ACI 3rd Advanced Summit
-
Upload
raden-kertanegara -
Category
Documents
-
view
230 -
download
0
Transcript of ACI 3rd Advanced Summit
-
8/13/2019 ACI 3rd Advanced Summit
1/8
Gain Invaluable Local Insights on Global Encryption Controls Requiremenand Policy Developments
April 18 19, 2012 Hilton San Francisco Airport Bayfront San Francisco,
Register Now 888-224-2480 AmericanConference.com/encryption
Earn
CLECredits
GLOBALENCRYPTIONCONTROLS
American Conference Institutes
3rdAdvanced Industry Summit on Complying with
CHINA:Working with Chinese agencies to acilitate your encryption imports
RUSSIA: Determining what is required to secure a license
ISRAEL:Complying with encryption registration and distribution requirementsto prevent penalties and license revocation
HONG KONG & MALAYSIA:Minimizing transshipment and re-export challenges
MEXICO:How new export controls wil l impact your encryption compliance strategy
INDIA:Understanding restrictions on key length and strength o encry ption
UK/IRELAND/NETHERLANDS: Interpretating the Cryptography Note and typeso required licenses
CLOUD COMPUTING:Minimizing the risks o unauthorized technology transerspresented by shared networks and collaborative platorms
INTERNATIONAL AGREEMENTS: How the Wassenaar Arrangement, rans Paci icPartnership and WO aect the import/export o your cryptography
Interactive Working Groups April 17, 2012
Group A: When andHow to Obtain an ERN, Apply License Exception ENC and Sel-ClassiA Practical Guide to What Every Export Controls Proessional Needs to Know
Group B: Employee ravel with Encryption Controlled-Items: Preventing Unauthorized Accand Setting up Internal Compliance Procedures or International ravel
Insights on Russias
Membership in the WTO:
Elizabeth Hafner
Director or Russiaand Northern EurasiaOffice of the U.S. TradeRepresentative
International Perspectives:
Alexander ZubarevInormation Security DirectorHewlett Packard(Russia)
Nora OchoaLatin America Regional radeCompliance Manager
Weatherford(Mexico)Michael MorganLabarge Weinstein (Canada)
Eric CarlsonCovington & Burling(China)
Eyal Roy SageAYR(Israel)
Anita EsslingerBryan Cave(London)
Media and Association Partners:
FullyUpdat
2012MoreFoc
InternationalRegulati
Google
Xilinx
Apple
Cisco Systems
Chevron
NetIQ
Hewlett-Packard
QLogic
Weatherford
Symantec
Ingram Micro
Practical Compliance
Strategies from:
-
8/13/2019 ACI 3rd Advanced Summit
2/8Register now: 888-224-2480 Fax: 877-927-1563 AmericanConference.com/encryption
Meet and Benchmark with In-House, Government and Private Practice
Speakers from the U.S. and Abroad.
See Why Export Professionals Attend this Unique Conference Each Year
to Learn the Latest on Global Encryption Controls.
I enjoyed the interaction among panelists and with the audience Qualcomm, Inc.
Conference organization, speaker selection and information delivered were perfect. Hitachi Data Systems (Ru
I learned a lot about the main focus areas. Dell Inc.
How this conference differs from other events: American Conference
Institutes 3rd Advanced Summit on Global Encryption Controls is an
industry-led program that wil l provide an optimal benchmarking opportunity
or companies on how to reduce new, complex and emerging compliance risks
worldwide. Dont miss this opportunity to obtain critical inormation that is
not available in print or on the web.Network and learn rom export counsel
and compliance oicers experienced in navigating foreign encryption
control regulations,in key jurisdictions, including China, Asia andEurope.
Countries such as China, Russia, India, France, Ireland, the UK and Canada
are all developing comprehensive laws on the import and export o encryption
items requiring speciic licenses or authorizations to import, use and export
items with encryption technology.
he Wassenaar Arrangement and other international agreements such
as the Trans Pacific Partnership,are becoming more inluential as countries
seek to work together on developing a comprehensive set o encryption
regulations. Knowing each countrys specific laws is essential for companies
that do business on a global scale.
As the global landscape is changing dramatically each year, exportcompliance proessionals must understand both oreign and U.S. encryption
regulations. More and more, companies are using encryption items to
protect the integrity o their inormation. In addition, more employees are
traveling internationally, bringing up the chal lenge o remaining compliant
with import laws as they enter each country.
he need or a comprehensive compliance program that incorporates all
regulations and policy developments is necessary to prevent severe monetary
fines, loss of import/export privileges and criminal penalties.
Key topics will include:
How international agreementsaect the import and export
o cryptography
Obtaining export permits from the SEMBinChina
Preventing steep ines or export violations in Malaysia and Hong K
How to handle technology transfers through cloud computing
without violating encryption regulat ions around the globe
Russias recent joining of the WTO,the U.S.-Russia 2006 Bilateral
Agreement and what this means or your export compliance progra
How to use Ireland and the Netherlandsas key sotware and hardw
EU distribution centers
Complying with Israeli encryption registrationand distribution
requirements to prevent strict penalties and l icense revocation
Complying with Canadianand Mexicanexport controls to prevent
business losses and delays
Also, benefit from i nteractive pre-summit working groups:
April 17, 2012
Group A: When and How to Obtain an ERN, Apply License Excep
ENC, and Sel-Classiy: A Practical Guide to What Every Export Con
Proessional Needs to Know
Group B:Employee ravel with Encryption Controlled-Items: Preven
Unauthorized Access and Setting up Internal Compliance Procedures
International ravel
Reserve your seat early by calling 1-888-224-2480, axing your registra
to1-877-927-1563 or registering online at:
www.americanconference.com/encryption
Vice Presidents, Directors and Managers of : Export and Import Compliance
Export Administration
Export and Import Controls
IT Security
Export Policy
Export Licensing
International Trade Compliance
Government Affairs
Corporate Counsel Import and Export Compliance
International Trade Counsel
Trade and Regulatory Counsel
Private practice attorneys and consultants practicing in: Export controls
International trade
Corporate Compliance and Governance
E-commerce
Chief Technology Officers Engineers
A Must-Attend Event For
-
8/13/2019 ACI 3rd Advanced Summit
3/8Register now: 888-224-2480 Fax: 877-927-1563 AmericanConference.com/encryption
MAIN CONFERENCE DAY 1
Wednesday, April 18, 2012
8:00 Registration Opens
9:00 Opening Remarks by Conference Co-Chairs
9:15 How International Agreements Affect theImport & Export of Cryptography: Wassenaar
Arrangement, Trans Pacific Partnership
and the WTO
10:30 Networking Coffee Break
10:45 CHINA:Overcoming Import and ExportChallenges Posed by Your Encryption-Related
Items and Technology
11:45 INDIA:Incorporating Emerging EncryptionCompliance Risks and Business Development
Opportunities into Your Global Export Program
12:45 Networking Lunch
2:00 HONG KONG & MALAYSIA:MinimizingTransshipment and Re-Exports Challenges
2:45 Refreshment Break
3:15 CLOUD COMPUTING: Reducing ComplianceRisks Posed by Shared Networks and
Collaborative Platforms
4:30 CANADA: Complying with Complex EncryptionRegulations to Prevent Business Losses, Delays
and Reduced Competitiveness
5:15 End of Day 1
MAIN CONFERENCE DAY 2
Thursday, April 19, 2012
9:00 Conference Co-Chairs Opening Remarks
9:05 U.S. Encryption Policy Update:Status Report on Current and Pending EAR,
ITAR and OFAC Reforms
9:35 Russias Membership in the WTO and theU.S.- Russia 2006 Bilateral Agreement:
The Latest on Russia Encryption Compliance
Expectations and Inter-Agency Cooperation
10:05 Coffee Break
10:20 CUSTOMS UNION OF RUSSIA, KAZAKHSTA& BELARUS:Satisfying Complex EncryptionImport Licensing Requirements
11:30 NETHERLANDS & IRELANDas Key Softwareand Hardware Distribution Centers: Overcomin
Clearance, Re-Export and Tax Implications
12:30 Networking Lunch
1:45 ISRAEL: Complying with Encryption Registratioand Distribution Requirements to Prevent Stric
Penalties and License Revocation
2:45 Networking Break
3:00 MEXICO: Managing the Practical Impactof New Export Controls on your Encryption
Compliance Strategy
4:00 Lessons Learned for Updating Your GlobalEncryption Compliance Program
Email questions to [email protected]
5:00 End of Summit
AGENDA AT-A-GLANCE
Group A: 9:00am 12:30pm
When and How to Obtain an ERN, ApplyLicense Exception ENC and Self-Classify:A Practical Guide to What Every ExportControls Professional Needs to Know
Group B: 1:30pm 5:00pm
Employee Travel with Encryption ControlleItems: Preventing Unauthorized Access anSetting up Internal Compliance Proceduresfor International Travel
INTERACTIVE WORKING GROUPS Tuesday, April 17, 2012
-
8/13/2019 ACI 3rd Advanced Summit
4/8Register now: 888-224-2480 Fax: 877-927-1563 AmericanConference.com/encryption
Working Group A9:00am 12:30pm
When and How to Obtain an ERN, Apply
License Exception ENC, and Self-Classify:A Practical Guide to What Every Export
Controls Professional Needs to Know
Steve BirdExport Compliance ManagerCisco Systems, Inc. (San Jose, CA)
Karla HaynesExport/Import Compliance AttorneyChevron Corporation (San Ramon, CA)
Export compliance proessionals in the high tech, oil& gas, nance, deense and health care industries ace
daunting compliance challenges impacting the exporto encryption-controlled items. Benet rom strategic,proven-effective licensing and compliance strategies atthis highly in-depth, practical working group. Understandwhen to sel-classiy v. seek a government review, utilizeexception ENC to expedite exports, and know when andhow to obtain an ERN rom a manuacturer.
Topics include:
What is an ERN and how do you obtain oneWhat is SNAP-R and how do you use itHow to determine i an item is 740.17 (b)(2), (b)(3),or (b)(1) under the new product descriptionsWhen to update your company registration and
whether to rely on a manuacturers sel-classicationand registrationHow do you sel-classiy an item or determine i anitem is subject to controls under 740.17When is sel-classication permitted and what productinormation is suffi cientReview o items with weak encryption and authenticationWhen and how to prepare a Supplement No. 8 report
Working Group B1:30pm 5:00pm
Employee Travel with Encryption
Controlled-Items: Preventing UnauthorizedAccess and Setting up Internal Compliance
Procedures for International Travel
Dr. Alexander ZubarevInormation Security DirectorHewlett-Packard (Moscow, Russia)
Darie Achstein-ConwayGlobal rade and Compliance ManagerQLogic Corporation (Orange County, CA)
Melissa DuffyAttorney
Hughes Hubbard & Reed LLP (Washington, DC)Which export/import regulations do you need comply with when you are traveling abroad withencrypted Blackberry or laptop? What are some bpractices or providing clean machines? What are sologistical challenges that multi-national companies when conducting business around the world?
Tis interactive working group is designed to provspecic examples o what you should do when travewith encryption items outside the U.S. Please bring yquestions to this session, as ample time will be usedaddress common challenges aced by industry.
opics will include:Complying with section 734.2 (b)(9), 740.17 (a)(2),and 740.9(a) (temporary exports)Determining what type o license is required ora oreign nationalDealing with oreign import and re-export controlson encrypted items transported by employeesWhat is the proper procedure or carrying a productor technical data out o the U.S.Working with HR and other affected departmentsto assess risks o unauthorized accessracking employee transers to a new location andsuccession planning: Ensuring EAR compliance when
assigning employees to new projects and rolesProtecting technical data on laptops or employee traWhen emails should be encrypted
PRE-CONFERENCE WORKING GROUPSTuesday, April 17, 2012
Accreditation will be sought in those jurisdictions requested by theregistrants which have continuing education requirements. Tis courseis identied as nontransitional or the purposes o CLE accreditation.
ACI certies that the activity has been approved or CLE credit by theNew York State Continuing Legal Edu cation Board in t he amount o 8.5 hours.An additional 4.0 credit hours will apply to each workshop participation.
ACI certies that this activity has been approved or CLE credit by the State Baro Caliornia in the amount o 11.0 hours. An additional 3.5 credit hours willapply to each workshop participation.
You are required to bring your state ba r number to complete the appropriatestate orms during the conerence. CLE credits are processed in 4-8 weeks afa conerence is held.
ACI has a dedicated team which processes requests or state approval. Pleasenote that event accreditation varies by state and ACI will make every effortto process your request.
Questions about CLE credits or your state? Visit our online CLE Help Centat www.americanconerence.com/CLE
CLECredits
Continuing Legal Education Credits
-
8/13/2019 ACI 3rd Advanced Summit
5/8Register now: 888-224-2480 Fax: 877-927-1563 AmericanConference.com/encryption
DAY 1 Wednesday, April 18, 2012
8:00 Registration Opens
9:00 Opening Remarks by Conference Co-Chairs
Steve BirdExport Compliance ManagerCisco Systems (San Jose, CA)
Roszel C. Tomsen, IIIPartnerTomsen & Burke LLP (Baltimore, MD)Co-Chair, Encryption Working Group,Bureau of Industry and Securitys InformationSystems Technical Advisory Committee
9:15 How International Agreements Affect
the Import and Export of Cryptography:
Wassenaar Arrangement, Trans Pacific
Partnership and the WTO
Michael F. AngeloSenior Architect , Offi ce o the CONetIQ Corporation (Houston, X)Co-Chair, Encryption Working Group, Bureau of Industryand Securitys Information Systems Technical AdvisoryCommittee
Elizabeth HafnerDirector or Russia and Northern EurasiaOffi ce o the U.S. rade Representative (Washington, DC)
Danielle KrizDirector, Global Cybersecurity PolicyInormation echnology Industry Council(Washington, DC)
Join our panelists or an in-depth discussion on thetransorming global landscape o encryption controls,and the key policies and agreements that are impactingyour compliance strategies. Each panelist brings uniqueexperience, having been personally involved in theprocess and negotiations that are helping to shape thisnew global encryption controls environment.
10:30 Networking Coffee Break
10:45 CHINA: Overcoming Import and ExportChallenges Posed by Your Encryption-Related
Items and Technology
Joseph KimDirector, Global rade ComplianceXilinx (San Jose, CA)
Eric CarlsonCovington & Burling LLP (Beijing, China)
Working with Chinese agencies to aci litateyour importsIdentiying when a CCAS is required
MOFCOM
General Administration o CustomsMinistry o Foreign AffairsSEMB
Obtaining export permits rom the State EncryptioManagement Bureau (SEMB)Understanding Chinas export control regime,MOFCOM administration, and Foreign rade LawPreventing product conscation, oreiture o illegaincome, and criminal prosecution
11:45 INDIA:Incorporating Emerging EncryptionCompliance Risks and Business Developme
Opportunities into Your Global Export Program
Dr. Kamlesh BajajChie Executive Offi cerData Security Council o India (DSCI) (New Delhi, Ind
Roszel C. Tomsen, IIIPartnerTomsen & Burke LLP (Baltimore, MD)
Joel M. Margolis
Director, Policy AdvocacyU.S.-India Business Council (Washington, DC)
Working with the Department o Inormationechnology, Ministry o Communications andInormation echnology to help acilitate entryo your encrypted products into IndiaRestrictions on key length and strength o encryptiStatus o regulations on importing encryptedhardware and security implications o encryption-related items coming in countryImplementation o requirements on telecomcompanies to provide source codeReview o key policy developments affecting your
compliance status
12:45 Networking Luncheon for Attendees
and Speakers
2:00 HONG KONG & MALAYSIA:MinimizingTransshipment and Re-Exports Challenges
Darie Achstein-ConwayGlobal rade and Compliance ManagerQLogic Corporation (Orange County, CA)
Complying with permit requirements and useo permit exceptions
Impact o the Strategic Trade Act (STA) Regulationsof 2010Addressing re-export concerns when sendingproducts into China through Hong KongObtaining permits in Malaysia, including: singleuse, multiple use, bulk or specialApplying applicable exceptions to permitrequirements in MalaysiaPreventing severe penalties or export violations,including steep nes and imprisonmentOperating within the new vetting process or movingencrypted goods
-
8/13/2019 ACI 3rd Advanced Summit
6/8
With more than 500 conerences in the United States, Europe, Asia Pacic,and Latin America, American Conference Institute (ACI) provides a diverseportolio devoted to providing business intelligence to senior decision makers whoneed to respond to challenges spanning various industries in the US and aroundthe world.
As a member o our sponsorship aculty, your organization will be deemed asa partner. We will work closely with your organization to create the perectbusiness development solution catered exclusively to the needs o your practicegroup, business line or corporation.
For more inormation about this program or our global portolio o events,please contact:
Wendy ylerHead o Sales, American Conerence Instituteel: 212-352-3220 x5242 | Fax: [email protected]
Global Sponsorship Opportunities
Register now: 888-224-2480 Fax: 877-927-1563 AmericanConference.com/encryption
2:45 Refreshment Break
3:15 CLOUD COMPUTING:ReducingCompliance Risks Posed by Shared
Networks and Collaborative Platforms
Ramakrishna DasariProduct & echnology Classication ManagerApple Inc. (Cupertino, CA)
Neil Martinrade Compliance ManagerGoogle (Mountain View, CA)
Te challenge o nding a common denitionor cloud computing and why vocabulary mattersHow to identiy the agencies that regulate yourcloud computing products and servicesHow to dissect cloud computing services andassess your regulatory obligations or each aceto the productBest practices or compliance, such as implementingIP lters and restricted-party screening
4:30 CANADA:Complying with ComplexEncryption Regulations to Prevent Business
Losses, Delays and Reduced Competitiveness
Michael MorganPartnerLabarge Weinstein (Ottawa, Canada)
Obtaining necessary permits with the rade Controls& echnical Barriers Bureau (CBB)Impact o the October 2010 Export Controls Divisiono Foreign Affairs and International rade Canada(ECD) policies on permits or export or transer o
inormation security goods, sofware and technologyEstabl ishing an effi cient and comprehensivecompliance plan to ensure export and transero controlled goods and technologyObtaining different Canadian permits including:Multi-destination, broad based, co-development,and regime decontrol permits
5:15 End of Day 1
DAY 2 Thursday, April 19, 2012
9:00 Conference Co-Chairs Opening Remarks
9:05 U.S. Encryption Policy Update:
Status Report on Current and Pending
EAR, ITAR and OFAC Reforms
Daniel M. Fisher-Owens
PartnerBerliner, Corcoran & Rowe LLP (San Francisco, CA)
State o play or ERN ling and sel-classicationreportingImpact o potential restructuring on category 13o the USML: Commercial v. military encryptionU.S. perspective on potential Wassenaar reormsto Category 5, Part 2How the changes to OFAC general license orpersonal communications/ web browsers hasimpacted export operations
9:35 RUSSIAs Membership in the WTO andthe U.S.- Russia 2006 Bilateral AgreemenThe Latest on Russia Encryption Complian
Expectations and Inter-Agency Cooperatio
Elizabeth HafnerDirector or Russia and Northern EurasiaOffi ce o the U.S. rade Representative (Washington, D
Betsy Haner will provide strategic insight on the curRussian import and export requirements or encrypitems. Hear the latest on how these recent developmeimpact your export program and what to watch outin 2012 rom the FSB in Russia.
10:05 Networking Coffee Break
10:20 CUSTOMS UNION OF RUSSIA,KAZAKHSTAN & BELARUS:SatisfyingComplex Encryption Import Licensing
Requirements
Dr. Alexander ZubarevInormation Security DirectorHewlett-Packard (Moscow, Russia)
Lynn WallaceManager, rade Compliance
Symantec Corporation (Mountain View, CA)Michael . GershbergO CounselSteptoe & Johnson LLP (Washington, DC)
What is required to secure a licenseDetermining what proprietary inormation is protecand increasing your communication with the FSBFSBs denition o strong encryptionComplying with requirements or bulk productswith identical encryption parametersReconciling US encryption export rules with Russiimport licensing requirements
-
8/13/2019 ACI 3rd Advanced Summit
7/8
he speakers are great! Huawei Symantec
Did a good job at obtaining local speakers Goo
Very informative forum and excellent networking Exxon M
American Conference Institute, 20
Whether mass market items quali y or noticationrequirementsManaging the effect o the new rule on mobile devicesNew initiatives on simplication o import o productswith cryptography in the CU countries
11:30 NETHERLANDS & IRELAND as KeySoftware and Hardware Distribution Centers:
Overcoming Clearance, Re-Export and
Tax Implications
Anita C. EsslingerPartnerBryan Cave LLP (London, England)
Daniel MinutilloPartnerDCM, A Proessional Law Corporation(San Francisco, CA)
Understanding where the exporter is establishedand knowing which export control authorityis the regulator
Comparing EU/UK/Irish export encryption controls Comparison to CCL and the absence o 992and EAR99 on the EU Dual-Use ListUnderstanding what licenses are availablein the UK and IrelandWorking with Customs to declare and clearyour goods in the NetherlandsWorking within the Irish export control systemor exporting US-origin goodsKey regulatory differences or EU distribution throughIreland vs. UK: Hardware v. sofware distribution
12:30 Luncheon for Attendees and Speakers
1:45 ISRAEL:Complying with EncryptionRegistration and Distribution Requirements
to Prevent Strict Penalties and License
Revocation
Ramakrishna DasariProduct & echnology Classication ManagerApple Inc. (Cupertino, CA)
Eyal Roy SagePartnerAmar Reiter Jeanne Sage Cohen & Co. (el Aviv, Israel)
How to distribute, register and notiy the IsraeliGovernment o your encryption products cominginto the countryWorking with Israels Ministry o Deense (MOD)to ensure complianceHow Israels I and cryptography industry t intotheir national security rameworkWorking with the Director-General to acilitatethe granting o encryption licensesObtaining special, restricted and general uselicenses, and dening ree meansHow to prepare a successul license application,and license renewals
2:45 Refreshment Break
3:00 MEXICO: Managing the Practical Impactof New Export Controls on your Encryption
Compliance Strategy
Martin HagermanPartnerHagerman Abogados (Mexico City, Mexico)
Nora OchoaLatin America Regional rade Compliance ManagerWeatherord (Mexico City, Mexico)
Review o the new Mexican export control regulatioand when they go into effectScope o controlled products, and restriction on settinup a new entity in MexicoWhen and how to le an end-user statementWhen to le a license per sales order or a blanket licenDetermining which exemptions are available or youencryption itemsWhen would you be subject to the regulations
as a multinational corporation, and what triggerscompliance requirements
4:00 A Round-Up of Encryption Controls Complian
Best Practices: Lessons Learned for Updating
Your Global Encryption Compliance Program
Led by:
Steve BirdExport Compliance ManagerCisco Systems (San Jose, CA)
Linda Gamaunt
Senior Export AnalystIngram Micro Inc. (Santa Ana, CA)
At this unique panel, you will hear directly roindustry experts on their experiences and challengto implementing and monitoring a global encrypticompliance program. Learn key lessons on how to bleconicting U.S. and oreign requirements, and prepare increased global encryption regulation and enorcemeTis interactive discussion will have ample time or Q &so please submit questions beore the Summit!
Email questions [email protected].
5:00 End of Summit
Register now: 888-224-2480 Fax: 877-927-1563 AmericanConference.com/encryption
Benchmarkingand
ComplianceStrategy
Panel
-
8/13/2019 ACI 3rd Advanced Summit
8/8
R E G I S T R A T I O N F O R M
ATTENTION MAILROOM: If undeliverable to addressee, please forward to:VP/Director/Manager, Export Compliance; International Trade Counsel
CONFERENCE CODE: 883L12-SNF
YES! Please register the following delegate for Global Encryption Controls
PRIORITY SERVICE CODE
883L12_WEB
SPECIAL DISCOUNT
We offer special pricing for groups and government emPlease email or call for details.
Promotional discounts may not be combined. ACIoffersscholarships for government employees, judges, law s
non-profit entities and others. For more informati
please email or call customer service.
To reserve your copy or to receive a catalog of ACItitlewww.aciresources.com or call 1-888-224-248
CONFERENCE PUBLICATIONS
PAYMENT
Please charge my VISA MasterCard AMEX Please invoice me
NUMBER EXP. DATE
CARDHOLDER
I have enclosed my check for $_______ made payable toAmerican Conference Institute(T.I.N.98-0116207)
ACH Payment ($USD)Please quote the name of the attendee(s) andthe event code 883L12 as a r eference.
For US registrants:Bank Name: HSBC USAAddress: 800 6th Avenue, New York, NY 10001Account Name: American Conference InstituteUPIC Routing and Transit Number: 021-05205-3UPIC Account Number: 74952405Non-US residents please contact Customer Service
for Wire Payment information
5 Easy Ways to RegisterMAIL American Conference In 45 West 25th Street, 11th New York, NY 10010
PHONE 888-224-2480
FAX 877-927-1563
ONLINEAmericanConference.com/encrypti
CONTACT DETAILS
NAME POSITION
APPROVING MANAGER POSITION
ORGANIZATION
ADDRESS
CITY STATE ZIP CODE
ELEPHONE FAX
MAIL TYPE OF BUSINESS
FEE PER DELEGATE Register & Pay by Feb. 17, 2012 Register & Pay by Mar. 23, 2012 Register after Mar. 23, 2012
Conference Only $1995 $2095 $2295
Conference & WorkshopA orB $2595 $2695 $2895
ELITEPASS*: Conference & Both Workshops $3195 $3295 $3495
I cannot attend but would like information on accessing the ACI publication library and archive
I would like to receive CLE accreditation for the following states: ___________________. See CLE details inside.
*ELITEPASS is recommended for maximum learning and networking value.
Registration FeeThe fee includes the conference all program materials continentalunches and refreshments.
Payment PolicyPayment must be received in full by the conference date. All discoapplied to the Conference Only fee (excluding add-ons), cannot bwith any other offer, and must be paid in full at time of order. Grouavailable to individuals employed by the same organization.
Cancellation and Refund PolicyYou must notify us by email at least 48 hrs in advance if you w
a substitute participant. Delegates may not share a pass betweattendees without prior authorization. If you are unable to find aplease notify American Conference Institute (ACI)in writing upprior to the conference date and a credit voucher valid for 1 year wto you for the full amount paid, redeemable against any other ACIIf you prefer, you may request a refund of fees paid less a 25% serNo credits or refunds will be given for cancellations received afprior to the conference date. ACI reserves the right to cancel anyit deems necessary and will not be responsible for airfare hotel orincurred by registrants. No liability is assumed by ACI for changesdate content speakers or venue.
Hotel InformationAmerican Conference Institute is pleased to offer our delegatnumber of hotel rooms at a preferential rate. Please contact the hotelmention the ACI-Global Encryption Controlsconference to rece
Venue: Hilton San Francisco Airport BayfrontAddress: 600 Airport Blvd. Burlingame, CA 94010Reservations: 650-340-8500
Incorrect Mailing InformationIf you would like us to change any of your details please fax tthis brochure to our Database Administrator at [email protected].
GLOBALENCRYPTIONCONTROLS
American Conference Institutes
3rdAdvanced Industry Summit on Complying with
Google
Xilinx
Apple
Cisco Systems
Chevron
NetIQ
Hewlett-Packar
QLogic
Weatherford
Symantec
Ingram Micro
Practical Compliance Strategie
from: