Information Management Institute



  • Brand Protection

  • Commercial Documents
    (Tickets, Corporate ID's, Bonds, Contracts, Etc.)

  • Government Issue Documents
    (ID's, Passports, Licenses, Etc.)

  • November 16-18, 2009

    Sheraton Baltimore City Center
    Baltimore, Maryland

    sponsored by

    Information Management Institute, Inc.


    Schofield Imaging Associates

    Conference Focus

    Rapid advancements in all aspects of security printing and security features plus the international focus on all aspects of security in today's world have created a rapidly growing demand for physical, document and identification security. Advancements in digital printing and technologies for incorporating security features, while spawning new modalities and efficiencies for security printing, have also enabled counterfeiters as well as legitimate issuers. From brand protection and secure access to ID's, tickets, travel documents, etc. - physical and digitally printed security images, features and data are converging in ways never before imagined. This convergence of once separate technologies is creating both challenges and market opportunities for effective integration of digital printing with physical security devices in a wide range of market specific applications.

    And the challenges of today's economy have made it all the more important to prevent the economic losses associated with counterfeited products, documents, ID's, etc. The ability to avoid losses, to identify fraudulent products/documents and to recover losses are all activities for which companies and agencies are willing to invest in to increase their sales, profits and ROI's. Thus, all end users and security technology providers need to be identifying new solutions, establishing new contacts and pursuing options to improve their sales and profitability.

    IMI's 6th Annual Security Printing Conference addresses the challenges and opportunities in dealing with security issues and enabling brand protection for products and production of secure documents for a wide variety of applications including business documents, ID's, currency, gaming/event tickets, travel documents, etc.

    Industry experts will address digital printing technologies' capabilities and shortcomings relative to printing secure output and the technology options available to enhance the production of secure documents, packaging and products of all types.

    The conference program provides a critical assessment of forensic analysis requirements, enhanced ink and media systems, document traceability technologies, software solutions and other potential avenues to enhance product and document security.

    This unique conference is designed to educate and inform industry leaders and technologists at all levels in the supply chain of security printing of the difficulties and business opportunities for combining digital and physical security printing on an application specific basis. If your business or products' future is dependent on finding effective ways to utilize physical features and digital security printing, or finding cost effective methods to stay ahead of counterfeiting, tampering and forgery, you will benefit from attending this conference.

    Don't miss this opportunity for digital printing technologists, security agency personnel, security organizations, hardware vendors, consumables suppliers, converters, component/software suppliers and end users to communicate and address the urgent issue of product and document security.


    • Participate in the only 2009 program dedicated entirely to Security Printing and Brand Protection issues/technology options

    • Learn about the latest digital printing technology developments and innovations being utilized and proposed to enhance brand protection and printed document security

    • Participate in interactive sessions and informal discussions on topics critical to development and implementation of digital printing systems with improved security features

    • Obtain information on how improved security printing system implementations can provide business opportunities for hardware, software and supplies manufacturers

    • Establish personal contacts with leading experts in digital printing and security printing organizations

    • Have a table top display to inform the industry of your products and services

    • Give a five minute presentation during the popular Suppliers' Forum

    Conference Chairman

    Harold Schofield, Schofield Imaging Associates

    Conference Speakers

    Elaine A. Bresnick, Bresnick Consulting
    Dr. Alain C. Briançon, NTERA
    Mike Caffrey, Appleton
    Dr. Steve Carlson, Optodot Corporation
    John Crain, Vorbeck Materials
    Lorie L. Gottesman, FBI Laboratory
    Chuck Hardester, NAPHSIS
    John Hattersley, InData Systems
    Tom Jay, SICPA
    Dr. Jochen Koenig, Schenk Vision
    James Mauro, Heidelberg USA
    Yvette Monson, U.S. Secret Service
    Frank St. John, Methode Electronics
    John Stearns, Magellan Consulting
    Jeffrey Strahl, H. W. Sands
    Johannes von Schilcher, JOEL Global Product & Brand Protection
    Stephan von Schilcher, JOEL Global Product & Brand Protection
    Robert S. Taylor, Eastman Kodak
    Richard H. Ward, Buena Vista Resources
    Trey White, ChemImage
    Dr. James R. Williams, Polyonics
    Don Wright, Lexmark International
    Dr. Kay Jeong, Xennia

    Companies having Displays at the 6th Annual
    Security Printing Conference
    Bayer Material Science
    Foster + Freeman USA
    H. W. Sands
    InData Systems
    Methode Electronics
    Prime Genetics
    Schenk Vision
    Tullis Russell
    Xennia Technology
    Brandstein Consulting
    Eastman Kodak
    FUJIFILM Corp.
    Heidelberg USA
    Ironsides Technology
    Quality Engineering Assoc.
    Seybold Report
    Treibacher Industries
    Vorbeck Materials

    6th Annual Security Printing Conference
    November 16-18, 2009
    Sheraton Baltimore City Center Hotel
    Baltimore, Maryland

    Program Coverage and Schedule

      Monday, November 16, 2009

      11:00 a.m.Conference Registration

      1:00 p.m.Session 1 - Security Printing - Why Are We Interested?

    Alvin G. Keene, President, Information Management Institute, Inc., Carrabassett Valley, Maine
    Harold Schofield, Schofield Imaging Associates, Narragansett, Rhode Island

    Harold Schofield, Schofield Imaging Associates, Narragansett, Rhode Island

    • Security Printing Industry Update
    • Digital Document Security
    • Protecting Against Alteration & Counterfeiting
    • Technology & Compliance Trends
    • Security Market Perspective
    • Security Printing Economics: What Are The Costs & Who Pays?
    • Conference Highlights

    Richard H. Ward, Principal and Managing Member, Buena Vista Resources LLC, Buena Vista, Colorado

    • "Security" Market is Very Broad
    • Many Segments are Underserved
    • High Level Overview & Discussions on
      - How to Analyze Markets Needs
      - How to Turn "Market Needs" Information into Meaningful Solutions
      - Why Don't Suppliers Make the Products Buyers Want?
      - Why Do Products Fail to Meet Expectations?
      - Why Do Buyers Lose Interest in Technologies?
    • Strategies for Buyer/Vendor Teaming to Develop Solutions

    Jim Mauro, Product Manager, Prinect Press Products, Heidelberg USA, Inc., Kennesaw, Georgia

    • Assessment of the Threat
    • Value to be Protected
    • Guideline for Selecting Appropriate Security Features for Given Packaging Applications
    • Overt & Covert Security Features
    • Samples showing Special Substrates, Inks, Coatings and/or Processes
    • Impact on Package Design & Appearance
    • Latest Developments in Packaging Security Printing

    John Stearns, President, Magellan Consulting, Bloomington, Minnesota

    • Snapshot of ID & Financial Card Industry
    • MagnePrint Technology
    • Machine Readable Technology
    • Already on Magnetic Stripe
    • Low Cost, Secure Authentication
    • Global Application

    Elaine A. Bresnick, President, Bresnick Consulting, Newton, Massachusetts

    • What is RFID?
      - How Does it Work?
      - Market Size & Applications
    • RFID Application Categories
      - Track & Trace (Retail, Healthcare)
      - Access Control (EZ Pass, Car Entry, Building Access)
      - Personal Identification (Passport, Driver's License, Pets)
    • Security Applications Focus on UHF
      - Personal ID (Kids on School Busses, Elderly & Infirmed-Alzheimers' Patients, Patient ID-BPOC)
      - Access Control (High Voltage Workers, Medicine Cabinet)
      - Track & Trace (E Pedigree-Pharma)
    • Assessment of RFID for Security Applications
      - Security & Privacy Concerns
      - UHF Gaining Traction
      - Standards Exist
      - Closed Loop Apps Work Best
      - Combining with Other Sensors for Tracking Environmental Conditions (Food, Pharma)

    Dr. James Williams, Founder & Chairman, Polyonics Inc., Westmoreland, New Hampshire

    • Brand-owners Face Daunting Task when Confronted with the Reality of Taking Action against Threats to their Brand Integrity
    • Developing Structured Process for Organizing Strategies to Protect Brands
    • Fundamental Axioms across all Industries - What are some of the Lessons Learned from Successful (and unsuccessful) Programs to Prevent Product Counterfeiting
    • Risk Analysis
      - Impact on Company & its Reputation (i.e. "ROI" as a Goal?)
      - ROI vs. Corporate Liability
    • Available Technologies
      - Acceptance of "Layered Protection" as the Effective Paradigm
      - Brief Overview of Technologies
    • Decision Analysis/Tradeoffs which you Must Face
      - Which Technology, i.e. Overt, Covert, Forensic?
      - Where to Use it, i.e. Packaging, On the Product, In the Product or In the Process?
      - What Tradeoffs do you Face in these Decisions?
      - A Decision Tree as a Useful Tool

    Don Wright, Director of Standards, Lexmark International, Lexington, Kentucky

    • IEEE 2600™ Series of Standards Define Security Requirements for Manufacturers, Users & Others
    • Covers Selection, Installation, Configuration & Usage of Hardcopy Devices & Systems
    • Printers, Copiers & Multifunction Devices Included
    • Issues Addressed Encompass Authentication, Authorization, Data Privacy, Data Integrity & Device Management
    • Testing & Certification
    • Protection Profiles for Specific Operational Environments
    • What's Next?

      5:30 p.m. Reception in Display Area

      Tuesday, November 17, 2009

      7:30 a.m. Continental Breakfast

      9:00 a.m.Session 2 - Security Printing Issues & Options

    Robert S. Taylor, General Manager, Kodak Security and Design-to-Launch Solutions, Business Services and Solutions Group, Eastman Kodak Co., Rochester, New York
    • Effective Brand Protection: Sound Strategy for a ComplexProblem
      - Assessment
      - Plan: Prevention & Protection
      - Protect: Tools, Security Solution Design
      - Monitor & Enforce
    • Business Case for a Brand Protection Solution
      - Defensive, Direct ROI, Offensive & Analysis Examples
    • Designing a Brand Protection Solution
    • Balancing Requirements for a High Performance Security Solution
      - Customer Needs: Effectiveness, Ease of Use, Economical
      - Regulatory Compliance
      - Technical Requirements: Deliverables & Constraints
      - Performance & Effectiveness Specifications
      - Technical Specifications for a Well-designed Security Solution
    • Brand Protection Tools & the Questions they Answer
      - Forensic, Covert & Overt Authentication Tools: Uses & Attributes
      - Ultra-covert, Covert, Semi-covert: Uses & Attributes
      - Ultra-covert: New Approach, Benefits - More than High Security
      - Layering Tools to Answer Complex Problems
      - A Unique Layering Approach

    Stephan von Schilcher , Joel Global Product & Brand Security, Annapolis, Maryland & Johannas von Schilcher, Joel Global Product & Brand Security, Berg, Germany

    • Document Security: The Paper, Security Features, Security Stamping Ink, Crypto Print & Crypto Trace
    • Product Security: Security Threads, New Up-Conversion (Detectable with & without Laser), Trace Tag, Random Structure Surface Structures, Intra-gram, Crypto Print, Crypto Trace (Print & Laser Engraved) & Color Twister

    Tom Jay, Vice President, Sales & Marketing, SICPA Securink Corporation, Springfield, Virginia

    • New Ink Jet Technology Description & Capabilities
    • New Innovations in Security Technologies for Government-run Programs
    • Best Practices for Selecting Technology
    • Implementing a Comprehensive Program for Security

    Chuck Hardester, Security Consulting, National Association for Public Health Statistics & Information Systems (NAPHSIS), Silver Springs, Maryland

    • NAPHSIS: Membership, Goals & Programs
    • Vital Records Responsibilities
      - Registration & Certification of Vital Events in 57 Jurisdictions
      - Model Vital Statistics Act & Regulation: 1992 Version
      - Customer Constituent Service
      - Preserving Records
    • Factors Contributing to Security Problems in Vital Records Offices
      - Open Record States
      - 6400 Issuing Agents - Lack of Control at Local Level
      - 14,000 Variations of Certification Documents
      - Lack of Security Features in Certification Documents
      - Failure to Adopt Federal Regulations of the Intelligence Reform & Terrorism Prevention Act of 2004 (INTEL)
    • Meeting the Security Challenges
      - Revision to the Model Vital Statistics Act & Regulations
      - Development of a NAPHSIS Security Guideline Manual (Document Security Features, Physical Plant Security & Issuance/Registration Procedures
      - Electronic Verification of Vital Events (EVVE)
      - Piloting a Fraud Early Warning System
      - Supporting the Adoption of the Federal INTEL Regulations

     12:00 Noon Luncheon

      1:30 p.m.Session 3 - Forensic Analysis Tools, Techniques & Needs

    Lorie L, Gottesman, Forensic Document Examiner, FBI Laboratory, Quantico, Virginia (Co-author: Joseph Stephens, Forensic Document Examiner, USSS Laboratory, Washington, DC)
    • Forensic Tools & Procedures for Identifying Counterfeit Documents & Other Items
    • Forensic Databases for Linking Evidence & Cases
    • Forensic Issues for Ink Jet & Laser Technologies
    • How can Security Printing Technologies Work for Us?

    Yvette Monson, Counterfeit Specialist, United States Secret Service, Washington, DC

    • Introduction to USSS Counterfeit Note Classification System & Role of Counterfeit Specialists
    • Information on Growing Problem of Digitally Produced Counterfeit Notes
    • Challenges Inherent to Classification of Digital Notes & Possible Solutions
    • Current Trends in Digital Counterfeits
      - Mixed Process Notes
      - Simulation of Security Features
      - Note Variations
      - Bleaching
    • Linking Digital Counterfeit Notes Forensically
      - Association through Identifiers & Defects
      - Evolution of Counterfeit Note Families from Traditional to Digital Print Processes

    Dr. Jochen Koenig, Managing Director, Schenk Vision, Woodbury, Minnesota

    • Security Papers Require Highly Stable Production Process to Meet Quality Requirements for Currency & Other Security Products
    • WebFeat Automated Inspection System
      - Developed in Cooperation with Leading Security Paper Manufacturers
      - Recognizes all state-of-the-art Security Features
      - Flexible Design enables Inclusion of New Parameters as New Security Features Evolve
    • Key Benefits & Advantages
      - High Resolution CCD Line-scan Cameras (Realistic, Microscope-like Defect Images; Easy Calibration, Robust & Maintenance-free compared to Laser Systems
      - Transparency of Project & Product (Customer Involvement at early Planning Stage, Full Transparency of Features & Operating Principles and No Black Box)
      - Tailor Made & Flexible for Future Enhancements (Designed according to Client Specifications, Enhanced Defect Classifications aligned with Customer Terminology & Open to Future Editions as Products Evolve)
    • Reliably Detects Defects in Paper Material plus Monitors Presence, Position & Properties of Incorporated Security Features
    • Measures the geometry of the Paper Sheets as an In-line System
    • Works on Real-time Basis enabling Immediate Root-cause Analysis & Corrective Action

    Trey White, Sales Representative, ChemImage, Pittsburgh, Pennsylvania

    • Determination of Number & Types of Ink
    • Hyperspectral Imaging in Visible & Near Infrared Spectral Range (400-1100nm)
    • Technology Methods for Non-destructive Analysis
      - Ink Discrimination
      - Identification of Alterations or Forgeries
      - Visualization of Hidden Security Features
      - Imaging of TLC Plates
    • Hyperspectral Imaging Research Provides Advantage over Current Practices

    SUPPLIERS' FORUM: 5-Minute Presentations Related To Technology, Capabilities, Services, New Product Introductions, etc. In combination with having a display, this provides an opportunity to present your technology, products or services to all conference participants. Contact Al Keene at IMI for information on having a display and signing up for the Suppliers' Forum.

      5:30 p.m. Reception in Display Area

      Wednesday, November 18, 2009

      7:30 a.m. Continental Breakfast

      8:30 a.m.Session 4 - Do New Security Printing Techniques Offer Economically Viable Solutions?

    Dr. Alain C. Briançon, Chief Technology Officer, NTERA, Inc., Radnor, Pennsylvania
    • NanoChromics Displays (NCD™) Technology & Principles of Operation
      - Solid State Electrochromic Phenomena
      - Electrochromic Molecules & Nanomaterial Formulations
      - Self-erasing, Metastable (Persistent Image) & Irreversible Color Changes
    • NCD Manufacturing Utilizes Additive All-print Process & can be made using Standard Printing Processes (Ink Jet, Flexographic, Screen, etc.) on Substrates from Polyester Films to Paper
    • NCD Designs can be used for Security Application Functions such as
      - One Time Passcodes for Two Factor Authentication
      - Dynamic Color Changes for Covert to Overt Authentication
      - Dynamic High Resolution Biometric Images
      - Tamper Detectors
      - Watermarkings
      - Device Trackers
      - & Many More
    • Inks Designed to Mix with Existing Security Ink & Film Solutions Enabling Further Advanced Solutions
    • Potential Use in Advanced Security Applications

    Frank St. John, Methode Electronics, Inc. Harwood Heights, Illinois

    • Development: Water Based Ink Jet Printable Ink
      - Thick Film Expertise: Micro-size Composition, Screen Print Production, Industries & Applications
      - Water Based Conductive Ink Jet Material Development: Nano-size Composition, Compatible Substrates, Ink Jet Production, Ink Characterization
    • Enabling Implementation - Ink Jet
      - Industries & Applications: Variable Data Advantage & Variable Production Batch Size Advantage
      - Development Support: Microelectronics Industry & Printing Industry, Thermal & Piezo Ink Jet Printheads & Cartridges, Scalable Engineering Thermal Desk Top Systems - Production: Industrial Systems & Product Volume Considerations
    • Security Printing Applications & Future Directions
      - Ink Jet Printable Ink Development
      - Enabling Industry Application Development

    Dr. Kay Jeong, Technical Inkjet Manager, Xennia Technology Ltd., Letchworth, Hertfordshire, UK

    • Role of Ink Jet for Security Printing
    • Types of Materials that can be Ink-jetted to Enable Security Features
    • Formulating Ink for Covert & Overt Security Printing
    • Applying Ink Jet Materials for Security Applications in Production Environments
      - Single Pass High Speed Printing
      - Printing of Multi-layer Composites
    • Key Success Criteria for Reliable Printing Solutions
    • Ink Jet Integration Challenges & Opportunities
    • Future for Ink Jet & Security: Novel Materials & New Applications

    Jeffrey Strahl, Vice President, H. W. Sands Corporation, Jupiter, Florida

    • Estimated Annual Sales of Counterfeit Products Exceed $750 Billion Worldwide, resulting in
      - Financial Loss
      - Damage to Brand Name Products
      - Damage to Health & Life from Faulty Counterfeit Products
    • SANDS-SECURE® Security Products, Solutions & Technologies
      - Offering Multiple Products to Create Layers of Security - Key to Staying Ahead of Counterfeiters
    • Overt Technologies
      - Color Shift Inks
      - Holograms
      - Photochromic Inks
      - Thermochromic Inks
      - Smart Holograms Optically Programmable Sensors TM (SHOPS)
    • Covert Technologies
      - Fluorescent Dyes
      - Scrambled Indicia - SI® Embedded Security Technology
      - Polarized Hidden-Image Tech (PTEC)
    • Forensic Technologies
      - Forensic Taggants
    • Implementation Examples

    Dr. Steve Carlson, President & CEO, Optodot Corporation, Allston, Massachusetts

    • Nearly Invisible IR Laser Digital Imageable Coatings for Security Applications
    • Capabilities to Form either an IR Image only or Dual Vesicular - Bubble & IR Images Readable in the Visible & IR Range
    • Laser Energy Conditions Needed to Produce Both Types of Digital Images
    • Application as Authentication Agent in ID Cards, Documents, Tags & More by Variety of Coating & Laminating Methods

    John R. Hattersley, President, InData Systems, Skaneateles, New York

    • Why Covert Barcodes?
      - In-the-field Track, Trace & Authentication
      - Types of Data in Invisible Marks
      - Multilayer Protection Combines Covert Mark + Encoded Serialization
    • 3 Legged Stool of Covert Security Solutions
      - Reliable Ink & Marking Methods
      - User Friendly In-field Scanners
      - Data System Integration/Tracking
    • Reliable Methods Now Widely Available
      - Digital & Ink Jet Printing, Thermal Transfer
      - Different Ink-specific Technologies
      - Affordable, Durable Field Scanners

    Mike Caffrey, Security Business Development Manager, Technical Papers Division - Security Papers, Appleton, Appleton, Wisconsin

    • Encapsulation Methods
      - Chemical
      - Physical
    • Release Methods
      - Pressure
      - Temperature
      - Chemical
    • Benefits of Micro-encapsulation
      - Raw Material Savings
      - Productivity
      - New Functionality
    • Security Authentication
      - Time Release & Markers
      - Patented Detection System
      - Patented Authentication System
    • Case Studies

    John Crain, Vice President Strategy & Business Development, Vorbeck Materials Corporation, Jessup, Maryland

    • Graphene: a Rapidly Rising Star on the Horizon of Materials Science & Condensed-Matter Physics
    • Strongest, most Thermally Conductive Material with Exceptional Mechanical, Electrical Properties
    • Vor-ink TM: Graphene Inks for Printed Electronics
    • Sinter-free Processing
    • Robust Films with Excellent Conductivity after Repeated Flex/Crease
    • Printed Antennae, Backplanes, Bus Bars, Interconnects on Paper, Paperboard, PET, PC, PMMA, Glass
    • RFID, Smart Packaging, Displays, TFPV

     1:00 p.m. Adjournment

    Download the PDF version of this program  
    Security Printing 09.pdf

    Speaking Opportunities at IMI Conferences

    If you have a potential topic for presentation at this or another IMI conference, please submit your proposed presentation topic and a brief outline to Al Keene at IMI (Email to or fax to +1-207-235-2226) for review.

    IMI is always looking for potential speakers for upcoming conference programs and will be pleased to discuss your ideas for potential presentation topics.

    Product Demonstrations & Free Displays

    Security printing and product demonstrations/displays by both conference speakers and registrants are encouraged. IMI will cooperate with all interested parties to provide appropriate space so products can be displayed and demonstrated during the conference breaks. There is no charge in addition to the conference registration fee to have a display table. Interested companies should contact Al Keene at to ensure that proper arrangements are made for product displays and demonstrations.

    IMI Conferences During November 2009

    Ink Jet Academy: Theory of Ink Jet Technology
    November 2-3, 2009
    Fira Palace Hotel
    Barcelona, Spain

    17th Annual European Ink Jet Printing Conference
    November 4-6, 2009
    Fira Palace Hotel
    Barcelona, Spain

    IMI Completed Conferences on this Topic

    5th Annual Security Printing Conference
    November 17-19, 2008

    4th Annual Security Printing Conference
    October 31 - November 2, 2007

    A Complete Listing of IMI Completed Programs

    Hotel Information

    IMI's 6th Annual Security Printing Conference is being held at the Sheraton Baltimore City Center Hotel in Baltimore, Maryland. Hotel reservations are the responsibility of each meeting registrant. To receive the special meeting rate of $129 for single or double occupancy, you may call +1-866-837-5182 to make hotel reservations. Identify yourself as a member of the IMI-6th Annual Security Printing Conference group. Early booking is advised as the reduced rate is guaranteed only until October 26, 2009 and will be on a space available basis after October 26, 2009.


    The Sheraton Baltimore City Center Hotel is located in the heart of Baltimore's thriving downtown business and cultural district and only a few blocks from Baltimore's famous Inner Harbor, National Aquarium, Science Center plus exciting shopping, dining and historical sites - yet only 10 miles from Baltimore-Washington International Airport (Airport shuttle service available via SuperShuttle upon arrival at BWI Airport). Hotel amenities include complimentary high speed internet in the sleeping rooms, self & valet parking for $18 daily (normally $28/$35), Sheraton Sweet Sleeper bed and 24 hour fitness center. The Sheraton Baltimore City Center Hotel is home to popular Baltimore eateries - Shula's Steak House (one of America's top-rated steak houses) and Shula's 2 (sports bar). The Sheraton City Center Hotel plus the City of Baltimore and the State of Mayland provide an excellent opportunity to extend your visit into a memorable vacation experience.

    Dress for IMI's 6th Annual Security Printing Conference will be casual.

    The Sheraton Baltimore City Center Hotel address is:

    Sheraton Baltimore City Center Hotel
    101 West Fayette Street
    Baltimore, MD 21201 USA
    Phone: +1-410-752-1100
    Fax: +1-410-752-0832
    Reservations Phone: +1-866-837-5182

    Information Management Institute

    Information Management Institute, Inc. is a leading worldwide sponsor of conferences designed to assist the digital printing industry in understanding technology developments, markets and applications requirements. IMI conferences offer a unique opportunity for leading hardware, consumables, software and user companies representatives to network and develop a more comprehensive understanding of current as well as future developments in the digital printing industry. Since 1990, IMI has held over 400 programs and each year over 2,000 technical, marketing and management personnel from over 600 companies worldwide attend IMI programs.

    IMI conference programs are designed to enable attendees to obtain the latest technical, market and application information while allowing time to network with other attendees in a time and cost efficient manner. Attendance at an IMI conference enables attendees to meet with the digital printing industry's leading experts in a single location over a short period of time thus maximizing information transfer efficiency and minimizing travel and time expenses.

    For further details, contact Information Management Institute:

    Information Management Institute, Inc.
    1106 Valley Crossing
    Carrabassett Valley, ME 04947
    Phone: +1-207-235-2225
    Fax: +1-207-235-2226
    Web Site:

    Information Management Institute

    Registration Update:
    Over 75 conference registrants from the following companies and organizations represent eight countries (Australia, Canada, France, Germany, Japan, The Netherlands, UK & US):

    Appleton, Bayer Material Science, Beard Group, Brandstein Consulting, Bresnick Consulting, Brother International, Buena Vista Resources, Burdge, Inc., ChemImage, Chesapeake Resource Group, Collins Ink, Data Management, Inc., Datacard, Dept. of Defense, Dept. of Homeland Security/ICE, Eastman Kodak, Eli Lilly & Company, FBI Laboratory, FLEXcon, Fontys University of Applied Technology, Foster + Freeman USA, FUJIFILM Corporation, Gemalto, H.W. Sands, Heidelberg, InData Systems, Information Management Institute, Ironsides Technology, JOEL Global Product & Brand Protection, LANXESS Corporation, Lexmark International, MACtac, Magellan Consulting, Methode Electronics, NAPHSIS, Nipson America, NPC, Inc., Nosco, NTERA, Oce North America, Optodot, Oxonica Materials, Polyonics, Prime Genetics, Printco, Quality Engineering Associates, Schenk Vision, Schofield Imaging Associates, Seybold Report, SICPA, Silberline, Treibacher Industries, Troy Group, Tullis Russell, U.S. Secret Service, United Color Manufacturing, Vorbeck Materials, Weldon-Williams & Lick, Inc. and Xennia Technology


    The binder and CD-ROM for this completed program, containing handout materials from all speakers plus a registration list with names, addresses and phone numbers, may be purchased for:

    $300 US including shipping by Federal Express
    Note: $50 Shipping Fee automatically added to non-US, Completed Program Binder orders only. Appears as $50 Shipping charge in the Shopping Cart
    Contact IMI by email ( to place your order or call (207) 235-2225.

    Return to Information Management Institute Master Schedule