BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Institute of Operational Privacy Design - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Institute of Operational Privacy Design
X-ORIGINAL-URL:https://instituteofprivacydesign.org
X-WR-CALDESC:Events for Institute of Operational Privacy Design
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Halifax
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20230312T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20231105T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20240310T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20241103T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20250309T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20251102T050000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20230312T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20231105T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20240310T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20241103T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20250309T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20251102T080000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20230326T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20231029T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20241027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240120
DTEND;VALUE=DATE:20240124
DTSTAMP:20260406T102851
CREATED:20240119T115717Z
LAST-MODIFIED:20240123T215237Z
UID:5633-1705708800-1706054399@instituteofprivacydesign.org
SUMMARY:Symptai Live Online CIPP/E Training
DESCRIPTION:This training is an opportunity to learn about critical privacy concepts that are also integral to the CIPP/E exam. While not purely a ‘test prep’ course\, this training is appropriate for professionals who plan to certify\, as well for those who want to deepen their data protection knowledge. Both the training and the exam are based on the same body of knowledge. \nThese instructor-led training sessions are beneficial for persons who plan to certify or just want to deepen your privacy knowledge. \n Preview this course \n\n\n\n\nWhat will you learn\n\nModule 1: Data Protection Laws\nModule 2: Personal Data\nModule 3: Controllers and Processors\nModule 4: Processing Personal Data\nModule 5: Data Subjects’ Rights\nModule 6: Information Provision Obligations\nModule 7: International Data Transfers\nModule 8: Compliance Considerations\nModule 9: Security of Processing\nModule 10: Accountability\nModule 11: Supervisions and Enforcement\n\n  \n\n\nWho should attend?\n\nLegal\nAuditors\nLegal Compliance Officers\nInformation Management\nHuman Resources\nSecurity Manager\nRecords Managers\n\n  \n\n\nWhat comes with registration?\nOnce registered for this course\, participants will also be registered as an official member of the IAPP and receive official members access to the training/course material for the CIPP exam and an exam voucher in order to register for the exam. This course will prepare persons to sit the CIPP exam and have a comprehensive understanding of jurisdictional laws\, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. \n  \n\nWhy organizations should implement training?\n\nComply with GDPR requirements\nAvoid penalties up to 20 million euros (25 million USD) or 4% of global revenues\nImprove the way your entire organization handles data\nReduce risk of a data breach\nBuild privacy policies to make your organization more cost-effective\nDemonstrate accountability and due diligence\nFoster customer confidence
URL:https://instituteofprivacydesign.org/event/iapp-cipp-e-virtual-jan-20-23/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPP/E
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/logo.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240125T120000
DTEND;TZID=America/New_York:20240125T130000
DTSTAMP:20260406T102851
CREATED:20240103T231752Z
LAST-MODIFIED:20240125T165323Z
UID:5403-1706184000-1706187600@instituteofprivacydesign.org
SUMMARY:Assurance Cases | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a one-hour informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases.\nThe participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nJanuary 25th\, 2024 @ 12:00 PM ET \n  \nTopic:\nAssurance Cases \n  \nSynopsis:\nAssurance cases are gaining traction as a means of certification in Aerospace and other safety and security critical industries. However\, these assurance cases can become overwhelming and complicated\, even for moderately complex systems. Therefore\, there is a compelling requirement to develop new automation that can aid in creating and assessing assurance cases. In this introductory presentation for the webinar to facilitate subsequent discussion\, I introduce a rigorous framework that eliminates adhoc construction of assurance cases with emphasis on the validity and soundness of the argumentation process\, confidence of the claims/arguments/evidences and the systematic exploration of defeaters. I briefly discuss the tools and automation support for Assurance 2.0 that was developed in the Clarissa project for a DARPA ARCOS program and finally highlight the key capabilities through examples. \n  \nPre-Webinar Resources:\n\nCLARISSA: Foundations\, Tools & Automation for Assurance Cases\, Presented at 42nd Digital Avionics Systems Conference (DASC)\, Barcelona\, Spain\, October 2023\, https://www.csl.sri.com/~rushby/papers/clarissa-dasc23.pdf\nAdelard ASCE tool https://www.adelard.com/asce/\nAdvoCATE NASA Tool: https://ntrs.nasa.gov/citations/20220009664\nAssurance 2.0 Methodology for Assurance cases: https://arxiv.org/abs/2205.04522\nAssurance 2.0: A Manifesto 2004.10474v3.pdf (arxiv.org) \n\n  \nSpeaker:\nVatsan Varadarajan\nDr. Srivatsan Varadarajan is a Technical Engineering Fellow within Advanced Technology for Honeywell Aerospace. Research areas include AI/ML technologies for autonomy\, certifiable software\, formal methods (e.g.\, model checkers\, theorem provers) for automated verification. Extensive expertise in the development of distributed\, fault-tolerant networks\, wireless communications and dependable\, embedded hardware and software platforms. In his current role\, he oversees specific research and technology development projects in the core areas of certifiable platforms and assurance technologies for autonomous avionics systems. He has over 30 publications in conferences and journals and has 25 Patents awarded to date. He has a PhD in Computer Science and MS degrees in Mathematics and Computer sciences and Engineering. \n  \nModerator:\nSteve Hickman\nSteve is the Founder of Epistimis\, a company dedicated to providing tools that support true Privacy by Design. Prior to founding Epistimis\, Steve worked in the privacy organization at Meta/Facebook where he saw first-hand how current approaches won’t scale. Prior to working at Meta\, Steve worked at Honeywell Aerospace Advanced Technology\, where he worked on design tooling for the US Army. (Epistimis Modeling Tool uses the same conceptual foundation developed for the US Military). Prior to that\, he managed the Honeywell Aerospace Invention / Patent review process for 4 years\, which processed ~1000 invention disclosures each year. There he improved and automated processes\, created training\, and managed 12+ invention review teams consisting of 75+ technical experts from across Honeywell Aerospace. Prior to that Steve was one of architects of HiLiTE\, a tool for test and code generation for data flow and state designs used in Honeywell Aerospace’s flight and engine control software. Steve holds a BSEE from Rice University\, a MS Comp Sci from Southern Methodist University\, and a JD (Intellectual Property) from Mitchell Hamline School of Law. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event. Join as an Ambassador before the 1st of each month to get invited to the recurring monthly event. If you are already a member\, but need an invitation please contact admin22. 
URL:https://instituteofprivacydesign.org/event/assurance-cases-january-2024-privacy-engineering-technology-education-discussion-peted/
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240206
DTEND;VALUE=DATE:20240208
DTSTAMP:20260406T102851
CREATED:20240119T101607Z
LAST-MODIFIED:20240123T212859Z
UID:5520-1707177600-1707350399@instituteofprivacydesign.org
SUMMARY:Symptai In Person CIPT Training (Kingston\, Jamaica)
DESCRIPTION:The CIPT program was developed by the International Association of Privacy Professionals (IAPP)\, which is the world’s largest comprehensive global information privacy community and resource. The CIPT certification also holds accreditation under ISO 17024: 2012. \nThese instructor-led training sessions are beneficial for persons who plan to certify or just want to deepen your privacy knowledge. And\, in the ever-changing privacy environment\, as new legislation such as the GDPR and the CCPA comes along\, you will be fully prepared. \n  \n\nWhat will you learn\n\nModule 1: Foundational principles of privacy in technology\nModule 2: The role of the technology professional in privacy\nModule 3: Privacy threats and violations\nModule 4: Technical measures and privacy-enhancing technologies\nModule 5: Privacy engineering\nModule 6: Privacy-by-design methodology\nModule 7: Technology challenges for privacy\n\n  \n\n\nWho should attend?\n\nData Protection Officers\nData Protection Managers\nAuditors\nLegal Compliance Officers\nSecurity Manager\nInformation Managers\nAnyone involved with data protection processes and programs\n\n  \n\n\nWhat comes with registration?\nOnce registered for this course\, participants will also be registered as an official member of the IAPP and receive official members access to the training/course material for the CIPM exam and an exam voucher in order to register for the exam. This course will prepare persons to sit the CIPM exam and have a comprehensive understanding of privacy in an organization and how to manage it. \n  \n\nWhy organizations should implement training?\n\nComply with GDPR requirements\nAvoid penalties up to 20 million euros (25 million USD) or 4% of global revenues\nImprove the way your entire organization handles data\nReduce risk of a data breach\nBuild privacy policies to make your organization more cost-effective\nDemonstrate accountability and due diligence\nFoster customer confidence
URL:https://instituteofprivacydesign.org/event/iapp-cipt-kingston-jamaica-feb-6-7/
LOCATION:Symptai Consulting Limited\, 58 Half Way Tree Road\, Kingston\, Jamaica
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/logo.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240214T150000
DTEND;TZID=America/New_York:20240214T160000
DTSTAMP:20260406T102851
CREATED:20240117T190010Z
LAST-MODIFIED:20240117T190010Z
UID:5497-1707922800-1707926400@instituteofprivacydesign.org
SUMMARY:Q1 2024 All Hands Meeting
DESCRIPTION:Ambassadors\, Advisors\, Volunteers\, and Committee Members are all invited to join us Wednesday\, February 14th from 3:00 – 4:00 PM. We will meet to welcome our new members\, discuss community growth\, and report on the Privacy Design Seal in development! Agenda will be announced ASAP.  \nPlease reach out to admin22@instituteofprivacydesign.org if you are a member and have yet to receive invitation details. Guest invites limited. Ask a current member to nominate you to receive an invitation. If you are not a member\, apply to join as an Ambassador to get invited and see what’s up! 
URL:https://instituteofprivacydesign.org/event/q1-2024-all-hands-meeting/
CATEGORIES:All Hands Meeting
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/IOPD-AHM-Q12024.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240219T090000
DTEND;TZID=America/New_York:20240220T160000
DTSTAMP:20260406T102851
CREATED:20240212T231939Z
LAST-MODIFIED:20240219T133617Z
UID:6026-1708333200-1708444800@instituteofprivacydesign.org
SUMMARY:Artificial Intelligence Governance (AIGP)
DESCRIPTION:This training teaches critical artificial intelligence governance concepts that are also integral to the AIGP certification exam. While not purely a “test prep” course\, this training is appropriate for professionals who plan to certify\, as well as for those who want to deepen their AI governance knowledge. Both the training and the exam are based on the same body of knowledge. \n  \nWHAT YOU WILL LEARN: \nAIGP training teaches how to develop\, integrate and deploy trustworthy AI systems in line with emerging laws and policies. The curriculum provides an overview of AI technology\, survey of current law\, and strategies for risk management\, among many other relevant topics. \n  \nMODULES: \n\nModule 1: Foundations of artificial intelligence\nDefines AI and machine learning\, presents an overview of the different types of AI systems and their use cases\, and\npositions AI models in the broader socio-cultural context.\nModule 2: AI impacts on people and responsible AI principles\nOutlines the core risks and harms posed by AI systems\, the characteristics of trustworthy AI systems\, and the\nprinciples essential to responsible and ethical AI.\nModule 3: AI development life cycle\nDescribes the AI development life cycle and the broad context in which AI risks are managed.\nModule 4: Implementing responsible AI governance and risk management\nExplains how major AI stakeholders collaborate in a layered approach to manage AI risks while acknowledging AI\nsystems’ potential societal benefits.\nModule 5: Implementing AI projects and systems\nOutlines mapping\, planning and scoping AI projects\, testing and validating AI systems during development\, and\nmanaging and monitoring AI systems after deployment.\nModule 6: Current laws that apply to AI systems\nSurveys the existing laws that govern the use of AI\, outlines key GDPR intersections\, and provides awareness of\nliability reform\nModule 7: Existing and emerging AI laws and standards\nDescribes global AI-specific laws and the major frameworks and standards that exemplify how AI systems can be\nresponsibly governed.\nModule 8: Ongoing AI issues and concerns\nPresents current discussions and ideas about AI governance\, including awareness of legal issues\, user concerns\, and AI auditing and accountability issues.\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam (anticipated release in 1st quarter of 2024). Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/artificial-intelligence-governance-aigp-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#AIGP
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240220T090000
DTEND;TZID=America/New_York:20240223T170000
DTSTAMP:20260406T102851
CREATED:20240119T102000Z
LAST-MODIFIED:20240123T213104Z
UID:5524-1708419600-1708707600@instituteofprivacydesign.org
SUMMARY:Symptai Live Online CIPM Training
DESCRIPTION:The CIPM program was developed by the International Association of Privacy Professionals (IAPP)\, which is the world’s largest comprehensive global information privacy community and resource. The CIPM certification also holds accreditation under ISO 17024: 2012. \nThese instructor-led training sessions are beneficial for persons who plan to certify or just want to deepen your privacy knowledge. And\, in the ever-changing privacy environment\, as new legislation such as the GDPR and the CCPA comes along\, you will be fully prepared. \n  \n\nWhat will you learn\n\nModule 1: Introduction to privacy program management\nModule 2: Privacy governance\nModule 3: Applicable laws and regulations\nModule 4: Data assessments\nModule 5: Policies\nModule 6: Data subject rights\nModule 7: Training and awareness\nModule 8: Protecting personal information\nModule 9: Data breach incident plans\nModule 10: Measuring\, monitoring and auditing program performance\n\n  \n\n\nWho should attend?\n\nData Protection Officers\nData Protection Managers\nAuditors\nLegal Compliance Officers\nSecurity Manager\nInformation Managers\nAnyone involved with data protection processes and programs\n\n  \n\n\nWhat comes with registration?\nOnce registered for this course\, participants will also be registered as an official member of the IAPP and receive official members access to the training/course material for the CIPM exam and an exam voucher in order to register for the exam. This course will prepare persons to sit the CIPM exam and have a comprehensive understanding of privacy in an organization and how to manage it. \n  \n\nWhy organizations should implement training?\n\nComply with GDPR requirements\nAvoid penalties up to 20 million euros (25 million USD) or 4% of global revenues\nImprove the way your entire organization handles data\nReduce risk of a data breach\nBuild privacy policies to make your organization more cost-effective\nDemonstrate accountability and due diligence\nFoster customer confidence
URL:https://instituteofprivacydesign.org/event/iapp-cipm-virtual-feb-20-23/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPM
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/logo.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240222T120000
DTEND;TZID=America/New_York:20240222T130000
DTSTAMP:20260406T102851
CREATED:20240103T231725Z
LAST-MODIFIED:20240207T204551Z
UID:5405-1708603200-1708606800@instituteofprivacydesign.org
SUMMARY:Deploying Decentralized Privacy-Preserving Contact Tracing | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a recorded 10-minute introduction followed by a 40-minute informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. \nThe participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nFebruary 22\, 2024 @ 12:00 PM ET / 6:00 PM CET \n  \nTopic:\nDeploying decentralized privacy-preserving contact tracing \n  \nProblem Statement:\nDigital contact tracing systems promised to help combat the COVID-19 pandemic; but in doing so introduce privacy risks. Privacy-friendly contact tracing systems enable notification of exposed people without privacy harms. \n  \nSynopsis:\nIn this webinar Wouter will talk about his experience designing a large-scale privacy-friendly digital contact tracing system that later led to the system adopted by Google and Apple\, and experiences deploying such a privacy-friendly system in the wild. \n  \nPre-Webinar Resources:\n\nDeploying Decentralized\, Privacy-Preserving Proximity Tracing https://dl.acm.org/doi/pdf/10.1145/3524107\nDecentralized Privacy-Preserving Proximity Tracing (original DP3T whitepaper) https://arxiv.org/pdf/2005.12273.pdf\n\n  \nSpeaker:\nWouter Lueks\nWouter Lueks is a tenure-track faculty member at the CISPA Helmholtz Center for Information Security in Saarbrücken\, German. Before that he was a postdoctoral researcher at EPFL in Lausanne\, Switzerland where he worked with Carmela Troncoso. He is interested in solving real-world problems by designing end-to-end privacy-friendly systems. To do so he combines privacy\, applied cryptography\, and systems research. His work has real-world impact. For instance\, his designs for privacy-friendly contact tracing have been deployed in millions of phones around the world\, and his secure document search system is being deployed by a large organisation for investigative journalists. \n  \nModerator:\nAndrei Dumitru \nAfter working more than ten years in the IT department of an International Organization\, I focused in the last years on privacy and data protection. I think privacy is a fundamental right that cannot exist today without computer security so I am always searching to find a balance between both and see how privacy can be embedded into technology. I am particularly interested in privacy by design and dark patterns\, and always curious to see how privacy is integrated (or not) in current products and services. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event. Join as an Ambassador before the 1st of each month to get invited to the recurring monthly event. If you are already a member\, but need an invitation please contact admin22. 
URL:https://instituteofprivacydesign.org/event/dark-patterns-february-2024-privacy-engineering-technology-education-discussion-peted/
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/1-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240228T090000
DTEND;TZID=America/New_York:20240229T160000
DTSTAMP:20260406T102851
CREATED:20240212T233127Z
LAST-MODIFIED:20240216T221215Z
UID:6039-1709110800-1709222400@instituteofprivacydesign.org
SUMMARY:European Data Protection (CIPP/E)
DESCRIPTION:The European Data Protection (CIPP/E) encompasses pan-European and national data protection laws\, key data protection terminology and practical concepts concerning the protection of personal data and trans-border data flows. The global gold standard in European data protection certification. \nThe content of the courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \n  \nCourse outline: \n\nModule 1: Data protection laws\nModule 2: Personal data\nModule 3: Controllers and processors\nModule 4: Processing personal data\nModule 5: Data subject rights\nModule 6: Information provision obligations\nModule 7: International data transfers\nModule 8: Compliance considerations\nModule 9: Security of processing\nModule 10: Accountability\nModule 11: Supervision and enforcement\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/european-data-protection-cipp-e-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPP/E
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240229
DTEND;VALUE=DATE:20240302
DTSTAMP:20260406T102851
CREATED:20240122T210050Z
LAST-MODIFIED:20240409T185519Z
UID:5774-1709164800-1709337599@instituteofprivacydesign.org
SUMMARY:Privacy SWAN Virtual Live CIPT Training
DESCRIPTION:PrivacySWAN is an Official Training Partner of the International Association of Privacy Professionals (IAPP) which is the largest association of privacy professionals in the world. The CIPT is the first and original certification in Privacy Technology Management. Along with the training program\, the IAPP also provides an ANSI/ISO-accredited certification. Come learn how to develop and manage a global privacy and data protection program today. \nThis instructor-led training is conducted over two days. Privacy in Technology training is the how-to course on privacy and data protection practices in the development\, engineering\, deployment\, and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. It prepares you for the tough challenges you will encounter as you talk to your technical teams about incorporating privacy into their design. You will be provided with real-life examples and templates that help deal with the ever-changing privacy landscape. These news skills will advance your career. In addition to the highly sought-after training\, the following benefits are provided by Privacy SWAN: \n\nIAPP Strategic Privacy by Design Textbook (only for the first four students who register)\nIAPP Introduction to Privacy for Technology Professionals Textbook (Digital only – $75 value)\nParticipant training materials (only available with training)\nExam Voucher – if purchased ($550 value)\nOne year of IAPP Membership or renewal of existing Membership ($295 value)\nPrivacy SWAN custom training materials\n\n  \nWho should attend\nTechnology\, InfoSec\, and Engineering professionals with a primary focus on securing the integrity\, confidentiality\, and availability of corporate data. Anyone who can understand highly complex interconnected technologies and who needs to incorporate a robust privacy program to ensure compliance with global data protection regulations. \n\nChief Information Security Officers\nSecurity Managers\nInformation Managers\nProduct Managers\nAuditors\nContract Managers\nCompliance Officers\nPrivacy Managers\nChief Privacy Officers\nData Protection Officers\n\n  \nWhat you will learn\nHow to protect personal data by applying critical privacy concepts and practices that impact technology and use technology to design data privacy into products and services and establish privacy practices for data security and control\, such as data minimization\, perturbing the data\, and de-identification techniques. Factor privacy into data classification and emerging technology\, such as cloud computing\, facial recognition\, and surveillance. Communicate and collaborate on privacy issues with management\, development\, marketing\, and legal departments. Understand consumer privacy expectations and best practices\, while proactively addressing privacy issues with the Internet of Things. \n\nFoundational Principles in Technology Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks\nThe Tech Pro’s role in privacy Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security\nNeutralizing Threats and Enhancing Privacy Identify inherent risks throughout the stages of the data life cycle and explore how software security helps mitigate privacy threats; examine the impacts that behavioral advertising\, cyberbullying\, and social engineering have on privacy within the technological environment\nPrivacy Engineering Explores the role of privacy engineering within an organization\, including the objectives of privacy engineering\, privacy design patterns\, and software privacy risks\nTechnological Challenges for Privacy Examine the unique challenges that come from online privacy issues\, including automated decision making\, tracking and surveillance technologies\, anthropomorphism\, ubiquitous computing\, and mobile social computing\nOfficial IAPP CIPT Get Certified Documents\n\n 
URL:https://instituteofprivacydesign.org/event/privacy-swan-virtual-live-cipt-training/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/SWANlogo2023-transp-3.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240304T090000
DTEND;TZID=America/New_York:20240305T160000
DTSTAMP:20260406T102851
CREATED:20240212T233410Z
LAST-MODIFIED:20240216T221229Z
UID:6042-1709542800-1709654400@instituteofprivacydesign.org
SUMMARY:Privacy Program Management (CIPM)
DESCRIPTION:Privacy Program Management teaches you how to create and manage a privacy program. It gives you the tools to answer day-to-day questions about privacy operations. The CIPM is the world’s first and only certification in privacy program management. When you earn a CIPM\, it shows that you know how to make a privacy program work for your organization. \nThe content of the courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \n  \nCourse outline: \n\nModule 1: Introduction to privacy program management\nModule 2: Privacy  Governance\nModule 3: Applicable laws and regulations\nModule 4: Data assessments\nModule 5: Policies\nModule 6: Data subject rights\nModule 7: Training and awareness\nModule 8: Protecting personal information\nModule 9: Data breach incident plans\nModule 10: Monitoring and auditing program performance\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/privacy-program-management-cipm-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPM
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240307T130000
DTEND;TZID=America/New_York:20240307T150000
DTSTAMP:20260406T102851
CREATED:20240221T210416Z
LAST-MODIFIED:20240304T171924Z
UID:6221-1709816400-1709823600@instituteofprivacydesign.org
SUMMARY:Certification Study Group - Privacy In Technology (CIPT)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-privacy-in-technology-cipt/
LOCATION:Online
CATEGORIES:#CIPT,#certificationstudygroup
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240313
DTEND;VALUE=DATE:20240404
DTSTAMP:20260406T102851
CREATED:20240122T202855Z
LAST-MODIFIED:20240409T190349Z
UID:5754-1710288000-1712188799@instituteofprivacydesign.org
SUMMARY:Q1 2024 Strategic Privacy by Design Online Course
DESCRIPTION:Dive into Privacy Design!\nThis course is offered as an introduction to the concepts of strategic privacy by design over 4 – 5 weeks. Each week you will be provided new material to be done at your own pace including: \n\nInteractive Lessons\nOnline Coursework\nQuizzes\nSupplementary Reading Material\nWeekly Live Instructor Review of Group Assignment\n\n\nExpect to put in approximately 5-8 hours of study time per week:\n\n3-6 in self-study\n1 in team assignment\n1 in instructor review\n\n  \nEarly Bird Discount: Train for only $520 when you register before March 1st!
URL:https://instituteofprivacydesign.org/event/q1-2024-strategic-privacy-by-design-online-course/
LOCATION:Virtual
CATEGORIES:#privacytraining,#spbd
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/Privacy-by-Design-Training-Blue-4.png
ORGANIZER;CN="Enterprivacy Consulting Group":MAILTO:rjc@enterprivacy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240314T130000
DTEND;TZID=America/New_York:20240314T140000
DTSTAMP:20260406T102851
CREATED:20240307T150457Z
LAST-MODIFIED:20240307T150457Z
UID:6330-1710421200-1710424800@instituteofprivacydesign.org
SUMMARY:Quarterly Data Breach Review - Free Webinar
DESCRIPTION:Once a quarter we review several recent breaches\, discussing what happened and how it could have been prevented. \n  \n\n  \nThe Quarterly Data Breach Review is led by Benjamin Siegel\, our Senior Privacy Consultant. Ben has a keen interest in the root causes of data breaches. He shares his breach insights by providing a quarterly roundup of recent events. He combines these learnings with his broad privacy knowledge to deliver concise\, actionable privacy assessments. \n  \nJoin us for all our monthly webinar conversations\, where we take a deep dive into current events happening globally\, and topics that have an impact on the decision making\, processing\, or transfer of personal data. \n  \nQuestions are welcome! Please submit them to info@privacyref.com. Contact us\, send us your comments and suggestions.
URL:https://instituteofprivacydesign.org/event/quarterly-data-breach-review-free-webinar/
LOCATION:Online
CATEGORIES:Speaking Engagements,Webinar
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240314T130000
DTEND;TZID=America/New_York:20240314T150000
DTSTAMP:20260406T102851
CREATED:20240221T210956Z
LAST-MODIFIED:20240312T193321Z
UID:6225-1710421200-1710428400@instituteofprivacydesign.org
SUMMARY:Certification Study Group - U.S. Private-Sector Privacy (CIPP/US)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-u-s-private-sector-privacy-cipp-us/
LOCATION:Online
CATEGORIES:#CIPP/US,#certificationstudygroup
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240318T090000
DTEND;TZID=America/New_York:20240319T160000
DTSTAMP:20260406T102851
CREATED:20240212T233739Z
LAST-MODIFIED:20240304T172042Z
UID:6045-1710752400-1710864000@instituteofprivacydesign.org
SUMMARY:Artificial Intelligence Governance (AIGP)
DESCRIPTION:This training teaches critical artificial intelligence governance concepts that are also integral to the AIGP certification exam. While not purely a “test prep” course\, this training is appropriate for professionals who plan to certify\, as well as for those who want to deepen their AI governance knowledge. Both the training and the exam are based on the same body of knowledge. \n  \nWHAT YOU WILL LEARN: \nAIGP training teaches how to develop\, integrate and deploy trustworthy AI systems in line with emerging laws and policies. The curriculum provides an overview of AI technology\, survey of current law\, and strategies for risk management\, among many other relevant topics. \n  \nMODULES: \n\nModule 1: Foundations of artificial intelligence\nDefines AI and machine learning\, presents an overview of the different types of AI systems and their use cases\, and\npositions AI models in the broader socio-cultural context.\nModule 2: AI impacts on people and responsible AI principles\nOutlines the core risks and harms posed by AI systems\, the characteristics of trustworthy AI systems\, and the\nprinciples essential to responsible and ethical AI.\nModule 3: AI development life cycle\nDescribes the AI development life cycle and the broad context in which AI risks are managed.\nModule 4: Implementing responsible AI governance and risk management\nExplains how major AI stakeholders collaborate in a layered approach to manage AI risks while acknowledging AI\nsystems’ potential societal benefits.\nModule 5: Implementing AI projects and systems\nOutlines mapping\, planning and scoping AI projects\, testing and validating AI systems during development\, and\nmanaging and monitoring AI systems after deployment.\nModule 6: Current laws that apply to AI systems\nSurveys the existing laws that govern the use of AI\, outlines key GDPR intersections\, and provides awareness of\nliability reform\nModule 7: Existing and emerging AI laws and standards\nDescribes global AI-specific laws and the major frameworks and standards that exemplify how AI systems can be\nresponsibly governed.\nModule 8: Ongoing AI issues and concerns\nPresents current discussions and ideas about AI governance\, including awareness of legal issues\, user concerns\, and AI auditing and accountability issues.\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam (anticipated release in 1st quarter of 2024). Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/artificial-intelligence-governance-aigp-2-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#AIGP
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240319T130000
DTEND;TZID=America/New_York:20240319T140000
DTSTAMP:20260406T102851
CREATED:20240228T223025Z
LAST-MODIFIED:20240228T223025Z
UID:6276-1710853200-1710856800@instituteofprivacydesign.org
SUMMARY:ISSA Privacy SIG: 50 Shades of Data
DESCRIPTION:Summary \nIt’s all about the data.  Whether it’s Data Subject Request or a Data Breach the amount of effort\, cost and impact on a company’s reputation depend on the quantity and the type of personal data involved.  The more personal data\, the larger the consequences.  This presentation is a practical approach to privacy and data protection that includes strategies to help you stay compliant with the evolving privacy regulations.  No legalese or technical jargon\, just a talk about applicability. \n\nDate and Time \nMarch 19 @ 1:00 pm – 2:00 pm EDT \n\nModerator \nZachary Miller – Information Security Engineer\, Kratos Defense and Security Solutions \nZach is a skilled information security professional committed to safeguarding digital landscapes. Beyond his corporate role\, he dedicates himself to supporting small businesses and non-profits\, actively contributing to their organizational resilience. \nHe looks forward to collaborating with fellow members and contributing to the success of the Privacy Special Interest Group\, the ISSA\, and its members. \n\nSpeaker/s \nJanelle Hsia – Principal\, Privacy SWAN Consulting \nJanelle Hsia is a trusted advisor for strategic and tactical decision-making within organizations of all sizes. She focuses on privacy and security while bringing a diverse background in leadership\, business\, security\, privacy\, and technology spanning over 20 years. Her experience integrating privacy with security and technology helps companies operationalize their privacy and security requirements. She creates comprehensive and tailored data governance programs for SMBs with a global presence. Her passion is privacy and data protection training and awareness. This fall\, she is teaching a class on Privacy and Technology at the University of Colorado in Boulder. She is an ISSA Privacy SIG Tri-Chair and one of our 2022 Volunteers of the Year. She is a member of the IEEE Digital Privacy Working Group and an IAPP Official Training Partner. She holds the following certifications CIPM\, CIPT\, CIPP/US/E\, CISA\, PMP\, and GSLC.
URL:https://instituteofprivacydesign.org/event/issa-privacy-sig-50-shades-of-data/
LOCATION:Virtual
CATEGORIES:Speaking Engagements,Webinar
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/image_967120.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240320T090000
DTEND;TZID=America/New_York:20240321T160000
DTSTAMP:20260406T102851
CREATED:20240212T234329Z
LAST-MODIFIED:20240304T172129Z
UID:6052-1710925200-1711036800@instituteofprivacydesign.org
SUMMARY:U.S. Private-Sector Privacy (CIPP/US)
DESCRIPTION:U.S. Private-Sector Privacy CIPP/US provides an overview of data protection laws and regulations in the U.S and an understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S.\, the EU and other jurisdictions. The U.S. Private-Sector Privacy CIPP/US program was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations. \nThe content of the U.S. Private-Sector Privacy CIPP/US courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \n  \nCourse Outline: \n\nModule 1: Introduction to privacy\nModule 2: Structure of U.S. law\nModule 3: General Data Protection Regulation overview\nModule 4: The California Consumer Privacy Act\nModule 5: Enforcement of U.S. privacy and security laws\nModule 6: Information management from a U.S. perspective\nModule 7: Federal versus state authority\nModule 8: Healthcare\nModule 9: Financial privacy\nModule 10: Education\nModule 11: Telecommunications and marketing\nModule 12: Law enforcement and privacy\nModule 13: National security and privacy\nModule 14: Civil litigation and privacy\nModule 15: Legal overview of workplace privacy\nModule 16: Privacy before\, during and after employment\nModule 17: State data security laws\nModule 18: Data breach notification laws\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/u-s-private-sector-privacy-cipp-us-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPP/US
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240322
DTEND;VALUE=DATE:20240324
DTSTAMP:20260406T102851
CREATED:20240122T210222Z
LAST-MODIFIED:20240409T185538Z
UID:5773-1711065600-1711238399@instituteofprivacydesign.org
SUMMARY:Privacy SWAN Virtual Live CIPT Training
DESCRIPTION:PrivacySWAN is an Official Training Partner of the International Association of Privacy Professionals (IAPP) which is the largest association of privacy professionals in the world. The CIPT is the first and original certification in Privacy Technology Management. Along with the training program\, the IAPP also provides an ANSI/ISO-accredited certification. Come learn how to develop and manage a global privacy and data protection program today. \nThis class is offered on Friday and Saturday for those busy professionals who can only afford to take off one day of the work week. This instructor-led training is conducted over two days. Privacy in Technology training is the how-to course on privacy and data protection practices in the development\, engineering\, deployment\, and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. It prepares you for the tough challenges you will encounter as you talk to your technical teams about incorporating privacy into their design. You will be provided with real-life examples and templates that help deal with the ever-changing privacy landscape. These news skills will advance your career. In addition to the highly sought-after training\, the following benefits are provided by Privacy SWAN: \n\nIAPP Strategic Privacy by Design Textbook (only for the first four students who register)\nIAPP Introduction to Privacy for Technology Professionals Textbook (Digital only – $75 value)\nParticipant training materials (only available with training)\nExam Voucher – if purchased ($550 value)\nOne year of IAPP Membership or renewal of existing Membership ($295 value)\nPrivacy SWAN custom training materials\n\n  \nWho should attend\nTechnology\, InfoSec\, and Engineering professionals with a primary focus on securing the integrity\, confidentiality\, and availability of corporate data. Anyone who can understand highly complex interconnected technologies and who needs to incorporate a robust privacy program to ensure compliance with global data protection regulations. \n\nChief Information Security Officers\nSecurity Managers\nInformation Managers\nProduct Managers\nAuditors\nContract Managers\nCompliance Officers\nPrivacy Managers\nChief Privacy Officers\nData Protection Officers\n\n  \nWhat you will learn\nHow to protect personal data by applying critical privacy concepts and practices that impact technology and use technology to design data privacy into products and services and establish privacy practices for data security and control\, such as data minimization\, perturbing the data\, and de-identification techniques. Factor privacy into data classification and emerging technology\, such as cloud computing\, facial recognition\, and surveillance. Communicate and collaborate on privacy issues with management\, development\, marketing\, and legal departments. Understand consumer privacy expectations and best practices\, while proactively addressing privacy issues with the Internet of Things. \n\nFoundational Principles in Technology Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks\nThe Tech Pro’s role in privacy Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security\nNeutralizing Threats and Enhancing Privacy Identify inherent risks throughout the stages of the data life cycle and explore how software security helps mitigate privacy threats; examine the impacts that behavioral advertising\, cyberbullying\, and social engineering have on privacy within the technological environment\nPrivacy Engineering Explores the role of privacy engineering within an organization\, including the objectives of privacy engineering\, privacy design patterns\, and software privacy risks\nTechnological Challenges for Privacy Examine the unique challenges that come from online privacy issues\, including automated decision making\, tracking and surveillance technologies\, anthropomorphism\, ubiquitous computing\, and mobile social computing\nOfficial IAPP CIPT Get Certified Documents\n\n 
URL:https://instituteofprivacydesign.org/event/privacy-swan-virtual-live-cipt-training-2/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/SWANlogo2023-transp-3.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240326T090000
DTEND;TZID=America/New_York:20240327T160000
DTSTAMP:20260406T102851
CREATED:20240212T234047Z
LAST-MODIFIED:20240304T172229Z
UID:6049-1711443600-1711555200@instituteofprivacydesign.org
SUMMARY:European Data Protection (CIPP/E)
DESCRIPTION:The European Data Protection (CIPP/E) encompasses pan-European and national data protection laws\, key data protection terminology and practical concepts concerning the protection of personal data and trans-border data flows. The global gold standard in European data protection certification. \nThe content of the courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \n  \nCourse outline: \n\nModule 1: Data protection laws\nModule 2: Personal data\nModule 3: Controllers and processors\nModule 4: Processing personal data\nModule 5: Data subject rights\nModule 6: Information provision obligations\nModule 7: International data transfers\nModule 8: Compliance considerations\nModule 9: Security of processing\nModule 10: Accountability\nModule 11: Supervision and enforcement\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/european-data-protection-cipp-e-2-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPP/E
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20240328T130000
DTEND;TZID=America/Halifax:20240328T140000
DTSTAMP:20260406T102851
CREATED:20240131T192636Z
LAST-MODIFIED:20240312T181817Z
UID:5913-1711630800-1711634400@instituteofprivacydesign.org
SUMMARY:Deceptive Design – Dark Patterns Beyond the Interface | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a recorded 10-minute introduction followed by a 40-minute informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. \nThe participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nMarch 28\, 2024 @ 1:00 PM EDT / 6:00 PM CET \n  \nTopic:\nDeceptive Design – Dark Patterns Beyond the Interface \n  \nSynopsis:\nJoin us for a riveting exploration into the murky waters of  ‘dark patterns’\, those cunning design strategies that steer us away from our true intentions online. Unravel the complexities of how these deceptive practices not only compromise our autonomy but also our wallets\, as we delve into the realms of consumer and data protection laws. With a keen eye on the European Union’s regulatory landscape\, Dr Leiser will dissect how current legislation like the General Data Protection Regulation\, the Unfair Commercial Practices Directive and the new Digital Services Act is being outmanoeuvred by Big tech and ponder the necessary evolution of laws to curb these manipulative designs that lurk behind every click. From sneaky sign-ups to misleading layouts\, learn how to spot these digital traps and the legal mechanisms at our disposal to combat them. This talk is a clarion call for a more informed and vigilant digital citizenship in an age where technology’s reach is ubiquitous\, and its influence\, undeniable. \n  \nLessons Learned:\nThe talk is a clarion call for a multi-faceted approach to combating dark patterns\, combining legal reform\, education\, and ethical design principles to safeguard digital citizenship in an increasingly manipulative digital landscape. \n  \nPre-Webinar Resources:\n\n Deceptive Design website – https://deceptive.design \n\n  \nSpeaker:\nDr M.R. (Mark) Leiser\nDr M.R. Leiser is a regulatory theorist specialising in Digital\, Legal\, and Platform Regulation at Vrije Universiteit Amsterdam in the Department of Transnational Legal Studies\, Amsterdam Law & Technology Institute). In his research and lecturing\, he focuses on law and digital technologies related to deceptive design\, dark patterns\, consumer protection\, and the use and regulation of AI and digital technologies. Alongside the running of the deceptive.design website\, he has published 30 pieces of academic work\, and several book chapters on AI\, company law\, deceptive design\, and data protection matters. He is a sought-after public speaker and has presented his findings to the UN\, the EU Parliament\, the Council of Europe\, and various regulators. \n  \nModerator:\nAndrei Dumitru \nAfter working more than ten years in the IT department of an International Organization\, I focused in the last years on privacy and data protection. I think privacy is a fundamental right that cannot exist today without computer security so I am always searching to find a balance between both and see how privacy can be embedded into technology. I am particularly interested in privacy by design and dark patterns\, and always curious to see how privacy is integrated (or not) in current products and services. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event. Join as an Ambassador before the 1st of each month to get invited to this month’s event! Please reach out to a current member to be invited as a guest. If you are already a member\, subscribe to our PETed Mailing List for announcements and monthly invitations!
URL:https://instituteofprivacydesign.org/event/deceptive-design-dark-patterns-beyond-the-interface-privacy-engineering-technology-education-discussion-peted/
LOCATION:https://iopd.whereby.com/peted-discussion
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/4.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240328T130000
DTEND;TZID=America/New_York:20240328T150000
DTSTAMP:20260406T102851
CREATED:20240221T211301Z
LAST-MODIFIED:20240304T172321Z
UID:6227-1711630800-1711638000@instituteofprivacydesign.org
SUMMARY:Certification Study Group - Privacy Program Management (CIPM)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-privacy-program-management-cipm/
LOCATION:Online
CATEGORIES:#CIPM,#certificationstudygroup
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240402
DTEND;VALUE=DATE:20240424
DTSTAMP:20260406T102851
CREATED:20240120T132449Z
LAST-MODIFIED:20240205T234136Z
UID:5677-1712016000-1713916799@instituteofprivacydesign.org
SUMMARY:The Privacy Pro CIPP/C Certification Course - Apr 2\, 9\, 16 & 23
DESCRIPTION:[Prices are in Canadian Dollars. To attend an informational session register here.] \nWhen you earn a CIPP/C\, you show that you have an understanding and application of Canadian information privacy laws\, principles and practices at the federal\, provincial and territorial levels. \n  \nWhat you will learn: \n\nCanadian Privacy Fundamentals\nThe Canadian Government and Legal System\nEnforcement Agencies and Powers\nCanadian Privacy Laws and Practices in the Private Sector\nCanadian Privacy Laws and Practices in the Public Sector\n\n  \nYour CIPP/C course includes: \n\nCIPP/C digital textbook (4th edition)\nExam voucher ($550 USD value)\nOne year of IAPP membership ($275 USD value)\nParticipant guide and sample exam questions\nAccess to class recordings\nExam study session\nBONUS – Update on proposed changes to the federal private sector privacy law (Bill C-27) and what to expect next with phase 2 of Quebec’s Law 25
URL:https://instituteofprivacydesign.org/event/iapp-cipp-c-virtual-apr-2-9-16-23/
LOCATION:Virtual
CATEGORIES:#privacytraining,#CIPP/C
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/the_privacy_pro-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20240404T151500
DTEND;TZID=America/Halifax:20240404T163000
DTSTAMP:20260406T102851
CREATED:20240320T191719Z
LAST-MODIFIED:20240320T192023Z
UID:6419-1712243700-1712248200@instituteofprivacydesign.org
SUMMARY:Privacy Engineering at Scale | IAPP Global Privacy Summit 2024
DESCRIPTION:Date\, Time\, and Location\nThu\, April 4 @ 3:15 p.m. – 4:30 p.m. \n\n\nRoom 147B\, Convention Center \n\n\n\n  \nTraditional Breakout\nCara Bloom\, Privacy Engineer\, Netflix \nSerge Egelman\, Research Director\, Usable Security and Privacy\, International Computer Science Institute; Founder and Chief Scientist\, AppCensus \nVaibhav Garg\, CIPT\, Cybersecurity & Privacy Research and Public Policy Research\, Executive Director\, Comcast Cable \nNandita Rao Narla\, CIPP/US\, CIPM\, CIPT\, FIP\, Head of Technical Privacy and Governance\, DoorDash \n\n\n  \nPrivacy by design requires us to embed privacy as a principle from the start of the product development process. However\, this shift requires privacy engineering at every subsequent stage. Every organization thus faces the challenge of scaling this process without adding significant cost. Furthermore\, these processes must align with developer workflow and not require developers themselves to be experts in privacy. This panel provides a roadmap of how to achieve this difficult task. The panel will present this in four stages. The first is how product teams can determine\, document\, and communicate privacy requirements? The second is how controls correspond to these requirements reviewed at design stage. The third is how the implementation of these controls is validated in build stage. The fourth is how teams pen-test applications to find any gaps in these implementations pre-production. \n  \nWhat you will learn: \n• What are the key elements of a privacy engineering program? \n• Potential tools and techniques to scale a program without extensive investment. \n• How to drive privacy with developers without requiring deep subject matter expertise.
URL:https://instituteofprivacydesign.org/event/privacy-engineering-at-scale-iapp-global-privacy-summit-2024/
CATEGORIES:Speaking Engagements,Conference,In-Person
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/03/tgrews.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20240405T150000
DTEND;TZID=America/Denver:20240405T163000
DTSTAMP:20260406T102851
CREATED:20240228T223716Z
LAST-MODIFIED:20240409T190258Z
UID:6280-1712329200-1712334600@instituteofprivacydesign.org
SUMMARY:Learn the Language of Privacy | 2024 PMI Mile Hi Symposium
DESCRIPTION:2024 PMI Mile Hi Symposium\nLearn the Language of Privacy with Janelle Hsia\nTime: 3:15 – 4:15 pm  |  Room: 102/104/106  |  PM Triangle: Ways of Working 1 PDU \nTo succeed\, it takes all of us working together and being on the same page. Today\, privacy and cybersecurity are top of mind for all of us and they must be seamlessly woven into all projects.  Getting it right is considered table-stakes to accomplish our goals\, completing projects\, and meet our deadlines.  For most professionals\, privacy is a foreign language. Whether it’s compliance with all the new US privacy laws (CCPA\, CPA\, VCDPA\, CDPA\, UCPA\, etc)\, data subject request/rights or data breach notification obligations\, it’s new\, changing\, and can be confusing. \nThis presentation will explain the language of privacy.  We’ll start with the data. The more personal data you process\, the more you need to learn.  The more sensitive the personal data\, the more potential impact on an organization’s reputation. \nSo\, what should an organization do when it needs data to run its operations? It should think differently about how it collects\, processes\, and stores personal data.  Specifically\, Program Managers must learn the language of privacy.  They need to understand the different types of personal data in their systems and recognize the privacy obligations related it to.  They need to know how to navigate the changing legal landscape and when to escalate issues to legal. \nWe will discuss strategies to use personal data in the most privacy friendly way.  This presentation will explain the different privacy terms and definitions you need to know. We will briefly discuss some of the top compliance obligations. We will describe the different strategies and tactics to help today’s organizations utilize data in a more privacy-preserving way.
URL:https://instituteofprivacydesign.org/event/learn-the-language-of-privacy-2024-pmi-mile-hi-symposium/
LOCATION:Colorado Convention Center\, Denver\, CO\, United States
CATEGORIES:Speaking Engagements,In-Person
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/Hsia.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20240408T090000
DTEND;TZID=Europe/Paris:20240411T180000
DTSTAMP:20260406T102851
CREATED:20240308T203510Z
LAST-MODIFIED:20240322T063814Z
UID:6341-1712566800-1712858400@instituteofprivacydesign.org
SUMMARY:Bello Consulting IAPP Certified AIGP Training
DESCRIPTION:IAPP Certified Artificial Intelligence Governance Professional Training\nThe field of AI is growing exponentially and in response the IAPP has developed the Artificial Intelligence Governance Professional certification. Establish your capacity to perform ethical\, safe\, trustworthy AI governance by earning the AIGP designation. \nBecome cornerstone of your organization privacy AI governance program. Certify and boost your carrier. \nThe AIGP Body of Knowledge outlines all the concepts and topics that you need to know to become certified. Learn more on this link. \nTraining and certification program\n1) Training program registration (click here to register) \n2) Kick off meeting \n> Agree on schedule \n> Develop personalized study plan \n> Agree on training format (time zone\, 2-3-4 days\, back2back or consecutive days/weeks) \n3) Pre-training material self-study including mentoring on per needed basis following personalized study plan \n4) In-person or Online training based on schedule and training format (proposed schedule is illustrative) \n5) Post-training exam preparation and mentoring (IAPP propose 30 hrs\, our experience is 2-4 weeks) We do not recommend to exceed 8 weeks after the training. IAPP exam voucher deadline is 12 month after purchase. \nTraining package price is covering:\n1) IAPP membership for 12 month (if you already have a valid IAPP membership it will be extended after expire date) \n2) All IAPP benefits you have as within professional membership including the access to resources and libraries \n3) digital editions of AIGP training materials provided by IAPP \n4) additional resources for training and exam preparation provided by Bello Consulting (including 95 sample exam questions) \n5) AIGP exam voucher valid for 12 month after purchase \n6) training in-person or online according to agreed format \n7) pre and post training mentoring \nAbout your trainer\nTraining is run by William Bello FIP CIPP/E CIPP/US CIPM CIPT ITIL and AIGP authorized trainer. William has more then 40yrs of experience at all levels in IT and business architecture and 7 years of dedicated privacy / data protection practice as a DPO and privacy professional trainer. William is member of EDPB expert team. Bello Consulting is IAPP Official training partner. \nWhy you should opt-in for training with us\nWilliam will prepare you for exam in a unique\, efficient and very effective way. It is experience that will not only help you to pass the exam but it will also provide you with guidance that will help you in your everyday work. AI is changing the world we know and AI governance is the future of this world. The unprecedented expertise and knowledge you will receive is going to enable change of your carrier to new heights. We are supporting you all the way until you successfully earn the AIGP certification – and beyond – if you need advice and help. \nImportant notice\nListed price is limited promotional price. \nPrice is without VAT. Individuals have to add 25% VAT. Companies are VAT reverse charge. Payment terms are flexible and individuals sponsoring is available. Ask for details. \nTRAINING IS SCHEDULLED FOR Monday – Thursday for two groups in GLOBAL MAIN TIME ZONES: 9am – 1pm CET (GMT+1) and 9am – 1 pm EDT (EST) \nHow to opt-in for training\nOption 1. Visit the CertShop here and purchase the training package \nOption 2. Register here (recomended) and we will contact you to personalise your training schedule and payment
URL:https://instituteofprivacydesign.org/event/aigp-bello-consulting/
LOCATION:Online
CATEGORIES:#privacytraining,#AIGP
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/03/65ead9afb289c-3.png
ORGANIZER;CN="Bello Consulting":MAILTO:iapp@bello.hr
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240415T090000
DTEND;TZID=America/New_York:20240416T160000
DTSTAMP:20260406T102851
CREATED:20240213T224732Z
LAST-MODIFIED:20240304T172403Z
UID:6067-1713171600-1713283200@instituteofprivacydesign.org
SUMMARY:Privacy Program Management (CIPM)
DESCRIPTION:Privacy Program Management teaches you how to create and manage a privacy program. It gives you the tools to answer day-to-day questions about privacy operations. The CIPM is the world’s first and only certification in privacy program management. When you earn a CIPM\, it shows that you know how to make a privacy program work for your organization. \nThe content of the courses is integral to broadening your knowledge\, educating your privacy team\, and put you on the path to obtaining your privacy certifications. \n  \nCourse outline: \n\nModule 1: Introduction to privacy program management\nModule 2: Privacy  Governance\nModule 3: Applicable laws and regulations\nModule 4: Data assessments\nModule 5: Policies\nModule 6: Data subject rights\nModule 7: Training and awareness\nModule 8: Protecting personal information\nModule 9: Data breach incident plans\nModule 10: Monitoring and auditing program performance\n\n  \n\n  \n*Certification Study Group voucher must be used within three months of taking the course. \n**The IAPP exam must be taken within three months of the release of the exam. Refresher course must be taken within three months of completing the IAPP exam. \n*** 1 Year Membership valid with first course taken with Privacy Ref \n  \n*** Links to Privacy Ref Include Web Tracking***
URL:https://instituteofprivacydesign.org/event/privacy-program-management-cipm-utm_sourceiopdutm_mediumwebsiteutm_campaigniopdq1-2024-2/
LOCATION:Hybrid (Online & In-Person)
CATEGORIES:#privacytraining,#CIPM
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240418T130000
DTEND;TZID=America/New_York:20240418T150000
DTSTAMP:20260406T102851
CREATED:20240222T140735Z
LAST-MODIFIED:20240410T194611Z
UID:6229-1713445200-1713452400@instituteofprivacydesign.org
SUMMARY:Certification Study Group - Artificial Intelligence Governance (AIGP)
DESCRIPTION:There are many ways to prepare for taking a certification exam from the International Association of Privacy Professionals. No matter how you study\, there always seem to be some questions that remain. Privacy Ref can help. \nCome prepared to this 2-hour session with questions or areas related to the exam that you want to review. We will be making use of the exam blueprint and body of knowledge provided by the IAPP to focus our discussion.
URL:https://instituteofprivacydesign.org/event/certification-study-group-artificial-intelligence-governance-aigp/
LOCATION:Online
CATEGORIES:#AIGP,#certificationstudygroup
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/02/65c4fddd1fe64-1.png
ORGANIZER;CN="Privacy Ref":MAILTO:info@privacyref.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20240424T110000
DTEND;TZID=America/Denver:20240424T120000
DTSTAMP:20260406T102851
CREATED:20240404T185739Z
LAST-MODIFIED:20240409T190110Z
UID:6472-1713956400-1713960000@instituteofprivacydesign.org
SUMMARY:Privacy Threat and Risk Modeling in 2024 | IAPP Sacramento KnowledgeNet
DESCRIPTION:Virtual Sacramento KnowledgeNet: 24 April 2024\nThis meeting will be held virtually with no in-person component and will not be recorded. Instructions on how to view this webinar will be sent to registrants upon registration and 1-2 days prior to the meeting. If registration is closed or you have any questions\, please email knowledgenet@iapp.org. Please note that recording by participants is strictly prohibited and anyone who attempts to record the event will be asked to stop and removed upon noncompliance.\n  \n\n\n\n\n\nTopic: \nPrivacy Threat and Risk Modeling in 2024 \nThreat modeling is all the rage in the security field\, but what is threat modeling in privacy? Join Jason Cronk\, President of the Institute of Operational Privacy Design (IOPD)\, as he discusses the nascent field of privacy threat and risk modeling. In this talk\, he’ll discuss privacy risk as described in his IAPP book Strategic Privacy by Design\, the new MITRE Corporation’s PANOPTIC Threat Model and the risk model used in the forthcoming IOPD standard for privacy by design. \n  \nSpeaker: \nJason Cronk\, CIPP/US\, CIPM\, CIPT\, FIP\, Privacy Engineer\, Author\, Enterprivacy Consulting Group; President\, Institute of Operational Privacy Design \n  \nTime: \n11:00-12:00 PDT \n  \nThank you to our local KnowledgeNet Chapter Chairs: \nLisa Ann Hall\, CIPP/US\, Senior Privacy Analyst\, Cloud Software Group \nSherrie Osborne\, CIPP/E\, CIPM\, Senior Director\, Privacy Compliance Officer\, LendingClub \nSteven Ward\, Data Privacy and Security Fellow\, R Street Institute \nSpecial thank you to Young Privacy Professional volunteer\, Susana Leone\, CIPP/E\, Program Manager\, Data Protection Attorney\, for helping to support the chapter. \n  \nEligible CPE Credits:  \nCIPP/A\, CIPP/C\, CIPP/E\, CIPP/US\, CIPM\, and CIPT. \n1.0 CPE \nIf you have certification questions\, please read our cpe policy or e-mail cpe@iapp.org. Credit will be awarded two weeks after date of event.
URL:https://instituteofprivacydesign.org/event/privacy-threat-and-risk-modeling-in-2024-iapp-sacramento-knowledgenet/
LOCATION:Virtual
CATEGORIES:Speaking Engagements,Webinar
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/04/unnamed-2.png
ORGANIZER;CN="Enterprivacy Consulting Group":MAILTO:rjc@enterprivacy.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20240424T150000
DTEND;TZID=America/Halifax:20240424T160000
DTSTAMP:20260406T102851
CREATED:20240401T194352Z
LAST-MODIFIED:20240401T194352Z
UID:6464-1713970800-1713974400@instituteofprivacydesign.org
SUMMARY:Q2 All Hands Meeting
DESCRIPTION:ALL HANDS MEETING 📢 Ambassadors\, Advisors\, Volunteers\, and Committee Members are all invited to join us Wednesday\, April 24th from 3:00 – 4:00 PM. We will meet to welcome our new members\, report on the new Standards Subcommittees\, and discuss the Privacy Design Seal currently in development! \nPlease reach out to admin22@instituteofprivacydesign.org if you have yet to receive an invitation. Guest invites are first come first serve. If you have a friend or colleague interested\, send us their email and we’ll add them to the guest list!
URL:https://instituteofprivacydesign.org/event/q2-all-hands-meeting/
LOCATION:https://iopd.whereby.com/all-hands
CATEGORIES:All Hands Meeting
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/04/AllHandsApr24.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20240425T120000
DTEND;TZID=America/Halifax:20240425T130000
DTSTAMP:20260406T102851
CREATED:20240103T231906Z
LAST-MODIFIED:20240416T180307Z
UID:5410-1714046400-1714050000@instituteofprivacydesign.org
SUMMARY:From Permission Usage to Compliance Analysis | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a recorded 10-minute introduction followed by a 40-minute informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. \nThe participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nApril 25\, 2024 @ 12:00 PM EDT / 5:00 PM CET \n  \nTopic:\nFrom Permission Usage to Compliance Analysis: Lessons Learned Analyzing Android Apps for 10 years \n  \nSynopsis:\nWe have been analyzing Android apps for regulatory requirements for eight years. We have analyzed Android apps for COPPA\, CCPA\, and Health Compliance (HIPAA\, HBNR\, and FTC Act). In this talk\, I present the lessons learned after analyzing thousands of apps\, the technical challenges we face while analyzing Android apps\, patterns of non-compliance issues we uncovered\, and the likely root causes of non-compliance. The talk will touch upon challenges posed by third-party code in complying with regulatory requirements\, the importance of privacy assessment\, and how the technical realm has changed over time for privacy assessments. \n  \nProblem Statement:\nWhat are the risks posed by the use of third-party code in the mobile ecosystem? How can you identify those risks before they become a regulatory headache? \n  \nRelated PETs (Privacy-Enhancing Technologies):\n\nAccountability\nCode Transparency\nPermission Usage\nPrivacy Assessment\nDynamic Analysis\n\n  \nPre-Discussion Resources:\n\nhttps://petsymposium.org/popets/2018/popets-2018-0021.php \nhttps://www.usenix.org/system/files/sec19-reardon.pdf \nhttps://petsymposium.org/popets/2023/popets-2023-0072.php \nhttps://conpro23.ieee-security.org/papers/samarin-conpro23.pdf \nhttps://www.ieee-security.org/TC/SPW2021/ConPro/papers/samarin-conpro21.pdf \nhttps://www.ieee-security.org/TC/SPW2019/ConPro/papers/okoyomon-conpro19.pdf \nhttps://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-wijesekera.pdf \nhttps://petsymposium.org/popets/2022/popets-2022-0108.pdf \nhttps://petsymposium.org/popets/2020/popets-2020-0050.pdf \nhttps://www.issa.org/event/taking-responsibility-for-someone-elses-code-studying-the-privacy-behaviors-of-mobile-apps-at-scale/ \n\n  \nSpeaker:\nPrimal Wijesekera\nPrimal Wijesekera is a research scientist in the Usable Security and Privacy Research Group at ICSI and holds an EECS appointment at the University of California\, Berkeley. His research exposes current privacy and security vulnerabilities and provides systematic solutions to meet consumers’ privacy expectations. He has extensive experience in mobile app analysis for privacy and security violations and implementing privacy protections for Android. He has published in top-tier security venues (IEEE S&P\, USENIX Security) and usable security and privacy venues (ACM CHI\, SOUPS\, PETS). He received his Ph.D. from the University of British Columbia\, although he carried out his Ph.D. research at UC Berkeley. His research on privacy on mobile platforms has received the Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies\, the USENIX Security Distinguished Paper Award\, the AEPD Emilio Aced Personal Data Protection Research Award\, and the CNIL-INRIA Privacy Award. He is a PI/Co-PI on multiple NSF Projects. He has also helped federal regulators in sensitive privacy investigations. He has also held an engineering position at Microsoft. \n  \nModerator:\nKimberly Lancaster \nTrusted Privacy Advisor who Guides Data Protection\, Drives Operational Excellence\, and Leads with Integrity by aligning with InfoSec\, Security\, GRC\, Compliance\, and Data Governance. Board Member\, Speaker\, and Author. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event. Join as an Ambassador before the 1st of each month to get invited to this month’s event! Please reach out to a current member to be invited as a guest. If you are already a member\, subscribe to our PETed Mailing List for announcements and monthly invitations!
URL:https://instituteofprivacydesign.org/event/march-2024-privacy-engineering-technology-education-discussion-peted/
LOCATION:https://iopd.whereby.com/peted-discussion
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/4-1.png
END:VEVENT
END:VCALENDAR