|
Workshop
1: The Consumer Experience
May 14, 2003
Workshop
2: The Business Experience
June 4, 2003
Federal
Trade Commission
Conference Center
601 New Jersey Ave, NW
Washington, DC 20001 |
Technology has been widely heralded as a
promising solution to the challenges presented by consumer
privacy and information security. A number of products promise
to help consumers and businesses control sensitive information
and guard against internal and external threats; technology
is also frequently cited as the best method for managing information
and ensuring information security. As more and more consumers
use “always on” Internet connections and share personal information
online, it is useful to examine the current role of technology
in addressing privacy and security issues.
The workshops being announced will focus on the role technology
plays for both consumers and businesses. Consumers may have
more technologies available to help them protect their personal
information, but it is unclear whether consumers are using
these technologies and whether these products reflect the
needs of consumers in this area. Businesses may also be using
new technologies to scan their Web sites for vulnerabilities
and encode privacy restrictions directly into stored data,
but it is equally unclear whether technology is meeting the
privacy and security needs of businesses.
The workshops will foster a wide-ranging discussion on these
issues. They will also examine whether and what progress has
been made in the security area since the Federal Trade Commission’s
May 2002 workshop on consumer information security.
Click
here for details on ordering videotapes of the workshops.
|
Staff
Workshop Report: Technologies for Protecting Personal
Information [PDF only 48K] |
|
Agendas
- The
Consumer Experience: May 14, 2003
- The
Business Experience: June 4, 2003
|
|
- Transcripts
The Consumer Experience: May 14, 2003
The Business Experience: June 4, 2003
|
|
The
Consumer Experience: Panelist Presentations
[PowerPoint files. Best viewed with Internet Explorer
5 or higher]
Panel
1: Consumer Tools for Managing the Collection and
Use of Personal Information Lorrie
Faith Cranor, AT&T Labs
An
Analysis of P3P Deployment on Commercial, Government,
and Children’s Web Sites as of May 2003
Stephanie
Perrin, Digital Discretion, Inc. |
Panel
2: Consumer Tools for Managing Information Security
Larry
Clinton, Internet Security Alliance
Richard
M. Smith, Computerbytesman.com Michael
Willett, Security and Privacy Consultant |
Panel
3: Making Effective Use of Technology: Understanding
Consumer Behavior Andrew
Patrick, National Research Council of Canada
Mary
J. Culnan, Bentley College
Donna
Hoffman, Vanderbilt University
Nathaniel
Wood, FTC |
Panel
4: Building Protections into the Architecture of
Identity Management Systems Lynette
Millett, National Academy of Sciences
Ari
Schwartz, Center for Democracy and Technology
|
Panelist
Bios [PDF] |
|
|
The
Business Experience: Panelist Presentations
[PowerPoint files. Best viewed with Internet Explorer
5 or higher]
Panel
1: The Process of Protecting Consumer Information:
Creating a Business Plan Using a Hypothetical
Joseph
Alhadeff, Oracle Corporation
Larry
Ponemon, Ponemon Institute |
Panel
2: Business Tools for Protecting Consumer Information
Steven
Adler, IBM Tivoli Security & Privacy
Software Robert
Gratchner, Corporate Privacy Manager, Intel
Corporation |
Panel
3: Current and Emerging Frameworks for Protecting
Consumer Information Larry
Clinton, Internet Security Alliance
Fran
Maier, TRUSTe |
Panel
4: Designing Technologies to Protect Consumer Information
Kathy
Bohrer, IBM Research |
|
|
Federal
Register Notice |
|
Public
Comments
The comment period for filing comments pertaining to the
workshop has been extended through June 20th. Instructions
for filing comments can be found in the Federal
Register Notice. |
|
Consumer
& Business Information |
|
|
|
More
Information |
|
|
|