Our driving objectives for ChiBrrCon: Give team members relevant, high quality speaking and learning opportunities in a fun, safe, Chatham House Rules environment. To help facilitate those objectives, the following rules will be enforced in person, virtually, and on all conference communication systems.
This is a by-invitation event, no rights or privileges are conferred by having a registered Eventbrite ticket, and any person may be asked to leave at the discretion of the conference management.
- Kevin Novak
- Jack Burback
- Troy Mattern
- Ricardo (Rico) LaFosse
- Walter Lefmann
Please keep what’s said and posted (including that which is said and posted by Administrators) in ChiBrrCon2022 confidential. Don’t copy or download contents, or repeat or quote things that are said here without the affirmative consent of the speaker(s) or originating individual.
Please be mindful that things you say here may at some point become public. While we expect members to honor the confidentiality of this space, we cannot guarantee that they will do so--nor can we guarantee that every member’s login credentials and logged-in devices are secure. Please exercise caution and refrain from sharing sensitive information that could harm you or others if it became public.
As a reminder, ChiBrrCon is driven by technology and security practitioners for technology and security practitioners. We have established ChiBrrCon as a safe-zone, where practitioners can feel comfortable openly discussing their successes and challenges with peers without the fear that they will be marketed to as a result. We are a privately sponsored event. We do not permit any vendors to market their products or services at this event. Anyone found doing so will be asked to leave the event.
Message Retention on Slack:
Because we use a free Slack account, we have restricted scrollback, but Slack--the company--retains complete logs of all channels and direct messages back to the creation of ChiBrrCon2020. Slack is a U.S. company and therefore subject to subpoenas from U.S. courts. Our logs may be subject to subpoena and could become public as part of legal proceedings.
We want this to be a fun, pleasant, and harassment-free experience for everyone, regardless of gender, gender identity and expression, sexual orientation, disability, physical appearance, body size, race, or religion. We do not tolerate harassment of participants in any form. Participants asked to stop any harassing behavior are expected to comply immediately.
- Offensive comments related to gender, gender identity and expression, sexual orientation, disability, mental illness, neuro(a)typicality, physical appearance, body size, race, or religion
- Unwelcome comments regarding a person’s lifestyle choices and practices, including those related to food, health, parenting, drugs, and employment.
- Deliberate misgendering or use of ‘dead’ or rejected names
- Gratuitous or off-topic sexual images or behavior in spaces where they’re not appropriate
- Simulated physical contact (e.g. textual descriptions like “hug” or “backrub”) without consent or after a request to stop.
- Threats of violence
- Incitement of violence towards any individual, including encouraging a person to commit suicide or to engage in self-harm
- Deliberate intimidation
- Sustained disruption of discussion
- Unwelcome sexual attention
- Continued one-on-one communication after requests to cease
- Publication of non-harassing private communication
If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact the Founders, Admins or any STAFF member wearing a Blue Shirt. They’ll respond as promptly as they can.
We will respect confidentiality requests for the purpose of protecting victims of abuse. At our discretion, we may publicly name a person about whom we’ve received harassment complaints, or privately warn third parties about them. We will not name harassment victims without their affirmative consent.
Participants asked to stop any harassing behavior are expected to comply immediately.
If a participant engages in harassing behavior, the Admins, Founders, or Staff Members may take any action they deem appropriate, up to and including expulsion from the event, or any communication channel supporting the event, and identifying the participant publicly as someone about whom we’ve received complaints.
Credits and License
This code of conduct is based on Annalee Flower Horne’s Sample Slack Code of Conduct, which is in turn based on Geek Feminism’s Community Anti-Harassment Policy. We have adapted the Sample Slack Code of Conduct for our own use under the terms of the Creative Commons Attribution License.
Who we are
Our website address is: http://chibrrcon.com.
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Who we share your data with
If you request a password reset, your IP address will be included in the reset email.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service.