BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//wp-events-plugin.com//7.2.3.1//EN
TZID:Europe/Berlin
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:54@hiig.de
DTSTART;TZID=Europe/Berlin:20130726T123000
DTEND;TZID=Europe/Berlin:20130726T193000
DTSTAMP:20140117T142322Z
URL:https://www.hiig.de/events/cloud-computing-and-eu-data-protection-regu
 lation/
SUMMARY:Cloud Computing and EU Data Protection Regulation
DESCRIPTION:Standards\, Design Considerations\, and Operations Recommendati
 ons for Privacy-friendly Cloud Computing\nDer internationale Workshop Clou
 d Computing and the EU Draft General Data Protection Regulation bringt St
 akeholder aus Politik\, Recht und Technik zusammen\, um ein gemeinsames Ve
 rständnis von Privacy und Datenschutz zu erlangen\, vor allem im Hinblick
  auf das Verhältnis von rechtlichen Anforderungen zu technischen Umsetzun
 gmöglichkeiten. Cloud Computing wird dabei einen thematischen Schwerpunkt
  bilden. Die Workshop-Sprache wird Englisch sein.\n\nHosts\nHumboldt-Unive
 rsität zu Berlin (HU)\nAlexander von Humboldt Institute for Internet and 
 Society (HIIG)\n\nCo-Host\nCisco Systems\, Inc.\n\nFurther Venue Informati
 on\nHumboldt-Universität zu Berlin | Faculty of Law\nRoom E034\nKommode |
  Bebelplatz 2\nD – 10099 Berlin\nOpenStreetMap\n\nArrival by public tran
 sportation\nThe Bus lines 100\, 200 as well as TXL will take you to the bu
 s stop »Staatsoper«.\nMetro- and Train-Stations in direct vicinity:\nFra
 nzösische Straße (U6)\nHausvogteiplatz (U2)\nS-Bahnhof Friedrichstraße 
 (U6 / S1 / S2/ S3 / S5 / S7 / S75 and several regional trains)\n\nArriving
  at Hauptbahnhof take S3 / S5 / S7 / S75 to S-Bahnhof Friedrichstraße.\nF
 rom Airport Schönefeld take S45 in direction of Südkreuz\, where you ste
 p out in S+U-Bahnhof Tempelhof and change to U6 in direction Alt-Tegel as 
 far as Französische Straße.\nFrom Airport Tegel take the Bus line TXL to
  the bus stop »Staatsoper«.\n\nSchedule\n12:30 – 13:00: Reception\n13:
 00 – 13:15: Welcome Address\, Introduction\n13:15 – 14:45: Session 1\n
 14:45 – 15:00: Coffee Break\n15:00 – 16:30: Session 2\n16:30 – 16:45
 : Coffee Break\n16:45 – 18:15: Session 3\n18:15 – 18:30: Closing\n18:3
 0 – 19:30: Stand-up Reception with pretzels\n\nBackground\nAgainst the b
 ackdrop of an immensly increased dimension of data processing including th
 e international flow of data in the last decade virtually all the relevant
  actors in the field have had to come to terms with the importance of priv
 acy and data protection issues.\nWhile everyone is aware of the fact that 
 something has to be done in order to safeguard the privacy of Internet use
 rs\, the question of how this end could be achieved by using what means re
 mains open as much as it remains contested. Engineers in this respect need
  to know the underlying values\, societal goals\, and legal operationaliza
 tions of privacy and data protection\, and their manifestation in legislat
 ion of which the EU Draft General Data Protection Regulation is one exampl
 e. Politicians/Practitioners on their part must understand the fundamental
  limits of any approach that intends to translate privacy and data protect
 ion goals into technical systems. Finally\, lawyers need to understand the
  characteristics of technical standardization compared to traditional meth
 ods of law making.\nThe workshop aims at bringing together politicians\, l
 awyers\, and engineers for an interdisciplinary discussion in order to imp
 rove the mutual understanding of what is to be done\, what principles appl
 y\, and what the technical limits of implementing privacy and data protect
 ion into ICT systems are. Special emphasis will thereby be placed on the i
 ssue of cloud computing.\n\nWorkshop Agenda and Expected Outcome\n\nSessio
 n 1: Societal goals and forms of legal operationalization\nModerator: Ingo
 lf Pernice\n Speakers: Nicolas Dubois (EU Commission)\, Caspar Bowden\nThe
  goal of the first session is to gain a specific understanding of what is 
 privacy and data protection\, and what the expectations of politicians and
  lawyers to technology\, designers\, and standard-developing organizations
  entail.\n\n	What are the (individual and societal\; philosophical\, socio
 logical\, political) protection goals of privacy and data protection\, whi
 ch meta norms they are derived from(freedom\, dignity\, autonomy\, control
  etc.)? Which conflict of norms can be observed? What are sub-goals? (conf
 identiality\, integrity\, availability\, transparency\, non-linkability\, 
 intervenability etc.) and how are they pursued?\n	What are the ends the Co
 mmission wants to achieve by its current draft GDPR? What are the underlyi
 ng expectations lawmakers have towards ICT designers and manufacturers wit
 h respect to the technical implementation of privacy goals. What demands a
 re lawmakers attaching to the processes of technical standard-setting?\n	H
 ow have privacy and data protection goals been legally operationalized so 
 far? (PII as legal reference object\, process orientation\, whitelist appr
 oach\, weighting of interests etc.)\n	What are the legal requirements for 
 ICT systems? What are the legal demands put upon the process of formulatin
 g technical requirements? (openness\, transparency\, documentation\, manag
 ement etc.)\n	How are legal privacy and data protection rules enforced?\n\
 nSession 2: Technical standardization\nModerator: Jeanette Hofmann\n Speak
 ers: Rainer Stentzel (BMI)\, Alissa Cooper (CDT)\nThis second session is 
 supposed to contribute to a better understanding of the processes themselv
 es as well as their underlying rationales. Attention will specifically be 
 commanded to existing approaches of technical privacy and data protection 
 requirements. The aim of this session is thereby to reconcile the politici
 ans’ and lawyers’ expectations concerning technical solutions with wha
 t is technically feasible.\n\n	Who are the stakeholders? How is standardiz
 ation organized? What are the processes? What is taken for granted in tech
 nical standards processes? How are these standards enforced?\n	What are si
 milarities and differences between standards for (protocol) designers and 
 operational recommendations issued by standard-developing organizations (S
 DO) respectively?\n	How came the IETF draft on Privacy Considerations for 
 Internet Protocols into being? What are the characteristics of its approac
 h? Are there further experiences with respect to standardization of techni
 cal privacy and data protection requirements?\n	What are the major obstacl
 es for standardization bodies concerning legal regulations and legal requi
 rements\, especially with regard to the area of privacy and data protectio
 n? How can they be addressed?\n\nSession 3: Bridging the gap\nModerator: C
 laus Schaale\n Speakers: TBA (EU Commission)\, Gunter Van de Velde (IETF)
 \, Fred Baker (IETF)\, Jörg Pohle (HIIG)\nIn order to link the general as
 pects mentioned above with specific cases “on the ground” the workshop
  will deal with the issue of cloud computing.\nThe goal is thereby to disc
 uss a set of recommendations concerning “operational privacy” or “pr
 ivacy management” in this field.\n\n	What is the Commission demanding fr
 om cloud computing providers and other stakeholders in the area of cloud c
 omputing with respect to privacy and data protection?\n	What are the exper
 iences with standardization in the area of cloud computing? (e.g. OpenStac
 k Initiative)\n	What are technically correct\, lay-person-useful\, and law
 yer-useful recommendations for “operational privacy” (comparable to Op
 sec)?\n	Is the “conventional approach” of ensuring compliance by certi
 fication (through third parties) still feasible in this field?\n\nWorkshop
  Style\nParticipants are requested to submit a position paper for the work
 shop. They are required to read all papers in preparation for the workshop
 .\nThe workshop will be structured as a series of working sessions. Each s
 ession will start with two or three short presentations by invited speaker
 s. Presentations will provide relevant background information or controver
 sial ideas worth discussing.\nThe workshop’s main focus will be on the d
 iscussions. Discussions will be results-oriented.\n\nThe workshop is not o
 rganised as a public event. If you would like to participate please contac
 t: joerg.pohle@hiig.de
CATEGORIES:Themen im Fokus
LOCATION:Room E034\, Faculty of Law / Kommode\, Bebelplatz 2\, 10099 Berlin
 \, Bebelplatz 2\, Berlin\, 10099\, Deutschland
X-APPLE-STRUCTURED-LOCATION;VALUE=URI;X-ADDRESS=Bebelplatz 2\, Berlin\, 100
 99\, Deutschland;X-APPLE-RADIUS=100;X-TITLE=Room E034\, Faculty of Law / K
 ommode\, Bebelplatz 2\, 10099 Berlin:geo:0,0
END:VEVENT
BEGIN:VTIMEZONE
TZID:Europe/Berlin
X-LIC-LOCATION:Europe/Berlin
BEGIN:DAYLIGHT
DTSTART:20130331T030000
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
END:DAYLIGHT
END:VTIMEZONE
END:VCALENDAR