PIIPES: Personal Identifiable Information: Privacy, Ethics, and Security 
http://perun.im.ns.ac.yu/adbis2010/organization.php
http://perun.im.ns.ac.yu/adbis2010/tracks/piipes/CFP_PIIPES.pdf
ADBIS 2010 Track, 
Novi Sad, Serbia, 
September 20 - 24, 2010 
(Submissions due March 27, 2010) 

Breaches of personally identifiable information (PII) have increased
dramatically over the past few years and have resulted in the loss of
millions of records. Breaches of PII are hazardous to both individuals
and organizations. Individual harms may include identity theft,
embarrassment, or blackmail. Organizational harms may include a loss
of public trust, legal liability, or high costs to handle the breach
(USA National Institute of Standards and Technology, 2009). According
to U.S. Department of Health & Human Services, PII is "information in
an IT system or online collection: (1) that directly identifies an
individual, or (2) by which an agency intends to identify specific
individuals in conjunction with other data elements, i.e., indirect
identification." EU directive 95/46/EC calls it "personal data".

Topics include but not limited to: 
 * PII Definition, 
 * PII Value, 
 * PII Effects and uses, 
 * PII Laws, 
 * PII Health records, 
 * PII Economics, 
 * PII Trust issues, 
 * PII Ownership, 
 * PII Impact Assessment, 
 * PII on the Internet, 
 * PII in e-commerce, 
 * PII and the Semantic Web, 
 * PII and Banking systems, 
 * PII and Social networks, 
 * PII and Digital Rights Management,
 * PII and Media content streaming, 
 * PII Classification, 
 * PII Processing,
 * PII Sensitivity, 
 * PII Lying, 
 * PII Flow, 
 * PII Seeking
 * Non-textual PII,
 * PII Biometrics, 
 * PII and Data mining, 
 * PII and Security, 
 * PII and Privacy, 
 * PII Protection, 
 * PII Surveillance, 
 * PII and Access Control, 
 * PII Confidentiality issues, 
 * PII and Anonymity, 
 * PII and Personal identifiable misinformation, 
 * PII and Privacy-by-design, 
 * PII Access and Dissemination, 
 * PII Management systems, 
 * Capture, archival and retrieval of PII, 
 * PII Policies, 
 * PII Databases, 
 * PII Warehouses, 
 * PII Online stores, 
 * PII into RDF, 
 * PII in P3P, 
 * PII Lifecycles.

For more information, please see: http://www.adbis2010.org