BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Institute of Operational Privacy Design - ECPv6.15.17.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Institute of Operational Privacy Design
X-ORIGINAL-URL:https://instituteofprivacydesign.org
X-WR-CALDESC:Events for Institute of Operational Privacy Design
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Halifax
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20240310T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20241103T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20250309T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20251102T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20260308T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20261101T050000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20250423T161500
DTEND;TZID=America/Halifax:20250423T174500
DTSTAMP:20260403T140013
CREATED:20250418T155202Z
LAST-MODIFIED:20250418T155728Z
UID:8946-1745424900-1745430300@instituteofprivacydesign.org
SUMMARY:IOPD Meetup – Washington\, D.C.
DESCRIPTION:Whether you live in the D.C. area or are in town for the IAPP Global Privacy Summit\, members\, volunteers and friends of the IOPD will be gathering at Rasa Mount Vernon on Wednesday April 23rd at 4:15 PM. Please join us!
URL:https://instituteofprivacydesign.org/event/iopd-meetup-washington-d-c/
LOCATION:Rasa Mount Vernon\, 485 K St NW\, Washington\, DC\, 20001\, United States
CATEGORIES:In-Person,IOPD Events
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2025/04/gpsmeetup.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250506
DTEND;VALUE=DATE:20250515
DTSTAMP:20260403T140013
CREATED:20250130T202610Z
LAST-MODIFIED:20250130T202640Z
UID:8602-1746489600-1747267199@instituteofprivacydesign.org
SUMMARY:Privacy Program Management (CIPM)
DESCRIPTION:LIVE ONLINE\nPrivacy Program Management (CIPM)\n6\, 7\, 13 & 14 May 0900-1300 CET\nThe Certified Information Privacy Manager (CIPM) is the world’s first and only certification in privacy programme management. When you earn a CIPM\, it shows that you know how to make a privacy programme work for your organisation. In other words\, you’re the go-to person for day-to-day operations when it comes to data protection. \n  \nWhat’s included\n\nInstruction by IAPP Faculty trainer\nDigital participant guide\nDigital copy of course textbook\nExam voucher\n1 year IAPP membership\n\n  \nWhat you’ll learn\n\nHow to create a company vision\nHow to structure the privacy team\nHow to develop and implement a privacy program framework\nHow to communicate to stakeholders\nHow to measure performance\nThe privacy program operational life cycle\n\n  \nCourse delivery\nThe course is delivered live online using MS Teams (or GoToWebinar) by an IAPP Faculty trainer. In order to minimise prolonged screen time the course is delivered over four half-days: \nDay 1 \nModule 1: Introduction to Privacy Program Management\nModule 2: Privacy program framework: Privacy Governance \nDay 2\nModule 3: Privacy program framework: Applicable Laws and Regulations\nModule 4: Privacy operational life cycle – Assess: Data Assessments\nModule 5: Privacy operational life cycle – Protect: Protecting Personal Information \nDay 3 \nModule 6: Privacy operational life cycle – Protect: Policies\nModule 7: Privacy operational life cycle – Sustain: Monitoring and auditing program performance\nModule 8: Privacy operational life cycle – Sustain: Training and awareness \nDay 4\nModule 9: Privacy operational life cycle – Respond: Data subject rights\nModule 10: Privacy operational life cycle – Respond: Data breach incident plans \n‍ \nOther information\nThe Body of Knowledge for the CIPM course can be viewed and downloaded from here. \nBe aware that IAPP recommend approximately 30 hours of additional study of course materials and resources is required to adequately prepare for the exam. \nYou are encouraged to read IAPP’s Certification Candidate Handbook for additional information about IAPP’s courses and preparation required to sit the exam. \nIf you take the CIPM exam within 3 months of the course and do not pass\, you are welcome to join a future course free of charge. \nPlease review the Online Training Policy for IAPP Courses that details information about cancellations. \n‍ \nProcessing and transfer of your personal data to the USA\nWhen you enrol on an IAPP course run by Purpose and Means\,  various personal data about you will be registered. For details on how your personal data is processed\, please view the Purpose and Means Privacy Notice. \nThe course you enrol on is offered in cooperation with the International Association of Privacy Professionals (IAPP)\, 75 Rochester Ave.\, Portsmouth\, NH 03801 USA. \nOnce you register for the course\, your name\, email address\, and existing IAPP membership status will be transferred to the IAPP in the USA. This is necessary  in order to complete the course registration\, and to allow you access to online training material\, register you as a member of the IAPP\, and make the required arrangements before a certification exam\, if relevant. \nThe transfer of your personal data to the IAPP in the USA is necessary for the performance of the training course contract between you and Purpose and Means\, and for the performance of the contract concluded in your interest between Purpose and Means and the IAPP.
URL:https://instituteofprivacydesign.org/event/privacy-program-management-cipm-7/
LOCATION:Online
CATEGORIES:#privacytraining,#CIPM
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/purposeandmeans.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250508
DTEND;VALUE=DATE:20250517
DTSTAMP:20260403T140013
CREATED:20250130T203226Z
LAST-MODIFIED:20250130T203253Z
UID:8608-1746662400-1747439999@instituteofprivacydesign.org
SUMMARY:US Private-Sector Privacy (CIPP/US)
DESCRIPTION:LIVE ONLINE\nUS Private-Sector Privacy (CIPP/US)\n8\, 9\, 15 & 16 May 0900-1300 CET\n\nWhat’s included\n\nInstruction by IAPP trainer\nDigital participant guide (in English)\nDigital copy of course textbook (in English)\nExam voucher\n1 year IAPP membership\n\n  \nWhy You Should Take U.S. Private-Sector Privacy Training\nU.S. privacy is a complicated amalgam of federal\, state and local privacy regulations. IAPP U.S. Private-Sector Privacy Training\, the principle course for the ANSI/ISO-accredited CIPP/US certification program\, gives privacy professionals the knowledge to manage compliance within this legal web and minimize the risks of regulatory fines and brand damage. \n  \nWho Should Train\nProfessionals who need in-depth knowledge of the U.S. privacy environment for compliance and other privacy management responsibilities. CIPP/US training will elevate your career prospects and help to prepare you for CIPP/US certification testing. \n  \nWhat You Will Learn\nThe CIPP/US curriculum provides an in-depth view of U.S. federal and state privacy statutes; detailed analysis of sectoral laws\, civil and criminal enforcement; and an overview of the EU’s General Data Protection Regulation and the California Consumer Privacy Act. \n‍ \nCourse delivery\nThe course is delivered live online using MS Teams by an IAPP trainer. In order to minimise prolonged screen time the course is delivered over four half-days: \nModule 1: Foundations of privacy and data protection\nModule 2: Comprehensive privacy and data protection laws\nModule 3: US legal framework\nModule 4: Enforcement of US privacy and security laws\nModule 5: Information management from a US perspective\nModule 6: Government and court access to private-sector information\nModule 7: State privacy and security laws\nModule 8: Telecommunications and marketing\nModule 9: Healthcare\nModule 10: Children’s privacy\nModule 11: Financial privacy\nModule 12: Privacy in the workplace \n  \nOther information\nThe Body of Knowledge for the CIPP/US course can be viewed and downloaded from here. \nBe aware that IAPP recommend approximately 30 hours of additional study of course materials and resources is required to adequately prepare for the exam. \nYou are encouraged to read IAPP’s Certification Candidate Handbook for additional information about IAPP’s courses and preparation required to sit the exam. \nIf you take the CIPP/US exam within 6 months of the course and do not pass\, you are welcome to join a future course free of charge. \nPlease review the Online Training Policy for IAPP Courses that details information about cancellations. \n‍ \nProcessing and transfer of your personal data to the USA\nWhen you enrol on an IAPP course run by Purpose and Means\,  various personal data about you will be registered. For details on how your personal data is processed\, please view the Purpose and Means Privacy Notice. \nThe course you enrol on is offered in cooperation with the International Association of Privacy Professionals (IAPP)\, 75 Rochester Ave.\, Portsmouth\, NH 03801 USA. \nOnce you register for the course\, your name\, email address\, and existing IAPP membership status will be transferred to the IAPP in the USA. This is necessary  in order to complete the course registration\, and to allow you access to online training material\, register you as a member of the IAPP\, and make the required arrangements before a certification exam\, if relevant. \nThe transfer of your personal data to the IAPP in the USA is necessary for the performance of the training course contract between you and Purpose and Means\, and for the performance of the contract concluded in your interest between Purpose and Means and the IAPP.
URL:https://instituteofprivacydesign.org/event/us-private-sector-privacy-cipp-us/
LOCATION:Online
CATEGORIES:#privacytraining,#CIPP/US
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/purposeandmeans.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250514T140000
DTEND;TZID=America/New_York:20250514T150000
DTSTAMP:20260403T140013
CREATED:20250430T231037Z
LAST-MODIFIED:20250430T231433Z
UID:8978-1747231200-1747234800@instituteofprivacydesign.org
SUMMARY:Q2 2025 All Hands Meeting
DESCRIPTION:ALL HANDS MEETING 📢 Ambassadors\, Advisors\, Volunteers\, and Committee Members are all invited to join us Wednesday\, May 14th from 2:00 – 3:00 PM EDT (11 AM PDT / 8 PM CEST). We will welcome our new members and give updates on current projects! \nPlease reach out to admin22@instituteofprivacydesign.org if you have yet to receive an invitation. Guest invites are first come first serve. If you have a friend or colleague interested\, send us their email and we’ll add them to the guest list!
URL:https://instituteofprivacydesign.org/event/q2-2025-all-hands-meeting/
LOCATION:https://iopd.whereby.com/all-hands
CATEGORIES:All Hands Meeting,IOPD Events
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2025/04/allhands-may142025.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250516T110000
DTEND;TZID=America/New_York:20250516T120000
DTSTAMP:20260403T140013
CREATED:20250310T205510Z
LAST-MODIFIED:20250421T193642Z
UID:8498-1747393200-1747396800@instituteofprivacydesign.org
SUMMARY:Reductive Security: Novel Yet Logical\, But Utterly Disruptive | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a recorded 10-minute introduction followed by a 40-minute informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. \nThe participants will be asked to bring questions related to the topic. Come back every quarter for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nMay 16th\, 2025 @ 11:00 AM – 12:00 PM EDT (8:00 AM PDT / 5:00 PM CEST) \n*Note that this quarter’s guest speaker discussion will take place during the normal May Sip & Chat time. The introductory presentation has been pre-recorded to maximize discussion time. Please watch the recording before attending\, George will do a brief recap but will not go in depth. \n  \nTopic:\nReductive Security: Novel Yet Logical\, But Utterly Disruptive \n  \nSynopsis:\nReductive Security is a refreshing and novel approach to privacy and security. \nWe live in the era of additive security\, in which security vendors and practitioners promote adding more things to mitigate the proliferation of data breaches and security incidents. More third-party providers\, more privileged access\, more PII collected\, more lines of code. . . yet data breaches and system compromises continue unabated. \nToday’s alleged solutions only make future problems more widespread and more destructive. Routes to compromise will blossom\, and more data collected will mean more PII is irrevocably lost. Reductive Security is antithetical to this approach. The starting point for security should reducing the attack surface\, not to expanding it. Reductive Security is a method to challenge today’s overcomplex and vulnerable environments. \n  \nPre-Discussion Resources:\n\n\nPresentation: https://instituteofprivacydesign.org/wp-content/uploads/2025/04/George-Reductive-Security-May-2025-2.mp4\nReductive Security Resources\n\n\n  \n\nSpeaker:\n\nGeorge Rosamond \nGeorge is a privacy-focused security technologist. He is a co-founder and CISO of ClearOPS\, an AI governance platform. George is a long-time volunteer for the Tor Project and considers open-source BSD Unix the only sane operating system available. \n  \nModerator:\nJanelle Hsia \nJanelle Hsia is the President and Founder of Privacy SWAN Consulting working as a trainer\, consultant\, and trusted advisor for strategic and tactical decision-making. While she is focused on the field of privacy and data protection\, Janelle Hsia is not a lawyer and brings a diverse background with strong leadership\, technical\, and business skills spanning 20 years in the areas of project management\, IT\, privacy\, security\, data governance\, and process improvement. Janelle Hsia is also Co-Founder and Vice-President of the Institute of Operational Privacy Design. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event\, but we welcome first time attendees as our guests. Come check it out! If you are already a member\, subscribe to our PETed Mailing List for announcements and monthly invitations!
URL:https://instituteofprivacydesign.org/event/q2-2025-privacy-engineering-technology-education-discussion-peted/
LOCATION:https://us02web.zoom.us/j/88093390935?pwd=v4giaLjBytoXEboeL9BkU4vhRIPTdo.1
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2025/03/george.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250603
DTEND;VALUE=DATE:20250612
DTSTAMP:20260403T140013
CREATED:20250130T200909Z
LAST-MODIFIED:20250130T200909Z
UID:8585-1748908800-1749686399@instituteofprivacydesign.org
SUMMARY:Privacy in Technology (CIPT)
DESCRIPTION:LIVE ONLINE\nPrivacy in Technology (CIPT)\n3\, 4\, 10 & 11 June 0900-1300 CET\nWhat’s included\n\n\n\n\nInstruction by IAPP Faculty trainer\nDigital participant guide\nDigital copy of course textbook\n1 year IAPP membership\n\n  \nWhy You Should Take Privacy in Technology Training\nData protection regulations worldwide require privacy protections be built into products and services. IAPP Privacy in Technology training\, aligned with the ANSI/ISO-accredited CIPT certification program\, will provide you with the knowledge to recognize privacy threats and skills to apply technical strategies to mitigate privacy risk throughout the software and systems development lifecycles. \n  \nWho Should Train\nSoftware developers\, information security professionals\, data architects\, privacy engineers\, network and cloud engineers responsible for incorporating privacy controls into technology operations and product development. Training helps with career advancement and preparing for CIPT certification testing. \n  \nWhat You Will Learn\nPrivacy in Technology training teaches technology and data professionals how to understand and integrate strategies and techniques to minimize privacy threats. The curriculum includes privacy-by-design principles; implementing data- and process-oriented strategies to support privacy policies; and managing threats from AI\, location tracking\, etc. \n  \nCourse delivery\nThe course is delivered live online using MS Teams (or GoToWebinar) by an IAPP Faculty trainer. In order to minimise prolonged screen time the course is delivered over four half-days: \nDay 1 \nModule 1: Foundational principles\nModule 2: The role of technology in privacy (part 1) \nDay 2 \nModule 2: The role of technology in privacy (part 2)\nModule 3: Privacy threats and violations \nDay 3 \nModule 4: Technical measures and privacy-enhancing technologies\nModule 5: Privacy-by-design methodology \nDay 4 \nModule 6: Privacy engineering\nModule 7: Technology challenges for privacy \n  \nOther information\nThe Body of Knowledge for the CIPT course can be viewed and downloaded from here. \nBe aware that IAPP recommend approximately 30 hours of additional study of course materials and resources is required to adequately prepare for the exam. \nYou are encouraged to read the IAPP’s Certification Candidate Handbook for additional information about IAPP’s courses and preparation required to sit the exam. \nIf you take the CIPT exam within 3 months of the course and do not pass\, you are welcome to join a future course free of charge. \nPlease review the Online Training Policy for IAPP Courses that details information about cancellations. \n‍ \nProcessing and transfer of your personal data to the USA\nWhen you enrol on an IAPP course run by Purpose and Means\,  various personal data about you will be registered. For details on how your personal data is processed\, please view the Purpose and Means Privacy Notice. \nThe course you enrol on is offered in cooperation with the International Association of Privacy Professionals (IAPP)\, 75 Rochester Ave.\, Portsmouth\, NH 03801 USA. \nOnce you register for the course\, your name\, email address\, and existing IAPP membership status will be transferred to the IAPP in the USA. This is necessary  in order to complete the course registration\, and to allow you access to online training material\, register you as a member of the IAPP\, and make the required arrangements before a certification exam\, if relevant. \nThe transfer of your personal data to the IAPP in the USA is necessary for the performance of the training course contract between you and Purpose and Means\, and for the performance of the contract concluded in your interest between Purpose and Means and the IAPP.
URL:https://instituteofprivacydesign.org/event/privacy-in-technology-cipt-3/
LOCATION:Online
CATEGORIES:#privacytraining,#CIPT
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/purposeandmeans.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250620T110000
DTEND;TZID=America/New_York:20250620T120000
DTSTAMP:20260403T140013
CREATED:20250608T222628Z
LAST-MODIFIED:20250608T224055Z
UID:9053-1750417200-1750420800@instituteofprivacydesign.org
SUMMARY:Use Cases of AI in a Privacy Preserving Way | PETed Sip & Chat
DESCRIPTION:Join our monthly PETed Sip & Chat hosted by Kimberly Lancaster! 3rd Friday of every month at 11:00AM – 12:00 PM ET throughout 2025.\nTopic: Use Cases of AI in a Privacy Preserving Way \n\nAI shines in areas where it can enhance efficiency\, uncover insights\, and support human creativity. Some of its best use cases include: \n\nAutomation & Productivity: AI streamlines repetitive tasks\, like data entry\, scheduling\, and customer support\, freeing up time for more meaningful work.\nData Analysis & Decision-Making: AI rapidly processes vast amounts of information to identify trends\, predict outcomes\, and optimize strategies—valuable for business\, healthcare\, and finance.\nCreative Assistance: From generating music and art to helping draft compelling writing\, AI serves as a powerful tool for inspiration and refinement.\nPersonalized Experiences: Recommendation algorithms tailor content in streaming platforms\, online shopping\, and even education to better suit individual preferences.\nScientific & Medical Advancements: AI assists in diagnosing diseases\, discovering new drugs\, and analyzing complex scientific data\, accelerating breakthroughs.\nEnhanced Security & Fraud Detection: AI improves cybersecurity by detecting anomalies and protecting sensitive information from cyber threats.\n\nIt’s a versatile powerhouse that complements human ingenuity rather than replacing it. Are you thinking of AI for a specific purpose?
URL:https://instituteofprivacydesign.org/event/use-cases-of-ai-in-a-privacy-preserving-way-peted-sip-chat/
LOCATION:https://us06web.zoom.us/j/88937320145?pwd=nOdra9gPOQYD9qETF1XWF7JcyaQiRc.1
CATEGORIES:PETed,IOPD Events
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2025/06/June20sipnchat.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250718T110000
DTEND;TZID=America/New_York:20250718T120000
DTSTAMP:20260403T140013
CREATED:20250515T202329Z
LAST-MODIFIED:20250606T171637Z
UID:9036-1752836400-1752840000@instituteofprivacydesign.org
SUMMARY:When AI Misses the Mark - The Worst Use Cases | PETed Sip & Chat
DESCRIPTION:Join our monthly PETed Sip & Chat hosted by Janelle Hsia! 3rd Friday of every month at 11:00AM – 12:00 PM ET throughout 2025.\nTopic: When AI Misses the Mark – The Worst Use Cases \nAs privacy professionals\, we see the worst of the worst when it comes to how companies use and abuse personal data.  When AI is added to the equation\, it can get frightening.  As companies rush to integrate AI into every aspect of their business\, not all applications lead to positive outcomes. Some AI use cases create inefficiencies\, amplify bias\, erode privacy\, or even produce harmful consequences. \nCome share your concerning stories as we explore issues such as algorithmic bias in hiring\, surveillance overreach\, AI-driven misinformation\, and automation that doesn’t work.
URL:https://instituteofprivacydesign.org/event/when-ai-misses-the-mark-the-worst-use-cases-peted-sip-chat/
LOCATION:https://us02web.zoom.us/j/88093390935?pwd=v4giaLjBytoXEboeL9BkU4vhRIPTdo.1
CATEGORIES:PETed,IOPD Events
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2025/05/Julypetedsipnchat.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250813T140000
DTEND;TZID=America/New_York:20250813T150000
DTSTAMP:20260403T140013
CREATED:20250623T202804Z
LAST-MODIFIED:20250623T203035Z
UID:9110-1755093600-1755097200@instituteofprivacydesign.org
SUMMARY:Q3 2025 All Hands Meeting
DESCRIPTION:ALL HANDS MEETING 📢 Ambassadors\, Advisors\, Volunteers\, and Committee Members are all invited to join us Wednesday\, August 13th from 2:00 – 3:00 PM EDT (11 AM PDT / 8 PM CEST). We will welcome our new members and give updates on current projects! \nPlease reach out to admin22@instituteofprivacydesign.org if you have yet to receive an invitation. Guest invites are first come first serve. If you have a friend or colleague interested\, send us their email and we’ll add them to the guest list!
URL:https://instituteofprivacydesign.org/event/q3-2025-all-hands-meeting/
LOCATION:https://iopd.whereby.com/all-hands
CATEGORIES:All Hands Meeting,IOPD Events
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2025/06/allhands-aug132025.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250815T110000
DTEND;TZID=America/New_York:20250815T120000
DTSTAMP:20260403T140013
CREATED:20250714T202846Z
LAST-MODIFIED:20250811T193015Z
UID:9122-1755255600-1755259200@instituteofprivacydesign.org
SUMMARY:Cars — IoT "Endpoints-on-Wheels" | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. \nThe participants will be asked to bring questions related to the topic. Come back every quarter for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nAugust 15th\, 2025 @ 11:00 AM – 12:00 PM EDT (8:00 AM PDT / 5:00 PM CEST) \n*Note that the quarterly guest speaker discussion takes place during the normal Sip & Chat time. The introductory presentation will be recorded to maximize discussion time. Recording Here.  \n  \nTopic:\nCars — IoT “Endpoints-on-Wheels” \n  \nSynopsis:\nModern vehicles have evolved far beyond transportation—they’re now sophisticated IoT endpoints collecting vast amounts of personal data. We will discuss data security and privacy risks modern cars pose to individuals and companies — from data leakage to 4th amendment exception; device-centric universal opt out mechanisms; car-specific IoT recommendations from the IoT Advisory Board to the US Dept of Commerce; Louisiana’s new law to disable connected app tracking & the “Disconnect by Reset Protocol”; and more. \n  \nProblem Statement:\nModern vehicle systems are often unmanaged\, unencrypted endpoints that collect\, process\, share\, and retain sensitive information. For company leaders\, when employees connect devices\, authenticate to services\, or utilize navigation and communication features\, these systems create data repositories typically outside standard security controls and monitoring capabilities. Not including vehicles in your asset management policies is akin to handing unencrypted hard drives with chock-fulls of personal and corporate data to random third parties. Let’s discuss ways to better protect companies and individuals data privacy & security in this talk. \n  \nRelated Privacy Enhancing Technologies (PETs):\nLet’s discuss the administrative\, technical\, and physical safeguards we apply to other devices like laptops and smartphones…and how we can apply these in the vehicle context.  \n  \nPre-Discussion Resources:\n\n\nRecorded Introduction: https://instituteofprivacydesign.org/wp-content/uploads/2025/08/IOPD_MerryMarwig_08152025_Intro-Only.mp4\nWhitepaper:  “Endpoints-on-Wheels: Protecting Company & Employee data in Cars” \nWhitepaper:  “Deleting Personal Data from Vehicles: A GDPR Obligation for Auto Businesses“\nWhitepaper:  FORTHCOMING (pls remind me after July 9th)…this one is going to be a page-turner!\nReport:  Internet of Things (IoT) Advisory Board Report\, Oct 2024 — particularly page 94 and 95 on car privacy labelling recommendations (note\, the amazing\, wonderful data-diva Debbie Reynolds served on this board!). \nResource:  vehicleprivacyreport.com <– check out a summary of your OEM’s data practices along with other auto providers\nResource:  Opt Out Code <– a universal opt out mechanism for devices…from smartphones\, to laptops\, tablets\, routers\, and cars! \nNews article:  Louisiana new law re: disabling vehicle tracking\nDocumentation:  Disconnect by Reset (page 13)\n\n\n  \n\nSpeaker:\n\nMerry Marwig \nMerry Marwig is a pro-consumer\, pro-business privacy advocate who is optimistic about what data privacy rights mean for everyday people—and for the companies they do business with. At Privacy4Cars — the world’s leading authority on vehicle privacy and data security — she helps protect driver and passengers’ personal data while creating business opportunities for automotive companies. Merry holds three IAPP certifications (FIP\, CIPP/US\, CIPM)\, is certified in Logical AI Governance\, and earned a master’s degree from the University of Illinois at Urbana-Champaign. \n  \nModerator:\nKimberly Lancaster \nTrusted Privacy Advisor who Guides Data Protection\, Drives Operational Excellence\, and Leads with Integrity by aligning with InfoSec\, Security\, GRC\, Compliance\, and Data Governance. Board Member\, Speaker\, and Author. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event\, but we welcome first time attendees as our guests. Come check it out! If you are already a member\, subscribe to our PETed Mailing List for announcements and monthly invitations!
URL:https://instituteofprivacydesign.org/event/cars-iot-endpoints-on-wheels-privacy-engineering-technology-education-discussion-peted/
LOCATION:https://iopd.whereby.com/peted-discussion
CATEGORIES:PETed,IOPD Events
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2025/07/merry.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250919T110000
DTEND;TZID=America/New_York:20250919T120000
DTSTAMP:20260403T140013
CREATED:20250814T191859Z
LAST-MODIFIED:20250904T210232Z
UID:9139-1758279600-1758283200@instituteofprivacydesign.org
SUMMARY:Who's Watching the Kids? AI\, Privacy & the Fight for Children’s Rights in Schools | PETed Sip & Chat
DESCRIPTION:Join our monthly PETed Sip & Chat hosted by Tiffany Soomdat! 3rd Friday of every month at 11:00AM – 12:00 PM ET throughout 2025.\nTopic: Who’s Watching the Kids? AI\, Privacy & the Fight for Children’s Rights in Schools \nAs AI tools become a normal part of school life\, tracking learning\, behavior\, and even emotions\, kids are being watched more than ever. Are their rights being protected? In this Sip & Chat\, we’ll unpack how AI is changing education\, what it means for children’s privacy\, and how new laws like COPPA updates and FERPA battles in California are reshaping the rules. Let’s talk about consent\, control\, and how to keep kids’ data safe in the age of AI.
URL:https://instituteofprivacydesign.org/event/whos-watching-the-kids-ai-privacy-the-fight-for-childrens-rights-in-schools-peted-sip-chat/
LOCATION:https://us02web.zoom.us/j/88093390935?pwd=v4giaLjBytoXEboeL9BkU4vhRIPTdo.1
CATEGORIES:PETed,IOPD Events
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2025/08/Sepsipnchat.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251017T110000
DTEND;TZID=America/New_York:20251017T120000
DTSTAMP:20260403T140013
CREATED:20250902T211412Z
LAST-MODIFIED:20250904T210258Z
UID:9222-1760698800-1760702400@instituteofprivacydesign.org
SUMMARY:Inclusion by Design | PETed Sip & Chat
DESCRIPTION:Join our monthly PETed Sip & Chat hosted by Shoshana Rosenberg! 3rd Friday of every month at 11:00AM – 12:00 PM ET throughout 2025.\nTopic: Inclusion by Design \nYou can’t fix what you can’t measure so let’s talk about how to reduce your risk profile and refine your programs. Do you need to gather inclusion feedback and track other sensitive personal data elements?  Are you looking for candid feedback so that you can move your any program forward?  During this Sip & Chat we will discuss how using a tool that ensure anonymity and privacy but still allows you to track engagement is critical when insights require people to trust the process and ensure their data is safe.
URL:https://instituteofprivacydesign.org/event/inclusion-by-design-peted-sip-chat/
LOCATION:https://us02web.zoom.us/j/88093390935?pwd=v4giaLjBytoXEboeL9BkU4vhRIPTdo.1
CATEGORIES:PETed,IOPD Events
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2025/09/PETed-Oct-sipnchat.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251121T110000
DTEND;TZID=America/New_York:20251121T120000
DTSTAMP:20260403T140013
CREATED:20250905T175720Z
LAST-MODIFIED:20250905T182711Z
UID:9274-1763722800-1763726400@instituteofprivacydesign.org
SUMMARY:Tracking Technologies in Flux: Patterns\, Risks\, and Emerging Practices | PETed Sip & Chat
DESCRIPTION:Join our monthly PETed Sip & Chat the 3rd Friday of every month at 11:00AM – 12:00 PM ET through 2025!\n\nSynopsis: \nTracking technologies are evolving faster than most governance models can adapt. Pixels\, cookies\, APIs\, and server-side integrations often behave in ways that diverge from what policies assume and create blind spots in consent\, inventories\, and operational control. This session examines recurring technical and operational patterns observed in practice\, the reasons governance breaks down\, and emerging practices that help privacy teams restore visibility and accountability. \n  \nGuest Expert: Nicole Nguyen\nNicole Nguyen is an enthusiastic privacy professional\, deftly bridging technology\, business\, and law. Beginning in intellectual property and patent prosecution\, she gained practical legal insights and technical acumen\, which she later applied to data privacy across various regulated industries. She honed her skills across operations\, regulatory analysis\, and engineering\, to streamline data handling\, shape privacy policies\, and drive privacy-by-design principles. Recognized for her leadership and technical prowess\, Nicole guides strategic decisions\, resolves complex issues\, and bolsters business resilience. Her passion lies in crafting comprehensive data governance programs\, weaving security\, privacy\, and risk disciplines into robust frameworks that safeguard business value and promote a future-ready\, privacy-conscious culture. B.S. Chemical and Electrical Engineering and M.S. Information Systems\, Cybersecurity and Business Intelligence. \n  \nModerator: Janelle Hsia\nJanelle Hsia is the President and Founder of Privacy SWAN Consulting working as a trainer\, consultant\, and trusted advisor for strategic and tactical decision-making. While she is focused on the field of privacy and data protection\, Janelle Hsia is not a lawyer and brings a diverse background with strong leadership\, technical\, and business skills spanning 20 years in the areas of project management\, IT\, privacy\, security\, data governance\, and process improvement. Janelle Hsia is also Co-Founder and Vice-President of the Institute of Operational Privacy Design. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event\, but we welcome first time attendees as our guests. Come check it out! If you are already a member\, subscribe to our PETed Mailing List for announcements and monthly invitations!
URL:https://instituteofprivacydesign.org/event/tracking-technologies-in-flux-patterns-risks-and-emerging-practices-peted-sip-chat/
LOCATION:https://us02web.zoom.us/j/88093390935?pwd=v4giaLjBytoXEboeL9BkU4vhRIPTdo.1
CATEGORIES:PETed,IOPD Events
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2025/09/nicole.png
END:VEVENT
END:VCALENDAR