The Second Annual Privacy & Data Security Summit

Total Page:16

File Type:pdf, Size:1020Kb

The Second Annual Privacy & Data Security Summit The Second Annual Privacy & Data Security Summit The Leading Forum on Confidentiality, Security, Regulatory Requirements & Technology Tools Featured Speakers Include: J. Howard Beales, III, Ph.D., Federal Trade Jan. 30-Feb. 1, 2002 Commission Phillip Bond, U.S. Department of Commerce Daniel Collins, Esq., U.S. Department of Justice Hyatt Regency Washington Kathleen H. Fyffe, U.S. Department of Health and Human Services on Capitol Hill, Amy Friend, Esq., Office of the Comptroller of the Currency Washington, DC Harriet Pearson, Esq., IBM Jules Polonetsky, DoubleClick, Inc. Larry Ponemon, Ph.D., Privacy Council Richard Purcell, Microsoft Corporation Mark Rotenberg, Esq., Electronic Privacy Information Center Howard A. Schmidt, Microsoft Corporation Zoe Strickland, U.S. Postal Service Peter Swire, Esq., George Washington University Co-Sponsored by American Insurance Association Chief Privacy Officers Council of the Internet Advertising Bureau Information Systems Security Association International Biometric Industry Association International Security, Trust and Privacy Alliance Internet Alliance Network Advertising Initiative Personal Communications Industry Association Privacy & American Business Privacy Council Privacy Leadership Initiative www.privacyassociation.org The Biometric Foundation And Financial Privacy Law Guide Information Security Magazine Privacy and Data Protection Journal Sponsored by Privacy Regulation Report INTERNATIONAL ASSOCIATION OF PRIVACY OFFICERS Privacy Times The New Voice for Privacy and Security Professionals SC Info Security The Informatics Review Resulting from the Merger of the Privacy Officers Association and the Association of Corporate Privacy Officers Major Supporters Davis Wright Tremaine ePrivacy Group Holland & Knight IBM Microsoft PricewaterhouseCoopers THE SECOND ANNUAL PRIVACY & DATA SECURITY SUMMIT: THE LEADING FORUM he International Association of Privacy Officers (IAPO) is Who Should Attend pleased to announce its groundbreaking event — The • Chief Executive Officers T Second Annual Privacy & Data Security Summit. IAPO was formed by combining the 2 preeminent privacy professional • Chief Operating Officers membership associations — The Privacy Officers Association • Chief Privacy Officers (“POA”) and the Association of Corporate Privacy Officers • Chief Security Officers (“ACPO”). Both the POA and ACPO were formed in mid-2000 by • Chief Technology Officers a group of individuals who noticed a need for a professional • Chief Financial Officers membership organization to provide a forum for the discussion • Compliance Officers and debate of issues related to developing and maintaining pri- vacy and data security programs and policies in business. Now • Corporate Counsel combined, these 2 professional groups will provide a new, uni- • Attorneys fied voice for Privacy Professionals around the world. • Medical Directors • Financial Services Executives In May 2001, more than 400 registrants attended POA’s First Annual Privacy & Data Security Summit. That conference • E-Commerce Executives received rave reviews from attendees, media, exhibitors and • Hospital Executives sponsors. The Summit is now being reconvened with an expert • Physicians faculty and promises to be even better as POA has taken its • Data Managers knowledge and combined it with ACPO, to become IAPO! The • Ethics Officers Second Annual Privacy Summit will address privacy and data • Consultants security issues as they relate to a multitude of industries. These industries include: Health Care, Financial Services, Marketing, • Government Agency Employees Telecommunications/Wireless, E-Commerce, Pharmaceutical • Risk Managers and Government Contractors/Partners, among others. • Information Technology Department Managers • HIPAA Project Managers Privacy and data security issues have become a never ending concern to those involved in maintaining a company’s privacy • GLB Project Managers policy and dealing with privacy issues. The ever-changing • Journalists government regulations make it imperative for you to be well • Executive Recruiters informed of the latest events, polices, laws and regulations. • Government Contractors The Second Annual Privacy & Data Security Summit promises to be your source for the most up to date privacy and data security information. Join our nation’s top business leaders and policy Continuing Education Credits makers as we explore the latest issues, regulations and trends in CISSP/SSCP — This program may qualify for security professional privacy and data security affecting business, the government and (CISSP) or security practitioner (SSCP) continuing education credit. CISSPs and SSCPs may apply for CPE credit for attending the 2nd Annual the world today. Privacy and Data Security Summit on-line at www.isc2.org. This informa- tion is provided for your convenience only by the Summit. Goals & Objectives CLE — Required sponsor documentation has been forwarded to and • To provide a comprehensive overview of the privacy and data credit requested from MCLE states with general requirements for all lawyers. We have requested a total of 19.75 from all MCLE states. security regulatory environment Lawyers seeking credit in Pennsylvania must pay fees of $1.50 per credit • To discuss the role of the Chief Privacy Officer in a variety hour directly to the PA CLE Board. The IAPO pays applicable fees in of industries, including health care, financial services and other states where the sponsor is required to do so, and in states where a late fee may become applicable. Please be aware that each state has its e-commerce own rules regulations, including its definition of “CLE”; therefore, certain • To discuss the intersection of privacy issues and security programs may not receive credit in some states. For information on approved credit hours for your state, please contact the IAPO at 800- • To analyze the key components of a privacy and data 266-6501 starting two to three weeks prior to the program date. security program Additional Continuting Education Units may be available. For additional • To provide a network of the nation’s leaders in privacy and information, please contact the IAPO National Office at 800-266-6501. data security 2 ON CONFIDENTIALITY, SECURITY, REGULATORY REQUIREMENTS & TECHNOLOGY TOOLS Wednesday, January 30, 2002 11:00 a.m. Summit Registration Opens 1:00 p.m OPTIONAL PRECONFERENCE SESSIONS — Choose One: Preconference Symposium I: Privacy Officer Training Ray Everett-Church, Esq., Senior Privacy Analyst, ePrivacy Group, San Jose, CA Jeff B. Richards, Senior Vice President, Global Policy and Strategy, ePrivacy Group, Washington, DC Stephen Cobb, CISSP, Vice President, Research & Education, ePrivacy Group, Saint Augustine, FL Preconference Symposium II: Security and Information Assurance Professor Lance J. Hoffman, Computer Sciences Department, George Washington University, Washington, DC Scott Charney, Principal, PricewaterhouseCoopers, Washington, DC Preconference Symposium III: Biometrics, Counter Surveillance and Cybercrime M. Paul Collier, Executive Director, The Biometric Foundation, and Founder, ID Technology Partners, Inc., Washington, DC Preconference Symposium IV: Privacy Crises and Public Communications — How companies manage, mismanage and avoid brand damage from public scrutiny of their privacy practices Jason Catlett, President, Junkbusters Corp., and Fellow, Kennedy School of Government, Harvard University, Green Brook NJ 5:00 p.m. Adjournment Thursday, January 31, 2002 7:00 a.m. Registration and Continental Breakfast 8:00 a.m. Welcome and Overview — Morning Plenary Session: Federal Privacy Regulator’s Roundtable Brenton Saunders, JD, MBA, Partner, PricewaterhouseCoopers, Past President, Health Care Compliance Association, and Founder, Privacy Officers Association, Washington, DC (Conference Co-Chair) Alan F. Westin, LLB, PhD, Professor Emeritus of Public Law and Government, Columbia University, and Publisher, Privacy & American Business, Washington, DC (Conference Co-Chair) Agnes Bundy-Scanlan, Managing Director and Chief Privacy Officer, FleetBoston Financial, Boston, MA (Conference Co-Chair) 8:15 a.m. Privacy Regulation and the Federal Trade Commission J. Howard Beales, III, PhD, Director, Bureau of Consumer Protection, Federal Trade Commission, Washington, DC 8:45 a.m. Privacy and Commerce Phillip Bond, Undersecretary for Technology, United States Department of Commerce, Washington, DC 9:15 a.m. Privacy and Financial Affairs Amy Friend, Esq., Assistant Chief Counsel, Office of General Counsel, Office of the Comptroller of the Currency, Washington, DC 9:45 a.m. Healthcare Privacy, Security and HIPAA Compliance Kathleen H. Fyffe, Senior Advisor for Health Information Privacy Outreach, Office for Civil Rights, United States Department of Health and Human Services, Washington, DC 10:15 a.m. Prosecuting Privacy Violations Daniel Collins, Esq., Chief Privacy Officer, United States Department of Justice, Washington, DC 10:45 a.m. BREAK 11:00 a.m. CONCURRENT SESSIONS I 1.01 Communicating Privacy Issues to the General Public Christopher Hamilton, Manager, Global Privacy Services, Ogilvy Public Relations Worldwide, Washington, DC 1.02 Advanced Issues in Healthcare Privacy and HIPAA Compliance Alan Goldberg, Esq., Partner, Goulston & Storrs, Adjunct Professor, Suffolk University Law School, and Moderator AHLA HIT List Serve, Boston, MA Keith Korenchuk, Esq., Partner, Davis Wright Tremaine, Washington, DC 1.03 Wireless Privacy Issues Now Before the FCC Peter M. Connolly, Esq., Partner,
Recommended publications
  • Download the Microsoft Tag and We’Ll Consider Them for the Magazine
    Fall 2014 Magazine Giant Creative Strategy Output @ 100% x 10"h Live: 7.375"w 8.25”w x 10.75”h Trim: Bleed: 8.75"w x 11.25"h Colors: 4CP + AD WINTER HB PATIENT PRINT GILPT11284 Speak from the PRINT live/trim_DO NOT heart about your angina “Tell your cardiologist exactly how you’re feeling. Don’t hold anything back.” Donnette, angina patient If you have been limiting your work or your activities because of your chronic angina, be sure to talk about it with your cardiologist. Your cardiologist is listening www.SpeakFromTheHeart.com Tips, information, and more from real angina patients Donnette, Ralph, and Claudia. Claudia, angina patient Speak From the Heart is a trademark, and the Speak From the Heart logo Ralph, angina patient is a registered trademark, of Gilead Sciences, Inc. © 2011 Gilead Sciences, Inc. All rights reserved. UN7951 1/11 D19528_1a_Donette.indd 11.04.2013 A17041x01G_300ucr_RBlk.tif 133 linescreen B19528x01A_3u.tif jn B19528x02A_3u.tif Dedicated to inspiring hope in heart disease patients and their families. Mission: Inspiring hope and improving the quality of life for heart patients and their families through ongoing peer-to-peer support THE MENDED HEARTS, INC. BOARD OF DIRECTORS 2013-2015 President Gus Littlefield Executive Vice President Donnette Smith Vice President Lynn Berringer Treasurer Dale Briggs Mended Little Hearts Vice President Andrea Baer Fall 2014 Regional Directors Central Jana Stewart Mid-Atlantic Gerald Kemp Midwest Cathy Byington Northeast Margaret Elbert Rocky Mountain Randy Gay Southern Fredonia Williams
    [Show full text]
  • Commencement 1969 Michigan State University the Commencement Committee
    COMMENCEMENT 1969 MICHIGAN STATE UNIVERSITY THE COMMENCEMENT COMMITTEE HERMAN L. KING, Chairman MADISON KUHN LLOYD R. CHAMPION JOHN G. LAETZ JAMES H . DENISON REBECCA J. LAU Student Representative EVERETT R. EMINO EDWARD L. PETRINI Student Representative HORACE C. KING KERMIT H. SMITH Following the close of the 1969 Winter term, approximately seven weeks are required to complete the processing of academic records and the preparation of diplomas. Based on this schedule, diplomas will be mailed in May, 1969. COMMENCEMENT 1969 Sunday, March 9 University Auditorium, East-Lansing The pageantry and color at commencement exercises reveal a record of ACADEMIC academic achievement of the various individuals taking part in the exercises. The following brief description is given that the audience might more readily COSTUME interpret such achievement. In 1895, the Intercollegiate Commission, a group of leading American educators, met at Columbia University to draft a code which would serve to regulate the design of gowns and hoods indicating the various degrees as well as the colors to indicate the various faculties. This code has been adopted by most of the colleges and universities in America and its use has made identification of scholastic honors an immediate activity. Three types of gowns are indicated by the code. Those worn by the bachelors are made of black worsted material and have long, pointed sleeves. Those worn by masters may be made either of black silk or black wool and have long, closed sleeves with the arc of a circle near the bottom. The arm goes through a slit, giving the appearance of short sleeves for the master's gown.
    [Show full text]
  • Copyright in an Era of Information Overload: Toward the Privileging of Categorizers
    Brooklyn Law School BrooklynWorks Faculty Scholarship 1-2007 Copyright in an Era of Information Overload: Toward the Privileging of Categorizers Frank Pasquale Follow this and additional works at: https://brooklynworks.brooklaw.edu/faculty Part of the Science and Technology Law Commons Copyright in an Era of Information Overload: Toward the Privileging of Categorizers Frank Pasquale 60 Vand. L. Rev. 135 (2007) Environmental laws are designed to reduce negative externalities (such as pollution) that harm the natural world. Copyright law should adjust the rights of content creators in order to compensate for the ways they reduce the usefulness of the information environment as a whole. Every new work created contributes to the store of expression, but also makes it more difficult to find whatever work one wants. "Search costs" have been well- documented in information economics and addressed by trademark law. Copyright law should take information overload externalities like search costs into account in its treatment of alleged copyright infringers whose work merely attempts to index, organize, categorize, or review works by providing small samples of them. These categorizers are not "'free riding" off the labor of copyright holders. Rather, they are creating the navigational tools and filters that help consumers make sense of the ocean of expression copyright holders have created. The new scholarship of cultural environmentalism lays the groundwork for a better understanding of the costs, as well as the benefits, of copyrighted expression. Any expression that signals something to one who wants exposure to it may constitute noise to thousands of others. By modeling information overload as an externality imposed by copyrighted works generally, this article attempts to provide a new economic justification for more favorable legal treatment of categorizers, indexers, and reviewers.
    [Show full text]
  • September 21, 1960, Minutes
    MEETING OF THE BOARD OF TRUSTEES OF THE UNIVERSITY OF ILLINOIS September 21, 1960 The September meeting of the Board of Trustees of the University of Illinois was held in the Mini Union Building, Urbana, Illinois, on Wednesday, September 21, 1960, beginning at 2:00 p.m. The following members of the Board were present: Mr. Howard W. Clement, Mr. Richard A. Harewood, Mr. Wirt Herrick, Mr. Earl M. Hughes, Mr. Wayne A. Johnston, Mr. Harold Pogue, Mr. Timothy W. Swain, Mrs. Frances B. Watkins, Mr. George T. Wilkins, Mr. Kenney E. Williamson. Governor William G. Stratton was absent. Also present were President David D. Henry, Vice-President and Provost Lyle H. Lanier, Dr. Joseph S. Begando, Assistant to the Presi­ dent and Acting Vice-President in charge of the Chicago Professional Colleges, Executive Dean C. C. Caveny of the Chicago Undergraduate Division, Director C. S. Havens of the Physical Plant, Mr. Ralph F. Lesemann, Legal Counsel, Mr. C. E. Flynn, Director of Public Infor­ mation; and the officers of the Board, Mr. H. O. Farber, Comptroller, Mr. C. W. Weldon, Treasurer, and Mr. A. J. Janata, Secretary. 89 90 BOARD OF TRUSTEES [September 21 MEETINGS OF COMMITTEES Meetings of the Board's Committees on General Policy and Buildings and Grounds were held on Wednesday, September 21, 1960, beginning at 10:00 a.m. MINUTES APPROVED The Secretary presented the minutes of the meeting of the Board of Trustees on May 17, 1960, press proof copies of which have previously been sent to the Board. On motion of Mr. Swain, the minutes were approved as printed on pages 1275 to 1310, inclusive.
    [Show full text]
  • Publisher's Brochure Including Ordering
    The Definitive Resource on Information and Computer Security SPECIAL PRE-PUB OFFER! This definitive 3-volume Handbook offers coverage Individual volumes: $250 each of both established and cutting-edge theories through 1/31/06; $300 thereafter and developments on information and computer Three-volume set: $750 each through 1/31/06; $900 thereafter security. Among industries expected to become a increasingly dependent upon the information and computer security and active in understanding the many issues surrounding this important and fast growing field are: government agencies, military, education, libraries, health, medical, law enforcement, accounting firms, law firms, justice, manufacturing, financial services, insurance, communications, transportation, aerospace, energy, biotechnology and utilities. Volume I: Key Concepts, Infrastructure, Standards and Protocols Volume II: Information Warfare, Social, Legal, and International Issues and Security Foundations Volume III: Threats, Vulnerabilities, Prevention, Detection and Management Contents “The Handbook of Information Security EDITED BY HOSSEIN BIDGOLI, is...a must have reference!” —Donn B. Parker, CISSP, Author and retired CALIFORNIA STATE UNIVERSITY, Senior Information Systems Management Consultant BAKERSFIELD, CALIFORNIA CONTRIBUTORS FROM AROUND THE WORLD... Detailed Australia, Austria, Canada, China, reference guide France, Germany, Hungary, Italy, United Kingdom, United States Cutting-edge topics Illustrations throughout Chapter-at-a-glance for your convenience Easy-to-read typeface KEY FEATURES: ■ The Handbook provides researchers and managers with a ■ Includes more than 200 articles from over 200 leading experts. solid coverage of the core technologies and applications in ■ Each article follows a unique format including Title and the information security field. Author, Glossary, Abstract, Introduction, Body, Conclusion, ■ Articles in the Handbook have been rigorously peer-reviewed Cross-references, and Bibliography.
    [Show full text]
  • FFA Proceedings 2002
    Proceedings FFA members from across the United States, traveled to Louisville, Ky. to celebrate 75 years of premier leadership, personal growth and career success through agricultural education. Contents 2003-2004 National Officers............................80 Agri-Entrepreneurship Awards ......................10 Agriscience Fair ..............................................15 Agriscience Student Recognition Program ....14 Agriscience Teacher of the Year......................15 Alumni Convention ....................................58-59 American FFA Degrees ..............................28-37 Band ................................................................21 Career Development Events ......................18-19 Career Show & Hall of States..........................62 Exhibitors ......................................................63 Proceedings Chorus..............................................................22 Committee Reports ....................................68-74 Program of Activities ....................................77 Convention Overview ....................................1-5 Convention Speakers..................................40-41 Courtesy Corps ..............................................64 Creed Speaking CDE........................................12 Distinguished Service Citations ......................60 Extemporaneous Public Speaking CDE ..........13 Foundation Sponsors..................................60-61 Honorary American FFA Degrees ..............56-57 H.O. Sargent Awards ......................................16
    [Show full text]
  • The Surprising Virtues of the New Financial Privacy Law
    University of Minnesota Law School Scholarship Repository Minnesota Law Review 2002 The urS prising Virtues of the New Financial Privacy Law Peter P. Swire Follow this and additional works at: https://scholarship.law.umn.edu/mlr Part of the Law Commons Recommended Citation Swire, Peter P., "The urS prising Virtues of the New Financial Privacy Law" (2002). Minnesota Law Review. 2083. https://scholarship.law.umn.edu/mlr/2083 This Article is brought to you for free and open access by the University of Minnesota Law School. It has been accepted for inclusion in Minnesota Law Review collection by an authorized administrator of the Scholarship Repository. For more information, please contact [email protected]. The Surprising Virtues of the New Financial Privacy Law Peter P. Swiret The financial privacy law passed by Congress in 1999 has been the target of scathing criticism. On one side, banks and other financial institutions have complained about the high costs of the billions of notices sent to consumers, apparently to widespread consumer indifference.1 On the other side, privacy advocates have condemned the law as woefully weak, and some have argued that its so-called privacy provisions actually re- sulted in weakening privacy protection.2 This Article disagrees with the criticisms. The new finan- cial privacy law, known more formally as Title V of the Gramm- Leach-Bliley Act of 1999 (GLB), works surprisingly well as pri- vacy legislation. It does so in ways that address legitimate in- dustry concerns about excessive cost and barriers to needed in- formation. In addition, the ability of states to draft additional legislation in the area means that an effective mechanism ex- ists to correct the key weaknesses of the law over time.
    [Show full text]
  • MICROCOMP Output File
    SPAMMING: THE E-MAIL YOU WANT TO CAN HEARING BEFORE THE SUBCOMMITTEE ON TELECOMMUNICATIONS, TRADE, AND CONSUMER PROTECTION OF THE COMMITTEE ON COMMERCE HOUSE OF REPRESENTATIVES ONE HUNDRED SIXTH CONGRESS FIRST SESSION NOVEMBER 3, 1999 Serial No. 106±84 Printed for the use of the Committee on Commerce ( U.S. GOVERNMENT PRINTING OFFICE 61±040CC WASHINGTON : 1999 VerDate 11-SEP-98 08:58 Dec 17, 1999 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 61040.TXT HCOM2 PsN: HCOM2 COMMITTEE ON COMMERCE TOM BLILEY, Virginia, Chairman W.J. ``BILLY'' TAUZIN, Louisiana JOHN D. DINGELL, Michigan MICHAEL G. OXLEY, Ohio HENRY A. WAXMAN, California MICHAEL BILIRAKIS, Florida EDWARD J. MARKEY, Massachusetts JOE BARTON, Texas RALPH M. HALL, Texas FRED UPTON, Michigan RICK BOUCHER, Virginia CLIFF STEARNS, Florida EDOLPHUS TOWNS, New York PAUL E. GILLMOR, Ohio FRANK PALLONE, Jr., New Jersey Vice Chairman SHERROD BROWN, Ohio JAMES C. GREENWOOD, Pennsylvania BART GORDON, Tennessee CHRISTOPHER COX, California PETER DEUTSCH, Florida NATHAN DEAL, Georgia BOBBY L. RUSH, Illinois STEVE LARGENT, Oklahoma ANNA G. ESHOO, California RICHARD BURR, North Carolina RON KLINK, Pennsylvania BRIAN P. BILBRAY, California BART STUPAK, Michigan ED WHITFIELD, Kentucky ELIOT L. ENGEL, New York GREG GANSKE, Iowa THOMAS C. SAWYER, Ohio CHARLIE NORWOOD, Georgia ALBERT R. WYNN, Maryland TOM A. COBURN, Oklahoma GENE GREEN, Texas RICK LAZIO, New York KAREN MCCARTHY, Missouri BARBARA CUBIN, Wyoming TED STRICKLAND, Ohio JAMES E. ROGAN, California DIANA DEGETTE, Colorado JOHN SHIMKUS, Illinois THOMAS M. BARRETT, Wisconsin HEATHER WILSON, New Mexico BILL LUTHER, Minnesota JOHN B. SHADEGG, Arizona LOIS CAPPS, California CHARLES W. ``CHIP'' PICKERING, Mississippi VITO FOSSELLA, New York ROY BLUNT, Missouri ED BRYANT, Tennessee ROBERT L.
    [Show full text]
  • Contents in This Issue
    MARCH 2005 The International Publication on Computer Virus Prevention, Recognition and Removal CONTENTS IN THIS ISSUE 2 COMMENT RATTLING THE Plenty of phish in the sea PERLY GATES Perl/Santy is, 3 NEWS essentially, a small piece of Perl code that Microsoft one step closer to AV spreads to vulnerable Errata: February 2005 Windows NT web servers located using the Google search engine. comparative review Frédéric Perriot describes Santy’s unusual replication strategy and explains why this worm 3 VIRUS PREVALENCE TABLE exemplifies the need for the ‘defence in depth’ approach. page 4 4 VIRUS ANALYSIS Black Perl HOME SWEET HOME FEATURES Randy Abrams looks at how the security support needs and behaviours of home users have changed 6 Protecting the home user over the years, and describes how Microsoft is 9 Virus outbreak protection: network-based adapting to maximise customer support now that detection consumers’ first port of call is their ISP. page 6 11 INSIGHT New kid on the block PRODUCT REVIEWS 13 VirusBuster 2005 Professional 17 Resolution Antivirus This month: anti-spam news & events; review of Fighting Spam for Dummies; MIT Spam 20 END NOTES & NEWS Conference report; ASRG summary. ISSN 0956-9979 COMMENT ‘The number to re-enter their user data. The email lures the recipient into clicking on a link that directs them straight to the of phishing spoofed website where they are asked to enter their attacks, and the personal information, providing the phishers with access to the victim’s bank details, credit card, or on-line associated costs, shopping account. are increasing.’ In any single scam, only a small proportion of recipients will be customers of the spoofed organization, and only a David Emm small proportion of these will ‘take the bait’.
    [Show full text]
  • School of Engineering and Applied Science, the George Washington University CONTENTS Winter 2001
    WINTER 2001 Volume 1, Number 2 Synergy Past, Present, Prospective A Conversation with Four Generations of Engineers Synergy The Magazine of the School of Engineering and Applied Science, The George Washington University CONTENTS Winter 2001 1 First Word Dean Timothy W. Tong 2 Reengineering From the Editor Engineering Education his second issue of Synergy is double in size and tackles some critical issues of transition in the field of engineering — and the constant adaption of engineer- 4 Headline News T ing education to step-up to the future. As you will read, SEAS is a leader in innovative approaches to education and is fast earning a reputation for responding 10 Gifts for the to the needs of students, the business community, and the nation. We continue to ask New Century for your input — write us, tell us how we’re doing, and what you’re doing. 16 Cover Story: Past, Present, Prospective A Conversation with Four Generations of Engineers 20 Alumni News 23 From the National Advisory Council Winter 2001 • Volume 1 Number 2 Synergy is published by the School of Engineering and Applied Science, The George Washington University. 110 Tompkins Hall, 725 23rd Street, NW Washington, DC 20052. 202-994-6080 or www.seas.gwu.edu Stephen J. Trachtenberg President of the University Timothy W. Tong, Ph.D. Dean Rachelle Heller, Ph.D. Associate Dean for Academic Affairs Department Chairmen William Roper, Ph.D. Civil & Environmental Engineering Bhagirath Narahari, Ph.D. Computer Science Branimir R. Vojcic, Ph.D. Electrical & Computer Engineering Thomas A. Mazzuchi, D.Sc. Engineering Management & Systems Engineering Michael Myers, Ph.D.
    [Show full text]
  • Copyright in an Era of Information Overload: Toward the Privileging of Categorizers
    Copyright in an Era of Information Overload: Toward the Privileging of Categorizers Frank Pasquale Environmental laws are designed to reduce negative externalities (such as pollution) that harm the natural environment. Copyright law should adjust the rights of content creators in order to compensate for the ways they reduce the usefulness of the information environment as a whole. Every new work created contributes to the store of expression, but also makes it more difficult to find whatever work one wants. “Search costs” have been well-documented in information economics. Copyright law should take information overload externalities like search costs into account in its treatment of alleged copyright infringers whose work merely attempts to index, organize, categorize, or review works by providing small samples of them. They are not “free riding” off the labor of copyrightholders, but rather are creating the types of navigational tools and filters that help consumers make sense of the ocean of expression copyrightholders have created. The new scholarship of cultural environmentalism sets the groundwork for a better understanding of the costs, as well as the benefits, of copyrighted expression. Any bit of expression that signals something to one who wants exposure to it may constitute noise to thousands of others. By modeling information overload as an externality imposed by copyrighted works, this article attempts to provide a new economic justification for more favorable legal treatment of categorizers, indexers, and reviewers. Information overload is an unintended negative consequence of copyright law’s success in incentivizing the production and distribution of expression. If courts grant content owners the right to veto categorizers’ efforts to make sense of given fields of expression, they will only exacerbate the problem.
    [Show full text]
  • NEWS of the American Institute for Foreign TRADE
    NEWS OF MARCH 1961 PROFESSOR AMALIO SUAREZ To the memory of our beloved Mali the alumni, faculty and staff of The American Institute for Foreign Trade dedicate the March 1961 issue of the News of Thunderbirds. THE AmERICAn InSTITUTE FOR FOREIGn TRADE THUNDERBIRD CAMPUS PHOENIX, ARIZONA 3n �emoriam MESSAGE FROM THE PRESIDENT Students, alumni, faculty, staff and friends of The current academic year has seen AIFT making The American InstitUte for Foreign Trade are many changes and adjuctmentz, zome planned, zome shocked and saddened by the tragic death of a unforeseen. In another place I have expressed much-beloved friend, Professor Amalio Suarez. He the desolation occazioned by the tragic loss of was returning to the campus after a trip to the Professor Amalia Suarez. He can never be re­ Pacific Northwest where he addressed the senior placed, and AIFT will always lack his radiant, classes of a number of universities and colleges friendly humanity. on the subject of overseas careers for young Americans. Snow, ice, and ptorm on a mountain Another major change was occasioned by the rezig­ road were responsible for a collision with a nation of Vice President Stanton S. von Grabill, truck. His death was instantaneous. who felt that eight yearz spent in almost contin­ uous travel for AIFT had kept him too long away A native of Jerome, Arizona, Mali was a graduate from his family. He is staying on in the Valley of Arizona State College at Flagstaff, and of the Sun as City Clerk of Phoenix. received his master's degree from the National University of Mexico.
    [Show full text]