Programme overview 2016: Difference between revisions
Line 252: | Line 252: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="4" bgcolor="#B0C4DE" width="872"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="4" bgcolor="#B0C4DE" width="872"| | ||
Key notes: | '''Key notes:''' | ||
::Andrus Ansip, Vice President of the European Commission | ::Andrus Ansip, Vice President of the European Commission | ||
::Thorbjørn Jagland, Secretary General of the Council of Europe | ::Thorbjørn Jagland, Secretary General of the Council of Europe | ||
Line 263: | Line 263: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" rowspan="2" bgcolor="#FFFACD" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" rowspan="2" bgcolor="#FFFACD" width="542"| | ||
[[PL 3: The rules of the digital world – economy versus human rights]] | '''[[PL 3: The rules of the digital world – economy versus human rights]]''' | ||
<div style='margin-bottom: 0in;'></div> | <div style='margin-bottom: 0in;'></div> | ||
Line 272: | Line 272: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | ||
[[F7: ICANN - IANA transition]] | '''[[F7: ICANN - IANA transition]]''' | ||
|- | |- | ||
Line 286: | Line 286: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFFACD" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFFACD" width="542"| | ||
[[PL 3a: From cybersecurity to terrorism - are we all under surveillance?]] | '''[[PL 3a: From cybersecurity to terrorism - are we all under surveillance?]]''' | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" rowspan="6" width="214"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" rowspan="6" width="214"| | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | ||
[[F8: UNESCO and Internet Issues]] | '''[[F8: UNESCO and Internet Issues]]''' | ||
|- | |- | ||
Line 301: | Line 301: | ||
|- | |- | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFB6C1" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFB6C1" width="542"| | ||
[[WS 5: Cybersecurity revisited, or are best practices really best?]] | '''[[WS 5: Cybersecurity revisited, or are best practices really best?]]''' | ||
<div style='margin-bottom: 0in;'></div> | <div style='margin-bottom: 0in;'></div> | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | ||
[[F9: World Economic Forum—Future of the digital economy and society ]] | '''[[F9: World Economic Forum—Future of the digital economy and society ]]''' | ||
|- | |- | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#fff0f5" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#fff0f5" width="542"| | ||
[[WS 6: Uncovering the DNA of European IG(F) initiatives ]] | '''[[WS 6: Uncovering the DNA of European IG(F) initiatives ]]''' | ||
<div style='margin-bottom: 0in;'></div> | <div style='margin-bottom: 0in;'></div> | ||
Line 316: | Line 316: | ||
|- | |- | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#87CEFA" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#87CEFA" width="542"| | ||
[[WS 7: Zero rating what is it?]] | '''[[WS 7: Zero rating what is it?]]''' | ||
<div style='margin-bottom: 0in;'></div> | <div style='margin-bottom: 0in;'></div> | ||
Line 323: | Line 323: | ||
|- | |- | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#F0FFF0" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#F0FFF0" width="542"| | ||
[[WS 8: Empowerment through education]] | '''[[WS 8: Empowerment through education]]''' | ||
<div style='margin-bottom: 0in;'></div> | <div style='margin-bottom: 0in;'></div> | ||
Line 340: | Line 340: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFFACD" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFFACD" width="542"| | ||
[[PL 3b: Intermediaries and human rights - between co-opted law enforcement and human rights protection]] | '''[[PL 3b: Intermediaries and human rights - between co-opted law enforcement and human rights protection]]''' | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" rowspan="6" width="214"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" rowspan="6" width="214"| | ||
Line 347: | Line 347: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | ||
[[F10: Live Demo: the Global Internet Policy Observatory]] | '''[[F10: Live Demo: the Global Internet Policy Observatory]]''' | ||
|- | |- | ||
Line 357: | Line 357: | ||
|- | |- | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFB6C1" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFB6C1" width="542"| | ||
[[WS 5 follow up: The future of cybersecurity in Europe - from state of play to state of art.]] | '''[[WS 5 follow up: The future of cybersecurity in Europe - from state of play to state of art.]]''' | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | ||
[[F11: Open Government and its interconnections with Internet governance]] | '''[[F11: Open Government and its interconnections with Internet governance]]''' | ||
|- | |- | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#87CEFA" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#87CEFA" width="542"| | ||
[[WS 7 follow up: Impact of zero rating ]] | '''[[WS 7 follow up: Impact of zero rating ]]''' | ||
<div style='margin-bottom: 0in;'></div> | <div style='margin-bottom: 0in;'></div> | ||
Line 372: | Line 372: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#87CEFA" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#87CEFA" width="542"| | ||
<div style='margin-bottom: 0in;'></div> | <div style='margin-bottom: 0in;'></div> | ||
[[WS 9: Signed, sealed - deciphered? Holding algorithms accountable to protect fundamental rights]] | '''[[WS 9: Signed, sealed - deciphered? Holding algorithms accountable to protect fundamental rights]]''' | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | ||
|- | |- | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#F0FFF0" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#F0FFF0" width="542"| | ||
[[WS 10: Confronting the digital divide (2) - Refugees, human rights and Internet access]] | '''[[WS 10: Confronting the digital divide (2) - Refugees, human rights and Internet access]]''' | ||
<div style='margin-bottom: 0in;'></div> | <div style='margin-bottom: 0in;'></div> | ||
Line 394: | Line 394: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#fff0f5" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#fff0f5" width="542"| | ||
[[PL 4: Internet fragmentation and digital sovereignty: implications for Europe]] | '''[[PL 4: Internet fragmentation and digital sovereignty: implications for Europe]]''' | ||
<div style='margin-bottom: 0in;'></div> | <div style='margin-bottom: 0in;'></div> | ||
Line 400: | Line 400: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | ||
[[Fl12: Next generation cybersecurity regulations and an outdated export control regime]] | '''[[Fl12: Next generation cybersecurity regulations and an outdated export control regime]]''' | ||
|- | |- |
Revision as of 13:03, 25 May 2016
EuroDIG programme 2016 with links to all session pages.
Pre events. Wednesday 8. June 2016
Time |
Pre-Events | |||
14:00 - 18:00
|
Co-designing the Global Internet Policy Observatory (GIPO) 2016 |
|||
18:00 - 20:00 |
Welcoming cocktail sponsored by Google with Alexander De Croo, Deputy Prime Minister of Belgium
|
THURSDAY 9. June 2016
Time |
Main track |
Side event |
Flash session | |
08:00 |
Registration | |||
09:00 |
Welcoming address:
| |||
09:30 |
Embracing the digital (r)evolution. Expectations and thoughts from the audience (moderated open mic session) | |||
11:00 |
Coffee break | |||
11:30 |
PL 1 Part 1: Will users' trust impact on transnational data flows? |
|||
13:00 |
Lunch break | |||
14:00 |
Key note. Günther Oettinger, EU Commissioner for Digital Economy & Society, European Commission | |||
14:30
|
F1:The interplay of data protection principles provided for by the GDPR and data-driven innovation | |||
14:30
Parallel
workshops
| ||||
WS 2: Confronting the digital divide (1) - Internet Access and/as Human Rights for Minorities |
||||
WS 3: Technical basics everyone should know before discussing online content control |
| |||
WS 4: Your IG Ecosystem may be out of date. Please check for updates |
||||
16:00 |
Coffee break | |||
16:30 |
Lightning talk: The future in 2026 - the perspective of a global player |
|||
17:00 |
||||
F5: Online sexual exploitation of children - challenges and legal response | ||||
20:00 |
Social event: "Get ready for a fabulous night in the seventies!" at Hotel de la Poste |