, P See HoWITaLLFITSTGeTHer MeeT THePeoPLWHoHa d e m y The PrIv Join yourpeersinDallasforthreedaysofqualityeducation and and yourreputation. organization’s privacyefforts. questions thatkeepyouupatnight.Couldyourorganization’s privacy enforcers that can impose real consequences on your brand privacy professionalsoftenarethelonewolfintheirorganization— reputation surviveabreach?Istherepossibilitythatyoucouldbe regulators, withoutstiflinginnovationandbusinessobjectives. need to excel in your daily practice and be a leader for your your for leader a be and practice daily your in excel to need networking andreturntoworkwiththetoolsexperiences you your organization’s productsaretrustworthy?Talk toyourpeers, year, Dallasisthecrossroadsforprivacyprofession. Come to the Academy and get information and answers to the the to answers and information get and Academy the to Come Privacy is interwoven into every facet of today’s economy, but but economy, today’s of facet every into interwoven is Privacy cOme TOgeTherwITh the targetofanFTCenforcementaction?Howdoyouensurethat to sharechallenges,getanswersandimprovetheirpractices.This Now, morethanever, privacyprofessionalsneedtocometogether walking the fine line of protecting customers and satisfying satisfying and customers protecting of line fine the walking hear fromtheexpertsandgetuniqueinsiderperspectivetop A President & CEO, IAP CEO, & President , c A Partner, Wiley Rein LLP Rein Wiley Partner, , Rates available for corporate groups, privacy certification training and testing. and training certification privacy government and higher education employees, Privacy Dinner only and Visit the website for additional pricing information. r g / O Bootcamp at the Practical Privacy Can’t make it to our daylong Privacy Privacy daylong our to it make Can’t Series? Catch it at the Academy! . Acy PrOfeSSION 1717 N.AkardStreet, Dallas,TX75201 The FairmontHotel Phone: +1214.720.2020 Conference LocationandHotel Accommodations Fax: +1 214.720.7405 Kirk Nahra, CIPP Nahra, Kirk IAPP’s new publication, Building a Privacy IAPP’s Privacy Bootcamp in today’s enterprise it is hard to know how how know to hard is it enterprise today’s in hands-on guidance for managing data within within data managing for guidance hands-on foundation that will give you the structure structure the you give will that foundation business models converging, and evolving, evolving, and converging, models business 8 a.m. – 5 p.m. to navigate the maze of challenges you face. face. you challenges of maze the navigate to introduce will program intensive two-part Privacy can be a bewildering topic. With With topic. bewildering a be can Privacy get to opportunity your is Bootcamp Privacy Attendees will receive a free copy of the you with a “Privacy Toolkit”—practical, Toolkit”—practical, “Privacy a with you sound a with leave You’ll organization. your you to the fundamentals of privacy. Part Part privacy. of fundamentals the to you multiple laws, jurisdictions, technologies and and technologies jurisdictions, laws, multiple right decisions for your privacy initiatives. privacy your for decisions right Program: A Practitioner’s Guide Program: A Practitioner’s and understanding you need to make the the make to need you understanding and a solid grounding in this dynamic field. This This field. dynamic this in grounding solid a concepts and philosophies. Part 2 will provide provide will 2 Part philosophies. and concepts J. Trevor Hughes, CIPP Hughes, Trevor J. 1 provides an overview of basic privacy privacy basic of overview an provides 1 IATION Regular Rate (After August 19) $1395 USD $1595 USD c Ve THanSWerS ASSO $545 USD $695 USD $695 USD c y A v I Early Bird Rate (Until August 19) $1195 USD $1395 USD r P w w w. EU Data Protection Bootcamp Privacy Bootcamp (full day) IAPP Member Nonmember , Partner, Panetta & Associati Panetta, Partner, Partner, , Rocco Hazel Grant, Partner, level. Using the latest research, this leave with a strong general understanding key building blocks of a network-centric network-centric a of blocks building key workshop will help you discover the nine nine the discover you help will workshop increase dramatically to plan a formulate (Wednesday only) (Wednesday One Session (half day) PrecONfereNce mAIN cONfereNce PrIcINg this broad overview of data protection relate to. Privacy officers who do just that that just do who officers Privacy to. relate role of data protection authorities, and the Two Sessions (full day) Two wOrKShOPS privacy pros to build programs people can can people programs build to pros privacy people’s insight, foresight and mind-sight to how you show and infostructure privacy your from participation program privacy practices across the pond. Learn about the the EU, the in structures legal and political designing a program that can engage of the roles, responsibilities and laws at both an intellectual and emotional customers, employees and partners. and employees customers, complex web of laws that guide data. You’ll complex web of laws that guide data. You’ll give customers an optimum experience and and experience optimum an customers give business. their for asset strategic a gain governing privacy in the European Union. The secret is “self-synchronization”— Join our expert European faculty for

The IAPP PrIvAcy AcAdemy 2011

September 14–16 The Fairmont Hotel

Dallas, TX International Association of Privacy Professionals Pease International Tradeport 75 Rochester Ave., Suite 4 b e r 1 4 Portsmouth, NH 03801 USA M

Visit www.privacyassociation.org/academy to register online e

or register by phone at +1 603.427.9200. PT

PRIORITY CODE: Day

SPONSOrS P Privacy Architect, YourPrivacy Architect, Privacy , ay, S e o SD n e SH D 1 – 5 p . m . Mario Morel Mario in a lively group discussion of how law and issues raised by these technologies. it is becoming apparent that technology is starting to drive that momentum. This Debunking the Privacy Paradox Myth: Myth: Paradox Privacy the Debunking Field Communication (NFC), RFID and mobile mobile and RFID (NFC), Communication Field workshop will examine NFC, RFID and Creating a Self-Synchronized Privacy Program Privacy Self-Synchronized a Creating be close. With the expansive new capabilities capabilities new expansive the With close. be benefit estimations. The apparent dissonance dissonance apparent The estimations. benefit them concerns say people what between technologies under existing laws. Engage their privacy is not a paradox; it is a call for for call a is it paradox; a not is privacy their Cognitive science has shown that consumers consumers that shown has science Cognitive may adapt to meet privacy and data security mobile payments and the regulation of such regulation—including proposed legislation— required momentum for such adoption may payments has taken longer than many possibility of including NFC technology in such such in technology NFC including of possibility of mobile phones and tablet devices, the devices, and upgrades to location tracking, don’t make privacy decisions based on cost/ on based decisions privacy make don’t protect to practice in do they what and online Although the broad-based adoption of Near Near of adoption broad-based the Although anticipated, there are recent signs that the

erence W e F bookstore. Meet the authors and get your copy signed! to putting together an effective privacy operation—being operation—being privacy effective an together putting to Bootcamp preconference workshop and get a free copy. free a get and workshop preconference Bootcamp Get your copy of this essential and long-awaited guide guide long-awaited and essential this of copy your Get Copies will also be available for sale at the Academy released this summer! Register for the Privacy

e Work S PP! Senior Privacy Officer, Officer, Privacy Senior , Senior Counsel, , a ea Christopher T. Pierson, , Christopher T. I , Associate Specialist,

L e Precon

re eXhIBITOrS

Affinion Evidon Nymity W M TH M Blockmaster Experian Rust Consulting BNA HiSoftware Stroz Friedberg ne

Click 4 Compliance Hogan Lovells Symantec ro Protecting and Securing a Moving Target: Protecting and Securing a Moving Target: NFC, RFID and Mobile Payments Navigating the Maze: Federal Legislation and Counselor Library Identity Finder TRUSTe the Privacy Impact Assessment Process CIPP Hoffman, C. William legislative requirements and how to be What does it take to make a privacy impact workshop for a comprehensive look at the CIPP, CIPP/G, Chief Privacy Officer and Senior CIPP, 8 a.m. – 12 p.m. that can increase efficiency and improve the Privacy Act—are covered by a PIA, it’s Buckley Sandler LLP Goodwin Procter LLP General Dynamics Information Technology Information Dynamics General your organization, including the pre-PIA work Vice President, Citizens Financial Group, Inc., F more important than ever to know the ins prepared for them. Investigate the systematic process that can help to ensure compliance and produce a successful PIA procedure in and outs of the process. Join this informative assessment (PIA) successful? As federal agencies scramble to ensure that all systems—as defined by FISMA, OMB and completion and accuracy. James Shreve, CIPP Jacqueline Klosek, CIPP Building a Privacy Program: Program: Privacy a Building A Practitioner’s Guide Practitioner’s A Debix Jordan Lawrence Womble Carlyle a Equifax Kroll TS G TS TS n ence I n I ee o LL M Susan Combs,

ce HP o r k X c e acy U IV TW 5-Minute Mixer 5-Minute Welcome Reception Reception Welcome Early Bird Run/Walk Bird Early Networking Dinners Networking Privacy Dinner and Awards Ceremony Awards and Dinner Privacy Table Topic Lunch Topic Table r o • • • • • • Keynote Speaker: Keynote innovators and leaders at the sixth main Academy your with included is winners of the 2011 HP-IAPP Privacy Rub elbows with privacy’s top this exceptional evening of celebration celebration of evening exceptional this Privacy Vanguard Award. A ticket to to ticket A Award. Vanguard Privacy Innovation Awards and the IAPP Comptroller, State of Texas Comptroller, Ceremony, where we will unveil the The IAPP Privacy Dinner 2011 Dinner Privacy IAPP The 15 September Thursday, Hotel Fairmont The P annual Privacy Dinner and Awards conference registration. conference throughout the Academy: build relationships at our many many our at relationships build Discover connections and

networking opportunities n e T Practice Meets Privacy www.privacyassociation.org/academy IAPP IAPP P etme 4–16 September 14 d

allas, TX r

I v D

A on

cy TI an D

eS G G A ca G T n I c re n n TIFI I A

demy STI Marc Rotenberg Marc KamberLaw LLC Scott A. Kamber A. Scott President, EPIC ra e TU Be a privacy standout! will be offered at the Academy. the at offered be will cer CIPP/IT, and testing for all modules all for testing and CIPP/IT, certification at the Academy. Train and test for your IAPP Training for the CIPP, CIPP/G and CIPP/G CIPP, the for Training T T ea in the consumer privacy protection protection privacy consumer the in the table. being on the opposite side of from some of the biggest players players biggest the of some from Get exclusive insider perspectives perspectives insider exclusive Get arena and learn how you can avoid avoid can you how learn and arena keyno F keyno F arena and learn how you can avoid Get exclusive insider perspectives from some of the biggest players being ontheoppositesideof the table. in the consumer privacy protection ea T T Training for the CIPP, CIPP/G and Train and test for your IAPP IAPP your for test and Train certification at the Academy. the at certification CIPP/IT, and testing for all modules cer will be offered at the Academy. Be a privacy standout! standout! privacy a Be TU e ra President, EPIC Scott A. Kamber KamberLaw LLC Marc Rotenberg STI demy

A I TIFI n n re c I n T G ca A G eS

D an TI cy

on A

D v I

r allas, TX

d September 14 –16 P IAPP www.privacyassociation.org/academy Privacy Privacy Meets Practice T e n networking opportunities

Discover connectionsand build relationships at our many throughout the Academy: Academy: the throughout conference registration. annual Privacy Dinner and Awards Awards and Dinner Privacy annual P The Fairmont Hotel Thursday, September 15 The IAPP Privacy Dinner 2011 Comptroller, StateofTexas the unveil will we where Ceremony, Innovation Awards and the IAPP IAPP the and Awards Innovation Privacy Vanguard Award. A ticket to this exceptional evening of celebration Rub elbows with privacy’s top top privacy’s with elbows Rub winners of the 2011 HP-IAPP Privacy Privacy HP-IAPP 2011 the of winners is included with your Academy main sixth the at leaders and innovators Keynote Speaker: • • • • • • o r Table Topic Lunch Privacy Dinner and Awards Ceremony Networking Dinners Early Bird Run/Walk Welcome Reception 5-Minute Mixer W T IV U acy e c X k r o P H ce

Susan Combs, M LL o ee I n I ence n TS G

S T

Kroll Equifax

Womble Carlyle Womble Jordan Lawrence Jordan Debix

a A Practitioner’s Guide Building a Privacy Program: Jacqueline Klosek,CIPP James Shreve,CIPP completion and accuracy. and completion systems—as defined by FISMA, OMB and and OMB FISMA, by defined systems—as agencies scramble to ensure that all all that ensure to scramble agencies federal As successful? (PIA) assessment and outs of the process. Join this informative informative this Join process. the of outs and and produce a successful PIA procedure in in procedure PIA successful a produce and process that can help to ensure compliance compliance ensure to help can that process systematic the Investigate them. for prepared more important than ever to know the ins ins the know to ever than important more F Vice President,CitizensFinancialGroup,Inc., your organization, including the pre-PIA work work pre-PIA the including organization, your General Dynamics Information Technology Goodwin ProcterLLP Buckley SandlerLLP the Privacy Act—are covered by a PIA, it’s PIA, a by covered Act—are Privacy the that can increase efficiency and improve improve and efficiency increase can that . m . p 2 1 – . m . a 8 CIPP, CIPP/G,ChiefPrivacyOfficerandSenior workshop for a comprehensive look at the the at look comprehensive a for workshop What does it take to make a privacy impact impact privacy a make to take it does What legislative requirements and how to be be to how and requirements legislative TRUSTe Identity Finder Identity William C. Hoffman, CIPP the PrivacyImpactAssessmentProcess Library Counselor Navigating theMaze:FederalLegislationand NFC, RFIDandMobilePayments Protecting andSecuringaMovingTarget:

,

Symantec Hogan Lovells Hogan ro Compliance 4 Click

P

ne Stroz Friedberg Stroz HiSoftware BNA

Rust Consulting Rust Experian Blockmaster

M TH Nymity Evidon Evidon Affinion

W

S r IBITO h X e re

Precon See HoWITaLLFITSTGeTHer MeeT THePeoPLWHoHa e L

d e m y , AssociateSpecialist, The PrIv Join yourpeersinDallasforthreedaysofqualityeducation and and yourreputation. organization’s privacyefforts. questions thatkeepyouupatnight.Couldyourorganization’s privacy enforcers that can impose real consequences on your brand privacy professionalsoftenarethelonewolfintheirorganization— reputation surviveabreach?Istherepossibilitythatyoucouldbe regulators, withoutstiflinginnovationandbusinessobjectives. need to excel in your daily practice and be a leader for your your for leader a be and practice daily your in excel to need networking andreturntoworkwiththetoolsexperiences you your organization’s productsaretrustworthy?Talk toyourpeers, year, Dallasisthecrossroadsforprivacyprofession. Come to the Academy and get information and answers to the the to answers and information get and Academy the to Come Privacy is interwoven into every facet of today’s economy, but but economy, today’s of facet every into interwoven is Privacy cOme TOgeTherwITh the targetofanFTCenforcementaction?Howdoyouensurethat to sharechallenges,getanswersandimprovetheirpractices.This Now, morethanever, privacyprofessionalsneedtocometogether walking the fine line of protecting customers and satisfying satisfying and customers protecting of line fine the walking hear fromtheexpertsandgetuniqueinsiderperspectivetop I , ChristopherT. Pierson, ea A a President & CEO, IAP CEO, & President , , , SeniorCounsel, c Senior Privacy Officer, PP! S A Partner, Wiley Rein LLP Rein Wiley Partner, Work e , Rates available for corporate groups, privacy certification training and testing. and training certification privacy government and higher education employees, Privacy Dinner only and Visit the website for additional pricing information.

r g / O Bootcamp at the Practical Privacy Can’t make it to our daylong Privacy Privacy daylong our to it make Can’t Series? Catch it at the Academy! . released this summer! Register for the Privacy Privacy the for Register summer! this released Copies willalsobeavailablefor saleattheAcademy Get your copy of this essential and long-awaited guide Bootcamp preconference workshop and get a free copy. to putting together an effective privacy operation—being bookstore. Meet theauthorsandgetyourcopy signed! Acy PrOfeSSION 1717 N.AkardStreet, Dallas,TX75201 The FairmontHotel Phone: +1214.720.2020 Conference LocationandHotel Accommodations Fax: +1 214.720.7405 F e W Kirk Nahra, CIPP Nahra, Kirk Privacy Bootcamp IAPP’s new publication, Building a Privacy IAPP’s in today’s enterprise it is hard to know how how know to hard is it enterprise today’s in hands-on guidance for managing data within within data managing for guidance hands-on foundation that will give you the structure structure the you give will that foundation business models converging, and evolving, evolving, and converging, models business 8 a.m. – 5 p.m. to navigate the maze of challenges you face. face. you challenges of maze the navigate to two-part intensive program will introduce introduce will program intensive two-part Privacy can be a bewildering topic. With With topic. bewildering a be can Privacy get to opportunity your is Bootcamp Privacy you to the fundamentals of privacy. Part Part privacy. of fundamentals the to you Toolkit”—practical, “Privacy a with you sound a with leave You’ll organization. your Attendees will receive a free copy of the multiple laws, jurisdictions, technologies and and technologies jurisdictions, laws, multiple right decisions for your privacy initiatives. privacy your for decisions right Program: A Practitioner’s Guide Program: A Practitioner’s a solid grounding in this dynamic field. This This field. dynamic this in grounding solid a the make to need you understanding and concepts and philosophies. Part 2 will provide provide will 2 Part philosophies. and concepts J. Trevor Hughes, CIPP Hughes, Trevor J. 1 provides an overview of basic privacy privacy basic of overview an provides 1 erence IATION

anticipated, therearerecentsignsthatthe Although the broad-based adoption of Near online and what they do in practice to protect don’t make privacy decisions based on cost/ devices, andupgradestolocationtracking, of mobilephonesandtabletdevices,the possibility of including NFC technology in such many than longer taken has payments regulation—including proposedlegislation— required momentumforsuchadoptionmay may adapttomeetprivacyanddatasecurity mobile paymentsandtheregulationofsuch Cognitive science has shown that consumers their privacy is not a paradox; it is a call for technologies underexistinglaws.Engage between what people say concerns them benefit estimations. The apparent dissonance be close. With the expansive new capabilities Creating a Self-Synchronized Privacy Program workshop will examine NFC, RFID and and RFID NFC, examine will workshop Field Communication (NFC), RFID and mobile Debunking the Privacy Paradox Myth: issues raisedbythesetechnologies. in alivelygroupdiscussionofhowlawand is starting to drive that momentum. This This momentum. that drive to starting is technology that apparent becoming is it Mario Morel . m . p 5 – 1 D SH Regular Rate (After August 19) $1395 USD $1595 USD c e n D S Ve THanSWerS o y e S ay, ASSO ,

Privacy Architect, YourPrivacy

$545 USD $695 USD $695 USD

S r P SPONSO c y

A

Day CODE: PRIORITY

T P 603.427.9200. +1 at phone by register or v

I

Visit www.privacyassociation.org/academy to register online register to www.privacyassociation.org/academy Visit Early Bird Rate (Until August 19) $1195 USD $1395 USD r e

P M tsmouth, NH 03801 USA 03801 NH tsmouth, Por

4 Suite ve., A Rochester 75

4 1 r e b

t radepor T International Pease

International Association of Privacy Professionals Privacy of Association International Dallas, TX Dallas, The Fairmont Hotel Fairmont The

w w w. etme 4–16 14 September

The IAPP Pr IAPP The cy Ac cy A v I demy 2011 2011 demy EU Data Protection Bootcamp A Privacy Bootcamp (full day) , Partner, Panetta & Associati Panetta, Partner, IAPP Member Nonmember Partner, Bristows, Rocco Hazel Grant, Partner, leave with a strong general understanding level. Using the latest research, this key building blocks of a network-centric network-centric a of blocks building key formulate a plan to dramatically increase increase dramatically to plan a formulate workshop will help you discover the nine nine the discover you help will workshop (Wednesday only) (Wednesday One Session (half day) PrecONfereNce mAIN cONfereNce PrIcINg this broad overview of data protection role of data protection authorities, and the relate to. Privacy officers who do just that that just do who officers Privacy to. relate Two Sessions (full day) Two wOrKShOPS practices across the pond. Learn about the the EU, the in structures legal and political privacy program participation from your your from participation program privacy privacy infostructure and show you how to to how you show and infostructure privacy privacy pros to build programs people can can people programs build to pros privacy people’s insight, foresight and mind-sight of the roles, responsibilities and laws designing a program that can engage at both an intellectual and emotional complex web of laws that guide data. You’ll complex web of laws that guide data. You’ll customers, employees and partners. and employees customers, governing privacy in the European Union. give customers an optimum experience and and experience optimum an customers give business. their for asset strategic a gain The secret is “self-synchronization”— Join our expert European faculty for

Join our expert European faculty for for faculty European expert our Join The secret is “self-synchronization”— is secret The gain a strategic asset for their business. give customers an optimum experience and governing privacyintheEuropeanUnion. customers, employees and partners. complex weboflawsthatguidedata.You’ll at both an intellectual and emotional emotional and intellectual an both at designing a program that can engage engage can that program a designing of theroles,responsibilitiesandlaws people’s insight, foresight and mind-sight mind-sight and foresight insight, people’s privacy pros to build programs people can privacy infostructure and show you how to privacy program participation from your political and legal structures in the EU, the practices acrossthepond.Learnabout wOrKShOPS Two Sessions(fullday) relate to. Privacy officers who do just that role ofdataprotectionauthorities,andthe this broad overview of data protection protection data of overview broad this mAIN cONfereNcePrIIN g PrecONfereNce One Session(halfday) (Wednesday only) workshop will help you discover the nine formulate a plan to dramatically increase key building blocks of a network-centric level. Using the latest research, this this research, latest the Using level. leave withastronggeneralunderstanding Hazel Grant,Partner, Bristows,Rocco Panetta, Partner, Panetta&Associati Nonmember IAPP Member Privacy Bootcamp(fullday) The IAPP PrIvAcy AcAdemy 2011 EU DataProtectionBootcamp

September 14–16 w. w w The Fairmont Hotel

Dallas, TX International Association of Privacy Professionals Pease International Tradeport 75 Rochester Ave., Suite 4 b e r 1 4 Portsmouth, NH 03801 USA M P e r $1395 USD $1195 USD Visit www.privacyassociation.org/academy(Until August19) Early BirdRate to register online I v or register by phone at +1 603.427.9200. PT

PRIORITY CODE: Day A y c

SPONSOrS P $695 USD $695 USD $545 USD Privacy Architect, YourPrivacy Architect, Privacy , O S S A ay, S e o Ve THe anSWerS SD n e c $1595 USD $1395 USD (After August19) Regular Rate SH D 1 – 5 p . m . Mario Morel Mario it is becoming apparent that technology is starting to drive that momentum. This in a lively group discussion of how law and issues raised by these technologies. Debunking the Privacy Paradox Myth: Myth: Paradox Privacy the Debunking Field Communication (NFC), RFID and mobile mobile and RFID (NFC), Communication Field workshop will examine NFC, RFID and Creating a Self-Synchronized Privacy Program Privacy Self-Synchronized a Creating be close. With the expansive new capabilities capabilities new expansive the With close. be benefit estimations. The apparent dissonance dissonance apparent The estimations. benefit them concerns say people what between technologies under existing laws. Engage their privacy is not a paradox; it is a call for for call a is it paradox; a not is privacy their Cognitive science has shown that consumers consumers that shown has science Cognitive mobile payments and the regulation of such may adapt to meet privacy and data security required momentum for such adoption may regulation—including proposed legislation— payments has taken longer than many such in technology NFC including of possibility of mobile phones and tablet devices, the devices, and upgrades to location tracking, don’t make privacy decisions based on cost/ on based decisions privacy make don’t protect to practice in do they what and online Although the broad-based adoption of Near Near of adoption broad-based the Although anticipated, there are recent signs that the

TION O I AT I erence 1 provides an overview of basic privacy J. Trevor Hughes, CIPP concepts and philosophies. Part 2 will provide and understanding you need to make the a solid grounding in this dynamic field. This Program: APractitioner’s Guide right decisions for your privacy initiatives. multiple laws, jurisdictions, technologies and Attendees willreceiveafreecopyofthe your organization. You’ll leave with a sound you with a “Privacy Toolkit”—practical, you to the fundamentals of privacy. Part Privacy Bootcamp is your opportunity to get Privacy can be a bewildering topic. With two-part intensive program will introduce to navigate the maze of challenges you face. . m . p 5 – . m . a 8 business models converging, and evolving, foundation that will give you the structure hands-on guidance for managing data within in today’s enterprise it is hard to know how IAPP’s newpublication,BuildingaPrivacy Privacy Bootcamp Kirk Nahra, CIPP W e F Fax: +1 214.720.7405 Conference Location and Hotel Accommodations Phone: +1 214.720.2020 The Fairmont Hotel 1717 N. Akard Street, Dallas, TX 75201 Acy PrOfeSSION bookstore. Meet the authors and get your copy signed! to putting together an effective privacy operation—being operation—being privacy effective an together putting to Bootcamp preconference workshop and get a free copy. free a get and workshop preconference Bootcamp Get your copy of this essential and long-awaited guide guide long-awaited and essential this of copy your Get Copies will also be available for sale at the Academy released this summer! Register for the Privacy . Series? CatchitattheAcademy! Can’t make it to our daylong Privacy Bootcamp atthePracticalPrivacy O / g r

pricing information. Visit thewebsiteforadditional employees, Privacy Dinneronlyand government andhighereducation privacy certification training and testing. Rates availableforcorporategroups, , e Work Partner, Wiley Rein LLP A S PP! Senior Privacy Officer, Officer, Privacy Senior c , Senior Counsel, , , President & CEO, IAP a A ea Christopher T. Pierson, , Christopher T. I hear from the experts and get unique insider perspective from top walking the fine line of protecting customers and satisfying Now, more than ever, privacy professionals need to come together more than ever, Now, to share challenges, get answers and improve their practices. This to share challenges, get answers and improve their practices. This the target of an FTC enforcement action? How do you ensure that cOme TOgeTher wITh Privacy is interwoven into every facet of today’s economy, but Come to the Academy and get information and answers to the year, Dallas is the crossroads for the privacy profession. year, your organization’s products are trustworthy? Talk to your peers, products are trustworthy? Talk your organization’s networking and return to work with the tools and experiences you need to excel in your daily practice and be a leader for your regulators, without stifling innovation and business objectives. reputation survive a breach? Is there a possibility that you could be privacy professionals often are the lone wolf in their organization— privacy enforcers that can impose real consequences on your brand brand your on consequences real impose can that enforcers privacy organization’s privacy efforts. organization’s questions that keep you up at night. Could your organization’s questions that keep you up at night. Could your organization’s and your reputation. Join your peers in Dallas for three days of quality education and The PrIv , Associate Specialist, y m e d

L e MeeT THe PeoPLe WHo Ha See HoW IT aLL FITS ToGeTHer Precon

re eXhIBITOrS

Affinion Evidon Nymity W M TH M Blockmaster Experian Rust Consulting BNA HiSoftware Stroz Friedberg ne P

Click 4 Compliance Hogan Lovells Symantec ro , Protecting and Securing a Moving Target: Protecting and Securing a Moving Target: NFC, RFID and Mobile Payments Navigating the Maze: Federal Legislation and Counselor Library Identity Finder TRUSTe the Privacy Impact Assessment Process CIPP Hoffman, C. William legislative requirements and how to be What does it take to make a privacy impact workshop for a comprehensive look at the CIPP, CIPP/G, Chief Privacy Officer and Senior CIPP, 8 a.m. – 12 p.m. that can increase efficiency and improve the Privacy Act—are covered by a PIA, it’s Buckley Sandler LLP Goodwin Procter LLP General Dynamics Information Technology Information Dynamics General your organization, including the pre-PIA work Vice President, Citizens Financial Group, Inc., F more important than ever to know the ins prepared for them. Investigate the systematic process that can help to ensure compliance and produce a successful PIA procedure in and outs of the process. Join this informative assessment (PIA) successful? As federal agencies scramble to ensure that all systems—as defined by FISMA, OMB and completion and accuracy. James Shreve, CIPP Jacqueline Klosek, CIPP Building a Privacy Program: Program: Privacy a Building A Practitioner’s Guide Practitioner’s A Debix Jordan Lawrence Womble Carlyle a Equifax Kroll TS G TS TS n ence I n I ee o LL M Susan Combs,

ce HP o r k X c e acy U IV TW 5-Minute Mixer 5-Minute Welcome Reception Reception Welcome Early Bird Run/Walk Bird Early Networking Dinners Networking Privacy Dinner and Awards Ceremony Awards and Dinner Privacy Table Topic Lunch Topic Table r o • • • • • • Keynote Speaker: Keynote innovators and leaders at the sixth main Academy your with included is winners of the 2011 HP-IAPP Privacy Rub elbows with privacy’s top this exceptional evening of celebration celebration of evening exceptional this Privacy Vanguard Award. A ticket to to ticket A Award. Vanguard Privacy Innovation Awards and the IAPP Ceremony, where we will unveil the State of Texas Comptroller, The IAPP Privacy Dinner 2011 Dinner Privacy IAPP The 15 September Thursday, Hotel Fairmont The P annual Privacy Dinner and Awards conference registration. conference throughout the Academy: build relationships at our many many our at relationships build Discover connections and

networking opportunities n e T www.privacyassociation.org/academy Practice Meets Privacy IAPP IAPP P etme 4–16 September 14 d

allas, TX r

I v D

A on

cy TI an D

eS G G A ca G T n I c re n n TIFI I A

demy STI Marc Rotenberg Marc KamberLaw LLC Scott A. Kamber A. Scott President, EPIC ra e TU Be a privacy standout! will be offered at the Academy. the at offered be will cer CIPP/IT, and testing for all modules all for testing and CIPP/IT, certification at the Academy. Train and test for your IAPP Training for the CIPP, CIPP/G and CIPP/G CIPP, the for Training T T ea in the consumer privacy protection protection privacy consumer the in the table. being on the opposite side of from some of the biggest players players biggest the of some from Get exclusive insider perspectives perspectives insider exclusive Get arena and learn how you can avoid avoid can you how learn and arena F keyno , P See HoWITaLLFITST GeTHer MeeT THePeoPLWHoH a d e m y The PrIv Join yourpeersinDallasforthreedays ofqualityeducationand and yourreputation. organization’s privacyefforts. questions thatkeepyouupatnight.Could yourorganization’s privacy enforcers that can impose real consequences on your brand privacy professionals oftenarethelonewolfintheirorganization— reputation surviveabreach?Isthere possibility thatyoucouldbe regulators, without stiflinginnovationandbusinessobjectives. need to excel in your daily practice and be a leader for your your for leader a be and practice daily your in excel to need networking andreturntoworkwiththe toolsandexperiencesyou your organization’s productsaretrustworthy?Talk toyourpeers, year, Dallasisthecrossroads fortheprivacyprofession. Come to the Academy and get information and answers to the the to answers and information get and Academy the to Come Privacy is interwoven into every facet of today’s economy, but but economy, today’s of facet every into interwoven is Privacy cOme TO geTher wITh the targetofanFTCenforcementaction? Howdoyouensurethat to sharechallenges,getanswersandimprove theirpractices.This Now, morethanever, privacyprofessionalsneed tocometogether walking the fine line of protecting customers and satisfying satisfying and customers protecting of line fine the walking hear fromtheexpertsandgetuniqueinsider perspectivefromtop A President & CEO, IAP CEO, & President , c A Partner, Wiley Rein LLP Rein Wiley Partner, , Rates available for corporate groups, privacy certification training and testing. and training certification privacy government and higher education employees, Privacy Dinner only and Visit the website for additional pricing information. r g / O Bootcamp at the Practical Privacy at the Practical Privacy Bootcamp Can’t make it to our daylong Privacy Privacy daylong our to it make Can’t Series? Catch it at the Academy! Series? Catch . Acy PrO feSSION 1717 N.AkardStreet,Dallas,TX75201 The FairmontHotel Phone: +1214.720.2020 Conference LocationandHotelAccommodations Fax: +1214.720.7405 Kirk Nahra, CIPP Nahra, Kirk IAPP’s new publication, Building a Privacy IAPP’s Privacy Bootcamp in today’s enterprise it is hard to know how how know to hard is it enterprise today’s in hands-on guidance for managing data within within data managing for guidance hands-on foundation that will give you the structure structure the you give will that foundation business models converging, and evolving, evolving, and converging, models business 8 a.m. – 5 p.m. two-part intensive program will introduce introduce will program intensive two-part to navigate the maze of challenges you face. face. you challenges of maze the navigate to Privacy can be a bewildering topic. With With topic. bewildering a be can Privacy get to opportunity your is Bootcamp Privacy Attendees will receive a free copy of the Attendees will receive a free copy of the you to the fundamentals of privacy. Part Part privacy. of fundamentals the to you Toolkit”—practical, “Privacy a with you sound a with leave You’ll organization. your multiple laws, jurisdictions, technologies and and technologies jurisdictions, laws, multiple right decisions for your privacy initiatives. privacy your for decisions right Program: A Practitioner’s Guide Program: A Practitioner’s and understanding you need to make the the make to need you understanding and a solid grounding in this dynamic field. This This field. dynamic this in grounding solid a concepts and philosophies. Part 2 will provide provide will 2 Part philosophies. and concepts J. Trevor Hughes, CIPP Hughes, Trevor J. 1 provides an overview of basic privacy privacy basic of overview an provides 1 IATION Regular Rate (After August 19) $1395 USD $1595 USD c Ve THanSWerS ASSO $545 USD $695 USD $695 USD c y A v I Early Bird Rate (Until August 19) $1195 USD $1395 USD r P w w w. EU Data Protection Bootcamp EU Data Protection Privacy Bootcamp (full day) , Partner, Panetta & Associati Panetta, Partner, IAPP Member Nonmember Partner, Bristows, Rocco Hazel Grant, Partner, leave with a strong general understanding leave with a strong general understanding level. Using the latest research, this key building blocks of a network-centric network-centric a of blocks building key formulate a plan to dramatically increase increase dramatically to plan a formulate workshop will help you discover the nine nine the discover you help will workshop (Wednesday only) (Wednesday One Session (half day) PrecONfereNce mAIN cONfereNce PrIcINg this broad overview of data protection role of data protection authorities, and the role of data protection authorities, and relate to. Privacy officers who do just that that just do who officers Privacy to. relate Two Sessions (full day) Two wOrKShOPS privacy program participation from your your from participation program privacy the practices across the pond. Learn about the EU, the in structures legal and political privacy infostructure and show you how to to how you show and infostructure privacy privacy pros to build programs people can can people programs build to pros privacy people’s insight, foresight and mind-sight of the roles, responsibilities and laws designing a program that can engage at both an intellectual and emotional complex web of laws that guide data. You’ll complex web of laws that guide data. You’ll customers, employees and partners. and employees customers, governing privacy in the European Union. give customers an optimum experience and and experience optimum an customers give business. their for asset strategic a gain The secret is “self-synchronization”— Join our expert European faculty for

The IAPP PrIvAcy AcAdemy 2011

September 14–16 The Fairmont Hotel

Dallas, TX International Association of Privacy Professionals Pease International Tradeport 75 Rochester Ave., Suite 4 b e r 1 4 Portsmouth, NH 03801 USA M

Visit www.privacyassociation.org/academy to register online e

or register by phone at +1 603.427.9200. PT

PRIORITY CODE: Day

SPONSOrS P Privacy Architect, YourPrivacy Architect, Privacy , ay, S e o SD n e SH D 1 – 5 p . m . Mario Morel Mario it is becoming apparent that technology is starting to drive that momentum. This in a lively group discussion of how law and in a lively group discussion of how law issues raised by these technologies. Debunking the Privacy Paradox Myth: Myth: Paradox Privacy the Debunking Field Communication (NFC), RFID and mobile mobile and RFID (NFC), Communication Field workshop will examine NFC, RFID and Creating a Self-Synchronized Privacy Program Privacy Self-Synchronized a Creating benefit estimations. The apparent dissonance dissonance apparent The estimations. benefit them concerns say people what between be close. With the expansive new capabilities capabilities new expansive the With close. be their privacy is not a paradox; it is a call for for call a is it paradox; a not is privacy their technologies under existing laws. Engage technologies under existing laws. Engage Cognitive science has shown that consumers consumers that shown has science Cognitive mobile payments and the regulation of such mobile payments and the regulation of may adapt to meet privacy and data security may adapt to meet privacy and data security required momentum for such adoption may required momentum regulation—including proposed legislation— payments has taken longer than many such in technology NFC including of possibility don’t make privacy decisions based on cost/ on based decisions privacy make don’t protect to practice in do they what and online of mobile phones and tablet devices, the of mobile phones and to location tracking, devices, and upgrades Although the broad-based adoption of Near Near of adoption broad-based the Although anticipated, there are recent signs that the anticipated, there are

erence W e F bookstore. Meet the authors and get your copy signed! to putting together an effective privacy operation—being operation—being privacy effective an together putting to Bootcamp preconference workshop and get a free copy. free a get and workshop preconference Bootcamp Get your copy of this essential and long-awaited guide guide long-awaited and essential this of copy your Get Copies will also be available for sale at the Academy released this summer! Register for the Privacy

e Work S PP! Senior Privacy Officer, Officer, Privacy Senior , Senior Counsel, , a ea Christopher T. Pierson, , Christopher T. I , Associate Specialist,

L e Precon

re eXhIBITOrS

Affinion Evidon Nymity W M TH M Blockmaster Experian Rust Consulting

BNA HiSoftware Stroz Friedberg ne

Click 4 Compliance Hogan Lovells Symantec ro Protecting and Securing a Moving Target: Protecting and Securing a Moving Target: NFC, RFID and Mobile Payments Navigating the Maze: Federal Legislation and Navigating the Maze: Counselor Library Identity Finder TRUSTe Assessment Process the Privacy Impact CIPP Hoffman, C. William legislative requirements and how to be What does it take to make a privacy impact workshop for a comprehensive look at the CIPP, CIPP/G, Chief Privacy Officer and Senior CIPP, 8 a.m. – 12 p.m. that can increase efficiency and improve the Privacy Act—are covered by a PIA, it’s Buckley Sandler LLP Goodwin Procter LLP General Dynamics Information Technology Information Dynamics General your organization, including the pre-PIA work Vice President, Citizens Financial Group, Inc., Vice President, Citizens Financial Group, F more important than ever to know the ins prepared for them. Investigate the systematic process that can help to ensure compliance and produce a successful PIA procedure in and outs of the process. Join this informative assessment (PIA) successful? As federal agencies scramble to ensure that all systems—as defined by FISMA, OMB and completion and accuracy.

James Shreve, CIPP Jacqueline Klosek, CIPP

Building a Privacy Program: Program: Privacy a Building A Practitioner’s Guide Practitioner’s A Debix Jordan Lawrence Womble Carlyle a Equifax Kroll TS G TS TS n ence I n I ee o LL M Susan Combs,

ce HP o r k X c e acy U IV TW 5-Minute Mixer 5-Minute Welcome Reception Reception Welcome Early Bird Run/Walk Bird Early Networking Dinners Networking Privacy Dinner and Awards Ceremony Awards and Dinner Privacy Table Topic Lunch Topic Table r o • • • • • • Keynote Speaker: Keynote innovators and leaders at the sixth main Academy your with included is winners of the 2011 HP-IAPP Privacy Rub elbows with privacy’s top this exceptional evening of celebration celebration of evening exceptional this Privacy Vanguard Award. A ticket to to ticket A Award. Vanguard Privacy Innovation Awards and the IAPP Ceremony, where we will unveil the State of Texas Comptroller, The IAPP Privacy Dinner 2011 Dinner Privacy IAPP The 15 September Thursday, Hotel Fairmont The P annual Privacy Dinner and Awards conference registration. conference throughout the Academy: build relationships at our many many our at relationships build Discover connections and

networking opportunities n e T Practice Meets Privacy www.privacyassociation.org/academy IAPP IAPP P etme 4–16 September 14 d allas, TX r

I v D

A on

cy TI an D

eS G G A ca G T n I c re n n TIFI I A demy STI Marc Rotenberg Marc KamberLaw LLC Scott A. Kamber A. Scott President, EPIC ra e TU Be a privacy standout! will be offered at the Academy. the at offered be will cer CIPP/IT, and testing for all modules all for testing and CIPP/IT, certification at the Academy. Train and test for your IAPP Training for the CIPP, CIPP/G and CIPP/G CIPP, the for Training T T ea in the consumer privacy protection protection privacy consumer the in the table. being on the opposite side of being on the opposite from some of the biggest players players biggest the of some from Get exclusive insider perspectives perspectives insider exclusive Get arena and learn how you can avoid avoid can you how learn and arena F keyno PrI vA cy AcA demy 2011 PrO grA m September 14 – 16 • t he Fairmont h otel • DallaS , t X

c ONfereN ce SeSSIONS

Litigation: There’s an App for That! Securing Data in the Cloud Sherry Ramsey, CIPP, AVP - Public Policy, AT&T Inc., Alan Raul, Partner, Sidley Austin LLP Kenneth E. Stavinoha, CIPP, Solutions Architect, Cisco Systems, Inc. “App privacy” is a cutting edge legal issue that has garnered acute attention from congress, privacy , the Explore the challenges of securing data in the cloud and the role of encryption as a tool. Hear the results of FTC and plaintiffs lawyers. Explore the complaints and investigations that have been leveled to date against “apps” extensive research into the critical factors that influence the adoption of encryption to secure data in the cloud. that collect, share, store, use or compromise user IDs, unique device identifiers, personal information or location Taming the Cloud: Contracting for a Cloud that Actually Works data without (alleged) adequate disclosure and consent from the app users. Leave with best “app” practices to Benjamin Hayes, CIPP, CIPP/C, CIPP/G, CIPP/IT, Americas Data Privacy Compliance Lead, Accenture, avoid the legal cross-hairs of the privacy enforcers in the first place. David Navetta, CIPP, Founding Partner, Information Law Group Never Enter Your Real Data! How can we “solve” the difficult application of privacy laws to the cloud? Discover a successful new Rocco Panetta, Partner, Panetta & Associati approach to negotiating cloud contracts that attempts to re-allocate applicable privacy and security Take a focused look at the issues arising out of the data flows around the world and relevant legal consequences, requirements between data owner, cloud provider and system integrator. onLIne PrIVacy especially with respect to the principle of jurisdiction, establishment and relevant applicable laws and regulations. Utilization of Cloud-Based Enterprise Solutions: Google’s Business Perspective of Privacy Challenges Monitoring and Preserving Data on Social Media Sites Will There Be a “Privacy Bill of Rights” and If So, What Will It Mean? and Solutions Erik Laykin, Managing Director, Duff & Phelps Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jules Polonetsky, CIPP, Marc Crandall, CIPP, Product Counsel, Google Inc. What options are available for the defensible and forensic preservation of social media data and usage? Co-Chairman and Director, Future of Privacy Forum, Christopher Wolf, Co-Chair Privacy and Data Security Practice What are the regulatory obligations and privacy impacts of cloud computing? What are the options Gain practical guidance while getting a hands-on, visual review of the tools and technologies available for the Group, Hogan Lovells US LLP regarding international conflicts of law? Take part in this session and gain the tools you need to identify real-time monitoring and preservation of electronic data contained on social media sites. Examine the proposal for a Privacy Bill of Rights, intended to implement Fair Information Practice Principles privacy risks in moving data to the cloud. through codes of conduct enforced by the FTC. Explore the details of the proposal as well as the political prospects Online Privacy: Who’s Watching the Kids? for passage in the near term. InForMaTIon SecUrITy Moderator: Nuala O’Connor Kelly, CIPP, CIPP/G, Senior Counsel, Information Governance & Chief Privacy Changing the Culture of Low Tech Information Security: Critical Policy Elements and Compliance Strategies Leader, General Electric FInancIaL SerVIceS Robert Johnson, Executive Director, National Association for Information Destruction Parry Aftab, Executive Director, WiredSafety, Michelle Dennedy, Founder & CEO, iDennedy Project, Lydia The Designated Transfer Date under Dodd-Frank Has Come and Gone: What Does It Mean for Financial Privacy? How can you implement a program to ensure compliance and avoid the embarrassment of a costly Parnes, Partner, Wilson Sonsini Goodrich & Rosati (A two-part session) “low tech” security breach? Explore the existing culture of low tech privacy concerns (the disposal of What do our kids really think about online privacy and what are they doing online? Join this lively session for H. Leigh Feldman, Senior Vice President, Compliance Program Executive, Bank of America, L. Richard Fischer, confidential material) and discuss how to shift the current thinking to make the subject more of a security a discussion of the practical, legal and policy implications of online privacy as applied to children and teens, Partner, Morrison & Foerster LLP, Lynn A. Goldstein, CIPP, Senior Vice President & Chief Privacy Officer, JP issue and less a price-driven commodity. and take away practical strategies and advice on talking to our kids about staying safe online. Morgan Chase Bank, N.A., Russell Schrader, Chief Privacy Officer and Global Enterprise Risk Counsel, Visa Inc. The CPO and the CSO: Building Bridges to Improve Both Privacy and Security The Self-Regulatory Principles for Online Behavioral Advertising: A How-to Compliance Workshop Examine the developments on the regulatory implications of the Consumer Financial Protection Bureau over the Martin Carmichael, Chief Security Officer, TD Ameritrade Holding , David Hale, CIPP, Chief Genie Barton, Director, Online Interest-Based Advertising Accountability, Council of Better Business Bureaus, last nine months, with a focus on those sections of the Dodd-Frank Act with privacy implications. What have been Privacy Officer, TD Ameritrade Holding Corporation Xenia Boone, Senior Vice President Corporate and Social Responsibility, Direct Marketing Association, Scott the ramifications of the transfers of authority called for by the act? Is it too soon to tell, or are there clear trends The close relationship between privacy and security can lead to conflict—or to synergies and Meyer, CEO, Evidon developing on these and other issues important to financial privacy? complementary roles. Find out how you can build a relationship between the privacy office and the security Gain a clear understanding of the requirements of the Self-Regulatory Principles, including who must Hot Button Privacy Issues in Payments and Financial Services structure that can greatly facilitate both jobs. implement them, how to implement them, and what to expect from the Council of Better Business Bureaus Erin Fonte, CIPP, Shareholder, Cox Smith Matthews Incorporated and the Direct Marketing Association, the groups that provide accountability for the Self-Regulatory Program. The New World of Cyber Risk: Advanced Persistent Threats Get the latest updates on the hottest topics in the world of payments and financial services, including discussion of Alan Brill, CIPP, Senior Managing Director, Secure Information Services, Kroll HeaLTHcare secure encrypted e-mail at financial institutions, suggested best practices for social media activities, and unique Examine Advanced Persistent Threats (APTs), a new and far more dangerous type of cyber attack, to learn A Health Privacy Segmentation of the American Public and EHR Users: Results of a National Survey mobile transaction and marketing issues. how they work, how they target PII and PHI—among other targets—and the importance of evolving from Alan Westin, Professor Emeritus, Columbia University MobILe coMPUTInG/LocaTIon-baSeD SerVIceS perimeter defense to a more comprehensive doctrine of defense-in-depth. Learn the results of a national survey being conducted to measure levels of trust and its benefits in U.S. EHR Avoiding the Mobile App Traps Who Am I? Understanding Multi-Factor Authentication in Online Environments systems. The survey applied a set of Health Privacy Intensity Measures developed by Dr. Alan Westin, who will Mark W. Brennan, Associate, Hogan Lovells US LLP, Devin Crock, Counsel, Sprint Nextel, Matthew Gerst, Counsel, Christopher T. Pierson, CIPP, CIPP/G, Chief Privacy Officer and Senior Vice President, Citizens Financial report and describe the sources of high, medium and low health privacy intensity for four U.S. patient populations. External & State Affairs, CTIA—The Wireless Association® Group, Inc., James Shreve, CIPP, Associate Specialist, Buckley Sandler LLP Medical Software and Its Regulation: HHS, FDA and the Rules “You snooze, you lose” in the mobile app ecosystem. But, “haste makes waste” when it comes to data privacy and Take part in a lively discussion of the emergence outside the banking sector of dual-factor and tri-factor Peter McLaughlin, CIPP, Senior Counsel, Foley & Lardner LLP security. What’s a business to do? Find out how to address privacy and security issues associated with mobile authentication, how these technologies work, and how to perform a risk-based assessment to determine The HITECH Act directed HHS and the FTC to prescribe rules for electronic health records, systems that are apps and still remain competitive by identifying the key traps. the type of security one might offer. made up of software and can collect patient data from numerous sources. Explore the impact of the FDA’s Choice on the Grid: Geolocation Technologies and Privacy DaTa breacH recently issued rules concerning medical device data systems and other software tools for developers and David Keating, Attorney, Alston & Bird LLP, Mikko Niva, CIPP/E, Global Privacy Counsel, Nokia, Rod Witmond, SVP, healthcare providers. Building a Records Retention Policy Aligned with Privacy Objectives Product Management & Marketing, Cardlytics Richard L. Johnson, Manager, Global Information Compliance, John Deere & Company, Marty Provin, CIPP, Top 10 New Lessons in Healthcare Privacy Investigate global data protection standards—from a U.S. perspective—for geolocation technologies on mobile EVP Business Development Group, Jordan Lawrence Kirk Nahra, CIPP, Partner, Wiley Rein LLP devices and apply those standards to advertising driven by location-based personalization. Examine the difficult In several recent high-profile data breaches, the compromised data was old and outdated. This fact Join in a review of the latest developments in the world of healthcare privacy and identify the key new balance between large market valuations attached to location-based advertising businesses, and data protection. underscores the importance of having a consistently executed retention policy as part of a company’s takeaways for healthcare companies and their business partners. Explore enforcement developments, new Privacy by Design in the Mobile App Ecosystem: Thinking Global, Acting Local overall data security and privacy strategy. Learn how to take a more intelligent, comprehensive approach regulations, the latest in risk areas and the key topics for controversy involving healthcare privacy issues. Ken Anderson, Assistant Commissioner of Privacy, Information and Privacy Commissioner of Ontario, Frank to information management and retention that approaches privacy and information governance as a GLobaL Dawson, CIPP/IT, Head of Consumer Data & Privacy Program, Nokia, Ed Schmit, Director, AT&T Developer single initiative. Program, AT&T Inc., Patrick Walshe, Director of Privacy, GSMA Certifying for the Safe Harbor: The Practical Aspects Data Breach—Help Your Company Avoid Being a Victim of Compromise Kimberly A. Bubnes, CIPP, Global Privacy Director, General Motors Corporation, Robert L. Rothman, Principal, The convergence of mobile and the web has created a vibrant and dynamic mobile ecosystem that is dramatically Charles Kallenbach, General Counsel, Heartland Payment Systems, Doug Meal, Ropes & Gray, Erin Nealy Privacy Associates International LLC changing our world for the better. Learn about leading industry approaches to addressing the challenges and Cox, Executive Managing Director and Deputy General Counsel, Stroz Friedberg LLC creating meaningful privacy experiences for mobile users. Roll up your sleeves and dive into the practical aspects of how to certify a class of data for Safe Harbor. Learn Lots of influential companies have learned the hard way about being the victim of a data breach, even the scope of Safe Harbor certification and how to create a Safe Harbor team using internal certification trees. though they may have complied with regulations and standards. Join this session to learn from those who oPeraTIonaL PrIVacy have survived a breach how you can use the tools and techniques of corporate compliance to be prepared. Mexico’s New Data Protection Law: Policy and Compliance Employees, Smart Phones and Social Media: Best Practices for Mobile Computing and Social Media Policies Jonathan D. Avila, CIPP, Vice President, Counsel, Chief Privacy Officer, The Walt Disney Company, Rosa Maria John Heitmann, CIPP, Partner, Kelley Drye & Warren, LLP Data Breach Resolution: Preparing for a Data Breach and How to Respond to It Moderator: Tony Hadley, Sr. V.P. of Government Affairs & Public Policy, Experian Franco, Attorney, Basham, Ringe Y Correa, S.C., Jacqueline Peschard Mariscal, President Commissioner, Join in a discussion exploring the best ways to create mobile computing and social media policies designed to Tom Bowers, Managing Director, Security Constructs LLC, Patricia Wagner, Member of the Firm, Federal Institute for Access to Information and Data Protection, Harry A. Valetk, CIPP, Corporate Privacy effectively address practical and legal concerns raised by the use of personal mobile devices and social media for EpsteinBeckerGreen Director, MetLife business purposes. Join this session for an overview of the policy choices that Mexico has made in adopting comprehensive data What tools do you need to prepare for a data breach and what are the best practices? How did the breach Enhanced Notice and Control protection legislation and discuss the practical challenges for business in implementing the law. happen and where did the data go? Join this lively session to learn how to build a forensics case once a Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jane Horvath, CIPP, CIPP/G, breach happens. Migrating to a Global Shared Services Center? Consider the Issues Global Privacy Counsel, Google Inc., Shane Wiley, CIPP, Sr. Director, Privacy & Data Governance, Yahoo! Inc. Jon Olefson, Vice President and General Counsel (), Cognizant Technology Solutions, Heidi Salow, Experts from two of the largest global Internet companies and the Center for Democracy and Technology, a neutral CIPP, Shareholder, Greenberg Traurig LLP consumer-advocacy group, will review the global development and progress of CLEAR Ad Notice, the emergence FacILITaTeD neTWorkInG The commercial sector—and to some extent the federal government—has moved toward a shared services of DNT, and where these intersect with the need for Privacy by Design. model, in which multiple business functions are centralized into a single global center. Learn what privacy Networking Session: 5-Minute Mixer and data security issues are associated with the use of these centers, particularly when they are outsourced Moving Toward Privacy by Design: The Microsoft Experience Facilitator: Chris Zoladz, CIPP, CIPP/G, Founder, Navigate LLC in countries with no data protection laws or laws that differ from the “host” country. David Bowermaster, Senior Cloud Privacy Strategist, Microsoft Corporation, Javier Salido, CIPP, CIPP/IT, Senior Don’t know anyone at the conference? Looking to network? Share your professional background Program Manager, Trustworthy Computing Group, Microsoft Corporation and discover connections with other Academy attendees and privacy leaders in fast, fun five-minute New Data Protection Laws and Case Law Trends in South America Get a “behind the scenes” look at Microsoft’s internal privacy process, which is responsible for ensuring that one-on-one meetings. Cedric Laurant, Cedric Laurant Consulting, Renato Opice Blum, Attorney, Opice Blum Advogados Associados privacy needs are taken into account throughout the product development process and into the management of Networking Session: To Track or Do Not Track? Browser Controls, Self Regulatory Programs Join this topical discussion of the most recent privacy developments in Latin American countries, including personal information within the company. new legislation in Brazil and Colombia, Uruguay’s expected “adequate protection” approval of its recent or New Laws privacy law from European authorities, and how upcoming EU legislation could have important consequences A Roadmap to Move up the Privacy Maturity Curve Jules Polonetsky, CIPP, Co-Chair and Director, Future of Privacy Forum Nancy Cohen, CIPP, Senior Technical Manager, Quality Control, American Institute of Certified Public Accountants, for the development and implementation of online behavioral advertising in South America. Networking Session: Study Tips and Advice from Certified Professionals—Your Burning Privacy Marilyn Prosch, CIPP, Associate Professor, Arizona State University Questions Answered! LaW anD PoLIcy Measuring and monitoring privacy compliance requires the establishment of effective monitoring procedures and Facilitated by CIPP-certified professionals a baseline against which to assess performance. Learn how the Privacy Maturity Model can provide an effective Ethical Privacy You’ve read tons of reference material, you’ve been to training, and you’ve even attended some great Edward McNicholas, Partner, Sidley Austin LLP tool to assess privacy compliance and progress against recognized benchmark data. conference sessions, but still you have burning questions about privacy. We have experienced privacy Join this session for an overview of practical legal ethics issues that confront privacy professionals and cLoUD coMPUTInG professionals ready to help you put out that fire! Talk to IAPP instructors about privacy-related topics discussion of a possible approach to a code of ethics for all professionals in the privacy field. that are important to you. Cloud Computing Compliance: The What, Who and Where How to Avoid Becoming a Privacy Class Action or FTC Enforcement Target Christopher Millard, Professor, Bristows, Networking Session: Minimize Boredom, Maximize Your Member Experience D. Reed Freeman, Jr., CIPP, Partner, Morrison & Foerster LLP, Jim Halpert, Partner, Communications, Join this informative session to learn the key compliance issues for users and providers of cloud services, Facilitated by the IAPP Membership Department e-Commerce and Privacy Practice, DLA Piper US LLP including the implications of anonymization, encryption and fragmentation of data in cloud environments, and the IAPP staff members will give you the inside scoop on the many ways that you can become more Join this session to identify the FTC enforcement priorities from among the agency’s laundry list of best local law impact of geographical arrangements—such as the “long-arm” reach of the EU Directive. involved with your professional association. Learn about volunteer career development opportunities practices and learn how to handle a subpoena or other initial FTC inquiry. Discover the privacy practices that in this casual networking session, where you’ll also have an opportunity to provide feedback on how give rise to significant class action risk, and discuss strategies to become a much harder target against the Joint Data Controllership: A Silver Bullet for Cloud Computing Privacy Issues? the IAPP can better serve you. threat of a class action lawsuit. Jan Geert Meents, Partner, Chair, DLA Piper IP & Technology Practice, Germany Networking Session: Your Company and the Cloud Cloud computing has raised significant privacy objections in the EU, making the use of cloud solutions by How Will the Safe Harbors in Pending Privacy Legislation Work? Facilitator: Tanya Forsheit, CIPP, Founding Partner, InfoLawGroup LLP multinational companies problematic. Explore how joint data controller arrangements can provide a breakthrough Marty Abrams, Senior Policy Advisor, Hunton & Williams LLP, Jennifer Barrett, CIPP, Global Privacy and Public Facilitator: Christine Lyon, Partner, Morrison & Foerster LLP for the privacy dilemma of modern cloud computing. Policy Executive Privacy Leader, Acxiom Corporation, Scott Taylor, CIPP, Vice President and Chief Privacy It’s your turn to join the discussion! Bring your questions, concerns and insights for a lively Officer, Hewlett-Packard Company, María Elena Pérez-Jaén Zermeño, Commissioner for Access to Public Obscured by Clouds: Privacy Audit in the Cloud discussion about managing privacy in the cloud, including due diligence and selection of providers, Information and Data Protection of the Institute for Access to Public Information of the Federal District, Mexico Doron Rotman, CIPP, National Privacy Service Leader, KPMG LLP (US) data back-up, encryption options, contractual protections (or lack thereof), cross-border transfers in The Obama administration has proposed federal legislation that would encourage industry codes of conduct Learn how to identify the impact of the move to cloud computing on an organization’s ability to undergo a the cloud environment, audit and third-party certification, and other topics of interest from the day’s that would be safe harbors. Suggested legislation on the hill would also contain safe harbors. Find out how privacy audit, and the considerations that should be taken into account in the selection, contracting and ongoing cloud computing sessions. these would work and formulate a plan for putting safe harbors into effect. management of cloud service providers.

vISIT www.P r I vA cyASSOc IATION. O rg/A c A demy TO regISTer ANd fO r uP - TO-dATe INf O rmATION PrI vA cy AcA demy 2011 PrO grA m September 14 – 16 • t he Fairmont h otel • DallaS , t X

c ONfereN ce SeSSIONS

Litigation: There’s an App for That! Securing Data in the Cloud Sherry Ramsey, CIPP, AVP - Public Policy, AT&T Inc., Alan Raul, Partner, Sidley Austin LLP Kenneth E. Stavinoha, CIPP, Solutions Architect, Cisco Systems, Inc. “App privacy” is a cutting edge legal issue that has garnered acute attention from congress, privacy advocates, the Explore the challenges of securing data in the cloud and the role of encryption as a tool. Hear the results of FTC and plaintiffs lawyers. Explore the complaints and investigations that have been leveled to date against “apps” extensive research into the critical factors that influence the adoption of encryption to secure data in the cloud. that collect, share, store, use or compromise user IDs, unique device identifiers, personal information or location Taming the Cloud: Contracting for a Cloud that Actually Works data without (alleged) adequate disclosure and consent from the app users. Leave with best “app” practices to Benjamin Hayes, CIPP, CIPP/C, CIPP/G, CIPP/IT, Americas Data Privacy Compliance Lead, Accenture, avoid the legal cross-hairs of the privacy enforcers in the first place. David Navetta, CIPP, Founding Partner, Information Law Group Never Enter Your Real Data! How can we “solve” the difficult application of privacy laws to the cloud? Discover a successful new Rocco Panetta, Partner, Panetta & Associati approach to negotiating cloud contracts that attempts to re-allocate applicable privacy and security Take a focused look at the issues arising out of the data flows around the world and relevant legal consequences, requirements between data owner, cloud provider and system integrator. onLIne PrIVacy especially with respect to the principle of jurisdiction, establishment and relevant applicable laws and regulations. Utilization of Cloud-Based Enterprise Solutions: Google’s Business Perspective of Privacy Challenges Monitoring and Preserving Data on Social Media Sites Will There Be a “Privacy Bill of Rights” and If So, What Will It Mean? and Solutions Erik Laykin, Managing Director, Duff & Phelps Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jules Polonetsky, CIPP, Marc Crandall, CIPP, Product Counsel, Google Inc. What options are available for the defensible and forensic preservation of social media data and usage? Co-Chairman and Director, Future of Privacy Forum, Christopher Wolf, Co-Chair Privacy and Data Security Practice What are the regulatory obligations and privacy impacts of cloud computing? What are the options Gain practical guidance while getting a hands-on, visual review of the tools and technologies available for the Group, Hogan Lovells US LLP regarding international conflicts of law? Take part in this session and gain the tools you need to identify real-time monitoring and preservation of electronic data contained on social media sites. Examine the proposal for a Privacy Bill of Rights, intended to implement Fair Information Practice Principles privacy risks in moving data to the cloud. through codes of conduct enforced by the FTC. Explore the details of the proposal as well as the political prospects Online Privacy: Who’s Watching the Kids? for passage in the near term. InForMaTIon SecUrITy Moderator: Nuala O’Connor Kelly, CIPP, CIPP/G, Senior Counsel, Information Governance & Chief Privacy Changing the Culture of Low Tech Information Security: Critical Policy Elements and Compliance Strategies Leader, General Electric FInancIaL SerVIceS Robert Johnson, Executive Director, National Association for Information Destruction Parry Aftab, Executive Director, WiredSafety, Michelle Dennedy, Founder & CEO, iDennedy Project, Lydia The Designated Transfer Date under Dodd-Frank Has Come and Gone: What Does It Mean for Financial Privacy? How can you implement a program to ensure compliance and avoid the embarrassment of a costly Parnes, Partner, Wilson Sonsini Goodrich & Rosati (A two-part session) “low tech” security breach? Explore the existing culture of low tech privacy concerns (the disposal of What do our kids really think about online privacy and what are they doing online? Join this lively session for H. Leigh Feldman, Senior Vice President, Compliance Program Executive, Bank of America, L. Richard Fischer, confidential material) and discuss how to shift the current thinking to make the subject more of a security a discussion of the practical, legal and policy implications of online privacy as applied to children and teens, Partner, Morrison & Foerster LLP, Lynn A. Goldstein, CIPP, Senior Vice President & Chief Privacy Officer, JP issue and less a price-driven commodity. and take away practical strategies and advice on talking to our kids about staying safe online. Morgan Chase Bank, N.A., Russell Schrader, Chief Privacy Officer and Global Enterprise Risk Counsel, Visa Inc. The CPO and the CSO: Building Bridges to Improve Both Privacy and Security The Self-Regulatory Principles for Online Behavioral Advertising: A How-to Compliance Workshop Examine the developments on the regulatory implications of the Consumer Financial Protection Bureau over the Martin Carmichael, Chief Security Officer, TD Ameritrade Holding Corporation, David Hale, CIPP, Chief Genie Barton, Director, Online Interest-Based Advertising Accountability, Council of Better Business Bureaus, last nine months, with a focus on those sections of the Dodd-Frank Act with privacy implications. What have been Privacy Officer, TD Ameritrade Holding Corporation Xenia Boone, Senior Vice President Corporate and Social Responsibility, Direct Marketing Association, Scott the ramifications of the transfers of authority called for by the act? Is it too soon to tell, or are there clear trends The close relationship between privacy and security can lead to conflict—or to synergies and Meyer, CEO, Evidon developing on these and other issues important to financial privacy? complementary roles. Find out how you can build a relationship between the privacy office and the security Gain a clear understanding of the requirements of the Self-Regulatory Principles, including who must Hot Button Privacy Issues in Payments and Financial Services structure that can greatly facilitate both jobs. implement them, how to implement them, and what to expect from the Council of Better Business Bureaus Erin Fonte, CIPP, Shareholder, Cox Smith Matthews Incorporated and the Direct Marketing Association, the groups that provide accountability for the Self-Regulatory Program. The New World of Cyber Risk: Advanced Persistent Threats Get the latest updates on the hottest topics in the world of payments and financial services, including discussion of Alan Brill, CIPP, Senior Managing Director, Secure Information Services, Kroll HeaLTHcare secure encrypted e-mail at financial institutions, suggested best practices for social media activities, and unique Examine Advanced Persistent Threats (APTs), a new and far more dangerous type of cyber attack, to learn A Health Privacy Segmentation of the American Public and EHR Users: Results of a National Survey mobile transaction and marketing issues. how they work, how they target PII and PHI—among other targets—and the importance of evolving from Alan Westin, Professor Emeritus, Columbia University MobILe coMPUTInG/LocaTIon-baSeD SerVIceS perimeter defense to a more comprehensive doctrine of defense-in-depth. Learn the results of a national survey being conducted to measure levels of trust and its benefits in U.S. EHR Avoiding the Mobile App Traps Who Am I? Understanding Multi-Factor Authentication in Online Environments systems. The survey applied a set of Health Privacy Intensity Measures developed by Dr. Alan Westin, who will Mark W. Brennan, Associate, Hogan Lovells US LLP, Devin Crock, Counsel, Sprint Nextel, Matthew Gerst, Counsel, Christopher T. Pierson, CIPP, CIPP/G, Chief Privacy Officer and Senior Vice President, Citizens Financial report and describe the sources of high, medium and low health privacy intensity for four U.S. patient populations. External & State Affairs, CTIA—The Wireless Association® Group, Inc., James Shreve, CIPP, Associate Specialist, Buckley Sandler LLP Medical Software and Its Regulation: HHS, FDA and the Rules “You snooze, you lose” in the mobile app ecosystem. But, “haste makes waste” when it comes to data privacy and Take part in a lively discussion of the emergence outside the banking sector of dual-factor and tri-factor Peter McLaughlin, CIPP, Senior Counsel, Foley & Lardner LLP security. What’s a business to do? Find out how to address privacy and security issues associated with mobile authentication, how these technologies work, and how to perform a risk-based assessment to determine The HITECH Act directed HHS and the FTC to prescribe rules for electronic health records, systems that are apps and still remain competitive by identifying the key traps. the type of security one might offer. made up of software and can collect patient data from numerous sources. Explore the impact of the FDA’s Choice on the Grid: Geolocation Technologies and Privacy DaTa breacH recently issued rules concerning medical device data systems and other software tools for developers and David Keating, Attorney, Alston & Bird LLP, Mikko Niva, CIPP/E, Global Privacy Counsel, Nokia, Rod Witmond, SVP, healthcare providers. Building a Records Retention Policy Aligned with Privacy Objectives Product Management & Marketing, Cardlytics Richard L. Johnson, Manager, Global Information Compliance, John Deere & Company, Marty Provin, CIPP, Top 10 New Lessons in Healthcare Privacy Investigate global data protection standards—from a U.S. perspective—for geolocation technologies on mobile EVP Business Development Group, Jordan Lawrence Kirk Nahra, CIPP, Partner, Wiley Rein LLP devices and apply those standards to advertising driven by location-based personalization. Examine the difficult In several recent high-profile data breaches, the compromised data was old and outdated. This fact Join in a review of the latest developments in the world of healthcare privacy and identify the key new balance between large market valuations attached to location-based advertising businesses, and data protection. underscores the importance of having a consistently executed retention policy as part of a company’s takeaways for healthcare companies and their business partners. Explore enforcement developments, new Privacy by Design in the Mobile App Ecosystem: Thinking Global, Acting Local overall data security and privacy strategy. Learn how to take a more intelligent, comprehensive approach regulations, the latest in risk areas and the key topics for controversy involving healthcare privacy issues. Ken Anderson, Assistant Commissioner of Privacy, Information and Privacy Commissioner of Ontario, Frank to information management and retention that approaches privacy and information governance as a GLobaL Dawson, CIPP/IT, Head of Consumer Data & Privacy Program, Nokia, Ed Schmit, Director, AT&T Developer single initiative. Program, AT&T Inc., Patrick Walshe, Director of Privacy, GSMA Certifying for the Safe Harbor: The Practical Aspects Data Breach—Help Your Company Avoid Being a Victim of Compromise Kimberly A. Bubnes, CIPP, Global Privacy Director, General Motors Corporation, Robert L. Rothman, Principal, The convergence of mobile and the web has created a vibrant and dynamic mobile ecosystem that is dramatically Charles Kallenbach, General Counsel, Heartland Payment Systems, Doug Meal, Ropes & Gray, Erin Nealy Privacy Associates International LLC changing our world for the better. Learn about leading industry approaches to addressing the challenges and Cox, Executive Managing Director and Deputy General Counsel, Stroz Friedberg LLC creating meaningful privacy experiences for mobile users. Roll up your sleeves and dive into the practical aspects of how to certify a class of data for Safe Harbor. Learn Lots of influential companies have learned the hard way about being the victim of a data breach, even the scope of Safe Harbor certification and how to create a Safe Harbor team using internal certification trees. though they may have complied with regulations and standards. Join this session to learn from those who oPeraTIonaL PrIVacy have survived a breach how you can use the tools and techniques of corporate compliance to be prepared. Mexico’s New Data Protection Law: Policy and Compliance Employees, Smart Phones and Social Media: Best Practices for Mobile Computing and Social Media Policies Jonathan D. Avila, CIPP, Vice President, Counsel, Chief Privacy Officer, The Walt Disney Company, Rosa Maria John Heitmann, CIPP, Partner, Kelley Drye & Warren, LLP Data Breach Resolution: Preparing for a Data Breach and How to Respond to It Moderator: Tony Hadley, Sr. V.P. of Government Affairs & Public Policy, Experian Franco, Attorney, Basham, Ringe Y Correa, S.C., Jacqueline Peschard Mariscal, President Commissioner, Join in a discussion exploring the best ways to create mobile computing and social media policies designed to Tom Bowers, Managing Director, Security Constructs LLC, Patricia Wagner, Member of the Firm, Federal Institute for Access to Information and Data Protection, Harry A. Valetk, CIPP, Corporate Privacy effectively address practical and legal concerns raised by the use of personal mobile devices and social media for EpsteinBeckerGreen Director, MetLife business purposes. Join this session for an overview of the policy choices that Mexico has made in adopting comprehensive data What tools do you need to prepare for a data breach and what are the best practices? How did the breach Enhanced Notice and Control protection legislation and discuss the practical challenges for business in implementing the law. happen and where did the data go? Join this lively session to learn how to build a forensics case once a Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jane Horvath, CIPP, CIPP/G, breach happens. Migrating to a Global Shared Services Center? Consider the Issues Global Privacy Counsel, Google Inc., Shane Wiley, CIPP, Sr. Director, Privacy & Data Governance, Yahoo! Inc. Jon Olefson, Vice President and General Counsel (Europe), Cognizant Technology Solutions, Heidi Salow, Experts from two of the largest global Internet companies and the Center for Democracy and Technology, a neutral CIPP, Shareholder, Greenberg Traurig LLP consumer-advocacy group, will review the global development and progress of CLEAR Ad Notice, the emergence FacILITaTeD neTWorkInG The commercial sector—and to some extent the federal government—has moved toward a shared services of DNT, and where these intersect with the need for Privacy by Design. model, in which multiple business functions are centralized into a single global center. Learn what privacy Networking Session: 5-Minute Mixer and data security issues are associated with the use of these centers, particularly when they are outsourced Moving Toward Privacy by Design: The Microsoft Experience Facilitator: Chris Zoladz, CIPP, CIPP/G, Founder, Navigate LLC in countries with no data protection laws or laws that differ from the “host” country. David Bowermaster, Senior Cloud Privacy Strategist, Microsoft Corporation, Javier Salido, CIPP, CIPP/IT, Senior Don’t know anyone at the conference? Looking to network? Share your professional background Program Manager, Trustworthy Computing Group, Microsoft Corporation and discover connections with other Academy attendees and privacy leaders in fast, fun five-minute New Data Protection Laws and Case Law Trends in South America Get a “behind the scenes” look at Microsoft’s internal privacy process, which is responsible for ensuring that one-on-one meetings. Cedric Laurant, Cedric Laurant Consulting, Renato Opice Blum, Attorney, Opice Blum Advogados Associados privacy needs are taken into account throughout the product development process and into the management of Networking Session: To Track or Do Not Track? Browser Controls, Self Regulatory Programs Join this topical discussion of the most recent privacy developments in Latin American countries, including personal information within the company. new legislation in Brazil and Colombia, Uruguay’s expected “adequate protection” approval of its recent or New Laws privacy law from European authorities, and how upcoming EU legislation could have important consequences A Roadmap to Move up the Privacy Maturity Curve Jules Polonetsky, CIPP, Co-Chair and Director, Future of Privacy Forum Nancy Cohen, CIPP, Senior Technical Manager, Quality Control, American Institute of Certified Public Accountants, for the development and implementation of online behavioral advertising in South America. Networking Session: Study Tips and Advice from Certified Professionals—Your Burning Privacy Marilyn Prosch, CIPP, Associate Professor, Arizona State University Questions Answered! LaW anD PoLIcy Measuring and monitoring privacy compliance requires the establishment of effective monitoring procedures and Facilitated by CIPP-certified professionals a baseline against which to assess performance. Learn how the Privacy Maturity Model can provide an effective Ethical Privacy You’ve read tons of reference material, you’ve been to training, and you’ve even attended some great Edward McNicholas, Partner, Sidley Austin LLP tool to assess privacy compliance and progress against recognized benchmark data. conference sessions, but still you have burning questions about privacy. We have experienced privacy Join this session for an overview of practical legal ethics issues that confront privacy professionals and cLoUD coMPUTInG professionals ready to help you put out that fire! Talk to IAPP instructors about privacy-related topics discussion of a possible approach to a code of ethics for all professionals in the privacy field. that are important to you. Cloud Computing Compliance: The What, Who and Where How to Avoid Becoming a Privacy Class Action or FTC Enforcement Target Christopher Millard, Professor, Bristows, London Networking Session: Minimize Boredom, Maximize Your Member Experience D. Reed Freeman, Jr., CIPP, Partner, Morrison & Foerster LLP, Jim Halpert, Partner, Communications, Join this informative session to learn the key compliance issues for users and providers of cloud services, Facilitated by the IAPP Membership Department e-Commerce and Privacy Practice, DLA Piper US LLP including the implications of anonymization, encryption and fragmentation of data in cloud environments, and the IAPP staff members will give you the inside scoop on the many ways that you can become more Join this session to identify the FTC enforcement priorities from among the agency’s laundry list of best local law impact of geographical arrangements—such as the “long-arm” reach of the EU Directive. involved with your professional association. Learn about volunteer career development opportunities practices and learn how to handle a subpoena or other initial FTC inquiry. Discover the privacy practices that in this casual networking session, where you’ll also have an opportunity to provide feedback on how give rise to significant class action risk, and discuss strategies to become a much harder target against the Joint Data Controllership: A Silver Bullet for Cloud Computing Privacy Issues? the IAPP can better serve you. threat of a class action lawsuit. Jan Geert Meents, Partner, Chair, DLA Piper IP & Technology Practice, Germany Networking Session: Your Company and the Cloud Cloud computing has raised significant privacy objections in the EU, making the use of cloud solutions by How Will the Safe Harbors in Pending Privacy Legislation Work? Facilitator: Tanya Forsheit, CIPP, Founding Partner, InfoLawGroup LLP multinational companies problematic. Explore how joint data controller arrangements can provide a breakthrough Marty Abrams, Senior Policy Advisor, Hunton & Williams LLP, Jennifer Barrett, CIPP, Global Privacy and Public Facilitator: Christine Lyon, Partner, Morrison & Foerster LLP for the privacy dilemma of modern cloud computing. Policy Executive Privacy Leader, Acxiom Corporation, Scott Taylor, CIPP, Vice President and Chief Privacy It’s your turn to join the discussion! Bring your questions, concerns and insights for a lively Officer, Hewlett-Packard Company, María Elena Pérez-Jaén Zermeño, Commissioner for Access to Public Obscured by Clouds: Privacy Audit in the Cloud discussion about managing privacy in the cloud, including due diligence and selection of providers, Information and Data Protection of the Institute for Access to Public Information of the Federal District, Mexico Doron Rotman, CIPP, National Privacy Service Leader, KPMG LLP (US) data back-up, encryption options, contractual protections (or lack thereof), cross-border transfers in The Obama administration has proposed federal legislation that would encourage industry codes of conduct Learn how to identify the impact of the move to cloud computing on an organization’s ability to undergo a the cloud environment, audit and third-party certification, and other topics of interest from the day’s that would be safe harbors. Suggested legislation on the hill would also contain safe harbors. Find out how privacy audit, and the considerations that should be taken into account in the selection, contracting and ongoing cloud computing sessions. these would work and formulate a plan for putting safe harbors into effect. management of cloud service providers.

vISIT www.P r I vA cyASSOc IATION. O rg/A c A demy TO regISTer ANd fO r uP - TO-dATe INf O rmATION PrI vA cy AcA demy 2011 PrO grA m September 14 – 16 • t he Fairmont h otel • DallaS , t X

c ONfereN ce SeSSIONS

Litigation: There’s an App for That! Securing Data in the Cloud Sherry Ramsey, CIPP, AVP - Public Policy, AT&T Inc., Alan Raul, Partner, Sidley Austin LLP Kenneth E. Stavinoha, CIPP, Solutions Architect, Cisco Systems, Inc. “App privacy” is a cutting edge legal issue that has garnered acute attention from congress, privacy advocates, the Explore the challenges of securing data in the cloud and the role of encryption as a tool. Hear the results of FTC and plaintiffs lawyers. Explore the complaints and investigations that have been leveled to date against “apps” extensive research into the critical factors that influence the adoption of encryption to secure data in the cloud. that collect, share, store, use or compromise user IDs, unique device identifiers, personal information or location Taming the Cloud: Contracting for a Cloud that Actually Works data without (alleged) adequate disclosure and consent from the app users. Leave with best “app” practices to Benjamin Hayes, CIPP, CIPP/C, CIPP/G, CIPP/IT, Americas Data Privacy Compliance Lead, Accenture, avoid the legal cross-hairs of the privacy enforcers in the first place. David Navetta, CIPP, Founding Partner, Information Law Group Never Enter Your Real Data! How can we “solve” the difficult application of privacy laws to the cloud? Discover a successful new Rocco Panetta, Partner, Panetta & Associati approach to negotiating cloud contracts that attempts to re-allocate applicable privacy and security Take a focused look at the issues arising out of the data flows around the world and relevant legal consequences, requirements between data owner, cloud provider and system integrator. onLIne PrIVacy especially with respect to the principle of jurisdiction, establishment and relevant applicable laws and regulations. Utilization of Cloud-Based Enterprise Solutions: Google’s Business Perspective of Privacy Challenges Monitoring and Preserving Data on Social Media Sites Will There Be a “Privacy Bill of Rights” and If So, What Will It Mean? and Solutions Erik Laykin, Managing Director, Duff & Phelps Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jules Polonetsky, CIPP, Marc Crandall, CIPP, Product Counsel, Google Inc. What options are available for the defensible and forensic preservation of social media data and usage? Co-Chairman and Director, Future of Privacy Forum, Christopher Wolf, Co-Chair Privacy and Data Security Practice What are the regulatory obligations and privacy impacts of cloud computing? What are the options Gain practical guidance while getting a hands-on, visual review of the tools and technologies available for the Group, Hogan Lovells US LLP regarding international conflicts of law? Take part in this session and gain the tools you need to identify real-time monitoring and preservation of electronic data contained on social media sites. Examine the proposal for a Privacy Bill of Rights, intended to implement Fair Information Practice Principles privacy risks in moving data to the cloud. through codes of conduct enforced by the FTC. Explore the details of the proposal as well as the political prospects Online Privacy: Who’s Watching the Kids? for passage in the near term. InForMaTIon SecUrITy Moderator: Nuala O’Connor Kelly, CIPP, CIPP/G, Senior Counsel, Information Governance & Chief Privacy Changing the Culture of Low Tech Information Security: Critical Policy Elements and Compliance Strategies Leader, General Electric FInancIaL SerVIceS Robert Johnson, Executive Director, National Association for Information Destruction Parry Aftab, Executive Director, WiredSafety, Michelle Dennedy, Founder & CEO, iDennedy Project, Lydia The Designated Transfer Date under Dodd-Frank Has Come and Gone: What Does It Mean for Financial Privacy? How can you implement a program to ensure compliance and avoid the embarrassment of a costly Parnes, Partner, Wilson Sonsini Goodrich & Rosati (A two-part session) “low tech” security breach? Explore the existing culture of low tech privacy concerns (the disposal of What do our kids really think about online privacy and what are they doing online? Join this lively session for H. Leigh Feldman, Senior Vice President, Compliance Program Executive, Bank of America, L. Richard Fischer, confidential material) and discuss how to shift the current thinking to make the subject more of a security a discussion of the practical, legal and policy implications of online privacy as applied to children and teens, Partner, Morrison & Foerster LLP, Lynn A. Goldstein, CIPP, Senior Vice President & Chief Privacy Officer, JP issue and less a price-driven commodity. and take away practical strategies and advice on talking to our kids about staying safe online. Morgan Chase Bank, N.A., Russell Schrader, Chief Privacy Officer and Global Enterprise Risk Counsel, Visa Inc. The CPO and the CSO: Building Bridges to Improve Both Privacy and Security The Self-Regulatory Principles for Online Behavioral Advertising: A How-to Compliance Workshop Examine the developments on the regulatory implications of the Consumer Financial Protection Bureau over the Martin Carmichael, Chief Security Officer, TD Ameritrade Holding Corporation, David Hale, CIPP, Chief Genie Barton, Director, Online Interest-Based Advertising Accountability, Council of Better Business Bureaus, last nine months, with a focus on those sections of the Dodd-Frank Act with privacy implications. What have been Privacy Officer, TD Ameritrade Holding Corporation Xenia Boone, Senior Vice President Corporate and Social Responsibility, Direct Marketing Association, Scott the ramifications of the transfers of authority called for by the act? Is it too soon to tell, or are there clear trends The close relationship between privacy and security can lead to conflict—or to synergies and Meyer, CEO, Evidon developing on these and other issues important to financial privacy? complementary roles. Find out how you can build a relationship between the privacy office and the security Gain a clear understanding of the requirements of the Self-Regulatory Principles, including who must Hot Button Privacy Issues in Payments and Financial Services structure that can greatly facilitate both jobs. implement them, how to implement them, and what to expect from the Council of Better Business Bureaus Erin Fonte, CIPP, Shareholder, Cox Smith Matthews Incorporated and the Direct Marketing Association, the groups that provide accountability for the Self-Regulatory Program. The New World of Cyber Risk: Advanced Persistent Threats Get the latest updates on the hottest topics in the world of payments and financial services, including discussion of Alan Brill, CIPP, Senior Managing Director, Secure Information Services, Kroll HeaLTHcare secure encrypted e-mail at financial institutions, suggested best practices for social media activities, and unique Examine Advanced Persistent Threats (APTs), a new and far more dangerous type of cyber attack, to learn A Health Privacy Segmentation of the American Public and EHR Users: Results of a National Survey mobile transaction and marketing issues. how they work, how they target PII and PHI—among other targets—and the importance of evolving from Alan Westin, Professor Emeritus, Columbia University MobILe coMPUTInG/LocaTIon-baSeD SerVIceS perimeter defense to a more comprehensive doctrine of defense-in-depth. Learn the results of a national survey being conducted to measure levels of trust and its benefits in U.S. EHR Avoiding the Mobile App Traps Who Am I? Understanding Multi-Factor Authentication in Online Environments systems. The survey applied a set of Health Privacy Intensity Measures developed by Dr. Alan Westin, who will Mark W. Brennan, Associate, Hogan Lovells US LLP, Devin Crock, Counsel, Sprint Nextel, Matthew Gerst, Counsel, Christopher T. Pierson, CIPP, CIPP/G, Chief Privacy Officer and Senior Vice President, Citizens Financial report and describe the sources of high, medium and low health privacy intensity for four U.S. patient populations. External & State Affairs, CTIA—The Wireless Association® Group, Inc., James Shreve, CIPP, Associate Specialist, Buckley Sandler LLP Medical Software and Its Regulation: HHS, FDA and the Rules “You snooze, you lose” in the mobile app ecosystem. But, “haste makes waste” when it comes to data privacy and Take part in a lively discussion of the emergence outside the banking sector of dual-factor and tri-factor Peter McLaughlin, CIPP, Senior Counsel, Foley & Lardner LLP security. What’s a business to do? Find out how to address privacy and security issues associated with mobile authentication, how these technologies work, and how to perform a risk-based assessment to determine The HITECH Act directed HHS and the FTC to prescribe rules for electronic health records, systems that are apps and still remain competitive by identifying the key traps. the type of security one might offer. made up of software and can collect patient data from numerous sources. Explore the impact of the FDA’s Choice on the Grid: Geolocation Technologies and Privacy DaTa breacH recently issued rules concerning medical device data systems and other software tools for developers and David Keating, Attorney, Alston & Bird LLP, Mikko Niva, CIPP/E, Global Privacy Counsel, Nokia, Rod Witmond, SVP, healthcare providers. Building a Records Retention Policy Aligned with Privacy Objectives Product Management & Marketing, Cardlytics Richard L. Johnson, Manager, Global Information Compliance, John Deere & Company, Marty Provin, CIPP, Top 10 New Lessons in Healthcare Privacy Investigate global data protection standards—from a U.S. perspective—for geolocation technologies on mobile EVP Business Development Group, Jordan Lawrence Kirk Nahra, CIPP, Partner, Wiley Rein LLP devices and apply those standards to advertising driven by location-based personalization. Examine the difficult In several recent high-profile data breaches, the compromised data was old and outdated. This fact Join in a review of the latest developments in the world of healthcare privacy and identify the key new balance between large market valuations attached to location-based advertising businesses, and data protection. underscores the importance of having a consistently executed retention policy as part of a company’s takeaways for healthcare companies and their business partners. Explore enforcement developments, new Privacy by Design in the Mobile App Ecosystem: Thinking Global, Acting Local overall data security and privacy strategy. Learn how to take a more intelligent, comprehensive approach regulations, the latest in risk areas and the key topics for controversy involving healthcare privacy issues. Ken Anderson, Assistant Commissioner of Privacy, Information and Privacy Commissioner of Ontario, Frank to information management and retention that approaches privacy and information governance as a GLobaL Dawson, CIPP/IT, Head of Consumer Data & Privacy Program, Nokia, Ed Schmit, Director, AT&T Developer single initiative. Program, AT&T Inc., Patrick Walshe, Director of Privacy, GSMA Certifying for the Safe Harbor: The Practical Aspects Data Breach—Help Your Company Avoid Being a Victim of Compromise Kimberly A. Bubnes, CIPP, Global Privacy Director, General Motors Corporation, Robert L. Rothman, Principal, The convergence of mobile and the web has created a vibrant and dynamic mobile ecosystem that is dramatically Charles Kallenbach, General Counsel, Heartland Payment Systems, Doug Meal, Ropes & Gray, Erin Nealy Privacy Associates International LLC changing our world for the better. Learn about leading industry approaches to addressing the challenges and Cox, Executive Managing Director and Deputy General Counsel, Stroz Friedberg LLC creating meaningful privacy experiences for mobile users. Roll up your sleeves and dive into the practical aspects of how to certify a class of data for Safe Harbor. Learn Lots of influential companies have learned the hard way about being the victim of a data breach, even the scope of Safe Harbor certification and how to create a Safe Harbor team using internal certification trees. though they may have complied with regulations and standards. Join this session to learn from those who oPeraTIonaL PrIVacy have survived a breach how you can use the tools and techniques of corporate compliance to be prepared. Mexico’s New Data Protection Law: Policy and Compliance Employees, Smart Phones and Social Media: Best Practices for Mobile Computing and Social Media Policies Jonathan D. Avila, CIPP, Vice President, Counsel, Chief Privacy Officer, The Walt Disney Company, Rosa Maria John Heitmann, CIPP, Partner, Kelley Drye & Warren, LLP Data Breach Resolution: Preparing for a Data Breach and How to Respond to It Moderator: Tony Hadley, Sr. V.P. of Government Affairs & Public Policy, Experian Franco, Attorney, Basham, Ringe Y Correa, S.C., Jacqueline Peschard Mariscal, President Commissioner, Join in a discussion exploring the best ways to create mobile computing and social media policies designed to Tom Bowers, Managing Director, Security Constructs LLC, Patricia Wagner, Member of the Firm, Federal Institute for Access to Information and Data Protection, Harry A. Valetk, CIPP, Corporate Privacy effectively address practical and legal concerns raised by the use of personal mobile devices and social media for EpsteinBeckerGreen Director, MetLife business purposes. Join this session for an overview of the policy choices that Mexico has made in adopting comprehensive data What tools do you need to prepare for a data breach and what are the best practices? How did the breach Enhanced Notice and Control protection legislation and discuss the practical challenges for business in implementing the law. happen and where did the data go? Join this lively session to learn how to build a forensics case once a Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jane Horvath, CIPP, CIPP/G, breach happens. Migrating to a Global Shared Services Center? Consider the Issues Global Privacy Counsel, Google Inc., Shane Wiley, CIPP, Sr. Director, Privacy & Data Governance, Yahoo! Inc. Jon Olefson, Vice President and General Counsel (Europe), Cognizant Technology Solutions, Heidi Salow, Experts from two of the largest global Internet companies and the Center for Democracy and Technology, a neutral CIPP, Shareholder, Greenberg Traurig LLP consumer-advocacy group, will review the global development and progress of CLEAR Ad Notice, the emergence FacILITaTeD neTWorkInG The commercial sector—and to some extent the federal government—has moved toward a shared services of DNT, and where these intersect with the need for Privacy by Design. model, in which multiple business functions are centralized into a single global center. Learn what privacy Networking Session: 5-Minute Mixer and data security issues are associated with the use of these centers, particularly when they are outsourced Moving Toward Privacy by Design: The Microsoft Experience Facilitator: Chris Zoladz, CIPP, CIPP/G, Founder, Navigate LLC in countries with no data protection laws or laws that differ from the “host” country. David Bowermaster, Senior Cloud Privacy Strategist, Microsoft Corporation, Javier Salido, CIPP, CIPP/IT, Senior Don’t know anyone at the conference? Looking to network? Share your professional background Program Manager, Trustworthy Computing Group, Microsoft Corporation and discover connections with other Academy attendees and privacy leaders in fast, fun five-minute New Data Protection Laws and Case Law Trends in South America Get a “behind the scenes” look at Microsoft’s internal privacy process, which is responsible for ensuring that one-on-one meetings. Cedric Laurant, Cedric Laurant Consulting, Renato Opice Blum, Attorney, Opice Blum Advogados Associados privacy needs are taken into account throughout the product development process and into the management of Networking Session: To Track or Do Not Track? Browser Controls, Self Regulatory Programs Join this topical discussion of the most recent privacy developments in Latin American countries, including personal information within the company. new legislation in Brazil and Colombia, Uruguay’s expected “adequate protection” approval of its recent or New Laws privacy law from European authorities, and how upcoming EU legislation could have important consequences A Roadmap to Move up the Privacy Maturity Curve Jules Polonetsky, CIPP, Co-Chair and Director, Future of Privacy Forum Nancy Cohen, CIPP, Senior Technical Manager, Quality Control, American Institute of Certified Public Accountants, for the development and implementation of online behavioral advertising in South America. Networking Session: Study Tips and Advice from Certified Professionals—Your Burning Privacy Marilyn Prosch, CIPP, Associate Professor, Arizona State University Questions Answered! LaW anD PoLIcy Measuring and monitoring privacy compliance requires the establishment of effective monitoring procedures and Facilitated by CIPP-certified professionals a baseline against which to assess performance. Learn how the Privacy Maturity Model can provide an effective Ethical Privacy You’ve read tons of reference material, you’ve been to training, and you’ve even attended some great Edward McNicholas, Partner, Sidley Austin LLP tool to assess privacy compliance and progress against recognized benchmark data. conference sessions, but still you have burning questions about privacy. We have experienced privacy Join this session for an overview of practical legal ethics issues that confront privacy professionals and cLoUD coMPUTInG professionals ready to help you put out that fire! Talk to IAPP instructors about privacy-related topics discussion of a possible approach to a code of ethics for all professionals in the privacy field. that are important to you. Cloud Computing Compliance: The What, Who and Where How to Avoid Becoming a Privacy Class Action or FTC Enforcement Target Christopher Millard, Professor, Bristows, London Networking Session: Minimize Boredom, Maximize Your Member Experience D. Reed Freeman, Jr., CIPP, Partner, Morrison & Foerster LLP, Jim Halpert, Partner, Communications, Join this informative session to learn the key compliance issues for users and providers of cloud services, Facilitated by the IAPP Membership Department e-Commerce and Privacy Practice, DLA Piper US LLP including the implications of anonymization, encryption and fragmentation of data in cloud environments, and the IAPP staff members will give you the inside scoop on the many ways that you can become more Join this session to identify the FTC enforcement priorities from among the agency’s laundry list of best local law impact of geographical arrangements—such as the “long-arm” reach of the EU Directive. involved with your professional association. Learn about volunteer career development opportunities practices and learn how to handle a subpoena or other initial FTC inquiry. Discover the privacy practices that in this casual networking session, where you’ll also have an opportunity to provide feedback on how give rise to significant class action risk, and discuss strategies to become a much harder target against the Joint Data Controllership: A Silver Bullet for Cloud Computing Privacy Issues? the IAPP can better serve you. threat of a class action lawsuit. Jan Geert Meents, Partner, Chair, DLA Piper IP & Technology Practice, Germany Networking Session: Your Company and the Cloud Cloud computing has raised significant privacy objections in the EU, making the use of cloud solutions by How Will the Safe Harbors in Pending Privacy Legislation Work? Facilitator: Tanya Forsheit, CIPP, Founding Partner, InfoLawGroup LLP multinational companies problematic. Explore how joint data controller arrangements can provide a breakthrough Marty Abrams, Senior Policy Advisor, Hunton & Williams LLP, Jennifer Barrett, CIPP, Global Privacy and Public Facilitator: Christine Lyon, Partner, Morrison & Foerster LLP for the privacy dilemma of modern cloud computing. Policy Executive Privacy Leader, Acxiom Corporation, Scott Taylor, CIPP, Vice President and Chief Privacy It’s your turn to join the discussion! Bring your questions, concerns and insights for a lively Officer, Hewlett-Packard Company, María Elena Pérez-Jaén Zermeño, Commissioner for Access to Public Obscured by Clouds: Privacy Audit in the Cloud discussion about managing privacy in the cloud, including due diligence and selection of providers, Information and Data Protection of the Institute for Access to Public Information of the Federal District, Mexico Doron Rotman, CIPP, National Privacy Service Leader, KPMG LLP (US) data back-up, encryption options, contractual protections (or lack thereof), cross-border transfers in The Obama administration has proposed federal legislation that would encourage industry codes of conduct Learn how to identify the impact of the move to cloud computing on an organization’s ability to undergo a the cloud environment, audit and third-party certification, and other topics of interest from the day’s that would be safe harbors. Suggested legislation on the hill would also contain safe harbors. Find out how privacy audit, and the considerations that should be taken into account in the selection, contracting and ongoing cloud computing sessions. these would work and formulate a plan for putting safe harbors into effect. management of cloud service providers. vISIT www.P r I vA cyASSOc IATION. O rg/A c A demy TO regISTer ANd fO r uP - TO-dATe INf O rmATION PrI vA cy AcA demy 2011 PrO grA m September 14 – 16 • t he Fairmont h otel • DallaS , t X

c ONfereN ce SeSSIONS

Litigation: There’s an App for That! Securing Data in the Cloud Sherry Ramsey, CIPP, AVP - Public Policy, AT&T Inc., Alan Raul, Partner, Sidley Austin LLP Kenneth E. Stavinoha, CIPP, Solutions Architect, Cisco Systems, Inc. “App privacy” is a cutting edge legal issue that has garnered acute attention from congress, privacy advocates, the Explore the challenges of securing data in the cloud and the role of encryption as a tool. Hear the results of FTC and plaintiffs lawyers. Explore the complaints and investigations that have been leveled to date against “apps” extensive research into the critical factors that influence the adoption of encryption to secure data in the cloud. that collect, share, store, use or compromise user IDs, unique device identifiers, personal information or location Taming the Cloud: Contracting for a Cloud that Actually Works data without (alleged) adequate disclosure and consent from the app users. Leave with best “app” practices to Benjamin Hayes, CIPP, CIPP/C, CIPP/G, CIPP/IT, Americas Data Privacy Compliance Lead, Accenture, avoid the legal cross-hairs of the privacy enforcers in the first place. David Navetta, CIPP, Founding Partner, Information Law Group Never Enter Your Real Data! How can we “solve” the difficult application of privacy laws to the cloud? Discover a successful new Rocco Panetta, Partner, Panetta & Associati approach to negotiating cloud contracts that attempts to re-allocate applicable privacy and security Take a focused look at the issues arising out of the data flows around the world and relevant legal consequences, requirements between data owner, cloud provider and system integrator. onLIne PrIVacy especially with respect to the principle of jurisdiction, establishment and relevant applicable laws and regulations. Utilization of Cloud-Based Enterprise Solutions: Google’s Business Perspective of Privacy Challenges Monitoring and Preserving Data on Social Media Sites Will There Be a “Privacy Bill of Rights” and If So, What Will It Mean? and Solutions Erik Laykin, Managing Director, Duff & Phelps Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jules Polonetsky, CIPP, Marc Crandall, CIPP, Product Counsel, Google Inc. What options are available for the defensible and forensic preservation of social media data and usage? Co-Chairman and Director, Future of Privacy Forum, Christopher Wolf, Co-Chair Privacy and Data Security Practice What are the regulatory obligations and privacy impacts of cloud computing? What are the options Gain practical guidance while getting a hands-on, visual review of the tools and technologies available for the Group, Hogan Lovells US LLP regarding international conflicts of law? Take part in this session and gain the tools you need to identify real-time monitoring and preservation of electronic data contained on social media sites. Examine the proposal for a Privacy Bill of Rights, intended to implement Fair Information Practice Principles privacy risks in moving data to the cloud. through codes of conduct enforced by the FTC. Explore the details of the proposal as well as the political prospects Online Privacy: Who’s Watching the Kids? for passage in the near term. InForMaTIon SecUrITy Moderator: Nuala O’Connor Kelly, CIPP, CIPP/G, Senior Counsel, Information Governance & Chief Privacy Changing the Culture of Low Tech Information Security: Critical Policy Elements and Compliance Strategies Leader, General Electric FInancIaL SerVIceS Robert Johnson, Executive Director, National Association for Information Destruction Parry Aftab, Executive Director, WiredSafety, Michelle Dennedy, Founder & CEO, iDennedy Project, Lydia The Designated Transfer Date under Dodd-Frank Has Come and Gone: What Does It Mean for Financial Privacy? How can you implement a program to ensure compliance and avoid the embarrassment of a costly Parnes, Partner, Wilson Sonsini Goodrich & Rosati (A two-part session) “low tech” security breach? Explore the existing culture of low tech privacy concerns (the disposal of What do our kids really think about online privacy and what are they doing online? Join this lively session for H. Leigh Feldman, Senior Vice President, Compliance Program Executive, Bank of America, L. Richard Fischer, confidential material) and discuss how to shift the current thinking to make the subject more of a security a discussion of the practical, legal and policy implications of online privacy as applied to children and teens, Partner, Morrison & Foerster LLP, Lynn A. Goldstein, CIPP, Senior Vice President & Chief Privacy Officer, JP issue and less a price-driven commodity. and take away practical strategies and advice on talking to our kids about staying safe online. Morgan Chase Bank, N.A., Russell Schrader, Chief Privacy Officer and Global Enterprise Risk Counsel, Visa Inc. The CPO and the CSO: Building Bridges to Improve Both Privacy and Security The Self-Regulatory Principles for Online Behavioral Advertising: A How-to Compliance Workshop Examine the developments on the regulatory implications of the Consumer Financial Protection Bureau over the Martin Carmichael, Chief Security Officer, TD Ameritrade Holding Corporation, David Hale, CIPP, Chief Genie Barton, Director, Online Interest-Based Advertising Accountability, Council of Better Business Bureaus, last nine months, with a focus on those sections of the Dodd-Frank Act with privacy implications. What have been Privacy Officer, TD Ameritrade Holding Corporation Xenia Boone, Senior Vice President Corporate and Social Responsibility, Direct Marketing Association, Scott the ramifications of the transfers of authority called for by the act? Is it too soon to tell, or are there clear trends The close relationship between privacy and security can lead to conflict—or to synergies and Meyer, CEO, Evidon developing on these and other issues important to financial privacy? complementary roles. Find out how you can build a relationship between the privacy office and the security Gain a clear understanding of the requirements of the Self-Regulatory Principles, including who must Hot Button Privacy Issues in Payments and Financial Services structure that can greatly facilitate both jobs. implement them, how to implement them, and what to expect from the Council of Better Business Bureaus Erin Fonte, CIPP, Shareholder, Cox Smith Matthews Incorporated and the Direct Marketing Association, the groups that provide accountability for the Self-Regulatory Program. The New World of Cyber Risk: Advanced Persistent Threats Get the latest updates on the hottest topics in the world of payments and financial services, including discussion of Alan Brill, CIPP, Senior Managing Director, Secure Information Services, Kroll HeaLTHcare secure encrypted e-mail at financial institutions, suggested best practices for social media activities, and unique Examine Advanced Persistent Threats (APTs), a new and far more dangerous type of cyber attack, to learn A Health Privacy Segmentation of the American Public and EHR Users: Results of a National Survey mobile transaction and marketing issues. how they work, how they target PII and PHI—among other targets—and the importance of evolving from Alan Westin, Professor Emeritus, Columbia University MobILe coMPUTInG/LocaTIon-baSeD SerVIceS perimeter defense to a more comprehensive doctrine of defense-in-depth. Learn the results of a national survey being conducted to measure levels of trust and its benefits in U.S. EHR Avoiding the Mobile App Traps Who Am I? Understanding Multi-Factor Authentication in Online Environments systems. The survey applied a set of Health Privacy Intensity Measures developed by Dr. Alan Westin, who will Mark W. Brennan, Associate, Hogan Lovells US LLP, Devin Crock, Counsel, Sprint Nextel, Matthew Gerst, Counsel, Christopher T. Pierson, CIPP, CIPP/G, Chief Privacy Officer and Senior Vice President, Citizens Financial report and describe the sources of high, medium and low health privacy intensity for four U.S. patient populations. External & State Affairs, CTIA—The Wireless Association® Group, Inc., James Shreve, CIPP, Associate Specialist, Buckley Sandler LLP Medical Software and Its Regulation: HHS, FDA and the Rules “You snooze, you lose” in the mobile app ecosystem. But, “haste makes waste” when it comes to data privacy and Take part in a lively discussion of the emergence outside the banking sector of dual-factor and tri-factor Peter McLaughlin, CIPP, Senior Counsel, Foley & Lardner LLP security. What’s a business to do? Find out how to address privacy and security issues associated with mobile authentication, how these technologies work, and how to perform a risk-based assessment to determine The HITECH Act directed HHS and the FTC to prescribe rules for electronic health records, systems that are apps and still remain competitive by identifying the key traps. the type of security one might offer. made up of software and can collect patient data from numerous sources. Explore the impact of the FDA’s Choice on the Grid: Geolocation Technologies and Privacy DaTa breacH recently issued rules concerning medical device data systems and other software tools for developers and David Keating, Attorney, Alston & Bird LLP, Mikko Niva, CIPP/E, Global Privacy Counsel, Nokia, Rod Witmond, SVP, healthcare providers. Building a Records Retention Policy Aligned with Privacy Objectives Product Management & Marketing, Cardlytics Richard L. Johnson, Manager, Global Information Compliance, John Deere & Company, Marty Provin, CIPP, Top 10 New Lessons in Healthcare Privacy Investigate global data protection standards—from a U.S. perspective—for geolocation technologies on mobile EVP Business Development Group, Jordan Lawrence Kirk Nahra, CIPP, Partner, Wiley Rein LLP devices and apply those standards to advertising driven by location-based personalization. Examine the difficult In several recent high-profile data breaches, the compromised data was old and outdated. This fact Join in a review of the latest developments in the world of healthcare privacy and identify the key new balance between large market valuations attached to location-based advertising businesses, and data protection. underscores the importance of having a consistently executed retention policy as part of a company’s takeaways for healthcare companies and their business partners. Explore enforcement developments, new Privacy by Design in the Mobile App Ecosystem: Thinking Global, Acting Local overall data security and privacy strategy. Learn how to take a more intelligent, comprehensive approach regulations, the latest in risk areas and the key topics for controversy involving healthcare privacy issues. Ken Anderson, Assistant Commissioner of Privacy, Information and Privacy Commissioner of Ontario, Frank to information management and retention that approaches privacy and information governance as a GLobaL Dawson, CIPP/IT, Head of Consumer Data & Privacy Program, Nokia, Ed Schmit, Director, AT&T Developer single initiative. Program, AT&T Inc., Patrick Walshe, Director of Privacy, GSMA Certifying for the Safe Harbor: The Practical Aspects Data Breach—Help Your Company Avoid Being a Victim of Compromise Kimberly A. Bubnes, CIPP, Global Privacy Director, General Motors Corporation, Robert L. Rothman, Principal, The convergence of mobile and the web has created a vibrant and dynamic mobile ecosystem that is dramatically Charles Kallenbach, General Counsel, Heartland Payment Systems, Doug Meal, Ropes & Gray, Erin Nealy Privacy Associates International LLC changing our world for the better. Learn about leading industry approaches to addressing the challenges and Cox, Executive Managing Director and Deputy General Counsel, Stroz Friedberg LLC creating meaningful privacy experiences for mobile users. Roll up your sleeves and dive into the practical aspects of how to certify a class of data for Safe Harbor. Learn Lots of influential companies have learned the hard way about being the victim of a data breach, even the scope of Safe Harbor certification and how to create a Safe Harbor team using internal certification trees. though they may have complied with regulations and standards. Join this session to learn from those who oPeraTIonaL PrIVacy have survived a breach how you can use the tools and techniques of corporate compliance to be prepared. Mexico’s New Data Protection Law: Policy and Compliance Employees, Smart Phones and Social Media: Best Practices for Mobile Computing and Social Media Policies Jonathan D. Avila, CIPP, Vice President, Counsel, Chief Privacy Officer, The Walt Disney Company, Rosa Maria John Heitmann, CIPP, Partner, Kelley Drye & Warren, LLP Data Breach Resolution: Preparing for a Data Breach and How to Respond to It Moderator: Tony Hadley, Sr. V.P. of Government Affairs & Public Policy, Experian Franco, Attorney, Basham, Ringe Y Correa, S.C., Jacqueline Peschard Mariscal, President Commissioner, Join in a discussion exploring the best ways to create mobile computing and social media policies designed to Tom Bowers, Managing Director, Security Constructs LLC, Patricia Wagner, Member of the Firm, Federal Institute for Access to Information and Data Protection, Harry A. Valetk, CIPP, Corporate Privacy effectively address practical and legal concerns raised by the use of personal mobile devices and social media for EpsteinBeckerGreen Director, MetLife business purposes. Join this session for an overview of the policy choices that Mexico has made in adopting comprehensive data What tools do you need to prepare for a data breach and what are the best practices? How did the breach Enhanced Notice and Control protection legislation and discuss the practical challenges for business in implementing the law. happen and where did the data go? Join this lively session to learn how to build a forensics case once a Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jane Horvath, CIPP, CIPP/G, breach happens. Migrating to a Global Shared Services Center? Consider the Issues Global Privacy Counsel, Google Inc., Shane Wiley, CIPP, Sr. Director, Privacy & Data Governance, Yahoo! Inc. Jon Olefson, Vice President and General Counsel (Europe), Cognizant Technology Solutions, Heidi Salow, Experts from two of the largest global Internet companies and the Center for Democracy and Technology, a neutral CIPP, Shareholder, Greenberg Traurig LLP consumer-advocacy group, will review the global development and progress of CLEAR Ad Notice, the emergence FacILITaTeD neTWorkInG The commercial sector—and to some extent the federal government—has moved toward a shared services of DNT, and where these intersect with the need for Privacy by Design. model, in which multiple business functions are centralized into a single global center. Learn what privacy Networking Session: 5-Minute Mixer and data security issues are associated with the use of these centers, particularly when they are outsourced Moving Toward Privacy by Design: The Microsoft Experience Facilitator: Chris Zoladz, CIPP, CIPP/G, Founder, Navigate LLC in countries with no data protection laws or laws that differ from the “host” country. David Bowermaster, Senior Cloud Privacy Strategist, Microsoft Corporation, Javier Salido, CIPP, CIPP/IT, Senior Don’t know anyone at the conference? Looking to network? Share your professional background Program Manager, Trustworthy Computing Group, Microsoft Corporation and discover connections with other Academy attendees and privacy leaders in fast, fun five-minute New Data Protection Laws and Case Law Trends in South America Get a “behind the scenes” look at Microsoft’s internal privacy process, which is responsible for ensuring that one-on-one meetings. Cedric Laurant, Cedric Laurant Consulting, Renato Opice Blum, Attorney, Opice Blum Advogados Associados privacy needs are taken into account throughout the product development process and into the management of Networking Session: To Track or Do Not Track? Browser Controls, Self Regulatory Programs Join this topical discussion of the most recent privacy developments in Latin American countries, including personal information within the company. new legislation in Brazil and Colombia, Uruguay’s expected “adequate protection” approval of its recent or New Laws privacy law from European authorities, and how upcoming EU legislation could have important consequences A Roadmap to Move up the Privacy Maturity Curve Jules Polonetsky, CIPP, Co-Chair and Director, Future of Privacy Forum Nancy Cohen, CIPP, Senior Technical Manager, Quality Control, American Institute of Certified Public Accountants, for the development and implementation of online behavioral advertising in South America. Networking Session: Study Tips and Advice from Certified Professionals—Your Burning Privacy Marilyn Prosch, CIPP, Associate Professor, Arizona State University Questions Answered! LaW anD PoLIcy Measuring and monitoring privacy compliance requires the establishment of effective monitoring procedures and Facilitated by CIPP-certified professionals a baseline against which to assess performance. Learn how the Privacy Maturity Model can provide an effective Ethical Privacy You’ve read tons of reference material, you’ve been to training, and you’ve even attended some great Edward McNicholas, Partner, Sidley Austin LLP tool to assess privacy compliance and progress against recognized benchmark data. conference sessions, but still you have burning questions about privacy. We have experienced privacy Join this session for an overview of practical legal ethics issues that confront privacy professionals and cLoUD coMPUTInG professionals ready to help you put out that fire! Talk to IAPP instructors about privacy-related topics discussion of a possible approach to a code of ethics for all professionals in the privacy field. that are important to you. Cloud Computing Compliance: The What, Who and Where How to Avoid Becoming a Privacy Class Action or FTC Enforcement Target Christopher Millard, Professor, Bristows, London Networking Session: Minimize Boredom, Maximize Your Member Experience D. Reed Freeman, Jr., CIPP, Partner, Morrison & Foerster LLP, Jim Halpert, Partner, Communications, Join this informative session to learn the key compliance issues for users and providers of cloud services, Facilitated by the IAPP Membership Department e-Commerce and Privacy Practice, DLA Piper US LLP including the implications of anonymization, encryption and fragmentation of data in cloud environments, and the IAPP staff members will give you the inside scoop on the many ways that you can become more Join this session to identify the FTC enforcement priorities from among the agency’s laundry list of best local law impact of geographical arrangements—such as the “long-arm” reach of the EU Directive. involved with your professional association. Learn about volunteer career development opportunities practices and learn how to handle a subpoena or other initial FTC inquiry. Discover the privacy practices that in this casual networking session, where you’ll also have an opportunity to provide feedback on how give rise to significant class action risk, and discuss strategies to become a much harder target against the Joint Data Controllership: A Silver Bullet for Cloud Computing Privacy Issues? the IAPP can better serve you. threat of a class action lawsuit. Jan Geert Meents, Partner, Chair, DLA Piper IP & Technology Practice, Germany Networking Session: Your Company and the Cloud Cloud computing has raised significant privacy objections in the EU, making the use of cloud solutions by How Will the Safe Harbors in Pending Privacy Legislation Work? Facilitator: Tanya Forsheit, CIPP, Founding Partner, InfoLawGroup LLP multinational companies problematic. Explore how joint data controller arrangements can provide a breakthrough Marty Abrams, Senior Policy Advisor, Hunton & Williams LLP, Jennifer Barrett, CIPP, Global Privacy and Public Facilitator: Christine Lyon, Partner, Morrison & Foerster LLP for the privacy dilemma of modern cloud computing. Policy Executive Privacy Leader, Acxiom Corporation, Scott Taylor, CIPP, Vice President and Chief Privacy It’s your turn to join the discussion! Bring your questions, concerns and insights for a lively Officer, Hewlett-Packard Company, María Elena Pérez-Jaén Zermeño, Commissioner for Access to Public Obscured by Clouds: Privacy Audit in the Cloud discussion about managing privacy in the cloud, including due diligence and selection of providers, Information and Data Protection of the Institute for Access to Public Information of the Federal District, Mexico Doron Rotman, CIPP, National Privacy Service Leader, KPMG LLP (US) data back-up, encryption options, contractual protections (or lack thereof), cross-border transfers in The Obama administration has proposed federal legislation that would encourage industry codes of conduct Learn how to identify the impact of the move to cloud computing on an organization’s ability to undergo a the cloud environment, audit and third-party certification, and other topics of interest from the day’s that would be safe harbors. Suggested legislation on the hill would also contain safe harbors. Find out how privacy audit, and the considerations that should be taken into account in the selection, contracting and ongoing cloud computing sessions. these would work and formulate a plan for putting safe harbors into effect. management of cloud service providers. vISIT www.P r I vA cyASSOc IATION. O rg/A c A demy TO regISTer ANd fO r uP - TO-dATe INf O rmATION PrI vA cy AcA demy 2011 PrO grA m September 14 – 16 • t he Fairmont h otel • DallaS , t X c ONfereN ce SeSSIONS

Litigation: There’s an App for That! Securing Data in the Cloud Sherry Ramsey, CIPP, AVP - Public Policy, AT&T Inc., Alan Raul, Partner, Sidley Austin LLP Kenneth E. Stavinoha, CIPP, Solutions Architect, Cisco Systems, Inc. “App privacy” is a cutting edge legal issue that has garnered acute attention from congress, privacy advocates, the Explore the challenges of securing data in the cloud and the role of encryption as a tool. Hear the results of FTC and plaintiffs lawyers. Explore the complaints and investigations that have been leveled to date against “apps” extensive research into the critical factors that influence the adoption of encryption to secure data in the cloud. that collect, share, store, use or compromise user IDs, unique device identifiers, personal information or location Taming the Cloud: Contracting for a Cloud that Actually Works data without (alleged) adequate disclosure and consent from the app users. Leave with best “app” practices to Benjamin Hayes, CIPP, CIPP/C, CIPP/G, CIPP/IT, Americas Data Privacy Compliance Lead, Accenture, avoid the legal cross-hairs of the privacy enforcers in the first place. David Navetta, CIPP, Founding Partner, Information Law Group Never Enter Your Real Data! How can we “solve” the difficult application of privacy laws to the cloud? Discover a successful new Rocco Panetta, Partner, Panetta & Associati approach to negotiating cloud contracts that attempts to re-allocate applicable privacy and security Take a focused look at the issues arising out of the data flows around the world and relevant legal consequences, requirements between data owner, cloud provider and system integrator. onLIne PrIVacy especially with respect to the principle of jurisdiction, establishment and relevant applicable laws and regulations. Utilization of Cloud-Based Enterprise Solutions: Google’s Business Perspective of Privacy Challenges Monitoring and Preserving Data on Social Media Sites Will There Be a “Privacy Bill of Rights” and If So, What Will It Mean? and Solutions Erik Laykin, Managing Director, Duff & Phelps Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jules Polonetsky, CIPP, Marc Crandall, CIPP, Product Counsel, Google Inc. What options are available for the defensible and forensic preservation of social media data and usage? Co-Chairman and Director, Future of Privacy Forum, Christopher Wolf, Co-Chair Privacy and Data Security Practice What are the regulatory obligations and privacy impacts of cloud computing? What are the options Gain practical guidance while getting a hands-on, visual review of the tools and technologies available for the Group, Hogan Lovells US LLP regarding international conflicts of law? Take part in this session and gain the tools you need to identify real-time monitoring and preservation of electronic data contained on social media sites. Examine the proposal for a Privacy Bill of Rights, intended to implement Fair Information Practice Principles privacy risks in moving data to the cloud. through codes of conduct enforced by the FTC. Explore the details of the proposal as well as the political prospects Online Privacy: Who’s Watching the Kids? for passage in the near term. InForMaTIon SecUrITy Moderator: Nuala O’Connor Kelly, CIPP, CIPP/G, Senior Counsel, Information Governance & Chief Privacy Changing the Culture of Low Tech Information Security: Critical Policy Elements and Compliance Strategies Leader, General Electric FInancIaL SerVIceS Robert Johnson, Executive Director, National Association for Information Destruction Parry Aftab, Executive Director, WiredSafety, Michelle Dennedy, Founder & CEO, iDennedy Project, Lydia The Designated Transfer Date under Dodd-Frank Has Come and Gone: What Does It Mean for Financial Privacy? How can you implement a program to ensure compliance and avoid the embarrassment of a costly Parnes, Partner, Wilson Sonsini Goodrich & Rosati (A two-part session) “low tech” security breach? Explore the existing culture of low tech privacy concerns (the disposal of What do our kids really think about online privacy and what are they doing online? Join this lively session for H. Leigh Feldman, Senior Vice President, Compliance Program Executive, Bank of America, L. Richard Fischer, confidential material) and discuss how to shift the current thinking to make the subject more of a security a discussion of the practical, legal and policy implications of online privacy as applied to children and teens, Partner, Morrison & Foerster LLP, Lynn A. Goldstein, CIPP, Senior Vice President & Chief Privacy Officer, JP issue and less a price-driven commodity. and take away practical strategies and advice on talking to our kids about staying safe online. Morgan Chase Bank, N.A., Russell Schrader, Chief Privacy Officer and Global Enterprise Risk Counsel, Visa Inc. The CPO and the CSO: Building Bridges to Improve Both Privacy and Security The Self-Regulatory Principles for Online Behavioral Advertising: A How-to Compliance Workshop Examine the developments on the regulatory implications of the Consumer Financial Protection Bureau over the Martin Carmichael, Chief Security Officer, TD Ameritrade Holding Corporation, David Hale, CIPP, Chief Genie Barton, Director, Online Interest-Based Advertising Accountability, Council of Better Business Bureaus, last nine months, with a focus on those sections of the Dodd-Frank Act with privacy implications. What have been Privacy Officer, TD Ameritrade Holding Corporation Xenia Boone, Senior Vice President Corporate and Social Responsibility, Direct Marketing Association, Scott the ramifications of the transfers of authority called for by the act? Is it too soon to tell, or are there clear trends The close relationship between privacy and security can lead to conflict—or to synergies and Meyer, CEO, Evidon developing on these and other issues important to financial privacy? complementary roles. Find out how you can build a relationship between the privacy office and the security Gain a clear understanding of the requirements of the Self-Regulatory Principles, including who must Hot Button Privacy Issues in Payments and Financial Services structure that can greatly facilitate both jobs. implement them, how to implement them, and what to expect from the Council of Better Business Bureaus Erin Fonte, CIPP, Shareholder, Cox Smith Matthews Incorporated and the Direct Marketing Association, the groups that provide accountability for the Self-Regulatory Program. The New World of Cyber Risk: Advanced Persistent Threats Get the latest updates on the hottest topics in the world of payments and financial services, including discussion of Alan Brill, CIPP, Senior Managing Director, Secure Information Services, Kroll HeaLTHcare secure encrypted e-mail at financial institutions, suggested best practices for social media activities, and unique Examine Advanced Persistent Threats (APTs), a new and far more dangerous type of cyber attack, to learn A Health Privacy Segmentation of the American Public and EHR Users: Results of a National Survey mobile transaction and marketing issues. how they work, how they target PII and PHI—among other targets—and the importance of evolving from Alan Westin, Professor Emeritus, Columbia University MobILe coMPUTInG/LocaTIon-baSeD SerVIceS perimeter defense to a more comprehensive doctrine of defense-in-depth. Learn the results of a national survey being conducted to measure levels of trust and its benefits in U.S. EHR Avoiding the Mobile App Traps Who Am I? Understanding Multi-Factor Authentication in Online Environments systems. The survey applied a set of Health Privacy Intensity Measures developed by Dr. Alan Westin, who will Mark W. Brennan, Associate, Hogan Lovells US LLP, Devin Crock, Counsel, Sprint Nextel, Matthew Gerst, Counsel, Christopher T. Pierson, CIPP, CIPP/G, Chief Privacy Officer and Senior Vice President, Citizens Financial report and describe the sources of high, medium and low health privacy intensity for four U.S. patient populations. External & State Affairs, CTIA—The Wireless Association® Group, Inc., James Shreve, CIPP, Associate Specialist, Buckley Sandler LLP Medical Software and Its Regulation: HHS, FDA and the Rules “You snooze, you lose” in the mobile app ecosystem. But, “haste makes waste” when it comes to data privacy and Take part in a lively discussion of the emergence outside the banking sector of dual-factor and tri-factor Peter McLaughlin, CIPP, Senior Counsel, Foley & Lardner LLP security. What’s a business to do? Find out how to address privacy and security issues associated with mobile authentication, how these technologies work, and how to perform a risk-based assessment to determine The HITECH Act directed HHS and the FTC to prescribe rules for electronic health records, systems that are apps and still remain competitive by identifying the key traps. the type of security one might offer. made up of software and can collect patient data from numerous sources. Explore the impact of the FDA’s Choice on the Grid: Geolocation Technologies and Privacy DaTa breacH recently issued rules concerning medical device data systems and other software tools for developers and David Keating, Attorney, Alston & Bird LLP, Mikko Niva, CIPP/E, Global Privacy Counsel, Nokia, Rod Witmond, SVP, healthcare providers. Building a Records Retention Policy Aligned with Privacy Objectives Product Management & Marketing, Cardlytics Richard L. Johnson, Manager, Global Information Compliance, John Deere & Company, Marty Provin, CIPP, Top 10 New Lessons in Healthcare Privacy Investigate global data protection standards—from a U.S. perspective—for geolocation technologies on mobile EVP Business Development Group, Jordan Lawrence Kirk Nahra, CIPP, Partner, Wiley Rein LLP devices and apply those standards to advertising driven by location-based personalization. Examine the difficult In several recent high-profile data breaches, the compromised data was old and outdated. This fact Join in a review of the latest developments in the world of healthcare privacy and identify the key new balance between large market valuations attached to location-based advertising businesses, and data protection. underscores the importance of having a consistently executed retention policy as part of a company’s takeaways for healthcare companies and their business partners. Explore enforcement developments, new Privacy by Design in the Mobile App Ecosystem: Thinking Global, Acting Local overall data security and privacy strategy. Learn how to take a more intelligent, comprehensive approach regulations, the latest in risk areas and the key topics for controversy involving healthcare privacy issues. Ken Anderson, Assistant Commissioner of Privacy, Information and Privacy Commissioner of Ontario, Frank to information management and retention that approaches privacy and information governance as a GLobaL Dawson, CIPP/IT, Head of Consumer Data & Privacy Program, Nokia, Ed Schmit, Director, AT&T Developer single initiative. Program, AT&T Inc., Patrick Walshe, Director of Privacy, GSMA Certifying for the Safe Harbor: The Practical Aspects Data Breach—Help Your Company Avoid Being a Victim of Compromise Kimberly A. Bubnes, CIPP, Global Privacy Director, General Motors Corporation, Robert L. Rothman, Principal, The convergence of mobile and the web has created a vibrant and dynamic mobile ecosystem that is dramatically Charles Kallenbach, General Counsel, Heartland Payment Systems, Doug Meal, Ropes & Gray, Erin Nealy Privacy Associates International LLC changing our world for the better. Learn about leading industry approaches to addressing the challenges and Cox, Executive Managing Director and Deputy General Counsel, Stroz Friedberg LLC creating meaningful privacy experiences for mobile users. Roll up your sleeves and dive into the practical aspects of how to certify a class of data for Safe Harbor. Learn Lots of influential companies have learned the hard way about being the victim of a data breach, even the scope of Safe Harbor certification and how to create a Safe Harbor team using internal certification trees. though they may have complied with regulations and standards. Join this session to learn from those who oPeraTIonaL PrIVacy have survived a breach how you can use the tools and techniques of corporate compliance to be prepared. Mexico’s New Data Protection Law: Policy and Compliance Employees, Smart Phones and Social Media: Best Practices for Mobile Computing and Social Media Policies Jonathan D. Avila, CIPP, Vice President, Counsel, Chief Privacy Officer, The Walt Disney Company, Rosa Maria John Heitmann, CIPP, Partner, Kelley Drye & Warren, LLP Data Breach Resolution: Preparing for a Data Breach and How to Respond to It Moderator: Tony Hadley, Sr. V.P. of Government Affairs & Public Policy, Experian Franco, Attorney, Basham, Ringe Y Correa, S.C., Jacqueline Peschard Mariscal, President Commissioner, Join in a discussion exploring the best ways to create mobile computing and social media policies designed to Tom Bowers, Managing Director, Security Constructs LLC, Patricia Wagner, Member of the Firm, Federal Institute for Access to Information and Data Protection, Harry A. Valetk, CIPP, Corporate Privacy effectively address practical and legal concerns raised by the use of personal mobile devices and social media for EpsteinBeckerGreen Director, MetLife business purposes. Join this session for an overview of the policy choices that Mexico has made in adopting comprehensive data What tools do you need to prepare for a data breach and what are the best practices? How did the breach Enhanced Notice and Control protection legislation and discuss the practical challenges for business in implementing the law. happen and where did the data go? Join this lively session to learn how to build a forensics case once a Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jane Horvath, CIPP, CIPP/G, breach happens. Migrating to a Global Shared Services Center? Consider the Issues Global Privacy Counsel, Google Inc., Shane Wiley, CIPP, Sr. Director, Privacy & Data Governance, Yahoo! Inc. Jon Olefson, Vice President and General Counsel (Europe), Cognizant Technology Solutions, Heidi Salow, Experts from two of the largest global Internet companies and the Center for Democracy and Technology, a neutral CIPP, Shareholder, Greenberg Traurig LLP consumer-advocacy group, will review the global development and progress of CLEAR Ad Notice, the emergence FacILITaTeD neTWorkInG The commercial sector—and to some extent the federal government—has moved toward a shared services of DNT, and where these intersect with the need for Privacy by Design. model, in which multiple business functions are centralized into a single global center. Learn what privacy Networking Session: 5-Minute Mixer and data security issues are associated with the use of these centers, particularly when they are outsourced Moving Toward Privacy by Design: The Microsoft Experience Facilitator: Chris Zoladz, CIPP, CIPP/G, Founder, Navigate LLC in countries with no data protection laws or laws that differ from the “host” country. David Bowermaster, Senior Cloud Privacy Strategist, Microsoft Corporation, Javier Salido, CIPP, CIPP/IT, Senior Don’t know anyone at the conference? Looking to network? Share your professional background Program Manager, Trustworthy Computing Group, Microsoft Corporation and discover connections with other Academy attendees and privacy leaders in fast, fun five-minute New Data Protection Laws and Case Law Trends in South America Get a “behind the scenes” look at Microsoft’s internal privacy process, which is responsible for ensuring that one-on-one meetings. Cedric Laurant, Cedric Laurant Consulting, Renato Opice Blum, Attorney, Opice Blum Advogados Associados privacy needs are taken into account throughout the product development process and into the management of Networking Session: To Track or Do Not Track? Browser Controls, Self Regulatory Programs Join this topical discussion of the most recent privacy developments in Latin American countries, including personal information within the company. new legislation in Brazil and Colombia, Uruguay’s expected “adequate protection” approval of its recent or New Laws privacy law from European authorities, and how upcoming EU legislation could have important consequences A Roadmap to Move up the Privacy Maturity Curve Jules Polonetsky, CIPP, Co-Chair and Director, Future of Privacy Forum Nancy Cohen, CIPP, Senior Technical Manager, Quality Control, American Institute of Certified Public Accountants, for the development and implementation of online behavioral advertising in South America. Networking Session: Study Tips and Advice from Certified Professionals—Your Burning Privacy Marilyn Prosch, CIPP, Associate Professor, Arizona State University Questions Answered! LaW anD PoLIcy Measuring and monitoring privacy compliance requires the establishment of effective monitoring procedures and Facilitated by CIPP-certified professionals a baseline against which to assess performance. Learn how the Privacy Maturity Model can provide an effective Ethical Privacy You’ve read tons of reference material, you’ve been to training, and you’ve even attended some great Edward McNicholas, Partner, Sidley Austin LLP tool to assess privacy compliance and progress against recognized benchmark data. conference sessions, but still you have burning questions about privacy. We have experienced privacy Join this session for an overview of practical legal ethics issues that confront privacy professionals and cLoUD coMPUTInG professionals ready to help you put out that fire! Talk to IAPP instructors about privacy-related topics discussion of a possible approach to a code of ethics for all professionals in the privacy field. that are important to you. Cloud Computing Compliance: The What, Who and Where How to Avoid Becoming a Privacy Class Action or FTC Enforcement Target Christopher Millard, Professor, Bristows, London Networking Session: Minimize Boredom, Maximize Your Member Experience D. Reed Freeman, Jr., CIPP, Partner, Morrison & Foerster LLP, Jim Halpert, Partner, Communications, Join this informative session to learn the key compliance issues for users and providers of cloud services, Facilitated by the IAPP Membership Department e-Commerce and Privacy Practice, DLA Piper US LLP including the implications of anonymization, encryption and fragmentation of data in cloud environments, and the IAPP staff members will give you the inside scoop on the many ways that you can become more Join this session to identify the FTC enforcement priorities from among the agency’s laundry list of best local law impact of geographical arrangements—such as the “long-arm” reach of the EU Directive. involved with your professional association. Learn about volunteer career development opportunities practices and learn how to handle a subpoena or other initial FTC inquiry. Discover the privacy practices that in this casual networking session, where you’ll also have an opportunity to provide feedback on how give rise to significant class action risk, and discuss strategies to become a much harder target against the Joint Data Controllership: A Silver Bullet for Cloud Computing Privacy Issues? the IAPP can better serve you. threat of a class action lawsuit. Jan Geert Meents, Partner, Chair, DLA Piper IP & Technology Practice, Germany Networking Session: Your Company and the Cloud Cloud computing has raised significant privacy objections in the EU, making the use of cloud solutions by How Will the Safe Harbors in Pending Privacy Legislation Work? Facilitator: Tanya Forsheit, CIPP, Founding Partner, InfoLawGroup LLP multinational companies problematic. Explore how joint data controller arrangements can provide a breakthrough Marty Abrams, Senior Policy Advisor, Hunton & Williams LLP, Jennifer Barrett, CIPP, Global Privacy and Public Facilitator: Christine Lyon, Partner, Morrison & Foerster LLP for the privacy dilemma of modern cloud computing. Policy Executive Privacy Leader, Acxiom Corporation, Scott Taylor, CIPP, Vice President and Chief Privacy It’s your turn to join the discussion! Bring your questions, concerns and insights for a lively Officer, Hewlett-Packard Company, María Elena Pérez-Jaén Zermeño, Commissioner for Access to Public Obscured by Clouds: Privacy Audit in the Cloud discussion about managing privacy in the cloud, including due diligence and selection of providers, Information and Data Protection of the Institute for Access to Public Information of the Federal District, Mexico Doron Rotman, CIPP, National Privacy Service Leader, KPMG LLP (US) data back-up, encryption options, contractual protections (or lack thereof), cross-border transfers in The Obama administration has proposed federal legislation that would encourage industry codes of conduct Learn how to identify the impact of the move to cloud computing on an organization’s ability to undergo a the cloud environment, audit and third-party certification, and other topics of interest from the day’s that would be safe harbors. Suggested legislation on the hill would also contain safe harbors. Find out how privacy audit, and the considerations that should be taken into account in the selection, contracting and ongoing cloud computing sessions. these would work and formulate a plan for putting safe harbors into effect. management of cloud service providers. vISIT www.P r I vA cyASSOc IATION. O rg/A c A demy TO regISTer ANd fO r uP - TO-dATe INf O rmATION PrI vA cy AcA demy 2011 PrO grA m September 14 – 16 • t he Fairmont h otel • DallaS , t X c ONfereN ce SeSSIONS

Litigation: There’s an App for That! Securing Data in the Cloud Sherry Ramsey, CIPP, AVP - Public Policy, AT&T Inc., Alan Raul, Partner, Sidley Austin LLP Kenneth E. Stavinoha, CIPP, Solutions Architect, Cisco Systems, Inc. “App privacy” is a cutting edge legal issue that has garnered acute attention from congress, privacy advocates, the Explore the challenges of securing data in the cloud and the role of encryption as a tool. Hear the results of FTC and plaintiffs lawyers. Explore the complaints and investigations that have been leveled to date against “apps” extensive research into the critical factors that influence the adoption of encryption to secure data in the cloud. that collect, share, store, use or compromise user IDs, unique device identifiers, personal information or location Taming the Cloud: Contracting for a Cloud that Actually Works data without (alleged) adequate disclosure and consent from the app users. Leave with best “app” practices to Benjamin Hayes, CIPP, CIPP/C, CIPP/G, CIPP/IT, Americas Data Privacy Compliance Lead, Accenture, avoid the legal cross-hairs of the privacy enforcers in the first place. David Navetta, CIPP, Founding Partner, Information Law Group Never Enter Your Real Data! How can we “solve” the difficult application of privacy laws to the cloud? Discover a successful new Rocco Panetta, Partner, Panetta & Associati approach to negotiating cloud contracts that attempts to re-allocate applicable privacy and security Take a focused look at the issues arising out of the data flows around the world and relevant legal consequences, requirements between data owner, cloud provider and system integrator. onLIne PrIVacy especially with respect to the principle of jurisdiction, establishment and relevant applicable laws and regulations. Utilization of Cloud-Based Enterprise Solutions: Google’s Business Perspective of Privacy Challenges Monitoring and Preserving Data on Social Media Sites Will There Be a “Privacy Bill of Rights” and If So, What Will It Mean? and Solutions Erik Laykin, Managing Director, Duff & Phelps Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jules Polonetsky, CIPP, Marc Crandall, CIPP, Product Counsel, Google Inc. What options are available for the defensible and forensic preservation of social media data and usage? Co-Chairman and Director, Future of Privacy Forum, Christopher Wolf, Co-Chair Privacy and Data Security Practice What are the regulatory obligations and privacy impacts of cloud computing? What are the options Gain practical guidance while getting a hands-on, visual review of the tools and technologies available for the Group, Hogan Lovells US LLP regarding international conflicts of law? Take part in this session and gain the tools you need to identify real-time monitoring and preservation of electronic data contained on social media sites. Examine the proposal for a Privacy Bill of Rights, intended to implement Fair Information Practice Principles privacy risks in moving data to the cloud. through codes of conduct enforced by the FTC. Explore the details of the proposal as well as the political prospects Online Privacy: Who’s Watching the Kids? for passage in the near term. InForMaTIon SecUrITy Moderator: Nuala O’Connor Kelly, CIPP, CIPP/G, Senior Counsel, Information Governance & Chief Privacy Changing the Culture of Low Tech Information Security: Critical Policy Elements and Compliance Strategies Leader, General Electric FInancIaL SerVIceS Robert Johnson, Executive Director, National Association for Information Destruction Parry Aftab, Executive Director, WiredSafety, Michelle Dennedy, Founder & CEO, iDennedy Project, Lydia The Designated Transfer Date under Dodd-Frank Has Come and Gone: What Does It Mean for Financial Privacy? How can you implement a program to ensure compliance and avoid the embarrassment of a costly Parnes, Partner, Wilson Sonsini Goodrich & Rosati (A two-part session) “low tech” security breach? Explore the existing culture of low tech privacy concerns (the disposal of What do our kids really think about online privacy and what are they doing online? Join this lively session for H. Leigh Feldman, Senior Vice President, Compliance Program Executive, Bank of America, L. Richard Fischer, confidential material) and discuss how to shift the current thinking to make the subject more of a security a discussion of the practical, legal and policy implications of online privacy as applied to children and teens, Partner, Morrison & Foerster LLP, Lynn A. Goldstein, CIPP, Senior Vice President & Chief Privacy Officer, JP issue and less a price-driven commodity. and take away practical strategies and advice on talking to our kids about staying safe online. Morgan Chase Bank, N.A., Russell Schrader, Chief Privacy Officer and Global Enterprise Risk Counsel, Visa Inc. The CPO and the CSO: Building Bridges to Improve Both Privacy and Security The Self-Regulatory Principles for Online Behavioral Advertising: A How-to Compliance Workshop Examine the developments on the regulatory implications of the Consumer Financial Protection Bureau over the Martin Carmichael, Chief Security Officer, TD Ameritrade Holding Corporation, David Hale, CIPP, Chief Genie Barton, Director, Online Interest-Based Advertising Accountability, Council of Better Business Bureaus, last nine months, with a focus on those sections of the Dodd-Frank Act with privacy implications. What have been Privacy Officer, TD Ameritrade Holding Corporation Xenia Boone, Senior Vice President Corporate and Social Responsibility, Direct Marketing Association, Scott the ramifications of the transfers of authority called for by the act? Is it too soon to tell, or are there clear trends The close relationship between privacy and security can lead to conflict—or to synergies and Meyer, CEO, Evidon developing on these and other issues important to financial privacy? complementary roles. Find out how you can build a relationship between the privacy office and the security Gain a clear understanding of the requirements of the Self-Regulatory Principles, including who must Hot Button Privacy Issues in Payments and Financial Services structure that can greatly facilitate both jobs. implement them, how to implement them, and what to expect from the Council of Better Business Bureaus Erin Fonte, CIPP, Shareholder, Cox Smith Matthews Incorporated and the Direct Marketing Association, the groups that provide accountability for the Self-Regulatory Program. The New World of Cyber Risk: Advanced Persistent Threats Get the latest updates on the hottest topics in the world of payments and financial services, including discussion of Alan Brill, CIPP, Senior Managing Director, Secure Information Services, Kroll HeaLTHcare secure encrypted e-mail at financial institutions, suggested best practices for social media activities, and unique Examine Advanced Persistent Threats (APTs), a new and far more dangerous type of cyber attack, to learn A Health Privacy Segmentation of the American Public and EHR Users: Results of a National Survey mobile transaction and marketing issues. how they work, how they target PII and PHI—among other targets—and the importance of evolving from Alan Westin, Professor Emeritus, Columbia University MobILe coMPUTInG/LocaTIon-baSeD SerVIceS perimeter defense to a more comprehensive doctrine of defense-in-depth. Learn the results of a national survey being conducted to measure levels of trust and its benefits in U.S. EHR Avoiding the Mobile App Traps Who Am I? Understanding Multi-Factor Authentication in Online Environments systems. The survey applied a set of Health Privacy Intensity Measures developed by Dr. Alan Westin, who will Mark W. Brennan, Associate, Hogan Lovells US LLP, Devin Crock, Counsel, Sprint Nextel, Matthew Gerst, Counsel, Christopher T. Pierson, CIPP, CIPP/G, Chief Privacy Officer and Senior Vice President, Citizens Financial report and describe the sources of high, medium and low health privacy intensity for four U.S. patient populations. External & State Affairs, CTIA—The Wireless Association® Group, Inc., James Shreve, CIPP, Associate Specialist, Buckley Sandler LLP Medical Software and Its Regulation: HHS, FDA and the Rules “You snooze, you lose” in the mobile app ecosystem. But, “haste makes waste” when it comes to data privacy and Take part in a lively discussion of the emergence outside the banking sector of dual-factor and tri-factor Peter McLaughlin, CIPP, Senior Counsel, Foley & Lardner LLP security. What’s a business to do? Find out how to address privacy and security issues associated with mobile authentication, how these technologies work, and how to perform a risk-based assessment to determine The HITECH Act directed HHS and the FTC to prescribe rules for electronic health records, systems that are apps and still remain competitive by identifying the key traps. the type of security one might offer. made up of software and can collect patient data from numerous sources. Explore the impact of the FDA’s Choice on the Grid: Geolocation Technologies and Privacy DaTa breacH recently issued rules concerning medical device data systems and other software tools for developers and David Keating, Attorney, Alston & Bird LLP, Mikko Niva, CIPP/E, Global Privacy Counsel, Nokia, Rod Witmond, SVP, healthcare providers. Building a Records Retention Policy Aligned with Privacy Objectives Product Management & Marketing, Cardlytics Richard L. Johnson, Manager, Global Information Compliance, John Deere & Company, Marty Provin, CIPP, Top 10 New Lessons in Healthcare Privacy Investigate global data protection standards—from a U.S. perspective—for geolocation technologies on mobile EVP Business Development Group, Jordan Lawrence Kirk Nahra, CIPP, Partner, Wiley Rein LLP devices and apply those standards to advertising driven by location-based personalization. Examine the difficult In several recent high-profile data breaches, the compromised data was old and outdated. This fact Join in a review of the latest developments in the world of healthcare privacy and identify the key new balance between large market valuations attached to location-based advertising businesses, and data protection. underscores the importance of having a consistently executed retention policy as part of a company’s takeaways for healthcare companies and their business partners. Explore enforcement developments, new Privacy by Design in the Mobile App Ecosystem: Thinking Global, Acting Local overall data security and privacy strategy. Learn how to take a more intelligent, comprehensive approach regulations, the latest in risk areas and the key topics for controversy involving healthcare privacy issues. Ken Anderson, Assistant Commissioner of Privacy, Information and Privacy Commissioner of Ontario, Frank to information management and retention that approaches privacy and information governance as a GLobaL Dawson, CIPP/IT, Head of Consumer Data & Privacy Program, Nokia, Ed Schmit, Director, AT&T Developer single initiative. Program, AT&T Inc., Patrick Walshe, Director of Privacy, GSMA Certifying for the Safe Harbor: The Practical Aspects Data Breach—Help Your Company Avoid Being a Victim of Compromise Kimberly A. Bubnes, CIPP, Global Privacy Director, General Motors Corporation, Robert L. Rothman, Principal, The convergence of mobile and the web has created a vibrant and dynamic mobile ecosystem that is dramatically Charles Kallenbach, General Counsel, Heartland Payment Systems, Doug Meal, Ropes & Gray, Erin Nealy Privacy Associates International LLC changing our world for the better. Learn about leading industry approaches to addressing the challenges and Cox, Executive Managing Director and Deputy General Counsel, Stroz Friedberg LLC creating meaningful privacy experiences for mobile users. Roll up your sleeves and dive into the practical aspects of how to certify a class of data for Safe Harbor. Learn Lots of influential companies have learned the hard way about being the victim of a data breach, even the scope of Safe Harbor certification and how to create a Safe Harbor team using internal certification trees. though they may have complied with regulations and standards. Join this session to learn from those who oPeraTIonaL PrIVacy have survived a breach how you can use the tools and techniques of corporate compliance to be prepared. Mexico’s New Data Protection Law: Policy and Compliance Employees, Smart Phones and Social Media: Best Practices for Mobile Computing and Social Media Policies Jonathan D. Avila, CIPP, Vice President, Counsel, Chief Privacy Officer, The Walt Disney Company, Rosa Maria John Heitmann, CIPP, Partner, Kelley Drye & Warren, LLP Data Breach Resolution: Preparing for a Data Breach and How to Respond to It Moderator: Tony Hadley, Sr. V.P. of Government Affairs & Public Policy, Experian Franco, Attorney, Basham, Ringe Y Correa, S.C., Jacqueline Peschard Mariscal, President Commissioner, Join in a discussion exploring the best ways to create mobile computing and social media policies designed to Tom Bowers, Managing Director, Security Constructs LLC, Patricia Wagner, Member of the Firm, Federal Institute for Access to Information and Data Protection, Harry A. Valetk, CIPP, Corporate Privacy effectively address practical and legal concerns raised by the use of personal mobile devices and social media for EpsteinBeckerGreen Director, MetLife business purposes. Join this session for an overview of the policy choices that Mexico has made in adopting comprehensive data What tools do you need to prepare for a data breach and what are the best practices? How did the breach Enhanced Notice and Control protection legislation and discuss the practical challenges for business in implementing the law. happen and where did the data go? Join this lively session to learn how to build a forensics case once a Justin Brookman, Director, Consumer Privacy, Center for Democracy & Technology, Jane Horvath, CIPP, CIPP/G, breach happens. Migrating to a Global Shared Services Center? Consider the Issues Global Privacy Counsel, Google Inc., Shane Wiley, CIPP, Sr. Director, Privacy & Data Governance, Yahoo! Inc. Jon Olefson, Vice President and General Counsel (Europe), Cognizant Technology Solutions, Heidi Salow, Experts from two of the largest global Internet companies and the Center for Democracy and Technology, a neutral CIPP, Shareholder, Greenberg Traurig LLP consumer-advocacy group, will review the global development and progress of CLEAR Ad Notice, the emergence FacILITaTeD neTWorkInG The commercial sector—and to some extent the federal government—has moved toward a shared services of DNT, and where these intersect with the need for Privacy by Design. model, in which multiple business functions are centralized into a single global center. Learn what privacy Networking Session: 5-Minute Mixer and data security issues are associated with the use of these centers, particularly when they are outsourced Moving Toward Privacy by Design: The Microsoft Experience Facilitator: Chris Zoladz, CIPP, CIPP/G, Founder, Navigate LLC in countries with no data protection laws or laws that differ from the “host” country. David Bowermaster, Senior Cloud Privacy Strategist, Microsoft Corporation, Javier Salido, CIPP, CIPP/IT, Senior Don’t know anyone at the conference? Looking to network? Share your professional background Program Manager, Trustworthy Computing Group, Microsoft Corporation and discover connections with other Academy attendees and privacy leaders in fast, fun five-minute New Data Protection Laws and Case Law Trends in South America Get a “behind the scenes” look at Microsoft’s internal privacy process, which is responsible for ensuring that one-on-one meetings. Cedric Laurant, Cedric Laurant Consulting, Renato Opice Blum, Attorney, Opice Blum Advogados Associados privacy needs are taken into account throughout the product development process and into the management of Networking Session: To Track or Do Not Track? Browser Controls, Self Regulatory Programs Join this topical discussion of the most recent privacy developments in Latin American countries, including personal information within the company. new legislation in Brazil and Colombia, Uruguay’s expected “adequate protection” approval of its recent or New Laws privacy law from European authorities, and how upcoming EU legislation could have important consequences A Roadmap to Move up the Privacy Maturity Curve Jules Polonetsky, CIPP, Co-Chair and Director, Future of Privacy Forum Nancy Cohen, CIPP, Senior Technical Manager, Quality Control, American Institute of Certified Public Accountants, for the development and implementation of online behavioral advertising in South America. Networking Session: Study Tips and Advice from Certified Professionals—Your Burning Privacy Marilyn Prosch, CIPP, Associate Professor, Arizona State University Questions Answered! LaW anD PoLIcy Measuring and monitoring privacy compliance requires the establishment of effective monitoring procedures and Facilitated by CIPP-certified professionals a baseline against which to assess performance. Learn how the Privacy Maturity Model can provide an effective Ethical Privacy You’ve read tons of reference material, you’ve been to training, and you’ve even attended some great Edward McNicholas, Partner, Sidley Austin LLP tool to assess privacy compliance and progress against recognized benchmark data. conference sessions, but still you have burning questions about privacy. We have experienced privacy Join this session for an overview of practical legal ethics issues that confront privacy professionals and cLoUD coMPUTInG professionals ready to help you put out that fire! Talk to IAPP instructors about privacy-related topics discussion of a possible approach to a code of ethics for all professionals in the privacy field. that are important to you. Cloud Computing Compliance: The What, Who and Where How to Avoid Becoming a Privacy Class Action or FTC Enforcement Target Christopher Millard, Professor, Bristows, London Networking Session: Minimize Boredom, Maximize Your Member Experience D. Reed Freeman, Jr., CIPP, Partner, Morrison & Foerster LLP, Jim Halpert, Partner, Communications, Join this informative session to learn the key compliance issues for users and providers of cloud services, Facilitated by the IAPP Membership Department e-Commerce and Privacy Practice, DLA Piper US LLP including the implications of anonymization, encryption and fragmentation of data in cloud environments, and the IAPP staff members will give you the inside scoop on the many ways that you can become more Join this session to identify the FTC enforcement priorities from among the agency’s laundry list of best local law impact of geographical arrangements—such as the “long-arm” reach of the EU Directive. involved with your professional association. Learn about volunteer career development opportunities practices and learn how to handle a subpoena or other initial FTC inquiry. Discover the privacy practices that in this casual networking session, where you’ll also have an opportunity to provide feedback on how give rise to significant class action risk, and discuss strategies to become a much harder target against the Joint Data Controllership: A Silver Bullet for Cloud Computing Privacy Issues? the IAPP can better serve you. threat of a class action lawsuit. Jan Geert Meents, Partner, Chair, DLA Piper IP & Technology Practice, Germany Networking Session: Your Company and the Cloud Cloud computing has raised significant privacy objections in the EU, making the use of cloud solutions by How Will the Safe Harbors in Pending Privacy Legislation Work? Facilitator: Tanya Forsheit, CIPP, Founding Partner, InfoLawGroup LLP multinational companies problematic. Explore how joint data controller arrangements can provide a breakthrough Marty Abrams, Senior Policy Advisor, Hunton & Williams LLP, Jennifer Barrett, CIPP, Global Privacy and Public Facilitator: Christine Lyon, Partner, Morrison & Foerster LLP for the privacy dilemma of modern cloud computing. Policy Executive Privacy Leader, Acxiom Corporation, Scott Taylor, CIPP, Vice President and Chief Privacy It’s your turn to join the discussion! Bring your questions, concerns and insights for a lively Officer, Hewlett-Packard Company, María Elena Pérez-Jaén Zermeño, Commissioner for Access to Public Obscured by Clouds: Privacy Audit in the Cloud discussion about managing privacy in the cloud, including due diligence and selection of providers, Information and Data Protection of the Institute for Access to Public Information of the Federal District, Mexico Doron Rotman, CIPP, National Privacy Service Leader, KPMG LLP (US) data back-up, encryption options, contractual protections (or lack thereof), cross-border transfers in The Obama administration has proposed federal legislation that would encourage industry codes of conduct Learn how to identify the impact of the move to cloud computing on an organization’s ability to undergo a the cloud environment, audit and third-party certification, and other topics of interest from the day’s that would be safe harbors. Suggested legislation on the hill would also contain safe harbors. Find out how privacy audit, and the considerations that should be taken into account in the selection, contracting and ongoing cloud computing sessions. these would work and formulate a plan for putting safe harbors into effect. management of cloud service providers. vISIT www.P r I vA cyASSOc IATION. O rg/A c A demy TO regISTer ANd fO r uP - TO-dATe INf O rmATION , P See HoWITaLLFITSTGeTHer MeeT THePeoPLWHoHa d e m y The PrIv Join yourpeersinDallasforthreedaysofqualityeducation and and yourreputation. organization’s privacyefforts. questions thatkeepyouupatnight.Couldyourorganization’s privacy enforcers that can impose real consequences on your brand privacy professionalsoftenarethelonewolfintheirorganization— reputation surviveabreach?Istherepossibilitythatyoucouldbe regulators, withoutstiflinginnovationandbusinessobjectives. need to excel in your daily practice and be a leader for your your for leader a be and practice daily your in excel to need networking andreturntoworkwiththetoolsexperiences you your organization’s productsaretrustworthy?Talk toyourpeers, year, Dallasisthecrossroadsforprivacyprofession. Come to the Academy and get information and answers to the the to answers and information get and Academy the to Come cOme TOgeTherwITh Privacy is interwoven into every facet of today’s economy, but but economy, today’s of facet every into interwoven is Privacy the targetofanFTCenforcementaction?Howdoyouensurethat to sharechallenges,getanswersandimprovetheirpractices.This Now, morethanever, privacyprofessionalsneedtocometogether walking the fine line of protecting customers and satisfying satisfying and customers protecting of line fine the walking hear fromtheexpertsandgetuniqueinsiderperspectivetop A President & CEO, IAP CEO, & President , c A Partner, Wiley Rein LLP Rein Wiley Partner, , Rates available for corporate groups, privacy certification training and testing. and training certification privacy government and higher education employees, Privacy Dinner only and Visit the website for additional pricing information. r g / O Bootcamp at the Practical Privacy Can’t make it to our daylong Privacy Privacy daylong our to it make Can’t Series? Catch it at the Academy! . Acy PrOfeSSION 1717 N.AkardStreet, Dallas,TX75201 The FairmontHotel Phone: +1214.720.2020 Conference LocationandHotel Accommodations Fax: +1 214.720.7405 Kirk Nahra, CIPP Nahra, Kirk IAPP’s new publication, Building a Privacy IAPP’s Privacy Bootcamp in today’s enterprise it is hard to know how how know to hard is it enterprise today’s in hands-on guidance for managing data within within data managing for guidance hands-on foundation that will give you the structure structure the you give will that foundation business models converging, and evolving, evolving, and converging, models business 8 a.m. – 5 p.m. two-part intensive program will introduce introduce will program intensive two-part to navigate the maze of challenges you face. face. you challenges of maze the navigate to Privacy can be a bewildering topic. With With topic. bewildering a be can Privacy get to opportunity your is Bootcamp Privacy Attendees will receive a free copy of the you to the fundamentals of privacy. Part Part privacy. of fundamentals the to you Toolkit”—practical, “Privacy a with you sound a with leave You’ll organization. your multiple laws, jurisdictions, technologies and and technologies jurisdictions, laws, multiple right decisions for your privacy initiatives. privacy your for decisions right Program: A Practitioner’s Guide Program: A Practitioner’s and understanding you need to make the the make to need you understanding and a solid grounding in this dynamic field. This This field. dynamic this in grounding solid a concepts and philosophies. Part 2 will provide provide will 2 Part philosophies. and concepts J. Trevor Hughes, CIPP Hughes, Trevor J. 1 provides an overview of basic privacy privacy basic of overview an provides 1 IATION Regular Rate (After August 19) $1395 USD $1595 USD c Ve THanSWerS ASSO $545 USD $695 USD $695 USD c y A v I Early Bird Rate (Until August 19) $1195 USD $1395 USD r P w w w. EU Data Protection Bootcamp Privacy Bootcamp (full day) , Partner, Panetta & Associati Panetta, Partner, IAPP Member Nonmember Partner, Bristows, Rocco Hazel Grant, Partner, level. Using the latest research, this leave with a strong general understanding key building blocks of a network-centric network-centric a of blocks building key formulate a plan to dramatically increase increase dramatically to plan a formulate workshop will help you discover the nine nine the discover you help will workshop (Wednesday only) (Wednesday One Session (half day) PrecONfereNce mAIN cONfereNce PrIcINg this broad overview of data protection role of data protection authorities, and the relate to. Privacy officers who do just that that just do who officers Privacy to. relate Two Sessions (full day) Two wOrKShOPS privacy infostructure and show you how to to how you show and infostructure privacy your from participation program privacy practices across the pond. Learn about the the EU, the in structures legal and political privacy pros to build programs people can can people programs build to pros privacy people’s insight, foresight and mind-sight designing a program that can engage of the roles, responsibilities and laws at both an intellectual and emotional customers, employees and partners. and employees customers, complex web of laws that guide data. You’ll give customers an optimum experience and and experience optimum an customers give business. their for asset strategic a gain governing privacy in the European Union. The secret is “self-synchronization”— Join our expert European faculty for

The IAPP PrIvAcy AcAdemy 2011

September 14–16 The Fairmont Hotel

Dallas, TX International Association of Privacy Professionals Pease International Tradeport 75 Rochester Ave., Suite 4 b e r 1 4 Portsmouth, NH 03801 USA M

Visit www.privacyassociation.org/academy to register online e

or register by phone at +1 603.427.9200. PT

PRIORITY CODE: Day

SPONSOrS P Privacy Architect, YourPrivacy Architect, Privacy , ay, S e o SD n e SH D 1 – 5 p . m . Mario Morel Mario it is becoming apparent that technology is starting to drive that momentum. This in a lively group discussion of how law and issues raised by these technologies. Debunking the Privacy Paradox Myth: Myth: Paradox Privacy the Debunking Field Communication (NFC), RFID and mobile mobile and RFID (NFC), Communication Field workshop will examine NFC, RFID and Creating a Self-Synchronized Privacy Program Privacy Self-Synchronized a Creating benefit estimations. The apparent dissonance dissonance apparent The estimations. benefit them concerns say people what between be close. With the expansive new capabilities capabilities new expansive the With close. be their privacy is not a paradox; it is a call for for call a is it paradox; a not is privacy their technologies under existing laws. Engage Cognitive science has shown that consumers consumers that shown has science Cognitive mobile payments and the regulation of such may adapt to meet privacy and data security required momentum for such adoption may regulation—including proposed legislation— payments has taken longer than many such in technology NFC including of possibility don’t make privacy decisions based on cost/ on based decisions privacy make don’t protect to practice in do they what and online of mobile phones and tablet devices, the devices, and upgrades to location tracking, Although the broad-based adoption of Near Near of adoption broad-based the Although anticipated, there are recent signs that the

erence W e F bookstore. Meet the authors and get your copy signed! to putting together an effective privacy operation—being operation—being privacy effective an together putting to Bootcamp preconference workshop and get a free copy. free a get and workshop preconference Bootcamp Get your copy of this essential and long-awaited guide guide long-awaited and essential this of copy your Get Copies will also be available for sale at the Academy released this summer! Register for the Privacy

e Work S PP! Senior Privacy Officer, Officer, Privacy Senior , Senior Counsel, , a ea Christopher T. Pierson, , Christopher T. I , Associate Specialist,

L e Precon

re eXhIBITOrS

Affinion Evidon Nymity W M TH M Blockmaster Experian Rust Consulting BNA HiSoftware Stroz Friedberg ne

Click 4 Compliance Hogan Lovells Symantec ro Protecting and Securing a Moving Target: Protecting and Securing a Moving Target: NFC, RFID and Mobile Payments Navigating the Maze: Federal Legislation and Counselor Library Identity Finder TRUSTe the Privacy Impact Assessment Process CIPP Hoffman, C. William legislative requirements and how to be What does it take to make a privacy impact workshop for a comprehensive look at the CIPP, CIPP/G, Chief Privacy Officer and Senior CIPP, 8 a.m. – 12 p.m. that can increase efficiency and improve the Privacy Act—are covered by a PIA, it’s Buckley Sandler LLP Goodwin Procter LLP General Dynamics Information Technology Information Dynamics General your organization, including the pre-PIA work Vice President, Citizens Financial Group, Inc., F more important than ever to know the ins prepared for them. Investigate the systematic process that can help to ensure compliance and produce a successful PIA procedure in and outs of the process. Join this informative assessment (PIA) successful? As federal agencies scramble to ensure that all systems—as defined by FISMA, OMB and completion and accuracy. James Shreve, CIPP Jacqueline Klosek, CIPP Building a Privacy Program: Program: Privacy a Building A Practitioner’s Guide Practitioner’s A Debix Jordan Lawrence Womble Carlyle a Equifax Kroll TS G TS TS n ence I n I ee o LL M Susan Combs,

ce HP o r k X c e acy U IV TW 5-Minute Mixer 5-Minute Welcome Reception Reception Welcome Early Bird Run/Walk Bird Early Networking Dinners Networking Privacy Dinner and Awards Ceremony Awards and Dinner Privacy Table Topic Lunch Topic Table r o • • • • • • Keynote Speaker: Keynote innovators and leaders at the sixth main Academy your with included is winners of the 2011 HP-IAPP Privacy Rub elbows with privacy’s top this exceptional evening of celebration celebration of evening exceptional this Privacy Vanguard Award. A ticket to to ticket A Award. Vanguard Privacy Innovation Awards and the IAPP Ceremony, where we will unveil the State of Texas Comptroller, The IAPP Privacy Dinner 2011 Dinner Privacy IAPP The 15 September Thursday, Hotel Fairmont The P annual Privacy Dinner and Awards conference registration. conference throughout the Academy: build relationships at our many many our at relationships build Discover connections and

networking opportunities n e T www.privacyassociation.org/academy Practice Meets Privacy IAPP IAPP P etme 4–16 September 14 d

allas, TX r

I v D

A on

cy TI an D

eS G G A ca G T n I c re n n TIFI I A

demy STI Marc Rotenberg Marc KamberLaw LLC Scott A. Kamber A. Scott President, EPIC ra e TU Be a privacy standout! will be offered at the Academy. the at offered be will cer CIPP/IT, and testing for all modules all for testing and CIPP/IT, certification at the Academy. Train and test for your IAPP Training for the CIPP, CIPP/G and CIPP/G CIPP, the for Training T T ea in the consumer privacy protection protection privacy consumer the in the table. being on the opposite side of from some of the biggest players players biggest the of some from Get exclusive insider perspectives perspectives insider exclusive Get arena and learn how you can avoid avoid can you how learn and arena F keyno