Workshop 1: The Consumer Experience
May 14, 2003

Workshop 2: The Business Experience
June 4, 2003

Federal Trade Commission
Conference Center
601 New Jersey Ave, NW
Washington, DC 20001

Technology has been widely heralded as a promising solution to the challenges presented by consumer privacy and information security. A number of products promise to help consumers and businesses control sensitive information and guard against internal and external threats; technology is also frequently cited as the best method for managing information and ensuring information security. As more and more consumers use “always on” Internet connections and share personal information online, it is useful to examine the current role of technology in addressing privacy and security issues.

The workshops being announced will focus on the role technology plays for both consumers and businesses. Consumers may have more technologies available to help them protect their personal information, but it is unclear whether consumers are using these technologies and whether these products reflect the needs of consumers in this area. Businesses may also be using new technologies to scan their Web sites for vulnerabilities and encode privacy restrictions directly into stored data, but it is equally unclear whether technology is meeting the privacy and security needs of businesses.

The workshops will foster a wide-ranging discussion on these issues. They will also examine whether and what progress has been made in the security area since the Federal Trade Commission’s May 2002 workshop on consumer information security.

Click here for details on ordering videotapes of the workshops.

Staff Workshop Report: Technologies for Protecting Personal Information [PDF only 48K]
Agendas
The Consumer Experience: May 14, 2003
The Business Experience: June 4, 2003
Transcripts

The Consumer Experience: May 14, 2003

Full Transcript (515k)
Welcoming Remarks (36k)
Panel 1: Consumer Tools for Managing the Collection and Use of Personal Information (111k)
Panel 2: Consumer Tools for Managing Information Security (97k)
Introductory Remarks for Afternoon Panels (14k)
Panel 3: Making Effective Use of Technology: Understanding Consumer Behavior (115k)
Panel 4: Building Protections into the Architecture of Identity Management Systems (100k)
Panel 5: Building Security into the Architecture for Safer Computing (71k)
Closing Remarks (23k)
The Business Experience: June 4, 2003
Full Transcript (496k)
Welcoming Remarks (31k)
Panel 1: The Process of Protecting Consumer Information: Creating a Business Plan Using a Hypothetical (139k)
Panel 2: Business Tools for Protecting Consumer Information (116k)
Panel 3: Current and Emerging Frameworks for Protecting Consumer Information (95k)
Panel 4: Designing Technologies to Protect Consumer Information (138k)
Closing Remarks (13k)

The Consumer Experience: Panelist Presentations
[PowerPoint files. Best viewed with Internet Explorer 5 or higher]

Panel 1: Consumer Tools for Managing the Collection and Use of Personal Information
Lorrie Faith Cranor, AT&T Labs
     
An Analysis of P3P Deployment on Commercial, Government, and Children’s Web Sites as of May 2003
Stephanie Perrin, Digital Discretion, Inc.
Panel 2: Consumer Tools for Managing Information Security
Larry Clinton, Internet Security Alliance
Richard M. Smith, Computerbytesman.com
Michael Willett, Security and Privacy Consultant
Panel 3: Making Effective Use of Technology: Understanding Consumer Behavior
Andrew Patrick, National Research Council of Canada
Mary J. Culnan, Bentley College
Donna Hoffman, Vanderbilt University
Nathaniel Wood, FTC
Panel 4: Building Protections into the Architecture of Identity Management Systems
Lynette Millett, National Academy of Sciences
Ari Schwartz, Center for Democracy and Technology
Panelist Bios [PDF]

The Business Experience: Panelist Presentations
[PowerPoint files. Best viewed with Internet Explorer 5 or higher]

Panel 1: The Process of Protecting Consumer Information: Creating a Business Plan Using a Hypothetical
Joseph Alhadeff, Oracle Corporation
Larry Ponemon, Ponemon Institute
Panel 2: Business Tools for Protecting Consumer Information
Steven Adler, IBM Tivoli Security & Privacy Software
Robert Gratchner, Corporate Privacy Manager, Intel Corporation
Panel 3: Current and Emerging Frameworks for Protecting Consumer Information
Larry Clinton, Internet Security Alliance
Fran Maier, TRUSTe
Panel 4: Designing Technologies to Protect Consumer Information
Kathy Bohrer, IBM Research
Federal Register Notice
Public Comments
The comment period for filing comments pertaining to the workshop has been extended through June 20th. Instructions for filing comments can be found in the Federal Register Notice.
Consumer & Business Information
More Information
 
Bullet Press Release (2/21/03)
Bullet Local Restaurants and Hotels
Bullet Directions between FTC buildings [PDF]