You are here:
WorldLII >>
Databases >>
EPIC Alert >>
2003 >>
[2003] EPICAlert 7
Database Search
| Name Search
| Recent Articles
| Noteup
| LawCite
| Help
EPIC Alert 10.07 [2003] EPICAlert 7
EPIC ALERT
Volume 10.07 April 9, 2003
Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.
http://www.epic.org/alert/EPIC_Alert_10.07.html
Table of Contents
[1] National Coalition Urges Accuracy for FBI Database
[2] Documents Show Errors in TSA's "No-Fly" Watchlist
[3] ICANN Fails to Establish Adequate WHOIS Privacy Standards
[4] EPIC Opposes Preemption of State Privacy Enforcement
[5] News in Brief
[6] EPIC Bill-Track: New Bills in Congress
[7] EPIC Bookstore: "Your Body as Password"
[8] Upcoming Conferences and Events
[1] National Coalition Urges Accuracy for FBI Database
Thousands of individuals and a broad coalition of organizations acrossthe country are calling on the FBI to restore the accuracy requirementsfor
the agency's National Crime Information Center (NCIC), the nation'slargest criminal justice database. On March 24, the Justice Departmentannounced
that it would no longer comply with the obligation under the1974 Privacy Act to ensure the accuracy, completeness and timeliness
ofthe 39 million criminal records maintained in the NCIC system.
Over 80,000 law enforcement agencies routinely access the NCIC, whichincludes data on wanted persons, missing persons, gang members
andindividuals with arrest records, as well as records about stolen cars,
boats, and other information. Incorrect information in the databasehas subjected individuals to false arrests, and identity theft
victimshave reported difficulty correcting erroneous information in thedatabase. The Supreme Court also has expressed concern about
lawenforcement's reliance on inaccurate records in the NCIC.
Recognizing that exempting the NCIC from data quality obligations mayincrease risks for both individuals and law enforcement, over
eighty-
five organizations have endorsed a letter to Office of Management andBudget (OMB) Director Mitchell Daniels urging him to exercise
theagency's oversight authority and require that the FBI restore theaccuracy requirements.
Additionally, over 3,000 individuals from 47 states and the Districtof Columbia have signed an online petition demanding that the
FBIrestore the accuracy requirements. While the coalition letter has beendelivered, the petition drive will continue until the OMB
acts on therequest.
Individuals may sign the petition at:
http://www.petitiononline.com/ncic/petition.html
EPIC National Crime Information Center Page:
http://www.epic.org/actions/ncic/
The FBI National Crime Information Center (NCIC) 2000:
http://www.fbi.gov/hq/cjisd/ncic.htm
[2] Documents Show Errors in TSA's "No-Fly" Watchlist
EPIC recently obtained agency documents through the Freedom ofInformation Act (FOIA) that raise important questions about how theTransportation
Security Administration (TSA) operates its "No-Fly"
watchlist. The documents preview several potential problems with dueprocess that may result from the proposed passenger profiling
system,
CAPPS-II (the Enhanced Computer Assisted Passenger Pre-screeningSystem), including numerous complaints from passengers who have no
ideawhy their names are on a list, or how to be removed. A few heavilyredacted agency memos concerning the operation of the watchlist
werealso released in part.
The documents show that the TSA administers two lists: a "no-fly" listand a "selectee" list, which requires passengers
to go throughadditional security measures. Names are provided to air carriersthrough Security Directives or Emergency Amendments,
and are stored intheir computer systems so that an individual whose name matches a nameon the list can be flagged when getting a
boarding pass. A "no-fly"
match requires the agent to call a law enforcement officer to detainand question the passenger. A "selectee" match causes
an "S" orspecial mark to be printed on the boarding pass, and the personreceives additional screening at security. The
TSA has withheld thenumber of names on each of the lists.
The watchlist was created in 1990, and contained names of individualswho had been "determined to pose a direct threat to U.S.
civilaviation." This list was administered by the FBI before the FederalAviation Administration and the TSA assumed full administrativeresponsibility
for the list in November 2001. Since the TSA took over,
the watchlist "has expanded almost daily as Intelligence Communityagencies and the Office of Homeland Security continue to request
theaddition of individuals to the No-Fly and Selectee lists."
There appears to be no formal approval process whereby an independentthird party verifies that names are selected appropriately and
thatthe information is accurate and up-to-date. There is also no apparentprocess for individuals to request that their names be removed
fromthe list -- it appears that the standard TSA response is to directindividuals to their local FBI office. The litany of problems
thatpassengers have faced is long, but they all point to a lack of trans-
parency and due process in the operation of the watchlists.
Full analysis and links to FOIA Documents:
http://www.epic.org/privacy/airtravel/foia/watchlist_analysis.html
EPIC's Passenger Profiling page:
http://www.epic.org/privacy/airtravel/profiling.html
[3] ICANN Fails to Establish Adequate WHOIS Privacy Standards
The WHOIS database was originally intended to allow network admini-
strators to access domain name registrants' information in order toeasily find and fix problems and maintain the stability of theInternet.
Currently, it also exposes that personally identifiableinformation to spammers, stalkers, criminal investigators, andcopyright enforcers.
On February 6, the WHOIS Task Force of theGeneric Names Supporting Organization posted its "Final Report onWHOIS Accuracy and
Bulk Access" for comments and for consideration bythe Generic Names Supporting Organization Council. The report includedfour
policies on accuracy and bulk access of WHOIS data along withother recommendations. These policies have been criticized as beingdeficient
because they fail to establish adequate privacy safeguards(see EPIC Alert 9.24 and 10.04).
The Internet Corporation for Assigned Names and Numbers (ICANN) votedon and adopted the WHOIS Task Force's policies on accuracy and
bulkaccess during its March 23-27 meeting in Rio de Janeiro, Brazil. Atthe meeting, ICANN also directed its President to appoint
a President'sStanding Committee on Privacy to monitor the implications of existingand proposed ICANN policies on the handling of
personal data. In themeantime, ICANN's Generic Names Supporting Organization initiated apolicy development process that may lead
to the creation of a newprivacy task force that would serve to adequately address WHOIS-relatedprivacy issues.
The Organization for Economic Cooperation and Development (OECD)
Recommendations Concerning and Guidelines Governing the Protection ofPrivacy and Transborder Flows of Personal Data offer a sound
andinternational framework for sensible WHOIS policies on privacy and dataprotection. EPIC prepared a privacy issues report on behalf
of thenon-commercial constituency recommending that a new task force beformed to evaluate WHOIS policies and practices with respect
to theOECD guidelines.
ICANN's RIO meeting report is available online at:
http://www.icann.org/minutes/prelim-report-27mar03.htm
WHOIS Task Force's policies on accuracy and bulk access of WHOIS data:
http://www.icann.org/gnso/whois-tf/report-19feb03.htm#I
EPIC's WHOIS Privacy Issues Report:
http://www.epic.org/privacy/whois/privacy_issues_report.pdf
For more information, see EPIC's Web site on WHOIS:
http://www.epic.org/privacy/whois/
[4] EPIC Opposes Preemption of State Privacy Enforcement
EPIC, joined by consumer advocacy group U.S. PIRG, filed comments thisweek with the Office of the Comptroller of the Currency (OCC)
urgingthe agency to reject a proposed rule that would limit state enforcementof consumer privacy laws. In its proposed rule, the
agency interpretedits regulatory jurisdiction over national banks so broadly that itwould prevent states from applying their consumer
protection andprivacy laws to national banks. In its comments, EPIC argued that theagency exceeded its authority by attempting to
make itself theexclusive enforcer of consumer protection and privacy laws againstbanks and their affiliates. It also failed to safeguard
consumers, whoare best served when both state and federal officials can protect themagainst unlawful business practices.
The OCC's jurisdiction over national banks derives from the NationalBank Act of 1864. Congress passed that law to establish a nationalbanking
system and to promote the development of one national currency.
Under the Act, Congress charged the OCC with ensuring national banks'
financial stability and compliance with banking law by granting it"visitorial powers" over national banks, including the
right toconduct supervisory examinations of banks and to take administrativeenforcement actions, such as issuing cease and desist
orders. Foryears, the Supreme Court and lower courts have concluded that thisstatute does not insulate national banks from state
legal action, aslong as a state is not seeking to enforce a state law that conflictswith federal law or discriminates against national
banks.
In February, the OCC announced a proposed rule that sharply departsfrom this long-standing interpretation. If enacted, the rule wouldeliminate
the traditional right of the states to sue national banks instate courts to enforce state laws. The proposal has drawn sharpcriticism
from state attorneys general, consumer advocates, and others,
because the rule would hinder the states' abilities to regulate in theareas of consumer protection and privacy.
As EPIC explained in its comments, federal privacy law generallyoperates as a regulatory baseline and allows states to enact greaterprotections
if they so choose. States have taken the lead indeveloping and enforcing legislative safeguards for privacy. Connect-
icut, North Dakota and Vermont, for example, have enacted strongerfinancial privacy standards than those provided by the federal Gramm-
Leach-Bliley Act. EPIC argued to the OCC that its proposal wouldundermine the effectiveness of these laws and well-establishedprinciples
of federalism, and urged the agency to reject the proposal.
Proposed Rule of the OCC:
http://www.occ.treas.gov/ftp/release/2003-07a.pdf
EPIC and U.S. PIRG's Comments to the OCC:
http://www.epic.org/privacy/preemption/occcomments4.8.03.html
EPIC's Fair Credit Reporting Act Page:
http://www.epic.org/privacy/fcra/
EPIC's Gramm-Leach-Bliley Act Page:
http://www.epic.org/privacy/glba/
[5] News in Brief
Open Government Community Mourns Passing of Senator Moynihan
Daniel Patrick Moynihan, the four-term Senator from New York whosewide-ranging interests, political ambition, and numerous books onsocial
issues helped shape public policy in Washington for more than aquarter century, died last month. In recent years, Moynihan directedhis
energies to the problems of government secrecy. He authoredlegislation to reduce government secrecy and published "Secrecy:
TheAmerican Experience" (1998). In that book he wrote, "The Cold War hasbequeathed to us a vast secrecy system that shows
no sign of receding.
It has become our characteristic mode of governance in the executivebranch."
Moynihan's Statement on the Secrecy Reform Act:
http://www.fas.org/sgp/congress/moynint.html
"Secrecy: The American Experience"
http://www.epic.org/bookstore/powells/redirect/alert1007.htmlJustice Department Issues Quarterly FOIA Report
The Department of Justice Office of Information and Privacy has issueda useful report on recent Freedom of Information Act decisions,
including Dept. of Justice v. City of Chicago, the recent Supreme Courtcase concerning access to gun purchase records under the FOIA.
"New FOIA Decisions, January-March 2003":
http://www.usdoj.gov/oip/foiapost/2003foiapost13.htm
Medical Privacy Rule Compliance Deadline Nears
By Monday, April 14, the health care industry must be in compliancewith the Health Insurance Portability and Accountability Act (HIPAA)
Privacy Rule. The Privacy Rule provides the first baseline federalprotection for privacy of medical information communicated electron-
ically, by paper, or orally. Patients will now have the right toreceive notice of privacy policies, request restrictions on disclosure,
amend their records, receive an accounting of disclosures, and file acomplaint with the Secretary of Health and Human Services (HHS).
However, contrary to the Administration's claims, the Privacy Ruledoes allow marketing use of health information without patient consent.
This was accomplished by exempting advertisements for health-relatedproducts or services and "alternative" therapies from
the regulation'sdefinition of "marketing."
HHS HIPAA Page:
http://www.hhs.gov/ocr/hipaa/
Senate Considers FISA "Lone Wolf" Amendment
This week the Senate is due to consider a bill, S.113, that would relaxa requirement for authorizing warrants under the Foreign IntelligenceSurveillance
Act. The legislation would allow the government toconduct surveillance on a person, even if officials lacked evidenceconnecting
the individual to a specific terrorist group or foreignpower that supported terrorism, as is now required. The bill wasamended on
March 11 to exclude United States persons, and it contains asunset clause in line with the USA PATRIOT Act. The "lone wolf"
amendment to the FISA is supposedly aimed at addressing the allegedproblem in the case of Zacarias Moussaoui, where FBI lawyers failed
toapply the correct standard to obtain a FISA warrant because they wereconfused about the law.
S.113, A bill to exclude United States persons from the definition of "foreign power" under the Foreign Intelligence
Surveillance Act of 1978 relating to international terrorism:
http://thomas.loc.gov/cgi-bin/bdquery/z?d108:s.00113:
U.S. Big Brother Award Winners Announced at CFP 2003
At the 13th Annual Conference on Computers, Freedom and Privacy onApril 3, Privacy International announced the winners of the 5th
AnnualU.S. "Big Brother" awards to the government and private sector organi-
zations that have done the most to invade personal privacy in theUnited States. "Brandeis" awards were also given to individuals
whohave made an outstanding contribution to the protection of privacy.
A list of winners is available online at:
http://www.privacyinternational.org/bigbrother/us2003/
[6] EPIC Bill-Track: New Bills in Congress
*House*
H.R.781 Privacy Protection Clarification Act: To amend theGramm-Leach-Bliley Act to exempt attorneys from the privacy provisionsof
that Act. Sponsor: Rep Biggert, Judy (R-IL) (introduced 2/13/2003)
Cosponsors: 7. Committees: House Financial Services. Latest MajorAction: 3/10/2003 Referred to House subcommittee. Status: Referred
tothe Subcommittee on Financial Institutions and Consumer Credit.
H.R.818 Identity Theft Consumer Notification Act: To amend theGramm-Leach-Bliley Act to further protect customers of financialinstitutions
whose identities are stolen from the financialinstitution, and for other purposes. Sponsor: Rep Kleczka, Gerald D.
(D-WI) (introduced 2/13/2003) Cosponsors: 6. Committees: HouseFinancial Services. Latest Major Action: 2/27/2003 Referred to Housesubcommittee.
Status: Referred to the Subcommittee on FinancialInstitutions and Consumer Credit.
H.R.858 Identity Theft Penalty Enhancement Act: To amend title 18,
United States Code, to establish penalties for aggravated identitytheft, and for other purposes. Sponsor: Rep Tanner, John S. (D-TN)
(introduced 2/13/2003) Cosponsors: 6. Committees: House Judiciary.
Latest Major Action: 2/13/2003 Referred to House committee. Status:
Referred to the House Committee on the Judiciary.
H.R.1009 Clear Your Good Name Act: To require Federal law enforcementagencies to expunge voidable arrest records, to provide incentivefunds
to States that have in effect a system for expunging suchrecords, and for other purposes. Sponsor: Rep Nadler, Jerrold (D-NY)
(introduced 2/27/2003) Cosponsors: 3. Committees: House Judiciary.
Latest Major Action: 2/27/2003 Referred to House committee. Status:
Referred to the House Committee on the Judiciary.
H.R.1037 Prevent Bank Fraud by Terrorists Act of 2003: To preventterrorists and money launderers from establishing accounts for illegalmoney
transfers through the use of false Social Security numbers ortaxpayer identification numbers, and for other purposes. Sponsor: RepSweeney,
John E. (R-NY) (introduced 2/27/2003) Cosponsors: (none).
Committees: House Financial Services. Latest Major Action: 2/27/2003Referred to House committee. Status: Referred to the House Committeeon
Financial Services.
H.R.1066 Benefit Authors without Limiting Advancement or Net ConsumerExpectations (BALANCE) Act of 2003: To amend title 17, United
StatesCode, to safeguard the rights and expectations of consumers wholawfully obtain digital entertainment. Sponsor: Rep Lofgren,
Zoe(D-CA) (introduced 3/4/2003) Cosponsors: 2. Committees: HouseJudiciary. Latest Major Action: 3/4/2003 Referred to House committee.
Status: Referred to the House Committee on the Judiciary.
H.R.1157 Freedom to Read Protection Act of 2003: To amend the ForeignIntelligence Surveillance Act to exempt bookstores and libraries
fromorders requiring the production of any tangible things for certainforeign intelligence investigations, and for other purposes.
Sponsor:
Rep Sanders, Bernard (I-VT) (introduced 3/6/2003) Cosponsors: 53.
Committees: House Judiciary; House Intelligence (Permanent Select).
Latest Major Action: 3/6/2003 Referred to House committee. Status:
Referred to the Committee on the Judiciary, and in addition to theCommittee on Intelligence (Permanent Select), for a period to besubsequently
determined by the Speaker, in each case for considerationof such provisions as fall within the jurisdiction of the committeeconcerned.
H.R.1161 Child Obscenity and Pornography Prevention Act of 2003: Toprevent trafficking in child pornography and obscenity, to proscribepandering
and solicitation relating to visual depictions of minorsengaging in sexually explicit conduct, to prevent the use of childpornography
and obscenity to facilitate crimes against children, andfor other purposes. Sponsor: Rep Smith, Lamar (R-TX) (introduced3/6/2003)
Cosponsors: 43. Committees: House Judiciary. Latest MajorAction: 3/11/2003 House committee/subcommittee actions. Status:
Subcommittee Hearings Held.
H.R.1171 Iris Scan Security Act of 2003: To provide grants to lawenforcement agencies to use iris scanning technology to conductbackground
checks on individuals who want to purchase guns. Sponsor:
Rep Andrews, Robert E. (D-NJ) (introduced 3/11/2003) Cosponsors:
(none). Committees: House Judiciary. Latest Major Action: 3/11/2003Referred to House committee. Status: Referred to the House Committeeon
the Judiciary.
H.R.1303 To amend the E-Government Act of 2002 with respect torulemaking authority of the Judicial Conference. Sponsor: Rep Smith,
Lamar (R-TX) (introduced 3/18/2003) Cosponsors: 1. Committees: HouseJudiciary. Latest Major Action: 3/20/2003 House committee/subcommitteeactions.
Status: Forwarded by Subcommittee to Full Committee (Amended)
by Voice Vote.
H.R.1365 To establish the United States Commission on an Open Societywith Security. Sponsor: Rep Norton, Eleanor Holmes (D-DC) (introduced3/19/2003)
Cosponsors: (none). Committees: House Transportation andInfrastructure. Latest Major Action: 3/19/2003 Referred to Housecommittee.
Status: Referred to the House Committee on Transportationand Infrastructure.
*Senate*
S.410 Foreign Intelligence Collection Improvement Act of 2003: A billto establish the Homeland Intelligence Agency, and for other
purposes.
Sponsor: Sen Edwards, John (D-NC) (introduced 2/13/2003) Cosponsors:
(none). Committees: Senate Select Committee on Intelligence. LatestMajor Action: 2/13/2003 Referred to Senate committee. Status: Readtwice
and referred to the Committee on Intelligence.
S.436 Domestic Surveillance Oversight Act of 2003: A bill to amend theForeign Intelligence Surveillance Act of 1978 to improve theadministration
and oversight of foreign intelligence surveillance, andfor other purposes. Sponsor: Sen Leahy, Patrick J. (D-VT) (introduced2/25/2003)
Cosponsors: 4. Committees: Senate Judiciary. Latest MajorAction: 2/25/2003 Referred to Senate committee. Status: Read twice andreferred
to the Committee on the Judiciary.
S.660 A bill to extend limitations on certain provisions of State lawunder the Fair Credit Reporting Act. Sponsor: Sen Johnson, Tim
(D-SD)
(introduced 3/19/2003) Cosponsors: (none). Committees: Senate Banking,
Housing, and Urban Affairs. Latest Major Action: 3/19/2003 Referred toSenate committee. Status: Read twice and referred to the Committee
onBanking, Housing, and Urban Affairs.EPIC Bill Track: Tracking Privacy, Speech, and Cyber-Liberties Billsin the 108th Congress, is available at:
http://www.epic.org/privacy/bill_track.html
[7] EPIC Bookstore: "Your Body as Password"
Biometrics: Identity Assurance in the Information Age. John D.
Woodward, Jr. et al (McGraw-Hill/Osborne 2003)
http://shop.osborne.com/cgi-bin/osborne/0072222271.html
Who Goes There? Authentication Through the Lens of Privacy. Stephen T.
Kent and Lynette I. Millett, Editors (National Research Council 2003)
http://www4.nationalacademies.org/news.nsf/isbn/0309088968/Biometrics are on the rise. New systems of identification capturefingerprints, voiceprints, iris patterns, and even facial images.
Increasingly, air travelers, visitors to the United States, andlicensed drivers may confront these new hi-tech IDs. How do thesesystems
work? Are they reliable, and how best is privacy preserved?
These issues are taken up in a new book from McGraw-Hill and a newreport from the National Research Council.
John Woodward and his colleagues provide a comprehensive introductionto biometric applications in "Biometrics: Identity Assurance
in theInformation Age." Several chapters describe the major biometrictechniques, as well as methods for evaluation, testing
and standard-
setting. The book notes problems and vulnerabilities with each of themajor biometric techniques. It also explores several case studies
inapplications as far-ranging as a housing project in Chicago, a schoolin Stockholm, Las Vegas casinos, and the California Statewide
Finger-
printing System.
Woodward also engages the major policy and legal objections to theexpanded use of biometric systems. While some may sense that he
lacksthe skepticism about government abuse that has given rise to manyprivacy laws, it is hard not to recognize his efforts to assessbiometric
systems from a wide range of perspectives, including theEuropean Union Data Directive as well as cultural, religious andphilosophical
objections.
The National Research Council takes up the issue of privacy andbiometric identification in "Who Goes There: Authentication Throughthe
Lens of Privacy?" Much of the report focuses on the privacyproblems that flow from systems that collect personally identifiableinformation.
The report sensibly suggests limiting the collection anduse of data, and notes that discrete systems of identifications aremore
likely to safeguard privacy than integrated identificationsystems.
In the end, one's willingness to support advanced identificationsystems, including a national ID card that Woodward and his colleaguesappear
to favor, may depend on one's trust in the institutions thatoperate such systems.
- Marc Rotenberg
EPIC Publications:
"The Privacy Law Sourcebook 2002: United States Law, InternationalLaw, and Recent Developments," Marc Rotenberg, editor
(EPIC 2002).
Price: $40. http://www.epic.org/bookstore/pls2002/
The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists
who needan up-to-date collection of U.S. and International privacy law, aswell as a comprehensive listing of privacy resources.
"FOIA 2002: Litigation Under the Federal Open Government Laws," HarryHammitt, David Sobel and Mark Zaid, editors (EPIC 2002).
Price: $40.
http://www.epic.org/bookstore/foia2002/
This is the standard reference work covering all aspects of theFreedom of Information Act, the Privacy Act, the Government in theSunshine Act, and the Federal Advisory Committee Act. The 21stedition fully updates the manual
that lawyers, journalists andresearchers have relied on for more than 25 years. For those wholitigate open government cases (or
need to learn how to litigatethem), this is an essential reference manual.
"Privacy & Human Rights 2002: An International Survey of Privacy Lawsand Developments" (EPIC 2002). Price: $25.
http://www.epic.org/bookstore/phr2002/
This survey, by EPIC and Privacy International, reviews the state ofprivacy in over fifty countries around the world. The survey
examinesa wide range of privacy issues including data protection, telephonetapping, genetic databases, video surveillance, location
tracking, IDsystems and freedom of information laws.
"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0/
A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens
free expression.
"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price:
$40.
http://www.epic.org/cls/
The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested
in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumersand
the basic responsibilities for businesses in the online economy.
"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC
2000). Price:
$20. http://www.epic.org/crypto&/
EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption
products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption
to law enforcement.
EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:
EPIC Bookstore http://www.epic.org/bookstore/
"EPIC Bookshelf" at Powell's Books http://www.powells.com/features/epic/epic.html
[8] Upcoming Conferences and Events
** Uniting Privacy and the First Amendment in the 21st Century **
May 9-10, 2003Oakland, CA
EPIC, the First Amendment Project, and the California Office ofPrivacy Protection are sponsoring this activist symposium designed
toexplore the interplay between privacy and First Amendment rights, withthe goal of developing strategies for optimizing both.
For more information: http://www.epic.org/events/unitingsymposium/
28th Annual AAAS Colloquium on Science and Technology Policy. AmericanAssociation for the Advancement of Science. April 10-11, 2003.
Washington, DC. For more information:
http://www.aaas.org/spp/rd/colloqu.htm
Integrating Government With New Technologies '03: E-Government, Changeand Information Democracy. Riley Information Services. April
11, 2003.
Ottawa, Canada. For more information: http://www.rileyis.com/seminars/
RSA Conference 2003. RSA Security. April 13-17, 2003. San Francisco,
CA. For more information: http://www.rsaconference.com/
O'Reilly Emerging Technology Conference. April 22-25, 2003. SantaClara, CA. For more information: http://conferences.oreilly.com/etcon/
Mid Canada Information Security Conference. Information ProtectionAssociation of Manitoba. April 30, 2003. Winnipeg, Manitoba, Canada.
For more information: http://www.ipam.mb.ca/mcisc/
Collecting and Producing Electronic Evidence in Cybercrime Cases.
University of Namur. May 8-9, 2003. Namur, Belgium. For moreinformation:
http://www.ctose.org/info/events/workshop-8-9-may-2003.html
Little Sister 2003: Community Resistance, Security, Law andTechnology. May 9-11, 2003. Vancouver, British Columbia, Canada. Formore
information: http://www.littlesister2003.org/
2003 IEEE Symposium on Security and Privacy. IEEE Computer SocietyTechnical Committee on Security and Privacy, in cooperation with
theInternational Association for Cryptologic Research (IACR). May 11-14,
2003. Oakland, CA. For more information:
http://www.ieee-security.org/TC/SP-Index.html
Technologies for Protecting Personal Information. Federal TradeCommission. Workshop 1: The Consumer Experience. May 14, 2003.
Workshop 2: The Business Experience. June 4, 2003. Washington, DC. Formore information: http://www.ftc.gov/techworkshop/
ITS-2003: Third International Conference on "Information Technologiesand Security." June 23-27, 2003. Partenit, Crimea,
Ukraine. For moreinformation: http://www.itb.conferen.ru/eng/info_e.html
Press Freedom on the Internet. The World Press Freedom Committee. June26-28, 2003. New York, NY. For more information: <mgreenewpfc.org>
Building the Information Commonwealth: Information Technologies andProspects for Development of Civil Society Institutions in theCountries
of the Commonwealth of Independent States.
Interparliamentary Assembly of the Member States of the Commonwealthof Independent States (IPA). June 30-July 2, 2003. St. Petersburg,
Russia. For more information: http://www.communities.org.ru/conference/
O'Reilly Open Source Convention. July 7-11, 2003. Portland, OR. Formore information: http://conferences.oreilly.com/oscon/
1st Global Conference: Visions of Humanity in Cyberculture, Cyberpunkand Science Fiction. August 11-13, 2003. Prague, Czech Republic.
Formore information: http://www.inter-disciplinary.net/vhccsf03cfp.htm
Privacy2003. Technology Policy Group. September 30 - October 2, 2003.
Columbus, OH. For more information:
http://www.privacy2000.org/privacy2003/
Subscription Information
Subscribe/unsubscribe via Web interface:
http://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news
Subscribe/unsubscribe via e-mail:
To: epic_news-requestmailman.epic.org
Subject line: "subscribe" or "unsubscribe" (no quotes)
Help with subscribing/unsubscribing:
To: epic_news-requestmailman.epic.org
Subject: "help" (no quotes)
Back issues are available at:
http://www.epic.org/alert/
The EPIC Alert displays best in a fixed-width font, such as Courier.
Privacy Policy
The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or
share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do
not enhance (linkto other databases) our mailing list or require your actual name.
In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under"subscription
information". Please contact infoepic.org if you wouldlike to change your subscription e-mail address, if you areexperiencing subscription/unsubscription problems, or if you
have anyother questions.
About EPIC
The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus
public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord
privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Actlitigation, and conducts policy research. For more information,
e-mail infoepic.org, http://www.epic.org or write EPIC, 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009.
+1 202 483 1140 (tel), +1 202 483 1248 (fax).
If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible.
Checks should be made out to "EPIC" and sent to1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009.
Or you can contribute online at:
http://www.epic.org/donate/
** Receive a free Observing Surveillance conference poster withdonation of $75 or more! **
Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation
ofencryption and expanding wiretapping powers.
Thank you for your support.
END EPIC Alert 10.07
.
WorldLII:
Copyright Policy
|
Disclaimers
|
Privacy Policy
|
Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2003/7.html