Reboot Communications Limited HOME Reboot Communications: 'Delivering end-to-end conference management solutions.'
General Info Call for Papers Sponsors Info

12th Annual Privacy and Security Conference
Security and Privacy - Is there an app for that?

February 16th - 18th, 2011

Hosted by the Province of British Columbia Victoria Conference Centre
Victoria, BC, Canada


When: February 16 & 18, 2011

Where: The west coast of Canada in beautiful Victoria, British Columbia. The conference is held in the Victoria Conference Centre, downtown Victoria.1

Theme: 12th Annual Privacy and Security Conference will focus on enhanced collaboration and improved service delivery and citizen engagement through information sharing, while ensuring effective and appropriate privacy and security measures.

The call for papers is closed. Thank you for your submissions.


The Annual Privacy and Security Conference and Exposition is recognized as one of the top tier events in North America. Anyone working in the information privacy and security fields will benefit from the speakers, discussions and networking at the conference. Attendees are from every level both within government and private industry. The two-day conference draws an international audience of some 1,200 delegates with an interest in cutting edge policy, programs, law, research and technologies aimed at the protection of privacy and security.

Hosted by the Province of British Columbia, along with its partners and sponsors, the Annual Privacy and Security Conference is renowned for its outstanding content, world class experts and excellent peer to peer networking opportunities with industry and government leaders.

The Privacy and Security Conference Committee is pleased to extend an invitation to those working within the broad privacy and security communities to submit papers on their area of expertise. Of particular interest are briefs on cutting-edge subjects and themes suitable for presentation in either:

  • 1 hour presentation - In-depth speech that allows for detailed presentation of a topic and discussion time with attendees
  • 1 hour discussion panel - These are moderated panels where each speaker has an allotted time (usually 15-20 minutes) and discussions can occur both between the speakers and the attendees
  • 15 minute 'Lightning speech' - The 'lightning speech' is a concentrated presentation allowing the speaker to bring high energy and focus to a key area of interest. These speeches will be held in sequence as part of a one hour time slot.
  • 15 minute 'Second chance' - This is for keynote or 1 hour speakers who would also like to provide a summary version of their speech. These may be scheduled in the same or next day. This allows interested attendees to listen to topics they may otherwise have missed due to schedule conflicts. These will be held in sequence as part of a one hour time slot.

The Committee will be selecting the papers and issuing the invitations to selected speakers. The intellectual property rights of those submitting papers for review will be respected throughout the process.


All entries must be received by midnight of September 10, 2010. Invited speakers will be notified by September 30, 2010.


Submissions will be accepted electronically at:

Please provide the following information:

  • Speaker's name
  • Speaker's title
  • Organization the speaker works for or represents
  • Speaker's phone number
  • Speaker's e-mail address
  • Technical or Expertise level for attendees:
      Low: All attendees,
      Medium: Some background knowledge or experience,
      High: Lots of experience or subject matter experts.
  • The theme of the speech: Please see the suggested list below
  • Topic, in 25 words or less
  • The abstract of the speech, in 250 words or less
  • Speaker's bio in 200 words or less

Speaker topic list:

This is not an exhaustive or exclusive list. If another topic is of interest, please contact us in advance of your submission.

  1. Cloud computing
  2. Digital Rights Management - preventing unauthorized use of digital files
  3. Social Media
  4. IT Infrastructure - Terrorism/crime/e-warfare
  5. Smart Grid
  6. Identity Management
  7. Identity tracking and profiling
  8. Biometrics
  9. Smartcards and smart documents
  10. e-Government
  11. Surveillance
  12. Information Sharing
  13. Data Mining & Data Matching
  14. Law and Legislation
  15. Open Source
  16. Electronic Health Records
  17. Hacking
  18. Mobile life
  19. Diverse platform security
  20. Managing resource access
  21. Virtualization
  22. Workplace privacy
  23. Electronic commerce, including Payment Card Industry (PCI)
  24. Routine Release

Presentation Types:

  • Issue papers: An executive or management briefing on a prominent issue or aspect of information privacy or security.
  • Case studies: Descriptions of a given information privacy or security situation or incident, or research results. Names of organizations can be kept anonymous to maintain confidentiality if necessary.
  • New technology research: Results or developments in cutting edge research on new information privacy and security technologies.
  • Sociological / Philosophical perspective: A candid and/or introspective look at the impacts of new technological developments on privacy, security, social consciousness, or social functioning.

Have Questions or Need More Information?

  • For conference content, theme and agenda questions, please contact: [email protected]
  • For venue and conference administration questions, please contact: Reboot Communications Ltd. at 1-604-534-0537, or [email protected]
  • For sponsorship questions, please contact Reboot Communications Ltd. at 1.250.388.6060 or [email protected]

Register Now
Contact Us
Reboot Communications Ltd.
Suite 814, 21 Dallas Road
Victoria, BC, Canada, V8V 4Z9

Phone: 1.250.388.6060
Fax: 1.250.595.1793

Marketing & sponsorship information
Click Here or call

Registration, logistics & general inquiries
Click Here or call

Follow the Conference on


Reboot Communications Ltd. reserves the right to make changes or amendments to the program and speakers, or to cancel sessions if enrollment criteria are not met, or when conditions beyond its control prevail. Please note that all sessions are filled on a first come, first seated basis. All recording devices and cameras are prohibited.