan Center for Justice<br />\nAyaan Dahir\, Young Muslim Collecti
 ve<br />\nEric Rosand\, The Prevention Project<br />\nWilliam Braniff\, ST
 ART\, University of Maryland<br />\nAlvaro Bedoya (moderator)\, Center on 
 Privacy & Technology at Georgetown Law</p>\n<p><strong>“Mosque Crawlers” a
 nd the <em>Raza</em> and <em>Hassan</em> cases</strong><br />\nAsad Dandia
 \, NYU Graduate Student<br />\nFarhaj Hassan\, Muslims United For Justice<
 br />\nLaura Moy (moderator)\, Center on Privacy & Technology at Georgetow
 n Law</p>\n<p><strong>“If they should come for us”: A Poet’s Response</str
 ong><br />\nFatimah Asghar<br />\nRenata Barreto (moderator)\, Center on P
 rivacy & Technology at Georgetown Law</p>\n<hr />\n<p><strong>BREAK<br />
 \n2:45 – 3:00pm</p>\n<p></strong></p>\n<hr />\n<p><strong>Community Action
 <br />\n3:00 – 5:25pm</strong></p>\n<p><strong>Organizing after </strong><
 i><strong>Raza</strong><br />\n</i>Fahd Ahmed\, DRUM – Desis Rising Up & M
 oving</p>\n<p><strong>Stopping the Digital Muslim Ban: A Case Study</stron
 g><br />\nRachel Levinson-Waldman\, Brennan Center for Justice<br />\nNata
 sha Duarte\, Center for Democracy & Technology<br />\nYolanda C. Rondon\, 
 American-Arab Anti-Discrimination Committee<br />\nSteven Renderos\, Cente
 r for Media Justice<br />\nHarrison Rudolph (moderator)\, Center on Privac
 y & Technology at Georgetown Law</p>\n<p><strong>Organizing in Silicon Val
 ley</strong><br />\nMaya Berry\, Arab American Institute<br />\nMichelle M
 iller\, Coworker.org<br />\nJameson Spivack (moderator)\, Center on Privac
 y & Technology at Georgetown Law</p>\n<p><strong>Organizing Locally</stron
 g><br />\nBrian Hofer\, Oakland Privacy</p>\n<p><strong>Religious Surveill
 ance and Intersectionality</strong><br />\nBrandi Collins-Dexter\, Color O
 f Change</p>\n<p><strong>“Stealth Wear”: An Artist’s Response</strong><br 
 />\nAdam Harvey</p>\n<hr />\n<p><strong>Closing Remarks<br />\n5:25 – 5:30
 pm</strong><br />\n<em>Reception to follow in Hart lobby</p>\n<p></em></p>
 \n<hr />\n<p><strong>Speakers:</strong></p>\n<ul>\n<li><strong>Fahd Ahmed<
 /strong> of Desis Rising Up and Moving\, a grassroots organizer on the iss
 ues of racial profiling\, immigrant justice\, and police accountability</l
 i>\n<li>Professor <strong>Brooke Allen</strong> of Bennington College\, au
 thor of <em><a class='' href='https://www.nytimes.com/2006/10/22/books/rev
 iew/Will.t.html' target='_blank' rel='noopener noreferrer nofollow'>Moral 
 Minority: Our Skeptical Founding Fathers</a></em>\, a <em>New York Times</
 em> notable book</li>\n<li>Poet <strong>Fatimah Asghar</strong>\, author o
 f <em><a class='' href='https://www.poetryfoundation.org/poetrymagazine/po
 ems/92374/if-they-should-come-for-us' target='_blank' rel='noopener norefe
 rrer nofollow'>If They Come For Us</a></em> & co-creator of the Emmy-nomin
 ated web series <em>Brown Girls</em></li>\n<li><strong>William Braniff</st
 rong> of the National Consortium for the Study of Terrorism and Responses 
 to Terrorism (START)\, studies CVE and alternative counterterrorism approa
 ches</li>\n<li>Filmmaker <strong>Assia Boundaoui</strong>\, director of <e
 m><a class='' href='http://www.nybooks.com/daily/2018/04/21/the-fbis-vulga
 r-betrayal-of-muslim-americans/' target='_blank' rel='noopener noreferrer 
 nofollow'>The Feeling of Being Watched</a></em>\, a “riveting” account (<e
 m>New York Times</em>) of surveillance of a suburban Muslim community in t
 he 1990s</li>\n<li>Professor <strong>John Coffey</strong> of the Universit
 y of Leicester\, a scholar of Tudor and Stuart-era surveillance of the Pur
 itans we now know as Pilgrims</li>\n<li><strong>Brandi Collins-Dexter</str
 ong> of Color Of Change\, a civil rights advocate on media\, environmental
  justice\, and economic issues</li>\n<li><strong>Ayaan Dahir</strong> of t
 he Minneapolis Young Muslims Collective\, a Somali American youth leader a
 nd civil liberties advocate</li>\n<li><strong>Asad Dandia</strong>\, M.A. 
 candidate in Middle Eastern Studies at New York University and plaintiff i
 n the <em><a class='' href='https://www.aclu.org/blog/national-security/di
 scriminatory-profiling/i-was-muslim-teen-under-nypd-surveillance-now-i-hav
 e' target='_blank' rel='noopener noreferrer nofollow'>Raza v. NYPD</a></em
 > case</li>\n<li><strong>Natasha Duarte</strong> of the Center for Democra
 cy & Technology\, author of <em><a class='' href='https://cdt.org/insight/
 mixed-messages-the-limits-of-automated-social-media-content-analysis/' tar
 get='_blank' rel='noopener noreferrer nofollow'>Mixed Messages: The Limits
  of Automated Social Media Analysis</a></em></li>\n<li>Professor <strong>S
 pencer Fluhman</strong> of Brigham Young University\, author of “<a class=
 '' href='https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1055&c
 ontext=mormonhistory#page=32' target='_blank' rel='noopener noreferrer nof
 ollow'>An ‘American Mahomet’</a>: Joseph Smith\, Mohammad\, and the Proble
 m of Prophets in Antebellum America”</li>\n<li>Artist <strong>Adam Harvey<
 /strong>\, creator of <a class='' href='https://ahprojects.com/projects/st
 ealth-wear/' target='_blank' rel='noopener noreferrer nofollow'>Stealth We
 ar</a>\, a clothing collection “inspired by traditional Islamic dress… rei
 magined in the context of drone warfare”</li>\n<li><strong>Syed Farhaj Has
 san</strong>\, a Sergeant in the U.S. Army Reserve and lead plaintiff in t
 he <em><a class='' href='http://www.nj.com/news/index.ssf/2012/07/former_a
 merican_soldier_from_n.html' target='_blank' rel='noopener noreferrer nofo
 llow'>Hassan v. City of New York</a></em> case</li>\n<li><strong>Brian Hof
 er</strong> of Oakland Privacy and the Privacy Advisory Commission of the 
 City of Oakland\, an advocate for <a class='' href='https://www.deportice.
 org/blog/' target='_blank' rel='noopener noreferrer nofollow'>local anti-s
 urveillance legislation</a></li>\n<li>Professor <strong>Sylvester Johnson<
 /strong> of Virginia Tech’s Center for the Humanities\, co-editor of <a cl
 ass='' href='https://www.ucpress.edu/book/9780520287280/the-fbi-and-religi
 on' target='_blank' rel='noopener noreferrer nofollow'><em>The FBI and Rel
 igion: Faith and National Security before and after 9/11</em></a></li>\n<l
 i><strong>Rachel Levinson-Waldman</strong> of the Brennan Center for Justi
 ce\, co-coordinator of the Immigrant Surveillance Working Group</li>\n<li>
 Professor <strong>Lerone Martin</strong> of the John C. Danforth Center on
  Religion and Politics\, a scholar on the <a class='' href='http://rac.ucp
 ress.edu/content/28/1/1' target='_blank' rel='noopener noreferrer nofollow
 '>FBI’s mobilization of African American clergy</a> to discredit Dr. Marti
 n Luther King\, Jr.</li>\n<li><strong>Michelle Miller</strong> of <a class
 ='' href='http://coworker.org/' target='_blank' rel='noopener noreferrer n
 ofollow'>coworker.org</a>\, leading facilitator of tech sector employee ac
 tivism and mobilization</li>\n<li><strong>Faiza Patel</strong> of the Bren
 nan Center for Justice\, author of an in-depth <a class='' href='https://w
 ww.brennancenter.org/sites/default/files/publications/Brennan%20Center%20C
 VE%20Report.pdf' target='_blank' rel='noopener noreferrer nofollow'>critiq
 ue</a> of federal CVE programs</li>\n<li><strong>Steven Renderos</strong> 
 of the Center for Media Justice\, co-organizer of a grassroots <a class=''
  href='https://www.reuters.com/article/us-ibm-immigration/ibm-urged-to-avo
 id-working-on-extreme-vetting-of-u-s-immigrants-idUSKBN1DG1VT' target='_bl
 ank' rel='noopener noreferrer nofollow'>petition to IBM</a> opposing the c
 ompany’s interest in ICE’s “Digital Muslim Ban”</li>\n<li><strong>Yolanda 
 Rondon </strong>of the American-Arab Anti-Discrimination Committee\, a civ
 il rights attorney critical of DHS surveillance initiatives</li>\n<li><str
 ong>Eric Rosand </strong>of the Prevention Project: Organizing Against Vio
 lent Extremism\, a non-resident Senior Fellow at Brookings\, and a former 
 State Department senior CVE official</li>\n<li><strong>Hina Shamsi</strong
 > of the American Civil Liberties Union\, which is challenging watchlists 
 as unfair and discriminatory</li>\n</ul>\n<p>Tickets: <a class='ai1ec-tick
 et-url-exported' href='https://www.eventbrite.com/e/color-of-surveillance-
 government-monitoring-of-religious-minorities-tickets-44923937707?mc_eid=d
 57dc607c8&mc_cid=dc8261e2cf'>https://www.eventbrite.com/e/color-of-surveil
 lance-government-monitoring-of-religious-minorities-tickets-44923937707?mc
 _eid=d57dc607c8&mc_cid=dc8261e2cf</a>.</p></BODY></HTML>
X-TICKETS-URL:https://www.eventbrite.com/e/color-of-surveillance-government
 -monitoring-of-religious-minorities-tickets-44923937707?mc_eid=d57dc607c8&
 mc_cid=dc8261e2cf
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-1987@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:https://www.fatconference.org/2019/cfp.html
DESCRIPTION:Submission site: TBD\nAbstract Deadline: pre-registration at 11
 :59PM August 16\, 2018 AoE\nFull paper submission: 11:59PM August 23\, 201
 8 AoE\nNotification Date: October 12\, 2018\nConference Date: late January
 /early February 2019
DTSTART;TZID=America/New_York:20180816T115900
DTEND;TZID=America/New_York:20180823T235900
SEQUENCE:0
SUMMARY:FAT 2019 Call for Papers
URL:https://privacycalendar.org/event/fat-2019-call-papers/
X-COST-TYPE:free
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 018/06/FAT-Conference-150x150.jpg\;150\;150\;1\,medium\;https://privacycal
 endar.org/wp-content/uploads/2018/06/FAT-Conference.jpg\;240\;240\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2018/06/FAT-Conference.jpg' width='240' height='240' /></d
 iv><p>Submission site: TBD</p>\n<p>Abstract Deadline: pre-registration at 
 11:59PM August 16\, 2018 AoE</p>\n<p>Full paper submission: 11:59PM August
  23\, 2018 AoE</p>\n<p>Notification Date: October 12\, 2018</p>\n<p>Confer
 ence Date: late January/early February 2019</p>\n</BODY></HTML>
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2107@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:networkedprivacycscw2018@gmail.com
DESCRIPTION:This site contains information related to the 2018 workshop on 
 networked privacy. This year’s workshop\, being held at CSCW in Jersey Cit
 y on November 3rd\, is titled\, “Privacy in Context: Critically Engaging w
 ith Theory to Guide Privacy Research and Design.”\nPrivacy has been a key 
 research theme in the CSCW and HCI communities\, but the term is often use
 d in an ad hoc and fragmented way. This is likely due to the fact that pri
 vacy is a complex and multi-faceted concept. This one-day workshop will fa
 cilitate discourse around key privacy theories and frameworks that can inf
 orm privacy research with the goal of producing guidelines for privacy res
 earchers on how and when to incorporate which theories into various aspect
 s of their empirical privacy research. This will lay the groundwork to mov
 e the privacy field forward. To inspire participants and spark discussion\
 , we will have a special keynote speaker\, Dr. Helen Nissenbaum\, engage w
 ith the audience about her renowned Contextual Integrity framework. Dr. Ni
 ssenbaum is a Professor of Information Science at Cornell Tech and her fra
 mework focuses on understanding privacy expectations and their implication
 s.\nImportant Dates\n\nSubmission Deadline: August 31\, 2018 (Late submiss
 ions will be accepted through September 24th\, 2018)\nSubmission Notificat
 ions: September 9\, 2018\nCamera-ready Deadline: September 28\, 2018\nDate
  of Workshop: November 3\, 2018\n\nHow to Participate\nWe seek participant
 s from various domains for a multidisciplinary workshop to\nshare their kn
 owledge and views of both the theory and design of privacy. Submission for
 mat is as follows:\n\nPosition Paper: A 2 to 4 page position paper in CHI 
 extended abstracts format that address the workshop themes and highlighted
  topics provided in the call. (References not included in page limit).\n\n
 Papers will be peer-reviewed\, and submissions will be accepted based on t
 he relevance and development of their chosen topic\, as well as their pote
 ntial to contribute to the workshop discussions and goals. Topics of inter
 est include\, but are not limited to:\n\nIdentification of relevant privac
 y theories\nEmpirical studies that incorporate privacy theories\nMethodolo
 gical considerations for incorporating privacy theories into empirical res
 earch\nImplementing privacy theories in collaborative systems’ design\n\nH
 ow To Submit\n\nPosition papers should be sent to networkedprivacycscw2018
 @gmail.com before or on August 31\, 2018 11:59 PM Pacific Standard Time.\n
 \nSubmissions will be peer-reviewed by the workshop’s program committee. A
 cceptance decisions will be sent out by September 9\, 2018 and camera-read
 y versions due at the end of September and will be made available on the w
 orkshop website.\nNOTE: At least one author of each accepted position pape
 r must attend the workshop and all participants must register for both the
  workshop and for at least one day of the conference.\nContact\nFinal subm
 issions and questions about the workshop should be sent to networkedprivac
 ycscw2018@gmail.com.
DTSTART;TZID=America/New_York:20180831T235900
SEQUENCE:0
SUMMARY:Call for Participation: Privacy in Context: Critically Engaging wit
 h Theory to Guide Privacy Research and Design
URL:https://privacycalendar.org/event/call-participation-privacy-context-cr
 itically-engaging-theory-guide-privacy-research-design/
X-COST-TYPE:free
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 018/08/CSCW-150x150.jpg\;150\;150\;1\,medium\;https://privacycalendar.org/
 wp-content/uploads/2018/08/CSCW.jpg\;240\;240\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2018/08/CSCW.jpg' width='240' height='240' /></div><p>This
  site contains information related to the 2018 workshop on networked priva
 cy. This year’s workshop\, being held at <strong>CSCW in Jersey City on No
 vember 3rd</strong>\, is titled\, “Privacy in Context: Critically Engaging
  with Theory to Guide Privacy Research and Design.”</p>\n<p>Privacy has be
 en a key research theme in the CSCW and HCI communities\, but the term is 
 often used in an ad hoc and fragmented way. This is likely due to the fact
  that privacy is a complex and multi-faceted concept. This one-day worksho
 p will facilitate discourse around key privacy theories and frameworks tha
 t can inform privacy research with the goal of producing guidelines for pr
 ivacy researchers on how and when to incorporate which theories into vario
 us aspects of their empirical privacy research. This will lay the groundwo
 rk to move the privacy field forward. To inspire participants and spark di
 scussion\, we will have a special keynote speaker\, <a href='https://netwo
 rkedprivacycscw2018.wordpress.com/keynote-speaker/'>Dr. Helen Nissenbaum</
 a>\, engage with the audience about her renowned Contextual Integrity fram
 ework. Dr. Nissenbaum is a Professor of Information Science at Cornell Tec
 h and her framework focuses on understanding privacy expectations and thei
 r implications.</p>\n<h2>Important Dates</h2>\n<ul>\n<li><strong>Submissio
 n Deadline</strong>: August 31\, 2018 (Late submissions will be accepted t
 hrough September 24th\, 2018)</li>\n<li><strong>Submission Notifications</
 strong>: September 9\, 2018</li>\n<li><strong>Camera-ready Deadline</stron
 g>: September 28\, 2018</li>\n<li><strong>Date of Workshop</strong>: Novem
 ber 3\, 2018</li>\n</ul>\n<h2>How to Participate</h2>\n<p>We seek particip
 ants from various domains for a multidisciplinary workshop to<br />\nshare
  their knowledge and views of both the theory and design of privacy. Submi
 ssion format is as follows:</p>\n<ul>\n<li><strong>Position Paper</strong>
 : A 2 to 4 page position paper in <a href='https://chi2018.acm.org/chi-pro
 ceedings-format/' target='_blank' rel='noopener'>CHI extended abstracts fo
 rmat</a> that address the workshop themes and highlighted topics provided 
 in the call. (References not included in page limit).</li>\n</ul>\n<p>Pape
 rs will be peer-reviewed\, and submissions will be accepted based on the r
 elevance and development of their chosen topic\, as well as their potentia
 l to contribute to the workshop discussions and goals. Topics of interest 
 include\, but are not limited to:</p>\n<ul>\n<li>Identification of relevan
 t privacy theories</li>\n<li>Empirical studies that incorporate privacy th
 eories</li>\n<li>Methodological considerations for incorporating privacy t
 heories into empirical research</li>\n<li>Implementing privacy theories in
  collaborative systems’ design</li>\n</ul>\n<h2>How To Submit</h2>\n<ul>\n
 <li>Position papers should be sent to <a href='mailto:networkedprivacycscw
 20187@gmail.com' target='_blank' rel='noopener'>networkedprivacycscw2018@g
 mail.com</a> before or on August 31\, 2018 11:59 PM Pacific Standard Time.
 </li>\n</ul>\n<p>Submissions will be peer-reviewed by the workshop’s <a hr
 ef='https://networkedprivacycscw2018.wordpress.com/committe/'>program comm
 ittee</a>. Acceptance decisions will be sent out by September 9\, 2018 and
  camera-ready versions due at the end of September and will be made availa
 ble on the workshop website.</p>\n<p><strong>NOTE</strong>: At least one a
 uthor of each accepted position paper must attend the workshop and all par
 ticipants must register for both the workshop and for at least one day of 
 the conference.</p>\n<h2>Contact</h2>\n<p>Final submissions and questions 
 about the workshop should be sent to <a href='mailto:networkedprivacycscw2
 018@gmail.com' target='_blank' rel='noopener'>networkedprivacycscw2018@gma
 il.com</a>.</p>\n</BODY></HTML>
X-INSTANT-EVENT:1
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2003@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:CPDP\; http://www.cpdpconferences.org/
DESCRIPTION:Deadline for submissions: Sunday 1 October 2018 (23:59 CET)\nNo
 tification to authors: Monday 3 December 2018\nSubmit papers to: https://e
 asychair.org/account/signin.cgi?key=73289956.qcZYoOQbJbUJgoKs
DTSTART;TZID=America/New_York:20181001T235900
SEQUENCE:0
SUMMARY:Call for Papers CPDP2019 – Data Protection and Democracy
URL:https://privacycalendar.org/event/call-papers-cpdp2019-data-protection-
 democracy/
X-COST-TYPE:free
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 018/06/CPDP2019-150x150.jpg\;150\;150\;1\,medium\;https://privacycalendar.
 org/wp-content/uploads/2018/06/CPDP2019-300x300.jpg\;300\;300\;1\,large\;h
 ttps://privacycalendar.org/wp-content/uploads/2018/06/CPDP2019.jpg\;400\;4
 00\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2018/06/CPDP2019-300x300.jpg' width='300' height='300' /><
 /div><blockquote><p>Deadline for submissions: Sunday 1 October 2018 (23:59
  CET)</p></blockquote>\n<blockquote><p>Notification to authors: Monday 3 D
 ecember 2018</p></blockquote>\n<blockquote><p>Submit papers to: https://ea
 sychair.org/account/signin.cgi?key=73289956.qcZYoOQbJbUJgoKs</p></blockquo
 te>\n</BODY></HTML>
X-INSTANT-EVENT:1
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2291@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:https://www.wirewheel.io/what-you-need-to-know-about-the-california
 -consumer-privacy-act/?utm_medium=social&utm_source=linkedin&utm_campaign=
 20190128-ccpa-webinar
DESCRIPTION:The California Consumer Privacy Act (CCPA): An Introduction by 
 its Author and Leading Technologists\nIn this webinar\, you will learn:\n
 \nWhat the key provisions of the law mean to you and your customers:\n\n“R
 ight to Know”\n“Right to Say No”\n“Right to Have Data Kept Safe”\n\n\nHow 
 existing and forthcoming technologies make it possible to achieve the inte
 nt of the CCPA\nHow to build a data privacy culture within your enterprise
 \n\nHosted by:\nAlastair Mactaggart\, Chairman\, Californians for Consumer
  Privacy\nJustin Antonipillai\, Privacy Expert & CEO\, WireWheel\nJohn Ack
 erly\, Security Expert & CEO\, Virtru\nJocelyn Aqua\, Principal\, Regulato
 ry Privacy & Cybersecurity\, PwC\nWebinar Summary:\n\nIn celebration of Da
 ta Privacy Day\, “an international effort to empower individuals and busin
 esses to respect privacy\, safeguard data and enable trust\,” please join 
 us in a webinar where we will discuss the California Consumer Privacy Act 
 (CCPA)\, a landmark piece of legislation designed to increase consumer rig
 hts over personal information\, establish that privacy is a human right\, 
 and set the minimum bar for national privacy regulations.\nThis will be th
 e first in a series of webinars to help educate consumers and businesses a
 bout the CCPA\, how to get ready for it\, and to understand that the CCPA 
 will ultimately protect a fundamental human right\, while still enabling a
 nd promoting innovation and the growth of small and medium-sized businesse
 s and large enterprises.\nThe CCPA is set to go into effect on January 1\,
  2020 and will help people regain ownership and control over their persona
 l information while helping businesses establish trust by ensuring they sa
 feguard people’s personal information.\nAlastair Mactaggart\, the Californ
 ians for Consumer Privacy Chairman and a force behind the CCPA\, along wit
 h Justin Antonipillai\, the founder and CEO of WireWheel\, and John Ackerl
 y\, the founder and CEO of Virtru\, will discuss the key sections of the C
 CPA and how technologies\, like those developed by WireWheel and Virtru\, 
 are making it possible for the CCPA to fully achieve its vision and goals.
DTSTART;TZID=America/New_York:20190128T130000
DTEND;TZID=America/New_York:20190128T141500
SEQUENCE:0
SUMMARY:National Data Privacy Day Webinar: WireWheel on the CCPA
URL:https://privacycalendar.org/event/national-data-privacy-day-webinar-wir
 ewheel-ccpa/
X-COST-TYPE:free
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><h3>The Californ
 ia Consumer Privacy Act (CCPA): An Introduction by its Author and Leading 
 Technologists</h3>\n<h4>In this webinar\, you will learn:</h4>\n<ul>\n<li>
 What the key provisions of the law mean to you and your customers:\n<ul>\n
 <li>“Right to Know”</li>\n<li>“Right to Say No”</li>\n<li>“Right to Have D
 ata Kept Safe”</li>\n</ul>\n</li>\n<li>How existing and forthcoming techno
 logies make it possible to achieve the intent of the CCPA</li>\n<li>How to
  build a data privacy culture within your enterprise</li>\n</ul>\n<h4>Host
 ed by:</h4>\n<p><strong>Alastair Mactaggart</strong>\, Chairman\, Californ
 ians for Consumer Privacy<br />\n<strong>Justin Antonipillai</strong>\, Pr
 ivacy Expert & CEO\, WireWheel<br />\n<strong>John Ackerly</strong>\, Secu
 rity Expert & CEO\, Virtru<br />\n<strong>Jocelyn Aqua</strong>\, Principa
 l\, Regulatory Privacy & Cybersecurity\, PwC</p>\n<p>Webinar Summary:</p>
 \n<ul>\n<li>In celebration of Data Privacy Day\, “an international effort 
 to empower individuals and businesses to respect privacy\, safeguard data 
 and enable trust\,” please join us in a webinar where we will discuss the 
 California Consumer Privacy Act (CCPA)\, a landmark piece of legislation d
 esigned to increase consumer rights over personal information\, establish 
 that privacy is a human right\, and set the minimum bar for national priva
 cy regulations.</li>\n<li>This will be the first in a series of webinars t
 o help educate consumers and businesses about the CCPA\, how to get ready 
 for it\, and to understand that the CCPA will ultimately protect a fundame
 ntal human right\, while still enabling and promoting innovation and the g
 rowth of small and medium-sized businesses and large enterprises.</li>\n<l
 i>The CCPA is set to go into effect on January 1\, 2020 and will help peop
 le regain ownership and control over their personal information while help
 ing businesses establish trust by ensuring they safeguard people’s persona
 l information.</li>\n<li>Alastair Mactaggart\, the Californians for Consum
 er Privacy Chairman and a force behind the CCPA\, along with Justin Antoni
 pillai\, the founder and CEO of WireWheel\, and John Ackerly\, the founder
  and CEO of Virtru\, will discuss the key sections of the CCPA and how tec
 hnologies\, like those developed by WireWheel and Virtru\, are making it p
 ossible for the CCPA to fully achieve its vision and goals.</li>\n</ul>\n<
 /BODY></HTML>
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2312@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:Future of Privacy Forum\; (202) 768-8950\; https://fpf.org/
DESCRIPTION:FPF’s monthly Privacy Landscape call is scheduled for next Tues
 day\, Feb. 19\, 2019 from 4pm-5pm ET. \nThe call will focus on state priva
 cy legislation\, with particular attention paid to the California Consumer
  Privacy Act and Senator Carlyle’s consumer privacy bill in Washington Sta
 te.  We expect a robust discussion and will set aside plenty of time for Q
 &A.  \nWe are fortunate to be joined by Jim Halpert\, Co-Chair of DLA Pipe
 r’s Global Data Protection\, Privacy and Security Practice and Alex Alben\
 , Washington State’s Chief Privacy Officer. Jim is a trusted voice in innu
 merable state privacy discussions. Alex has deep insight into the ongoing 
 process re: the proposed Washington Privacy Act\, including the just-publi
 shed substitute bill.\nResources:\nCalifornia Consumer Privacy Act – https
 ://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180
 AB375&search_keywords=California+Consumer+Privacy+Act+of+2018\nWashington 
 State consumer privacy bill – http://lawfilesext.leg.wa.gov/biennium/2019-
 20/Pdf/Bills/Senate%20Bills/5376.pdf\nDial-in info for US callers and comm
 only requested international numbers are below.  If you need an additional
  country-specific dial-in\, please let me know.\nWe look forward to hearin
 g from everyone – it promises to be a great call!\nDial-in info:\nUS Dial-
 In: 1 (888) 545-0687\nPasscode: 5784 622#\nBelgium: 0800 389 15\nFrance: 0
 805 102 857\nGermany: 0800 222 2013\nIreland: 1800 936 220\nIsrael: 1809 2
 12 583\nItaly: 800 906 150\nNetherlands: 0800 0200 273\nPoland 0 0800 121 
 34 45\nUK: 0808 238 9856
DTSTART;TZID=America/New_York:20190219T160000
DTEND;TZID=America/New_York:20190219T170000
SEQUENCE:0
SUMMARY:FPF Privacy Landscape Call
URL:https://privacycalendar.org/event/fpf-privacy-landscape-call/
X-COST-TYPE:free
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p>FPF’s monthly
  Privacy Landscape call is scheduled for next Tuesday\, Feb. 19\, 2019 fro
 m 4pm-5pm ET. </p>\n<p>The call will focus on state privacy legislation\, 
 with particular attention paid to the California Consumer Privacy Act and 
 Senator Carlyle’s consumer privacy bill in Washington State.  We expect a 
 robust discussion and will set aside plenty of time for Q&A.  </p>\n<p>We 
 are fortunate to be joined by Jim Halpert\, Co-Chair of DLA Piper’s Global
  Data Protection\, Privacy and Security Practice and Alex Alben\, Washingt
 on State’s Chief Privacy Officer. Jim is a trusted voice in innumerable st
 ate privacy discussions. Alex has deep insight into the ongoing process re
 : the proposed Washington Privacy Act\, including the just-published subst
 itute bill.</p>\n<p>Resources:<br />\nCalifornia Consumer Privacy Act – ht
 tps://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720
 180AB375&search_keywords=California+Consumer+Privacy+Act+of+2018<br />\nWa
 shington State consumer privacy bill – http://lawfilesext.leg.wa.gov/bienn
 ium/2019-20/Pdf/Bills/Senate%20Bills/5376.pdf<br />\nDial-in info for US c
 allers and commonly requested international numbers are below.  If you nee
 d an additional country-specific dial-in\, please let me know.</p>\n<p>We 
 look forward to hearing from everyone – it promises to be a great call!</p
 >\n<p>Dial-in info:<br />\nUS Dial-In: 1 (888) 545-0687<br />\nPasscode: 5
 784 622#</p>\n<p>Belgium: 0800 389 15<br />\nFrance: 0805 102 857<br />\nG
 ermany: 0800 222 2013<br />\nIreland: 1800 936 220<br />\nIsrael: 1809 212
  583<br />\nItaly: 800 906 150<br />\nNetherlands: 0800 0200 273<br />\nPo
 land 0 0800 121 34 45<br />\nUK: 0808 238 9856  </p>\n</BODY></HTML>
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2379@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:Future of Privacy Forum\; www.fpf.org
DESCRIPTION:FPF’s monthly Privacy Landscape call is scheduled for NEXT TUES
 DAY\, May 21\, 2019 from 4pm-5pm ET.\nFPF staff and Tanya Forsheit (Chair 
 of Frankfurt Kurnit’s Privacy & Data Security Group) will provide an updat
 e and opportunity to discuss the status of proposed amendments to the Cali
 fornia Consumer Privacy Act (CCPA).\nWe are also fortunate to be joined by
  Ashwin Machanavajjhala\, (Associate Professor\, Director of Graduate Stud
 ies\, Department of Computer Science\, Duke University). Prof. Machanavajj
 hala will describe and discuss his work regarding Ektelo: an open source f
 ramework for defining differentially private computation.\nPlease note: th
 e presentation will be useful to privacy and compliance experts\, but will
  be of particular interest to technical members of your organization’s tea
 m. Please invite interested technologists from your organization to join t
 he call!\nResources:\nEktelo: A framework for defining deferentially priva
 te computation\nDial-in info for US callers and commonly requested interna
 tional numbers are below. If you need an additional country-specific dial-
 in\, please let me know.\nWe look forward to hearing from everyone – it pr
 omises to be a great call!\nDial-in info:\nUS Dial-In: 1 (888) 545-0687 or
  1 (630) 691-2764\nPasscode: 8180 550#\nBelgium: 0800 389 15\nFrance: 0805
  102 857\nGermany: 0800 222 2013\nIreland: 1800 936 220\nIsrael: 1809 212 
 583\nItaly: 800 906 150\nNetherlands: 0800 0200 273\nPoland 0 0800 121 34 
 45\nUK: 0808 238 9856
DTSTART;TZID=America/New_York:20190521T160000
DTEND;TZID=America/New_York:20190521T170000
SEQUENCE:0
SUMMARY:FPF Monthly Privacy Landscape Call
URL:https://privacycalendar.org/event/fpf-monthly-privacy-landscape-calll/
X-COST-TYPE:free
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p>FPF’s monthly
  Privacy Landscape call is scheduled for NEXT TUESDAY\, May 21\, 2019 from
  4pm-5pm ET.</p>\n<p>FPF staff and Tanya Forsheit (Chair of Frankfurt Kurn
 it’s Privacy & Data Security Group) will provide an update and opportunity
  to discuss the status of proposed amendments to the California Consumer P
 rivacy Act (CCPA).</p>\n<p>We are also fortunate to be joined by Ashwin Ma
 chanavajjhala\, (Associate Professor\, Director of Graduate Studies\, Depa
 rtment of Computer Science\, Duke University). Prof. Machanavajjhala will 
 describe and discuss his work regarding Ektelo: an open source framework f
 or defining differentially private computation.</p>\n<p>Please note: the p
 resentation will be useful to privacy and compliance experts\, but will be
  of particular interest to technical members of your organization’s team. 
 Please invite interested technologists from your organization to join the 
 call!</p>\n<p>Resources:<br />\nEktelo: A framework for defining deferenti
 ally private computation<br />\nDial-in info for US callers and commonly r
 equested international numbers are below. If you need an additional countr
 y-specific dial-in\, please let me know.</p>\n<p>We look forward to hearin
 g from everyone – it promises to be a great call!</p>\n<p>Dial-in info:<br
  />\nUS Dial-In: 1 (888) 545-0687 or 1 (630) 691-2764<br />\nPasscode: 818
 0 550#</p>\n<p>Belgium: 0800 389 15<br />\nFrance: 0805 102 857<br />\nGer
 many: 0800 222 2013<br />\nIreland: 1800 936 220<br />\nIsrael: 1809 212 5
 83<br />\nItaly: 800 906 150<br />\nNetherlands: 0800 0200 273<br />\nPola
 nd 0 0800 121 34 45<br />\nUK: 0808 238 9856</p>\n</BODY></HTML>
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2387@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:Stacy Martin\; privacy-events@mozilla.org\; https://www.eventbrite.
 com/e/may-privacy-lab-privacy-authors-panel-tickets-60959863593
DESCRIPTION:The May iteration of Privacy Lab will be a privacy author round
 -table hosted by the Interdisciplinary Research Group on Privacy at Berkel
 ey (IRGP). The event will bring together prominent authors of privacy book
 s who will discuss their work and privacy more generally.\n\nFor the first
  time\, Privacy Lab will be coordinated with the annual Privacy Law Schola
 rs Conference (PLSC). The PLSC 2019\, organized jointly by Berkeley Center
  For Law & Technology and the George Washington University Law School\, as
 sembles a wide array of privacy law scholars and practitioners from around
  the world to discuss current issues and foster greater connections betwee
 n academia and practice.\n\nThe PLSC brings together privacy law scholars\
 , privacy scholars from other disciplines (economics\, philosophy\, politi
 cal science\, computer science)\, and practitioners (industry\, legal\, ad
 vocacy\, and government).\n\n\nFood: Light refreshments and beverages will
  be served.\n\nVideo: The event will be recorded for remote attendees.\n\n
 Confirmed Authors:\n\nSarah Igo – author of The Known Citizen: A History o
 f Privacy in Modern America\, Faculty member at Vanderbilt.\n\nJames Rule 
 – author of Privacy in Peril\, sociologist and writer based in Berkeley.\n
 \nDenise Anthony – author of the article “Towards a Sociology of Privacy.”
 \n\nDanielle Citron – author of Hate Crimes in Cyberspace\, among other wo
 rks.\n\nModerator: Naniette Coleman\n\nTickets: https://www.eventbrite.com
 /e/may-privacy-lab-privacy-authors-panel-tickets-60959863593.
DTSTART;TZID=America/New_York:20190530T180000
DTEND;TZID=America/New_York:20190530T200000
GEO:+37.875026;-122.258805
LOCATION:The Blum Center at UC Berkeley\, Room 100 @ Blum Hall\, Berkeley\,
  CA 94709\, USA
SEQUENCE:0
SUMMARY:May Privacy Lab – Privacy Authors Panel
URL:https://privacycalendar.org/event/may-privacy-lab-privacy-authors-panel
 /
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 019/05/https___cdn.evbuc_.com_images_61277580_51105803850_1_original-150x1
 50.jpg\;150\;150\;1\,medium\;https://privacycalendar.org/wp-content/upload
 s/2019/05/https___cdn.evbuc_.com_images_61277580_51105803850_1_original-30
 0x150.jpg\;300\;150\;1\,large\;https://privacycalendar.org/wp-content/uplo
 ads/2019/05/https___cdn.evbuc_.com_images_61277580_51105803850_1_original.
 jpg\;800\;400\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2019/05/https___cdn.evbuc_.com_images_61277580_51105803850
 _1_original-300x150.jpg' width='300' height='150' /></div><div>The May ite
 ration of Privacy Lab will be a privacy author round-table hosted by the I
 nterdisciplinary Research Group on Privacy at Berkeley (IRGP). The event w
 ill bring together prominent authors of privacy books who will discuss the
 ir work and privacy more generally.</div>\n<div></div>\n<div>For the first
  time\, Privacy Lab will be coordinated with the annual Privacy Law Schola
 rs Conference (PLSC). The PLSC 2019\, organized jointly by Berkeley Center
  For Law & Technology and the George Washington University Law School\, as
 sembles a wide array of privacy law scholars and practitioners from around
  the world to discuss current issues and foster greater connections betwee
 n academia and practice.</div>\n<div></div>\n<div>The PLSC brings together
  privacy law scholars\, privacy scholars from other disciplines (economics
 \, philosophy\, political science\, computer science)\, and practitioners 
 (industry\, legal\, advocacy\, and government).</div>\n<div></div>\n<div>
 \n<div>Food: Light refreshments and beverages will be served.</div>\n<div>
 </div>\n<div>Video: The event will be recorded for remote attendees.</div>
 \n<div></div>\n<div>Confirmed Authors:</div>\n<div></div>\n<div><a href='h
 ttps://as.vanderbilt.edu/history/bio/sarah-igo' target='_blank' rel='nofol
 low noopener noreferrer'>Sarah Igo</a> – author of <a href='http://www.hup
 .harvard.edu/catalog.php?isbn=9780674737501' target='_blank' rel='nofollow
  noopener noreferrer'>The Known Citizen</a>: A History of Privacy in Moder
 n America\, Faculty member at Vanderbilt.</div>\n<div></div>\n<div><a href
 ='http://www.jamesbrule.net/' target='_blank' rel='nofollow noopener noref
 errer'>James Rule</a> – author of <a href='https://www.oxfordscholarship.c
 om/view/10.1093/acprof:oso/9780195307832.001.0001/acprof-9780195307832' ta
 rget='_blank' rel='nofollow noopener noreferrer'>Privacy in Peril</a>\, so
 ciologist and writer based in Berkeley.</div>\n<div></div>\n<div><a href='
 https://sph.umich.edu/faculty-profiles/anthony-denise.html' target='_blank
 ' rel='nofollow noopener noreferrer'>Denise Anthony</a> – author of the ar
 ticle “Towards a Sociology of Privacy.”</div>\n<div></div>\n<div><a href='
 http://www.daniellecitron.com/' target='_blank' rel='nofollow noopener nor
 eferrer'>Danielle Citron</a> – author of <a href='http://www.hup.harvard.e
 du/catalog.php?isbn=9780674659902' target='_blank' rel='nofollow noopener 
 noreferrer'>Hate Crimes in Cyberspace</a>\, among other works.</div>\n<div
 ></div>\n<div>Moderator: Naniette Coleman</div>\n</div>\n<p>Tickets: <a cl
 ass='ai1ec-ticket-url-exported' href='https://www.eventbrite.com/e/may-pri
 vacy-lab-privacy-authors-panel-tickets-60959863593'>https://www.eventbrite
 .com/e/may-privacy-lab-privacy-authors-panel-tickets-60959863593</a>.</p><
 /BODY></HTML>
X-TICKETS-URL:https://www.eventbrite.com/e/may-privacy-lab-privacy-authors-
 panel-tickets-60959863593
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2393@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:Future of Privacy Forum\; sgray@fpf.org\; https://www.eventbrite.co
 m/e/roundtable-discussion-with-dr-johnny-ryan-the-future-of-ad-tech-regist
 ration-62056389331
DESCRIPTION:Future of Privacy Forum (FPF) invites you to join us on Friday\
 , June 7th\, 2019 for a roundtable discussion with Dr. Johnny Ryan\, Chief
  Policy & Industry Relations Officer for Brave Software\, to discuss The F
 uture of Ad Tech – Emerging Business Models and Designing for Privacy.\nPr
 ior to joining Brave Software\, Dr. Ryan was Head of Ecosystem for PageFai
 r\, and Chief Innovation Officer of The Irish Times. In recent years\, he 
 has been a prominent privacy advocate in the EU\, working with digital rig
 hts organizations to file formal complaints with regulators in the UK\, Ir
 eland\, Spain\, the Netherlands\, Belgium\, and Luxembourg\, related to ad
 vocates’ concerns about the Ad Tech industry and current real-time bidding
  (RTB) practices (read the primary regulatory complaint here). More recent
 ly\, Dr. Ryan testified before the U.S. Senate Judicary Committee in a May
  21st hearing\, “Understanding the Digital Advertising Ecosystem and the I
 mpact of Data Privacy and Competition Policy.” (Watch the hearing)\nThe di
 scussion will be moderated by Stacey Gray\, Senior Counsel at the Future o
 f Privacy Forum.\nWe will discuss with the group:\n\nWhat does the future 
 hold for alternative Ad Tech business models\, including blockchain and at
 tention-based models such as the Brave Attention Token (BAT)?\nWhat does e
 ngineering for privacy\, or “privacy by design\,” mean in the context of a
 dvertising technology?\nWhat’s on the horizon for Ad Tech in Europe?\n& an
 y other questions you have — please feel free to send your questions ahead
  of time.\n\nLunch will be provided.\n** Invitation only — Limit 1 per org
 anization & non-transferable. **\nTickets: https://www.eventbrite.com/e/ro
 undtable-discussion-with-dr-johnny-ryan-the-future-of-ad-tech-registration
 -62056389331.
DTSTART;TZID=America/New_York:20190607T113000
DTEND;TZID=America/New_York:20190607T133000
GEO:+38.901013;-77.032383
LOCATION:Future of Privacy Forum @ 1400 I St NW #450\, Washington\, DC 2000
 5\, USA
SEQUENCE:0
SUMMARY:Roundtable Discussion with Dr. Johnny Ryan
URL:https://privacycalendar.org/event/roundtable-discussion-dr-johnny-ryan/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 017/05/FPF_300x300-150x150.png\;150\;150\;1\,medium\;https://privacycalend
 ar.org/wp-content/uploads/2017/05/FPF_300x300.png\;300\;300\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2017/05/FPF_300x300.png' width='300' height='300' /></div>
 <p>Future of Privacy Forum (FPF) invites you to join us on Friday\, June 7
 th\, 2019 for a roundtable discussion with <strong>Dr. Johnny Ryan\,</stro
 ng> Chief Policy & Industry Relations Officer for Brave Software\, to disc
 uss <strong>The Future of Ad Tech – Emerging Business Models and Designing
  for Privacy.</strong></p>\n<p>Prior to joining Brave Software\, Dr. Ryan 
 was Head of Ecosystem for PageFair\, and Chief Innovation Officer of The I
 rish Times. In recent years\, he has been a prominent privacy advocate in 
 the EU\, working with digital rights organizations to file formal complain
 ts with regulators in the UK\, Ireland\, Spain\, the Netherlands\, Belgium
 \, and Luxembourg\, related to advocates’ concerns about the Ad Tech indus
 try and current real-time bidding (RTB) practices (read the <a href='https
 ://brave.com/adtech-data-breach-complaint' target='_blank' rel='nofollow n
 oopener noreferrer'>primary regulatory complaint here)</a>. More recently\
 , Dr. Ryan testified before the U.S. Senate Judicary Committee in a May 21
 st hearing\, “Understanding the Digital Advertising Ecosystem and the Impa
 ct of Data Privacy and Competition Policy.” (<a href='https://www.judiciar
 y.senate.gov/meetings/understanding-the-digital-advertising-ecosystem-and-
 the-impact-of-data-privacy-and-competition-policy' target='_blank' rel='no
 follow noopener noreferrer'>Watch the hearing</a>)</p>\n<p>The discussion 
 will be moderated by Stacey Gray\, Senior Counsel at the Future of Privacy
  Forum.</p>\n<p>We will discuss with the group:</p>\n<ul>\n<li>What does t
 he future hold for alternative Ad Tech business models\, including blockch
 ain and attention-based models such as the Brave Attention Token (BAT)?</l
 i>\n<li>What does engineering for privacy\, or “privacy by design\,” mean 
 in the context of advertising technology?</li>\n<li>What’s on the horizon 
 for Ad Tech in Europe?</li>\n<li>& any other questions you have — please f
 eel free to <a href='mailto:%20sgray@fpf.org' target='_blank' rel='nofollo
 w noopener noreferrer'>send your questions</a> ahead of time.</li>\n</ul>
 \n<p><em>Lunch will be provided.</em></p>\n<p><em><strong>** Invitation on
 ly — Limit 1 per organization & non-transferable. **</strong></em></p>\n<p
 >Tickets: <a class='ai1ec-ticket-url-exported' href='https://www.eventbrit
 e.com/e/roundtable-discussion-with-dr-johnny-ryan-the-future-of-ad-tech-re
 gistration-62056389331'>https://www.eventbrite.com/e/roundtable-discussion
 -with-dr-johnny-ryan-the-future-of-ad-tech-registration-62056389331</a>.</
 p></BODY></HTML>
X-TICKETS-URL:https://www.eventbrite.com/e/roundtable-discussion-with-dr-jo
 hnny-ryan-the-future-of-ad-tech-registration-62056389331
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2429@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:Future of Privacy Forum\; www.fpf.org
DESCRIPTION:Each month\, the Future of Privacy Forum hosts a call with thou
 ght leaders to discuss topical issues related to privacy and responsible d
 ata use.\nWe will provide an update and opportunity to discuss recent priv
 acy updates to the Android and iOS platforms and app stores.\nWe will also
  discuss recent legislative developments regarding biometric technologies.
  Lawmakers are increasingly passing or considering measures that would lim
 it use of facial recognition or other biometric tech by government agencie
 s and/or companies. These issues are top of mind for legislators at the fe
 deral\, state\, and municipal levels.\nDial-in info for US callers and com
 monly requested international numbers are below. If you need an additional
  country-specific dial-in\, please let me know.\nWe look forward to hearin
 g from everyone – it promises to be a great call!\nDial-in info:\nUS Dial-
 In: 1 (888) 545-0687 or 1 (630) 691-2764\nPasscode: 7267 860#\nBelgium: 08
 00 389 15\nFrance: 0805 102 857\nGermany: 0800 222 2013\nIreland: 1800 936
  220\nIsrael: 1809 212 583\nItaly: 800 906 150\nNetherlands: 0800 0200 273
 \nPoland 0 0800 121 34 45\nUK: 0808 238 9856
DTSTART;TZID=America/New_York:20190618T160000
DTEND;TZID=America/New_York:20190618T170000
SEQUENCE:0
SUMMARY:FPF Monthly Privacy Landscape Call | June 2019
URL:https://privacycalendar.org/event/fpf-monthly-privacy-landscape-call-ju
 ne-2019/
X-COST-TYPE:free
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 017/05/FPF_300x300-150x150.png\;150\;150\;1\,medium\;https://privacycalend
 ar.org/wp-content/uploads/2017/05/FPF_300x300.png\;300\;300\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2017/05/FPF_300x300.png' width='300' height='300' /></div>
 <p>Each month\, the Future of Privacy Forum hosts a call with thought lead
 ers to discuss topical issues related to privacy and responsible data use.
 </p>\n<p>We will provide an update and opportunity to discuss recent priva
 cy updates to the Android and iOS platforms and app stores.</p>\n<p>We wil
 l also discuss recent legislative developments regarding biometric technol
 ogies. Lawmakers are increasingly passing or considering measures that wou
 ld limit use of facial recognition or other biometric tech by government a
 gencies and/or companies. These issues are top of mind for legislators at 
 the federal\, state\, and municipal levels.</p>\n<p>Dial-in info for US ca
 llers and commonly requested international numbers are below. If you need 
 an additional country-specific dial-in\, please let me know.</p>\n<p>We lo
 ok forward to hearing from everyone – it promises to be a great call!</p>
 \n<p>Dial-in info:<br />\nUS Dial-In: 1 (888) 545-0687 or 1 (630) 691-2764
 <br />\nPasscode: 7267 860#</p>\n<p>Belgium: 0800 389 15<br />\nFrance: 08
 05 102 857<br />\nGermany: 0800 222 2013<br />\nIreland: 1800 936 220<br /
 >\nIsrael: 1809 212 583<br />\nItaly: 800 906 150<br />\nNetherlands: 0800
  0200 273<br />\nPoland 0 0800 121 34 45<br />\nUK: 0808 238 9856</p>\n</B
 ODY></HTML>
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2411@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:https://learn.segment.com/ccpa-webinar/
DESCRIPTION:The California Consumer Privacy Act (CCPA) goes into effect on 
 January 1\, 2020. While the specifics are still being hammered out\, the C
 CPA will inevitably change how businesses around the world operate. Join d
 ata privacy experts\, Mark Kahn (General Counsel\, Segment)\, Melissa Maal
 ouf (Shareholder\, ZwillGen)\, and Jeremy Greenberg (Policy Fellow\, Futur
 e of Privacy Forum)\, for a fireside chat on the CCPA and the future of co
 nsumer data privacy.\n\n \n \n\nIn this webinar\, you’ll learn:\n\n\n\nWha
 t the CCPA means for your industry\nActionable advice for how you can prep
 are for the CCPA\nChanges we expect to see before the CCPA even goes into 
 effect\nRegulatory trends impacting data privacy at the state and federal 
 level\n\n\nTickets: https://learn.segment.com/ccpa-webinar/.
DTSTART;TZID=America/New_York:20190626T110000
SEQUENCE:0
SUMMARY:The CCPA and the future of consumer data privacy
URL:https://privacycalendar.org/event/ccpa-future-consumer-data-privacy/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 019/06/segment-150x150.png\;150\;150\;1\,medium\;https://privacycalendar.o
 rg/wp-content/uploads/2019/06/segment-300x158.png\;300\;158\;1\,large\;htt
 ps://privacycalendar.org/wp-content/uploads/2019/06/segment.png\;600\;315\
 ;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2019/06/segment-300x158.png' width='300' height='158' /></
 div><div id='lp-pom-text-15' class='lp-element lp-pom-text nlh'>\n<p>The C
 alifornia Consumer Privacy Act (CCPA) goes into effect on January 1\, 2020
 . While the specifics are still being hammered out\, the CCPA will inevita
 bly change how businesses around the world operate. Join data privacy expe
 rts\, <strong>Mark Kahn</strong> (General Counsel\, Segment)\, <strong>Mel
 issa Maalouf</strong> (Shareholder\, ZwillGen)\, and <strong>Jeremy Greenb
 erg</strong> (Policy Fellow\, Future of Privacy Forum)\, for a fireside ch
 at on the CCPA and the future of consumer data privacy.</p>\n</div>\n<p> <
 /p>\n<p> </p>\n<div id='lp-pom-text-147' class='lp-element lp-pom-text nlh
 '>\n<h3>In this webinar\, you’ll learn:</h3>\n</div>\n<div id='lp-pom-text
 -149' class='lp-element lp-pom-text nlh'>\n<ul>\n<li>What the CCPA means f
 or <em>your</em> industry</li>\n<li>Actionable advice for how you can prep
 are for the CCPA</li>\n<li>Changes we expect to see before the CCPA even g
 oes into effect</li>\n<li>Regulatory trends impacting data privacy at the 
 state and federal level</li>\n</ul>\n</div>\n<p>Tickets: <a class='ai1ec-t
 icket-url-exported' href='https://learn.segment.com/ccpa-webinar/'>https:/
 /learn.segment.com/ccpa-webinar/</a>.</p></BODY></HTML>
X-TICKETS-URL:https://learn.segment.com/ccpa-webinar/
X-INSTANT-EVENT:1
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2447@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:Christine Reap\; christine.reap@charter.com
DESCRIPTION:Please join Charter Communications and the Future of Privacy Fo
 rum for a conversation with two leading members of Congress who will share
  their perspective on this important issue and potential legislative solut
 ions.\nThis event will feature Rep. Jan Schakowsky\, Chair and Rep. Cathy 
 McMorris Rodgers\, Ranking Member of House Energy and Commerce Subcommitte
 e on Consumer Protection and Commerce.\nA light breakfast will be served. 
 Please email christine.reap@charter.com to RSVP.
DTSTART;TZID=America/New_York:20190717T081500
GEO:+38.902209;-77.020552
LOCATION:Charter Communications @ 601 Massachusetts Ave NW\, Washington\, D
 C 20001\, USA
SEQUENCE:0
SUMMARY:Online Privacy: Consumer Protection and the Internet Economy
URL:https://privacycalendar.org/event/online-privacy-consumer-protection-in
 ternet-economy/
X-COST-TYPE:free
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 019/07/event-pic-300x75.png\;300\;75\,medium\;https://privacycalendar.org/
 wp-content/uploads/2019/07/event-pic-300x75.png\;300\;75\,large\;https://p
 rivacycalendar.org/wp-content/uploads/2019/07/event-pic-300x75.png\;300\;7
 5\,full\;https://privacycalendar.org/wp-content/uploads/2019/07/event-pic-
 300x75.png\;300\;75
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p><img class='a
 lignnone size-medium wp-image-2448' src='https://privacycalendar.org/wp-co
 ntent/uploads/2019/07/event-pic-300x75.png' alt='' width='300' height='75'
  srcset='https://privacycalendar.org/wp-content/uploads/2019/07/event-pic-
 300x75.png 300w\, https://privacycalendar.org/wp-content/uploads/2019/07/e
 vent-pic.png 600w' sizes='(max-width: 300px) 100vw\, 300px' /></p>\n<p>Ple
 ase join <strong>Charter Communications</strong> and the <strong>Future of
  Privacy Forum</strong> for a conversation with two leading members of Con
 gress who will share their perspective on this important issue and potenti
 al legislative solutions.</p>\n<p>This event will feature Rep. Jan Schakow
 sky\, Chair and Rep. Cathy McMorris Rodgers\, Ranking Member of House Ener
 gy and Commerce Subcommittee on Consumer Protection and Commerce.</p>\n<p>
 A light breakfast will be served. Please email christine.reap@charter.com 
 to RSVP.</p>\n</BODY></HTML>
X-INSTANT-EVENT:1
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2454@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:+1 510.528.8649\; conference@usenix.org\; https://www.usenix.org/co
 nference/pepr19#questions
DESCRIPTION:The USENIX Conference on Privacy Engineering Practice and Respe
 ct (PEPR) is a single-track conference focused on designing and building p
 roducts and systems with privacy and respect for their users and the socie
 ties in which they operate. Our goal is to improve the state of the art an
 d practice of building for privacy and respect and to foster a deeply know
 ledgeable community of both privacy practitioners and researchers who coll
 aborate towards that goal.\nTickets: https://www.usenix.org/user.
DTSTART;TZID=America/New_York:20190812T073000
DTEND;TZID=America/New_York:20190813T174500
GEO:+37.405328;-121.976193
LOCATION:Hyatt Regency Santa Clara @ 5101 Great America Pkwy\, Santa Clara\
 , CA 95054\, USA
SEQUENCE:0
SUMMARY:USENIX Privacy Engineering Practice and Respect (PEPR) Conference ’
 19
URL:https://privacycalendar.org/event/privacy-engineering-practice-respect-
 pepr-conference-19/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 019/07/pepr-conference-2-300x158.png\;300\;158\,medium\;https://privacycal
 endar.org/wp-content/uploads/2019/07/pepr-conference-2-300x158.png\;300\;1
 58\,large\;https://privacycalendar.org/wp-content/uploads/2019/07/pepr-con
 ference-2-300x158.png\;300\;158\,full\;https://privacycalendar.org/wp-cont
 ent/uploads/2019/07/pepr-conference-2-300x158.png\;300\;158
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p><img class='a
 lignnone size-medium wp-image-2455' src='https://privacycalendar.org/wp-co
 ntent/uploads/2019/07/pepr-conference-2-300x158.png' alt='' width='300' he
 ight='158' srcset='https://privacycalendar.org/wp-content/uploads/2019/07/
 pepr-conference-2-300x158.png 300w\, https://privacycalendar.org/wp-conten
 t/uploads/2019/07/pepr-conference-2-768x403.png 768w\, https://privacycale
 ndar.org/wp-content/uploads/2019/07/pepr-conference-2-1024x538.png 1024w\,
  https://privacycalendar.org/wp-content/uploads/2019/07/pepr-conference-2.
 png 1200w' sizes='(max-width: 300px) 100vw\, 300px' /></p>\n<p>The USENIX 
 Conference on Privacy Engineering Practice and Respect (PEPR) is a single-
 track conference focused on designing and building products and systems wi
 th privacy and respect for their users and the societies in which they ope
 rate. Our goal is to improve the state of the art and practice of building
  for privacy and respect and to foster a deeply knowledgeable community of
  both privacy practitioners and researchers who collaborate towards that g
 oal.</p>\n<p>Tickets: <a class='ai1ec-ticket-url-exported' href='https://w
 ww.usenix.org/user'>https://www.usenix.org/user</a>.</p></BODY></HTML>
X-COST:$495- 915
X-TICKETS-URL:https://www.usenix.org/user
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2424@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:Stacy Martin\; privacy-events@mozilla.org\; https://www.eventbrite.
 com/e/august-2019-privacy-lab-nist-privacy-framework-tickets-63409770330
DESCRIPTION:For August\, we’re thrilled that NIST will join us to share an 
 updated draft of their Privacy Framework to seek feedback prior to its pla
 nned October 2019 release.\nJoin us at 6pm for networking. Program starts 
 at 6:30pm.\nPresenters include:\n\nNaomi Lefkovitz\, Senior Privacy Policy
  Advisor and Lead\, Privacy Framework\, NIST\nEllen Nadeau\, Deputy Manage
 r\, Privacy Framework\, NIST\n\nTickets: https://www.eventbrite.com/e/augu
 st-2019-privacy-lab-nist-privacy-framework-tickets-63409770330.
DTSTART;TZID=America/New_York:20190813T180000
DTEND;TZID=America/New_York:20190813T200000
GEO:+37.775422;-122.417365
LOCATION:Uber HQ @ 1455 Market St 4th Floor\, San Francisco\, CA 94103\, US
 A
SEQUENCE:0
SUMMARY:August 2019 Privacy Lab – NIST Privacy Framework
URL:https://privacycalendar.org/event/aug-privacy-lab/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 019/05/https___cdn.evbuc_.com_images_61277580_51105803850_1_original-150x1
 50.jpg\;150\;150\;1\,medium\;https://privacycalendar.org/wp-content/upload
 s/2019/05/https___cdn.evbuc_.com_images_61277580_51105803850_1_original-30
 0x150.jpg\;300\;150\;1\,large\;https://privacycalendar.org/wp-content/uplo
 ads/2019/05/https___cdn.evbuc_.com_images_61277580_51105803850_1_original.
 jpg\;800\;400\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2019/05/https___cdn.evbuc_.com_images_61277580_51105803850
 _1_original-300x150.jpg' width='300' height='150' /></div><p>For August\, 
 we’re thrilled that NIST will join us to share an updated draft of their P
 rivacy Framework to seek feedback prior to its planned October 2019 releas
 e.</p>\n<p>Join us at 6pm for networking. Program starts at 6:30pm.</p>\n<
 p>Presenters include:</p>\n<ul>\n<li><span class='m_-3769758968807816958Em
 ailStyle23'>Naomi Lefkovitz\, Senior Privacy Policy Advisor and Lead\, Pri
 vacy Framework\, NIST</span></li>\n<li><span class='m_-3769758968807816958
 EmailStyle23'>Ellen Nadeau\, Deputy Manager\, Privacy Framework\, NIST</sp
 an></li>\n</ul>\n<p>Tickets: <a class='ai1ec-ticket-url-exported' href='ht
 tps://www.eventbrite.com/e/august-2019-privacy-lab-nist-privacy-framework-
 tickets-63409770330'>https://www.eventbrite.com/e/august-2019-privacy-lab-
 nist-privacy-framework-tickets-63409770330</a>.</p></BODY></HTML>
X-TICKETS-URL:https://www.eventbrite.com/e/august-2019-privacy-lab-nist-pri
 vacy-framework-tickets-63409770330
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2458@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:privaci.research@gmail.com \; http://privaci.info/ci_symposium/cfp.
 html
DESCRIPTION:The aim of the symposium is to foster interaction among diverse
  communities of research and practice using contextual integrity to reason
  about privacy\, and to design and evaluate\, craft regulation\, and gener
 ate formal logics for privacy.\nAs the goal of the workshop is to foster d
 iscussion around works in progress\, the workshop will not publish formal 
 proceedings (so as to not preclude the publication of subsequent versions 
 of those works\, improved by workshop feedback). However\, with authors’ p
 ermission\, we will post accepted submissions on the website.\nTickets: ht
 tp://privaci.info/ci_symposium.html.
DTSTART;TZID=America/New_York:20190819T130000
DTEND;TZID=America/New_York:20190820T180000
GEO:+37.869414;-122.266545
LOCATION:UC Berkeley David Brower Center @ 2150 Allston Way\, Berkeley\, CA
  94704\, USA
SEQUENCE:0
SUMMARY:2nd Annual Symposium on Applications of Contextual Integrity
URL:https://privacycalendar.org/event/2nd-annual-symposium-applications-con
 textual-integrity/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 019/07/ci-event-2-300x137.png\;300\;137\,medium\;https://privacycalendar.o
 rg/wp-content/uploads/2019/07/ci-event-2-300x137.png\;300\;137\,large\;htt
 ps://privacycalendar.org/wp-content/uploads/2019/07/ci-event-2-300x137.png
 \;300\;137\,full\;https://privacycalendar.org/wp-content/uploads/2019/07/c
 i-event-2-300x137.png\;300\;137
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p><img class='a
 lignnone size-medium wp-image-2461' src='https://privacycalendar.org/wp-co
 ntent/uploads/2019/07/ci-event-2-300x137.png' alt='' width='300' height='1
 37' srcset='https://privacycalendar.org/wp-content/uploads/2019/07/ci-even
 t-2-300x137.png 300w\, https://privacycalendar.org/wp-content/uploads/2019
 /07/ci-event-2-768x352.png 768w\, https://privacycalendar.org/wp-content/u
 ploads/2019/07/ci-event-2.png 1000w' sizes='(max-width: 300px) 100vw\, 300
 px' /></p>\n<p>The aim of the symposium is to foster interaction among div
 erse communities of research and practice using contextual integrity to re
 ason about privacy\, and to design and evaluate\, craft regulation\, and g
 enerate formal logics for privacy.</p>\n<p>As the goal of the workshop is 
 to foster discussion around works in progress\, the workshop will not publ
 ish formal proceedings (so as to not preclude the publication of subsequen
 t versions of those works\, improved by workshop feedback). However\, with
  authors’ permission\, we will post accepted submissions on the website.</
 p>\n<p>Tickets: <a class='ai1ec-ticket-url-exported' href='http://privaci.
 info/ci_symposium.html'>http://privaci.info/ci_symposium.html</a>.</p></BO
 DY></HTML>
X-COST:$50
X-TICKETS-URL:http://privaci.info/ci_symposium.html
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2477@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:Heather Martin\; 303.492.5442\; Heather.Martin@colorado.edu\; https
 ://siliconflatirons.org/events/the-near-future-of-u-s-privacy-law/
DESCRIPTION:The year 2019 may be a turning point for data privacy law. Priv
 acy law in the United States is famously a hole-ridden patchwork of state 
 laws\, sectoral legislation\, and consumer protection. Whether in response
  to the European Union’s General Data Protection Regulation or to Californ
 ia’s enactment of its Consumer Privacy Act\, over this past year state and
  federal legislators have been proposing new data privacy laws at an energ
 etic rate.\nHow will we govern the technology of the near future? Will the
  United States join the rest of the world in recognizing data privacy righ
 ts or will it take its own approach? Will these choices even matter in pra
 ctice\, given the long reach of both EU and California law?\nThis conferen
 ce will bring together academics\, practitioners\, technologists\, and reg
 ulators to discuss the near future of U.S. data privacy law. Specifically\
 , we will explore municipal bans on surveillance technology\, new state pr
 ivacy laws\, the future role of the Federal Trade Commission\, and propose
 d federal legislation.\nThose who cannot attend the event in person may al
 so register for the free livestream.\n\nTickets: https://siliconflatirons.
 org/events/the-near-future-of-u-s-privacy-law/.
DTSTART;TZID=America/New_York:20190906T090000
DTEND;TZID=America/New_York:20190906T133000
GEO:+40.001226;-105.262274
LOCATION:University of Colorado Law School\, Wittemyer Courtroom @ Wolf Law
  Building\, 2450 Kittredge Loop Dr\, Boulder\, CO 80305\, USA
SEQUENCE:0
SUMMARY:The Near Future of U.S. Privacy Law
URL:https://privacycalendar.org/event/near-future-u-s-privacy-law/
X-COST-TYPE:external
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='trib
 e-events-single-event-description tribe-events-content'>\n<p>The year 2019
  may be a turning point for data privacy law. Privacy law in the United St
 ates is famously a hole-ridden patchwork of state laws\, sectoral legislat
 ion\, and consumer protection. Whether in response to the European Union’s
  General Data Protection Regulation or to California’s enactment of its Co
 nsumer Privacy Act\, over this past year state and federal legislators hav
 e been proposing new data privacy laws at an energetic rate.</p>\n<p>How w
 ill we govern the technology of the near future? Will the United States jo
 in the rest of the world in recognizing data privacy rights or will it tak
 e its own approach? Will these choices even matter in practice\, given the
  long reach of both EU and California law?</p>\n<p>This conference will br
 ing together academics\, practitioners\, technologists\, and regulators to
  discuss the near future of U.S. data privacy law. Specifically\, we will 
 explore municipal bans on surveillance technology\, new state privacy laws
 \, the future role of the Federal Trade Commission\, and proposed federal 
 legislation.</p>\n<p>Those who cannot attend the event in person may also 
 register for the free livestream.</p>\n</div>\n<p>Tickets: <a class='ai1ec
 -ticket-url-exported' href='https://siliconflatirons.org/events/the-near-f
 uture-of-u-s-privacy-law/'>https://siliconflatirons.org/events/the-near-fu
 ture-of-u-s-privacy-law/</a>.</p></BODY></HTML>
X-COST:$40-60
X-TICKETS-URL:https://siliconflatirons.org/events/the-near-future-of-u-s-pr
 ivacy-law/
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2462@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:Cornelia Riehle\; +49 (0)651 937 37 302\; https://www.era.int/cgi-b
 in/cms?_SID=ef0318296e3ceaf039609de06b07dbf0a79aea8b00632063204271&_sprach
 e=en&_bereich=artikel&_aktion=detail&idartikel=128778
DESCRIPTION:The aim of the conference is to explore the practical implement
 ation of EU data protection rules within the law enforcement sector and hi
 ghlight some of the practical challenges that data protection experts face
  in light of developments in policing\, society as a whole and a rapidly c
 hanging criminal environment.\nThe conference is organised by the Danish N
 ational Police and ERA in cooperation with Europol’s Data Protection Exper
 ts Network (EDEN) and will bring together internationally renowned practit
 ioners from law enforcement and security authorities with privacy experts\
 , academics and civil society representatives.\nKey topics\n\nData-sharing
 \, GDPR and the police: how to fight crime in the age of GDPR?\nPassenger 
 Name Record (PNR) data\n“Data protection by design” through legislation?\n
 Policing in the age of artificial intelligence (AI)\, open source intellig
 ence (OSINT) and the Internet of Things: proportionality in an age of data
  abundance\n\nWho should attend?\nLaw enforcement officials\, data protect
 ion officers\, members of Europol’s Data Protection Experts Network (EDEN)
 \, representatives of national data protection authorities\, academics.\nT
 ickets: https://www.era.int/cgi-bin/cms?_SID=ef0318296e3ceaf039609de06b07d
 bf0a79aea8b00632063204271&_sprache=en&_bereich=artikel&_aktion=detail&idar
 tikel=128778.
DTSTART;TZID=America/New_York:20190919T090000
DTEND;TZID=America/New_York:20190920T160000
GEO:+55.669542;+12.564636
LOCATION:DGI-byen @ Tietgensgade 65\, 1704 København\, Denmark
SEQUENCE:0
SUMMARY:Paradise Lost? Policing in the Age of Data Protection
URL:https://privacycalendar.org/event/paradise-lost-policing-age-data-prote
 ction/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 019/07/Paradise-lost-logo-lille.jpg\;211\;141\,medium\;https://privacycale
 ndar.org/wp-content/uploads/2019/07/Paradise-lost-logo-lille.jpg\;211\;141
 \,large\;https://privacycalendar.org/wp-content/uploads/2019/07/Paradise-l
 ost-logo-lille.jpg\;211\;141\,full\;https://privacycalendar.org/wp-content
 /uploads/2019/07/Paradise-lost-logo-lille.jpg\;211\;141
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p><img class='a
 lignnone  wp-image-2463' src='https://privacycalendar.org/wp-content/uploa
 ds/2019/07/Paradise-lost-logo-lille.jpg' alt='' width='211' height='141' /
 ></p>\n<p>The aim of the conference is to explore the practical implementa
 tion of EU data protection rules within the law enforcement sector and hig
 hlight some of the practical challenges that data protection experts face 
 in light of developments in policing\, society as a whole and a rapidly ch
 anging criminal environment.</p>\n<p>The conference is organised by the Da
 nish National Police and ERA in cooperation with Europol’s Data Protection
  Experts Network (EDEN) and will bring together internationally renowned p
 ractitioners from law enforcement and security authorities with privacy ex
 perts\, academics and civil society representatives.</p>\n<h3>Key topics</
 h3>\n<ul>\n<li>Data-sharing\, GDPR and the police: how to fight crime in t
 he age of GDPR?</li>\n<li>Passenger Name Record (PNR) data</li>\n<li>“Data
  protection by design” through legislation?</li>\n<li>Policing in the age 
 of artificial intelligence (AI)\, open source intelligence (OSINT) and the
  Internet of Things: proportionality in an age of data abundance</li>\n</u
 l>\n<h3>Who should attend?</h3>\n<p>Law enforcement officials\, data prote
 ction officers\, members of Europol’s Data Protection Experts Network (EDE
 N)\, representatives of national data protection authorities\, academics.<
 /p>\n<p>Tickets: <a class='ai1ec-ticket-url-exported' href='https://www.er
 a.int/cgi-bin/cms?_SID=ef0318296e3ceaf039609de06b07dbf0a79aea8b00632063204
 271&_sprache=en&_bereich=artikel&_aktion=detail&idartikel=128778'>https://
 www.era.int/cgi-bin/cms?_SID=ef0318296e3ceaf039609de06b07dbf0a79aea8b00632
 063204271&_sprache=en&_bereich=artikel&_aktion=detail&idartikel=128778</a>
 .</p></BODY></HTML>
X-COST:$250- 550
X-TICKETS-URL:https://www.era.int/cgi-bin/cms?_SID=ef0318296e3ceaf039609de0
 6b07dbf0a79aea8b00632063204271&_sprache=en&_bereich=artikel&_aktion=detail
 &idartikel=128778
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2464@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:
DESCRIPTION:The Future of the COPPA Rule: An FTC Workshop will examine whet
 her to update the COPPA Rule in light of evolving business practices in th
 e online children’s marketplace\, including the increased use of Internet 
 of Things devices\, social media\, educational technology\, and general au
 dience platforms hosting third-party child-directed content. The COPPA Rul
 e\, which was enacted in 2000 and updated in 2013\, requires certain Web s
 ite operators to obtain parental consent before collecting\, using\, or di
 sclosing personal information from children under 13. Workshop topics will
  include:\n\nHow the development of new technologies or business models\, 
 the evolving nature of privacy harms\, and changes in the way parents and 
 children use websites and online services\, affect children’s privacy toda
 y\;\nHow the Rule should address parental consent for education technology
  vendors that collect personal information consented to by schools\, follo
 wing on discussions that occurred during the FTC’s Student Privacy and Ed 
 Tech workshop in December 2017\;\nWhether the Rule should include a specif
 ic exception to parental consent for audio files containing a child’s voic
 e that website operators collect and then promptly delete\;\nWhether the R
 ule should permit general audience platforms to rebut the presumption that
  all users of child-directed content are children\, and if so\, under what
  circumstances\;\nWhether the revisions to the Rule made in 2013 have work
 ed as intended or require modification\; and\nWhether the Rule should be a
 mended to better address websites and online services that do not include 
 traditionally child-oriented activities\, but that have large numbers of c
 hild users.\n\nFor a more detailed list of topics\, see the Commission’s r
 equest for public comment on the COPPA Rule
DTSTART;TZID=America/New_York:20191007T090000
GEO:+38.884175;-77.020748
LOCATION:Constitution Center @ 400 7th St SW\, Washington\, DC 20024\, USA
SEQUENCE:0
SUMMARY:The Future of the COPPA Rule: An FTC Workshop
URL:https://privacycalendar.org/event/future-coppa-rule-ftc-workshop/
X-COST-TYPE:free
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 017/03/ftc.jpg\;200\;200\,medium\;https://privacycalendar.org/wp-content/u
 ploads/2017/03/ftc.jpg\;200\;200\,large\;https://privacycalendar.org/wp-co
 ntent/uploads/2017/03/ftc.jpg\;200\;200\,full\;https://privacycalendar.org
 /wp-content/uploads/2017/03/ftc.jpg\;200\;200
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p><img class='a
 lignnone size-full wp-image-1262' src='https://privacycalendar.org/wp-cont
 ent/uploads/2017/03/ftc.jpg' alt='' width='200' height='200' srcset='https
 ://privacycalendar.org/wp-content/uploads/2017/03/ftc.jpg 200w\, https://p
 rivacycalendar.org/wp-content/uploads/2017/03/ftc-150x150.jpg 150w' sizes=
 '(max-width: 200px) 100vw\, 200px' /></p>\n<p><em>The Future of the COPPA 
 Rule: An FTC Workshop</em> will examine whether to update the COPPA Rule i
 n light of evolving business practices in the online children’s marketplac
 e\, including the increased use of Internet of Things devices\, social med
 ia\, educational technology\, and general audience platforms hosting third
 -party child-directed content. <a href='https://www.ftc.gov/enforcement/ru
 les/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-prot
 ection-rule'>The COPPA Rule\, which was enacted in 2000</a> and <a href='h
 ttps://www.ftc.gov/news-events/press-releases/2013/07/revised-childrens-on
 line-privacy-protection-rule-goes-effect'>updated in 2013</a>\, requires c
 ertain Web site operators to obtain parental consent before collecting\, u
 sing\, or disclosing personal information from children under 13. Workshop
  topics will include:</p>\n<ul>\n<li>How the development of new technologi
 es or business models\, the evolving nature of privacy harms\, and changes
  in the way parents and children use websites and online services\, affect
  children’s privacy today\;</li>\n<li>How the Rule should address parental
  consent for education technology vendors that collect personal informatio
 n consented to by schools\, following on discussions that occurred during 
 the <a href='https://www.ftc.gov/news-events/events-calendar/2017/12/stude
 nt-privacy-ed-tech'>FTC’s Student Privacy and Ed Tech workshop</a> in Dece
 mber 2017\;</li>\n<li>Whether the Rule should include a specific exception
  to parental consent for audio files containing a child’s voice that websi
 te operators collect and then promptly delete\;</li>\n<li>Whether the Rule
  should permit general audience platforms to rebut the presumption that al
 l users of child-directed content are children\, and if so\, under what ci
 rcumstances\;</li>\n<li>Whether the revisions to the Rule made in 2013 hav
 e worked as intended or require modification\; and</li>\n<li>Whether the R
 ule should be amended to better address websites and online services that 
 do not include traditionally child-oriented activities\, but that have lar
 ge numbers of child users.</li>\n</ul>\n<p>For a more detailed list of top
 ics\, see the <a href='https://www.ftc.gov/system/files/documents/federal_
 register_notices/2019/07/p195404_coppa_rule_review_draft_notice.pdf'>Commi
 ssion’s request for public comment on the COPPA Rule</a></p>\n</BODY></HTM
 L>
X-INSTANT-EVENT:1
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2465@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:Jonas Boß\; back.office@euprivacyseal.com\; https://www.european-pr
 ivacy-seal.eu/eps-en/european-privacy-seal-expert-admission-workshop
DESCRIPTION:The 2-day workshop will introduce you to the EuroPriSe certific
 ation scheme: You will learn about EuroPriSe criteria and procedures and t
 rain how to specify a target of evaluation (ToE) and to apply the certific
 ation criteria in the field. In addition\, you will start to work on an ex
 ercise to be completed after the workshop\, which is one important precond
 ition for being admitted as a EuroPriSe Expert.\nThe workshop is a combina
 tion of classroom and group work and involves practical examples. You will
  deal with privacy use cases to apply what you have learned and to benefit
  from the professional exchange with other workshop participants.\nEnjoy m
 eeting other privacy professionals from around the globe and expand your p
 rofessional network!\nTickets: https://www.european-privacy-seal.eu/eps-en
 /european-privacy-seal-expert-admission-workshop.
DTSTART;TZID=America/New_York:20191106T090000
DTEND;TZID=America/New_York:20191107T183000
GEO:+45.819522;+15.976545
LOCATION:Academia Hotel @ Ul. Ivana Tkalčića 88\, 10000\, Zagreb\, Croatia
SEQUENCE:0
SUMMARY:EuroPriSe Admission Workshop
URL:https://privacycalendar.org/event/europrise-admission-workshop/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 019/07/Europrise-300x212.jpg\;300\;212\,medium\;https://privacycalendar.or
 g/wp-content/uploads/2019/07/Europrise-300x212.jpg\;300\;212\,large\;https
 ://privacycalendar.org/wp-content/uploads/2019/07/Europrise-300x212.jpg\;3
 00\;212\,full\;https://privacycalendar.org/wp-content/uploads/2019/07/Euro
 prise-300x212.jpg\;300\;212
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p><img class='a
 lignnone size-medium wp-image-2466' src='https://privacycalendar.org/wp-co
 ntent/uploads/2019/07/Europrise-300x212.jpg' alt='' width='300' height='21
 2' srcset='https://privacycalendar.org/wp-content/uploads/2019/07/Europris
 e-300x212.jpg 300w\, https://privacycalendar.org/wp-content/uploads/2019/0
 7/Europrise.jpg 368w' sizes='(max-width: 300px) 100vw\, 300px' /></p>\n<p>
 The 2-day workshop will introduce you to the EuroPriSe certification schem
 e: You will learn about EuroPriSe criteria and procedures and train how to
  specify a target of evaluation (ToE) and to apply the certification crite
 ria in the field. In addition\, you will start to work on an exercise to b
 e completed after the workshop\, which is one important precondition for b
 eing admitted as a EuroPriSe Expert.</p>\n<p>The workshop is a combination
  of classroom and group work and involves practical examples. You will dea
 l with privacy use cases to apply what you have learned and to benefit fro
 m the professional exchange with other workshop participants.</p>\n<p>Enjo
 y meeting other privacy professionals from around the globe and expand you
 r professional network!</p>\n<p>Tickets: <a class='ai1ec-ticket-url-export
 ed' href='https://www.european-privacy-seal.eu/eps-en/european-privacy-sea
 l-expert-admission-workshop'>https://www.european-privacy-seal.eu/eps-en/e
 uropean-privacy-seal-expert-admission-workshop</a>.</p></BODY></HTML>
X-COST:1.596\,64 €
X-TICKETS-URL:https://www.european-privacy-seal.eu/eps-en/european-privacy-
 seal-expert-admission-workshop
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2469@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:IEREK\; sara.elsherbiny.ie@gmail.com\; https://www.aztechcouncil.or
 g/event/food-nutrition-security-and-sustainable-agriculture-fnssa/
DESCRIPTION:The 1st Edition of the international conference on FNSSA is org
 anized by the Agro-Food Industries Alliance (funded by Academy of Scientif
 ic Research and Technology in Egypt)\, World Food Program\, the Arab Acade
 my for Science\, Technology and Maritime Transport (AASTMT\, Alexandria)\,
  Alexandria University\, Egypt\, and IEREK – International Experts for Res
 earch Enrichment and Knowledge Exchange in collaboration with Springer as 
 a publishing partner.\nTo take place in Cairo from 1 to 3 December of 2019
 \, the conference will be an opportunity to present and discuss the newest
  researches related to food\, nutrition and sustainable agriculture as wel
 l as to shed light on their relationships with the industry. The scientifi
 c committee welcomes contributions from academics\, researchers and intere
 sted participants.\nTickets: https://www.aztechcouncil.org/event/food-nutr
 ition-security-and-sustainable-agriculture-fnssa/.
DTSTART;TZID=America/New_York:20191201T090000
DTEND;TZID=America/New_York:20191203T180000
GEO:+30.034663;+31.227342
LOCATION:Grand Nile Tower (Grand Hayat) @ Corniche El Nil، Egypt
SEQUENCE:0
SUMMARY:Food\, Nutrition Security and Sustainable Agriculture (FNSSA)
URL:https://privacycalendar.org/event/food-nutrition-security-sustainable-a
 griculture-fnssa/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://www.food-conference.org/storage/uploads/
 conferences/486/cover_img.jpg\;553\;133\,medium\;https://www.food-conferen
 ce.org/storage/uploads/conferences/486/cover_img.jpg\;553\;133\,large\;htt
 ps://www.food-conference.org/storage/uploads/conferences/486/cover_img.jpg
 \;553\;133\,full\;https://www.food-conference.org/storage/uploads/conferen
 ces/486/cover_img.jpg\;553\;133
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p><img class=''
  src='https://www.food-conference.org/storage/uploads/conferences/486/cove
 r_img.jpg' width='553' height='133' /></p>\n<p>The 1st Edition of the inte
 rnational conference on FNSSA is organized by the Agro-Food Industries All
 iance (funded by Academy of Scientific Research and Technology in Egypt)\,
  World Food Program\, the Arab Academy for Science\, Technology and Mariti
 me Transport (AASTMT\, Alexandria)\, Alexandria University\, Egypt\, and I
 EREK – International Experts for Research Enrichment and Knowledge Exchang
 e in collaboration with Springer as a publishing partner.</p>\n<p>To take 
 place in Cairo from 1 to 3 December of 2019\, the conference will be an op
 portunity to present and discuss the newest researches related to food\, n
 utrition and sustainable agriculture as well as to shed light on their rel
 ationships with the industry. The scientific committee welcomes contributi
 ons from academics\, researchers and interested participants.</p>\n<p>Tick
 ets: <a class='ai1ec-ticket-url-exported' href='https://www.aztechcouncil.
 org/event/food-nutrition-security-and-sustainable-agriculture-fnssa/'>http
 s://www.aztechcouncil.org/event/food-nutrition-security-and-sustainable-ag
 riculture-fnssa/</a>.</p></BODY></HTML>
X-COST:$400
X-TICKETS-URL:https://www.aztechcouncil.org/event/food-nutrition-security-a
 nd-sustainable-agriculture-fnssa/
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2550@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:IAPP\; https://iapp.org/store/webconferences/a0l1P00000DroauQAB/
DESCRIPTION:In addition to other benefits\, the California Consumer Privacy
  Act enhances privacy for individuals when data uses cannot be adequately 
 served using consent alone. The CCPA provides incentives for companies to 
 implement safeguards that reduce data privacy risk from even occurring in 
 the first place. Under the CCPA\, this can be accomplished by leveraging n
 ew technically enforced\, risk-based deidentification controls.\nBenefits 
 of Non-Consent Processing (via DeIdentification)\nProcessing data under th
 e CCPA’s deidentification requirements brings many benefits. They include:
 \nFor individuals and society:\n+Consumer benefits from data processing th
 at is not well supported via opt-in/consent requirements because of the co
 mplexity of processing and difficulty of explanation.\n+Societal benefits 
 from having more representative\, non-discriminatory data to train accurat
 e and representative artificial intelligence and machine learning models.
 \nFor data controllers and processors:\n+Greater flexibility in complying 
 with data subject requests to delete data.\n+Enhanced ability to lawfully 
 share and combine data with third parties.\n+Requirements for Non-Consent 
 Processing (via DeIdentification)\nProcessing protected personal informati
 on via CCPA deidentification exceptions requires that proper technical and
  organizational safeguards are in place.\nThose requirements include:\n+CC
 PA increases deidentification standards to a new “2020 De-ID Standard”\n+T
 he 2020 De-ID Standard under the CCPA now requires:\n+Technical safeguards
  to prevent recipients of protected information from inadmissibly re-ident
 ifying individuals when used on a distributed\, multi-party basis.\n+Great
 er protection than otherwise required under laws that were enacted almost 
 a quarter century ago\, like the Health Insurance Portability and Accounta
 bility Act.\n+Context-aware\, risk-based management of re-identification r
 isk.\n+Protection against re-identification risk from data in the hands of
  third parties.\nHost:\nDave Cohen\, CIPP/E\, CIPP/US\, Knowledge Manager\
 , IAPP\nPanelists:\nDeven McGraw\, Chief Compliance Officer\, Ciitizen (fo
 rmer healthcare privacy official at the Department of Health and Human Ser
 vices)\n﻿Khaled El Emam\, Professor\, University of Ottawa/CHEO Research I
 nstitute\nGary LaFever\, CEO\, Anonos\nJustin Antonipillai\, CEO\, WireWhe
 el\nTickets: https://iapp.org/store/webconferences/a0l1P00000DroauQAB/.
DTSTART;TZID=America/New_York:20200116T110000
DTEND;TZID=America/New_York:20200116T120000
SEQUENCE:0
SUMMARY:IAPP: What to Do When Consent Doesn’t Work under CCPA
URL:https://privacycalendar.org/event/iapp-consent-doesnt-work-ccpa/
X-COST-TYPE:external
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p>In addition t
 o other benefits\, the California Consumer Privacy Act enhances privacy fo
 r individuals when data uses cannot be adequately served using consent alo
 ne. The CCPA provides incentives for companies to implement safeguards tha
 t reduce data privacy risk from even occurring in the first place. Under t
 he CCPA\, this can be accomplished by leveraging new technically enforced\
 , risk-based deidentification controls.</p>\n<p>Benefits of Non-Consent Pr
 ocessing (via DeIdentification)</p>\n<p>Processing data under the CCPA’s d
 eidentification requirements brings many benefits. They include:</p>\n<p>F
 or individuals and society:<br />\n+Consumer benefits from data processing
  that is not well supported via opt-in/consent requirements because of the
  complexity of processing and difficulty of explanation.<br />\n+Societal 
 benefits from having more representative\, non-discriminatory data to trai
 n accurate and representative artificial intelligence and machine learning
  models.</p>\n<p>For data controllers and processors:<br />\n+Greater flex
 ibility in complying with data subject requests to delete data.<br />\n+En
 hanced ability to lawfully share and combine data with third parties.<br /
 >\n+Requirements for Non-Consent Processing (via DeIdentification)</p>\n<p
 >Processing protected personal information via CCPA deidentification excep
 tions requires that proper technical and organizational safeguards are in 
 place.</p>\n<p>Those requirements include:<br />\n+CCPA increases deidenti
 fication standards to a new “2020 De-ID Standard”<br />\n+The 2020 De-ID S
 tandard under the CCPA now requires:<br />\n+Technical safeguards to preve
 nt recipients of protected information from inadmissibly re-identifying in
 dividuals when used on a distributed\, multi-party basis.<br />\n+Greater 
 protection than otherwise required under laws that were enacted almost a q
 uarter century ago\, like the Health Insurance Portability and Accountabil
 ity Act.<br />\n+Context-aware\, risk-based management of re-identificatio
 n risk.<br />\n+Protection against re-identification risk from data in the
  hands of third parties.</p>\n<p>Host:<br />\nDave Cohen\, CIPP/E\, CIPP/U
 S\, Knowledge Manager\, IAPP</p>\n<p>Panelists:<br />\nDeven McGraw\, Chie
 f Compliance Officer\, Ciitizen (former healthcare privacy official at the
  Department of Health and Human Services)</p>\n<p>﻿Khaled El Emam\, Profes
 sor\, University of Ottawa/CHEO Research Institute</p>\n<p>Gary LaFever\, 
 CEO\, Anonos</p>\n<p>Justin Antonipillai\, CEO\, WireWheel</p>\n<p>Tickets
 : <a class='ai1ec-ticket-url-exported' href='https://iapp.org/store/webcon
 ferences/a0l1P00000DroauQAB/'>https://iapp.org/store/webconferences/a0l1P0
 0000DroauQAB/</a>.</p></BODY></HTML>
X-TICKETS-URL:https://iapp.org/store/webconferences/a0l1P00000DroauQAB/
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2551@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:IAPP\; https://iapp.org/store/webconferences/a0l1P00000Drn75QAB/
DESCRIPTION:Processing data under the EU General Data Protection Regulation
 ’s legitimate-interest legal basis can bring many benefits\, but to do so 
 properly\, the right technical and organizational safeguards must be in pl
 ace. What are those benefits?\nThey include:\n+Greater flexibility in comp
 lying with data subjects’ right to be forgotten requests.\n+Flexibility in
  complying with claims to restrict the processing of personal data.\n+Exem
 ption from data subjects’ right of portability.\n+The ability to claim tha
 t technical and organizational measures are in place in the context of aut
 omated decision making.\n+All of which bring significant value to the orga
 nization. If that’s the case\, then what are the technical and organizatio
 nal safeguards that must be implemented to realize these benefits\, and ho
 w can your organization put them in place? Join us for this privacy educat
 ion web conference to learn about this and more.\nYou’ll hear from experts
  in the field about:\n+How merely claiming to have a legitimate interest i
 n the results of processing is not enough without having accountability co
 ntrols to support data protection by design and default and transparency o
 bligations.\n+What types of technical/organizational safeguards help to sa
 tisfy the “Balancing on Interest” test to enable legitimate interest as a 
 legal basis for processing under the GDPR.\n+The benefits that greater/law
 ful data use bring when legitimate interest safeguards are implemented pro
 perly.\n+The risks that exist when claiming legitimate interest as a legal
  basis without having the proper safeguards in place.\nHost:\nDave Cohen\,
  CIPP/E\, CIPP/US\, Knowledge Manager\, IAPP\nPanelist:\nAilidh Callander\
 , Legal Officer\, Privacy International\nGary LaFever\, CEO\, Anonos\nRocc
 o Panetta\, CIPP/E\, Managing Partner\, Panetta & Associati\nTickets: http
 s://iapp.org/store/webconferences/a0l1P00000Drn75QAB/.
DTSTART;TZID=America/New_York:20200123T110000
DTEND;TZID=America/New_York:20200123T120000
SEQUENCE:0
SUMMARY:Legitimate-Interest Processing under the GDPR (With Privacy Interna
 tional)
URL:https://privacycalendar.org/event/iapp-legitimate-interest-processing-g
 dpr-privacy-international/
X-COST-TYPE:external
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p>Processing da
 ta under the EU General Data Protection Regulation’s legitimate-interest l
 egal basis can bring many benefits\, but to do so properly\, the right tec
 hnical and organizational safeguards must be in place. What are those bene
 fits?</p>\n<p>They include:<br />\n+Greater flexibility in complying with 
 data subjects’ right to be forgotten requests.<br />\n+Flexibility in comp
 lying with claims to restrict the processing of personal data.<br />\n+Exe
 mption from data subjects’ right of portability.<br />\n+The ability to cl
 aim that technical and organizational measures are in place in the context
  of automated decision making.<br />\n+All of which bring significant valu
 e to the organization. If that’s the case\, then what are the technical an
 d organizational safeguards that must be implemented to realize these bene
 fits\, and how can your organization put them in place? Join us for this p
 rivacy education web conference to learn about this and more.</p>\n<p>You’
 ll hear from experts in the field about:</p>\n<p>+How merely claiming to h
 ave a legitimate interest in the results of processing is not enough witho
 ut having accountability controls to support data protection by design and
  default and transparency obligations.<br />\n+What types of technical/org
 anizational safeguards help to satisfy the “Balancing on Interest” test to
  enable legitimate interest as a legal basis for processing under the GDPR
 .<br />\n+The benefits that greater/lawful data use bring when legitimate 
 interest safeguards are implemented properly.<br />\n+The risks that exist
  when claiming legitimate interest as a legal basis without having the pro
 per safeguards in place.</p>\n<p>Host:<br />\nDave Cohen\, CIPP/E\, CIPP/U
 S\, Knowledge Manager\, IAPP</p>\n<p>Panelist:<br />\nAilidh Callander\, L
 egal Officer\, Privacy International<br />\nGary LaFever\, CEO\, Anonos<br
  />\nRocco Panetta\, CIPP/E\, Managing Partner\, Panetta & Associati</p>\n
 <p>Tickets: <a class='ai1ec-ticket-url-exported' href='https://iapp.org/st
 ore/webconferences/a0l1P00000Drn75QAB/'>https://iapp.org/store/webconferen
 ces/a0l1P00000Drn75QAB/</a>.</p></BODY></HTML>
X-TICKETS-URL:https://iapp.org/store/webconferences/a0l1P00000Drn75QAB/
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2578@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:
DESCRIPTION:Hear from the IAPP\, ICO\, IAF\, Anonos and Acxiom on the follo
 wing:\nFor those at the crossroads of trying to balance data value and pri
 vacy\, this web conference teaches the fundamentals of EU General Data Pro
 tection Regulation-recommended pseudonymization and how it helps organizat
 ions to maximize data utility while increasing accountability\, ethics and
  transparency.\nData drives commerce. It opens up opportunities for busine
 sses to build on a global scale. But those opportunities have brought chal
 lenges in data innovation and utility\, risk and the privacy of individual
 s. To date\, commerce has experimented with consent to manage these risk a
 nd privacy challenges. But consent alone no longer works in many situation
 s\; we need to go above and beyond consent by itself. This webinar will lo
 ok at a complement to consent\, a technological application that is a “bel
 t and braces” approach to balancing privacy and data value when consent do
 es not work. Panelists will discuss how to fully maximize data value while
  maintaining privacy\, through the use of GDPR-recommended pseudonymizatio
 n safeguards\, to achieve ethical data use\, while maximizing data utility
 .\nJoin us for this data privacy education web conference to learn about t
 his and more. You’ll hear from experts in the field about:\n+What is the 5
 th Cookie working group (www.5thCookie.com)\, and what does it hope to ach
 ieve?\n+How does the 5th Cookie approach leverage GDPR-recommended pseudon
 ymization?\n+How does it enable ethical advertising technology/real-time b
 idding?\n+How to apply GDPR-recommended pseudonymization to other data use
 s (non-adtech/RTB)?\n+What are the benefits of leveraging pseudonymization
  to enforce risk-based data governance policies?\n+What do you gain when y
 ou can resolve conflicts between maximizing data value and protecting priv
 acy?\nPanelists:\n+Paul Comerford\, Principal Technology Policy Advisor\, 
 ICO UK Data Protection Authority\n+Martin Abrams\, Executive Director and 
 Chief Strategist\, International Accountability Foundation\n+Gary LaFever\
 , CEO\, Anonos\n+Dr. Sachiko Scheuing\, CIPP/E\, European Privacy Officer 
 and Data Protection Officer\, Acxiom\nTickets: https://www.anonos.com/ICO.
DTSTART;TZID=America/New_York:20200213T110000
DTEND;TZID=America/New_York:20200213T110000
SEQUENCE:0
SUMMARY:Can Pseudonymization Save AdTech?
URL:https://privacycalendar.org/event/can-pseudonymization-save-adtech/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 020/02/ICO-Pseudonymisation-Webinar-GDPR-150x150.png\;150\;150\;1\,medium\
 ;https://privacycalendar.org/wp-content/uploads/2020/02/ICO-Pseudonymisati
 on-Webinar-GDPR-300x86.png\;300\;86\;1\,large\;https://privacycalendar.org
 /wp-content/uploads/2020/02/ICO-Pseudonymisation-Webinar-GDPR-1024x294.png
 \;1024\;294\;1\,full\;https://privacycalendar.org/wp-content/uploads/2020/
 02/ICO-Pseudonymisation-Webinar-GDPR.png\;1450\;416\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2020/02/ICO-Pseudonymisation-Webinar-GDPR-300x86.png' widt
 h='300' height='86' /></div><p>Hear from the IAPP\, ICO\, IAF\, Anonos and
  Acxiom on the following:</p>\n<p>For those at the crossroads of trying to
  balance data value and privacy\, this web conference teaches the fundamen
 tals of EU General Data Protection Regulation-recommended pseudonymization
  and how it helps organizations to maximize data utility while increasing 
 accountability\, ethics and transparency.</p>\n<p>Data drives commerce. It
  opens up opportunities for businesses to build on a global scale. But tho
 se opportunities have brought challenges in data innovation and utility\, 
 risk and the privacy of individuals. To date\, commerce has experimented w
 ith consent to manage these risk and privacy challenges. But consent alone
  no longer works in many situations\; we need to go above and beyond conse
 nt by itself. This webinar will look at a complement to consent\, a techno
 logical application that is a “belt and braces” approach to balancing priv
 acy and data value when consent does not work. Panelists will discuss how 
 to fully maximize data value while maintaining privacy\, through the use o
 f GDPR-recommended pseudonymization safeguards\, to achieve ethical data u
 se\, while maximizing data utility.</p>\n<p>Join us for this data privacy 
 education web conference to learn about this and more. You’ll hear from ex
 perts in the field about:</p>\n<p>+What is the 5th Cookie working group (w
 ww.5thCookie.com)\, and what does it hope to achieve?<br />\n+How does the
  5th Cookie approach leverage GDPR-recommended pseudonymization?<br />\n+H
 ow does it enable ethical advertising technology/real-time bidding?<br />
 \n+How to apply GDPR-recommended pseudonymization to other data uses (non-
 adtech/RTB)?<br />\n+What are the benefits of leveraging pseudonymization 
 to enforce risk-based data governance policies?<br />\n+What do you gain w
 hen you can resolve conflicts between maximizing data value and protecting
  privacy?</p>\n<p>Panelists:</p>\n<p>+Paul Comerford\, Principal Technolog
 y Policy Advisor\, ICO UK Data Protection Authority</p>\n<p>+Martin Abrams
 \, Executive Director and Chief Strategist\, International Accountability 
 Foundation</p>\n<p>+Gary LaFever\, CEO\, Anonos</p>\n<p>+Dr. Sachiko Scheu
 ing\, CIPP/E\, European Privacy Officer and Data Protection Officer\, Acxi
 om</p>\n<p>Tickets: <a class='ai1ec-ticket-url-exported' href='https://www
 .anonos.com/ICO'>https://www.anonos.com/ICO</a>.</p></BODY></HTML>
X-TICKETS-URL:https://www.anonos.com/ICO
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2468@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:In-person event streamed online
CONTACT:https://www.rsaconference.com/events/us20/speakers/call-for-speaker
 s
DESCRIPTION:You’re an industry expert with knowledge to share. Showcase you
 r industry expertise with our community February 24 – 28 in San Francisco.
  Get recognition from industry colleagues and take advantage of unparallel
 ed networking opportunities with other cyber security and risk management 
 professionals\, industry authorities\, and thought leaders from around the
  world.\nCall for Speakers for Full Conference tracks and Learning Labs cl
 oses:\nFriday\, August 2 (11:59 PM Pacific Time).\nCall for Speakers for H
 ackers & Threats tracks and RSAC Sandbox\, closes:\nFriday\, August 16 (11
 :59 PM Pacific Time).
DTSTART;TZID=America/New_York:20200224T090000
DTEND;TZID=America/New_York:20200228T180000
GEO:+37.783604;-122.400888
LOCATION:Moscone Center @ Moscone Center South\, 747 Howard St\, San Franci
 sco\, CA 94103\, USA
SEQUENCE:0
SUMMARY:Call for Speakers for RSA Conference 2020
URL:https://privacycalendar.org/event/call-speakers-rsa-conference-2020/
X-COST-TYPE:free
X-WP-IMAGES-URL:thumbnail\;https://www.linkedin.com/media-proxy/ext?w=1200&
 h=627&hash=8rdiHsPzMxMCUNFENQKMIqGaSZI%3D&ora=1%2CaFBCTXdkRmpGL2lvQUFBPQ%2
 CxAVta5g-0R65gwkZxhJs4b2SqFujqlRXV4vSCWzjRXb1p8qDY3P2G6SuCrChpl15G3NSyVVuE
 JL9FGmwfervdNSsEq8glsXjcsPgMAVXJEtmhj4CuIhjP1QmtpGjSLOmOXYd0OoOPXrlMfS8MgN
 nXnFurbzHJ5ff\;358\;187\,medium\;https://www.linkedin.com/media-proxy/ext?
 w=1200&h=627&hash=8rdiHsPzMxMCUNFENQKMIqGaSZI%3D&ora=1%2CaFBCTXdkRmpGL2lvQ
 UFBPQ%2CxAVta5g-0R65gwkZxhJs4b2SqFujqlRXV4vSCWzjRXb1p8qDY3P2G6SuCrChpl15G3
 NSyVVuEJL9FGmwfervdNSsEq8glsXjcsPgMAVXJEtmhj4CuIhjP1QmtpGjSLOmOXYd0OoOPXrl
 MfS8MgNnXnFurbzHJ5ff\;358\;187\,large\;https://www.linkedin.com/media-prox
 y/ext?w=1200&h=627&hash=8rdiHsPzMxMCUNFENQKMIqGaSZI%3D&ora=1%2CaFBCTXdkRmp
 GL2lvQUFBPQ%2CxAVta5g-0R65gwkZxhJs4b2SqFujqlRXV4vSCWzjRXb1p8qDY3P2G6SuCrCh
 pl15G3NSyVVuEJL9FGmwfervdNSsEq8glsXjcsPgMAVXJEtmhj4CuIhjP1QmtpGjSLOmOXYd0O
 oOPXrlMfS8MgNnXnFurbzHJ5ff\;358\;187\,full\;https://www.linkedin.com/media
 -proxy/ext?w=1200&h=627&hash=8rdiHsPzMxMCUNFENQKMIqGaSZI%3D&ora=1%2CaFBCTX
 dkRmpGL2lvQUFBPQ%2CxAVta5g-0R65gwkZxhJs4b2SqFujqlRXV4vSCWzjRXb1p8qDY3P2G6S
 uCrChpl15G3NSyVVuEJL9FGmwfervdNSsEq8glsXjcsPgMAVXJEtmhj4CuIhjP1QmtpGjSLOmO
 XYd0OoOPXrlMfS8MgNnXnFurbzHJ5ff\;358\;187
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><p><img class=''
  src='https://www.linkedin.com/media-proxy/ext?w=1200&h=627&hash=8rdiHsPzM
 xMCUNFENQKMIqGaSZI%3D&ora=1%2CaFBCTXdkRmpGL2lvQUFBPQ%2CxAVta5g-0R65gwkZxhJ
 s4b2SqFujqlRXV4vSCWzjRXb1p8qDY3P2G6SuCrChpl15G3NSyVVuEJL9FGmwfervdNSsEq8gl
 sXjcsPgMAVXJEtmhj4CuIhjP1QmtpGjSLOmOXYd0OoOPXrlMfS8MgNnXnFurbzHJ5ff' alt='
 Image result for rsa conference call for speakers' width='358' height='187
 ' /></p>\n<p>You’re an industry expert with knowledge to share. Showcase y
 our industry expertise with our community February 24 – 28 in San Francisc
 o. Get recognition from industry colleagues and take advantage of unparall
 eled networking opportunities with other cyber security and risk managemen
 t professionals\, industry authorities\, and thought leaders from around t
 he world.</p>\n<p>Call for Speakers for <strong>Full Conference tracks</st
 rong> and <strong>Learning Labs</strong> closes:<br />\n<strong>Friday\, A
 ugust 2</strong> (11:59 PM Pacific Time).</p>\n<p>Call for Speakers for <s
 trong>Hackers & Threats tracks</strong> and <strong>RSAC Sandbox</strong>\
 , closes:<br />\n<strong>Friday\, August 16</strong> (11:59 PM Pacific Tim
 e).</p>\n</BODY></HTML>
END:VEVENT
BEGIN:VEVENT
UID:ai1ec-2592@privacycalendar.org
DTSTAMP:20210430T202943Z
CATEGORIES;LANGUAGE=en-US:Online Events
CONTACT:
DESCRIPTION:Complying with GDPR\, CCPA and emerging state laws requires a g
 ood technical and business understanding of ad tech in order to assess rel
 ationships with a wide range of partners.\nFor a deeper dive into the nuts
  and bolts of ad tech\, please join us on Wednesday\, April 8th\, from 10a
 m – 12pm Eastern Time for a training on data collection methods and busine
 ss models for tracking\, analytics\, and advertising. Topics will include:
  basic ad delivery and reporting\, online and mobile platforms and data fl
 ows\, real-time bidding (RTB)\, and analytics as well as an overview of th
 e current discussions on the future of ad tech.\nParticipants will gain an
  understanding of:\n\nHow browsers work and why default browser settings m
 atter when performing a cookie audit of a website.\n\n\nHow online adverti
 sing works\, including the intricacies of real-time bidding and the interp
 lay between the various participants in the ad-ecosystem.\n\n\nAn overview
  of the ideas being discussed in response to the phasing out of support fo
 r third-party cookies and the working groups and standards efforts to foll
 ow to track the post-cookie discussions.\n\nExpert Speakers Include:\n\nCh
 risty Harris\, Director of Technology & Privacy Research\, Future of Priva
 cy Forum\n\n\nDr. Rob van Eijk\, Managing Director\, Europe\, Future of Pr
 ivacy Forum\n\nPlease register as soon as possible\, as space is limited.
 \nThis event will ONLY be live-streamed for remote participation and will 
 be recorded.\n\n\n\n\n\n\nTickets: https://www.eventbrite.com/e/fpf-worksh
 op-understanding-ad-tech-tickets-100422847440.
DTSTART;TZID=America/New_York:20200408T100000
DTEND;TZID=America/New_York:20200408T120000
SEQUENCE:0
SUMMARY:FPF Workshop: Understanding Ad Tech
URL:https://privacycalendar.org/event/fpf-workshop-ad-tech-101-102/
X-COST-TYPE:external
X-WP-IMAGES-URL:thumbnail\;https://privacycalendar.org/wp-content/uploads/2
 020/03/Ad-Tech-Webinar-Invite-Graphic-v.3-Apr.8.2020-150x150.png\;150\;150
 \;1\,medium\;https://privacycalendar.org/wp-content/uploads/2020/03/Ad-Tec
 h-Webinar-Invite-Graphic-v.3-Apr.8.2020-300x300.png\;300\;300\;1\,large\;h
 ttps://privacycalendar.org/wp-content/uploads/2020/03/Ad-Tech-Webinar-Invi
 te-Graphic-v.3-Apr.8.2020-1024x1024.png\;1024\;1024\;1\,full\;https://priv
 acycalendar.org/wp-content/uploads/2020/03/Ad-Tech-Webinar-Invite-Graphic-
 v.3-Apr.8.2020.png\;1654\;1654\;
X-ALT-DESC;FMTTYPE=text/html:<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 3.2//E
 N'>\\n<HTML>\\n<HEAD>\\n<TITLE></TITLE>\\n</HEAD>\\n<BODY><div class='ai1e
 c-event-avatar alignleft timely'><img src='https://privacycalendar.org/wp-
 content/uploads/2020/03/Ad-Tech-Webinar-Invite-Graphic-v.3-Apr.8.2020-300x
 300.png' width='300' height='300' /></div><div class='tribe-events-single-
 event-description tribe-events-content'>\n<div class='g-cell g-cell-1-1 g-
 cell-md-7-12 g-cell--no-gutters l-lg-pad-right-6'>\n<div class='g-group l-
 mar-bot-6 l-sm-mar-bot-4'>\n<div class='structured-content g-cell g-cell-1
 0-12 g-cell-md-1-1'>\n<div class='has-user-generated-content' data-automat
 ion='about-this-event-sc'>\n<div class='structured-content-rich-text struc
 tured-content__module l-align-left l-mar-vert-6 l-sm-mar-vert-4 text-body-
 medium'>\n<p>Complying with GDPR\, CCPA and emerging state laws requires a
  good technical and business understanding of ad tech in order to assess r
 elationships with a wide range of partners.</p>\n<p>For a deeper dive into
  the nuts and bolts of ad tech\, please join us on <strong>Wednesday\, Apr
 il 8th\, from 10am – 12pm Eastern Time </strong>for a training on data col
 lection methods and business models for tracking\, analytics\, and adverti
 sing. Topics will include: basic ad delivery and reporting\, online and mo
 bile platforms and data flows\, real-time bidding (RTB)\, and analytics as
  well as an overview of the current discussions on the future of ad tech.<
 /p>\n<p><strong>Participants will gain an understanding of:</strong></p>\n
 <ul>\n<li>How browsers work and why default browser settings matter when p
 erforming a cookie audit of a website.</li>\n</ul>\n<ul>\n<li>How online a
 dvertising works\, including the intricacies of real-time bidding and the 
 interplay between the various participants in the ad-ecosystem.</li>\n</ul
 >\n<ul>\n<li>An overview of the ideas being discussed in response to the p
 hasing out of support for third-party cookies and the working groups and s
 tandards efforts to follow to track the post-cookie discussions.</li>\n</u
 l>\n<p><strong>Expert Speakers Include:</strong></p>\n<ul>\n<li><strong>Ch
 risty Harris</strong>\, Director of Technology & Privacy Research\, Future
  of Privacy Forum</li>\n</ul>\n<ul>\n<li><strong>Dr. Rob van Eijk</strong>
 \, Managing Director\, Europe\, Future of Privacy Forum</li>\n</ul>\n<p><e
 m><strong>Please register as soon as possible\, as space is limited.</stro
 ng></em></p>\n<p>This event will ONLY be live-streamed for remote particip
 ation and will be recorded.</p>\n</div>\n</div>\n</div>\n</div>\n</div>\n<
 /div>\n<p>Tickets: <a class='ai1ec-ticket-url-exported' href='https://www.
 eventbrite.com/e/fpf-workshop-understanding-ad-tech-tickets-100422847440'>
 https://www.eventbrite.com/e/fpf-workshop-understanding-ad-tech-tickets-10
 0422847440</a>.</p></BODY></HTML>
X-TICKETS-URL:https://www.eventbrite.com/e/fpf-workshop-understanding-ad-te
 ch-tickets-100422847440
END:VEVENT
END:VCALENDAR
