Privacy, Data Protection, IT Law

  •  TYPE: Track    START DATE: Wednesday, May 15, 2013     START TIME: 14:00    LOCATION:  AMMERSEE 1
Conference Agenda


EU, US, OECD and worldwide regulatory frameworks for privacy, data protection and IT-law in general date back to the 90s and 80s or even earlier, long before social networks or even the internet itself appeared, bringing along a totally new quality of privacy risks. Together with the rising awareness for those risks, governments and regulators all over the world have started to create a new generation of governance, which is more and more influencing the way we use information. IT professionals today need to understand legal basics and should know, how the legal framworks will eveolve. Therefore, the legal aspects of privacy and data protection have become a key topic at EIC

Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

After attending this block you will be able to:Explain the basis of privacy and data protection in the EU

  • Describe how the law and regulations in this area are evolving
  • Discuss the impact of regulations and penalties upon the attitude of organizations to IT security
  • Describe in detail the new EU data protection strategy
  • Explain the impact of BYOD (Bring Your Own Device) on the legal position of organizations allowing this
  • Describe the legal issues involved in a multi-national cloud based transaction and how to audit these
  • Describe the new EU legislation around trust frameworks and its potential impact
  • Explain the problems of how to enforce rules when dealing with people acting anonymously

This block qualifies for up to 5 Group Learning based CPEs depending on the number of sessions you attend.


Beyond BYOD: Where Privacy meets Business Needs

Date: Wednesday, May 15, 2013 Time: 14:00-15:00

Beyond BYOD: Where Privacy meets Business Needs
Dr. Karsten Kinast, KuppingerCole

Bring Your Own Device – stroke of luck or unpredictable risk of incompliance? Companies might save money or more likely at the end even pay for BYOD. Employees might be happy to use their expensively purchased tablets & smartphones for work. But how about control and protection? Without personal data being controlled and protected, data protection and compliance is at risk. Finally, regulation is needed, where freedom of use is provided. Wipe-out-rules are essential, informed...

Auditing your Multinational Cloud Transaction
David Snead, W. David Snead, PC

There are few businesses who are not engaged in a cloud transaction. Because of the nature of the cloud, these transactions can be difficult to audit. This difficulty is often amplified by the multinational operation of cloud infrastructure. In this highly interactive presentation, Mr. Snead will use a cloud transaction in which he participated to help attendees develop real world cloud audit skills. Attendees will learn: How to develop strategies to create an audit framework that...

New EU Legislation Provides Framework for Identity Management

Date: Wednesday, May 15, 2013 Time: 15:00-16:00

New EU Legislation Provides Framework for Identity Management
Dave Kearns, KuppingerCole • Anthony Nadalin, Microsoft • Don Thibeau, OpenID Foundation • Dr. Marten Voulon, ING Insurance & Leiden University

The European Union has issued extensive legislation regarding the "electronic signature". In practice, this is a very limited view on identity & access management. In 2012, the EU has published draft legislation regarding "trust services" in general. This means that in the near future, there will be extensive, specific legal rules regarding: trust schemes electronic signatures electronic seals electronic time stamps electronic documents electronic delivery services...

FedICT Government Case Study: Delivering end-to-end e-Government Services to Belgian Citizens

Date: Wednesday, May 15, 2013 Time: 17:00-18:00

FedICT Government Case Study: Delivering end-to-end e-Government Services to Belgian Citizens
Jan Vanhaecht, Deloitte

FedICT, the Federal Public Service for Information and Communication Technology, defines and implements the Belgian federal e-government strategy, including the electronic identity card (eID) program. This presentation will provide an overview of the FedICT identity and access management architecture and how the ForgeRock Open Identity Stack is being used to deliver end-to-end e-government services to 11 million citizens.

Trust in Adherence to a Predefined Role
Dr. Johannes Wiele, Jungheinrich AG

In old Venice, upper-class citizens for centuries were used to wear masks in everyday life, not only during carnival times. One special mask and disguise, “Bauta e Tabarro”, was commonly used to go to business meetings, to friends, to lovers or to the casino without being identified. The use of the Bauta costume was acknowledged and regulated by the government. The mask itself was standardized in a similar way to English school uniforms to be suitable even for official...


European Identity & Cloud Conference 2013

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 14 - 17, 2013 Munich/Germany