WorldLII Home | Databases | WorldLII | Search | Feedback

EPIC Alert

You are here:  WorldLII >> Databases >> EPIC Alert >> 2004 >> [2004] EPICAlert 15

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

EPIC Alert 11.15 [2004] EPICAlert 15









EPIC ALERT


Volume 11.15 August 4, 2004


Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.

http://www.epic.org/alert/EPIC_Alert_11.15.html


Table of Contents



[1] EPIC Report: Homeland Security Given Census Data on Arab Americans
[2] White House Responds to 9/11 Commission Report
[3] Court Rejects Agency Effort to Withhold CAPPS II Info From EPIC
[4] Agencies Issue Rules on Homeless Tracking; Bank Customer ID
[5] Congress Considers Bills to Strengthen E-Mail Privacy
[6] News in Brief
[7] EPIC Bookstore: A Little Knowledge
[8] Upcoming Conferences and Events


[1] EPIC Report: Homeland Security Given Census Data on Arab Americans


EPIC obtained documents through the Freedom of Information Act lastweek revealing that the Census Bureau gave the Department of HomelandSecurity statistical information on people who identified themselveson the 2000 census as being of Arab ancestry. The special tabulationswere prepared specifically for the law enforcement agency, and do notindicate that similar information about any other ethnic groups wasrequested. The tabulations apparently include information aboutUnited States citizens, as well as individuals of Arab descent whosefamilies have lived in the United States for generations.

One tabulation shows cities with populations of 10,000 or more andwith 1,000 or more people who indicated they are of Arab ancestry. Foreach city, the tabulation provides total population, population ofArab ancestry, and percent of the total population which is of Arabancestry.

A second tabulation, more than a thousand pages in length, shows thenumber of census responses indicating Arab ancestry in zip codesthroughout the country. The responses indicating Arab ancestry aresubdivided into Egyptian, Iraqi, Jordanian, Lebanese, Moroccan,
Palestinian, Syrian, Arab/Arabic, and Other Arab.

The heavily redacted documents show that in April 2004, a CensusBureau analyst e-mailed a Department of Homeland Security official andsaid, "You got a file of Arab ancestry information by ZIP CodeTabulation Area from me last December (2003). My superiors are nowasking questions about the usage of that data, given the sensitivityof different data requests we have received about the Arabpopulation."

The same day, a Department of Homeland Security Customs and BorderProtection official e-mailed the analyst to explain, "At U.S.
International airports, U.S. Customs posts signage informing variousnationalities of the U.S. Customs regulations to report currencybrought into the US upon entry . . . . My reason for asking for U.S.
demographic data is to aid the Outbound Passenger Program Officer inidentifying which language of signage, based on U.S. ethnicnationality population, would be best to post at the majorInternational airports."

During World War II, the Census Bureau provided statisticalinformation to help the War Department round up more than 120,000innocent Japanese Americans and confine them to internment camps.

The tabulations were produced using data from the 2000 censuslong-form questionnaire, which goes to only a sample of thepopulation. The tabulation figures, therefore, do not provide anentirely accurate representation of the Arab American population.

The documents:

http://www.epic.org/privacy/census/foia

For more information on the census and privacy, see EPIC's CensusPrivacy Page:

http://www.epic.org/privacy/census



[2] White House Responds to 9/11 Commission Report


In a White House Rose Garden speech on Monday, President Bush endorsedtwo significant recommendations contained in the final report of theNational Commission on Terrorist Attacks, also known as the 9/11Commission: the creation of a national intelligence director and thedevelopment of a national counterterrorism center that will operate as"our government's knowledge bank for information about known andsuspected terrorists."

The final report of the 9/11 Commission calls for a majorrestructuring of the U.S. national security framework. The 9/11Commission recommends that a newly appointed Cabinet-level nationalintelligence director have direct control over the intelligencecommunity's $40 billion annual budget, real power to coordinate theefforts of fifteen government agencies, and veto power over theindividuals named to head intelligence agencies.

In contrast, under President Bush's plan, the intelligence directorwould not have full control over budget and hiring matters. WhiteHouse spokesman Scott McClellan said the Bush administration wouldprovide Congress with more information about the proposal in comingdays, including details regarding how much authority over budgetaryand personnel matters the new national intelligence director shouldhave. The director would have "significant input" in making budgetaryrecommendations to the president, according to Andrew Card, WhiteHouse Chief of Staff. McClellan stated, "The national intelligencedirector will have the authority he or she needs to do the job."

The disagreement over the director's power is likely to be symbolic ofthe forthcoming public debate over which 9/11 Commissionrecommendations Congress should enact. Both House and Senate leaderssay they want to enact legislation prior to the November presidentialelection. However, some intelligence officials and civil libertiesorganizations warn against a Congressional rush to action withoutcareful deliberation.

It remains unclear the extent to which the critical governmentactivities of the new counterterrorism center will be subject topublic disclosure under the Freedom of Information Act. In addition,
questions remain about how the proposed changes would affect federalgovernment data mining efforts at the Department of Defense and othergovernment agencies. In a report released in May 2004 titled"Safeguarding Privacy in the Fight Against Terrorism," the bipartisanTechnology and Privacy Advisory Committee, created by Secretary ofDefense Donald Rumsfeld, expressed privacy concerns over governmentdata mining efforts. The report concluded that "rapid action isnecessary to address the host of government programs that involve datamining concerning U.S. persons." The report recommended that theDefense Department "should safeguard the privacy of U.S. persons whenusing data mining to fight terrorism."

President Bush's remarks on intelligence reform:

http://www.whitehouse.gov/news/releases/2004/08/20040802-2.html

The 9/11 Commission's final report:

http://www.epic.org/privacy/terrorism/911report.pdf

EPIC's testimony before the 9/11 Commission:

http://www.epic.org/privacy/terrorism/911commtest.pdf

For more information about the report, see EPIC's 9/11 Commissionpage:

http://www.epic.org/privacy/terrorism/911comm.html#comment



[3] Court Rejects Agency Effort to Withhold CAPPS II Info From EPIC


A federal district court has refused to allow the TransportationSecurity Administration (TSA) to withhold factual information withindeliberative, nonfinal agency documents concerning the ComputerAssisted Passenger Prescreening System (CAPPS II).

In August 2003 EPIC requested, among other information, any privacyimpact assessments the agency had performed for CAPPS II. TheE-Government Act of 2002 requires an agency to perform a privacyimpact assessment before developing or procuring informationtechnology that collects, maintains or disseminates identifiableinformation.

TSA agreed to process the documents, but failed to respond to EPIC'srequest for expedited processing. In September 2003, EPIC applied foran emergency court order requiring TSA immediately to release therequested documents. TSA relented and agreed to process the materialby September 25, 2003, five days before public comments were due onTSA's proposed Privacy Act notice for CAPPS II. TSA then refused torelease the documents, claiming that they were exempt from disclosureunder the Freedom of Information Act because they were not final andbecause CAPPS II was "still evolving." The agency further maintainedthat no factual material, which must be disclosed under law, couldpossibly be released to EPIC because "facts are necessarilyinextricably intertwined with policy-making processes," and to releasethem would "expose the deliberative process."

In a 21-page opinion issued on August 2, 2004, Judge ColleenKollar-Kotelly determined that drafts of privacy impact assessmentsare protected from disclosure under the Freedom of Information Act,
but rejected the government's claim that no factual material could beseparated from exempt material. Noting that the government failed tosatisfy its burden to "specify in detail which portions of thedocument are disclosable and which are allegedly exempt," JudgeKollar-Kotelly concluded that if the agency's "stated rationale,
without further detail or explanation, could be the sole justificationfor non-segregability, the segregability requirement . . . would begutted. . . . This Circuit has expressly provided that suchconclusory language is insufficient to justify a finding ofnon-segregability."

Judge Kollar-Kotelly has ordered the agency to review the documentsagain for factual information that can be separated from protectedmaterial, or to explain to the court why it is unable to do so.

The order comes just days after the Department of Homeland Securityadmitted that CAPPS II is too flawed to go forward, and the agency isconsidering other aviation security options.

Judge Kollar-Kotelly's decision:

http://www.epic.org/privacy/airtravel/pia_order.pdf

For more information about CAPPS II, see EPIC's Passenger ProfilingPage:

http://www.epic.org/privacy/airtravel/profiling



[4] Agencies Issue Rules on Homeless Tracking; Bank Customer ID


The Department of Housing and Urban Development has issued final rulesto implement Homeless Management Information Systems (HMIS), programsthat track recipients of benefits to assess the number of personsreceiving care, and to improve efficiency of services to the poor.
While well intentioned, the implementation of HMIS can be highlyprivacy invasive.

In comments to the agency, eight civil liberties groups joined EPIC inopposing unnecessarily invasive aspects of HMIS, including provisionsgiving law enforcement broad access to data, the collection of theSocial Security Number from the homeless, and a proposal that domesticviolence victims be included in the tracking system. The groups alsoargued that the agency should take a census-style "snapshot" of thehomeless population rather than a constant enumeration of homelessindividuals. In its final rule, the agency decided to proceed withcollection of the Social Security Number and a full enumeration of thehomeless, including domestic violence victims. However, the finalrule incorporates tighter controls over law enforcement access andcontains significant new protections for privacy.

Under the final rule, law enforcement access provisions are clearerand offer more detail to benefits providers. Additionally, whereasthe proposed rule would allow some government agents to access anentire HMIS database without a warrant, the final rule limits thecontexts in which and the amount of data that law enforcement canobtain. The rule articulates a full set of fair information practicesfor protection of HMIS data, including collection limitation, purposespecification, use limitation, purpose specification, openness, accessand correction, and accountability. The rule also articulates atwo-tiered approach to security, where benefits providers must complywith a floor of requirements but may adopt heightened procedures whereappropriate.

In a separate proceeding, federal banking regulators issued a finalrule requiring all banks to create customer identification programsthat must be approved by the banks' board of directors. Individualsopening new deposit accounts, trust services, a safe deposit box,
credit accounts, or even an extension of credit must provide theirnames, dates of birth, addresses, and Social Security Numbers underthe new rules. A bank must verify enough of this information "to forma reasonable belief that it knows the true identity of the customer,"
but it need not confirm the accuracy of all the information submittedby the individual. Banks may verify using documents, such asgovernment issued identification cards, or though non-documentarymethods, such as credit reporting agency files or public databases.

Banks must also check new accounts against the Office of ForeignAssets Control database, which lists known or suspected criminalorganizations. Banks must retain both identifying information andinformation about verifying customers for five years after the accountis closed.

Bank examiners are encouraged to inspect several categories ofsuspicious accounts under the rules. They include accounts where thecustomer applied for a new taxpayer identification number and"high-risk" activities including foreign private banking and trustaccounts, accounts of foreign political officials, offshore accountsand non-face-to-face accounts.

Basic bank services, such as wire transfers, check cashing, and moneyorder sales do not trigger customer identification programs. Theregulations were promulgated under Section 326 of the USA PATRIOT Act.

HMIS Final Rule:

http://www.epic.org/redirect/hmis_reg.html

EPIC comments on HMIS:

http://www.epic.org/privacy/poverty/hmiscomments.html

Federal Reserve Customer Identification Program Rules:

http://www.epic.org/redirect/cips_rules.html



[5] Congress Considers Bills to Strengthen E-Mail Privacy


Rep. Jay Inslee (D-WA) has introduced the E-mail Privacy Act of 2004,
H.R. 4956, which would address two weaknesses in the ElectronicCommunications Privacy Act that were recently highlighted in acontroversial First Circuit case. In United States v. Councilman, thecourt found that an ISP's real-time, continuous acquisition ofsubscriber e-mail did not violate federal wiretap law. The new billwould fix this misinterpretation of the Wiretap Act as well as close along-standing loophole in the law governing stored communications thatallows an Internet Service Provider (or any electronic communicationservice provider) to read its subscribers' communications. A secondbill, the E-mail Privacy Protection Act of 2004, H.R. 4977, has beenintroduced by Rep. Jerrold Nadler (D-NY) to address the same issues.

In creating the 1986 Electronic Communications Privacy Act, Congressupdated existing wiretap law to address electronic communications.
Before, only wire and oral communications were protected frominterception. The amendments extended protections againstinterception to electronic communications, and also sought toestablish legal standards for access to email in the possession of aservice provider. The changes created two categories of electroniccommunications -- those "in transit," which enjoy relatively generousprotection under the first tier of the Electronic CommunicationsPrivacy Act (the Wiretap Act), and those "in storage," which receive alesser degree of legal protection under the second tier of theElectronic Communications Privacy Act (the Stored Communications Act).
The categories that resulted from the amendments were viewed ascomplimentary efforts to protect the privacy of electroniccommunications. The tiering of communications resulted more from theeffort to address specific concerns -- such as extending protectionsto electronic communications and creating safeguards for storedcommunications -- than to formally categorize the privacy protectionfor each type of information.

The Councilman case involved the conduct of Interloc, an onlineliterary clearinghouse that sought to pair its subscribers -- rare andused book dealers -- with book buyers. Brad Councilman, formerexecutive of the company, directed Interloc employees to writecomputer code to intercept and copy all incoming communications fromAmazon.com to the subscriber book dealers, for whom Interloc providede-mail service. According to the indictment, the Interloc systemsadministrator wrote a revision to the mail processing code thatintercepted, copied and stored all incoming messages from Amazon.combefore they were delivered to the subscribers. Councilman was chargedwith violating the Wiretap Act. However, because the messages were in"temporary storage" while on the Interloc e-mail server -- momentarilybefore being made available to subscribers -- the court held that themessages were not "intercepted" in violation of the Wiretap Act.

The House bills seek to correct the First Circuit's narrowinterpretation of the provision by clarifying the language, thusreflecting the Congressional intent of the Electronic CommunicationsPrivacy Act: the real-time, continuous acquisition of messages whilethey are in transit -- even if stored momentarily during the course oftransmission -- should be an "interception" under the Wiretap Act.
H.R. 4956 appears to address the issue more directly than H.R. 4977 bymodifying the definition of "interception." Without thesemodifications, and using the anomalous interpretation of the FirstCircuit, law enforcement may be able to gain such real-time,
continuous acquisition of a suspect's e-mail or other electroniccommunications without following the strict requirements for a wiretapcourt order.

Counterintuitively, Brad Councilman could not be charged under thesecond tier of the Electronic Communications Privacy Act, the StoredCommunications Act. Both the Wiretap Act and the StoredCommunications Act contain a "service provider exception," allowingthe service provider to monitor subscriber communications undercertain circumstances. The exception in the Wiretap Act allows theprovider to monitor communications to the extent necessary for theprovision of the service (e.g. ensuring that phone line quality issufficient). However, the Stored Communications Act exception allowsproviders -- including ISPs -- to monitor communications without anysuch qualification. This extremely broad exception allowed Councilmanto escape liability under the Stored Communications Act as well. Thebills seek to close this loophole by modifying the service providerexception language in the Stored Communications Act to approximatethat of the Wiretap Act.

H.R. 4956, the E-mail Privacy Act of 2004:

http://thomas.loc.gov/cgi-bin/bdquery/z?d108:h.r.4956:

H.R. 4977, the E-mail Privacy Protection Act of 2004:

http://thomas.loc.gov/cgi-bin/bdquery/z?d108:h.r.4977:

The opinion in United States v. Councilman:

http://www.ca1.uscourts.gov/pdf.opinions/03-1383-01A.pdf

For more information about wiretap law, see EPIC's Wiretap Page:

http://www.epic.org/privacy/wiretap



[6] News in Brief


PRIVACY INTERNATIONAL HOLDS 2004 UK BIG BROTHER AWARDS
Privacy International recently held its sixth annual United KingdomBig Brother Awards ceremony, honoring the year's most egregiousviolators of privacy in the UK. Privacy International acceptednominations from the public in five categories: Worst Public Servant,
Most Invasive Company, Most Appalling Project, Most Heinous GovernmentOrganisation, and Lifetime Menace Award. The nominees were judged bya panel of lawyers, academics, consultants, journalists and civilrights activists. Winners received a golden award in the shape of aboot stamping on a human head, an image drawn from George Orwell'snovel 1984. The Lifetime Menace Award went to the United StatesVisitor and Immigrant Status Indicator Technology (US-VISIT) becauseof its offensive and invasive plan to fingerprint all visitors to theUnited States beginning in September 2004. The unusual nomination ofa United States initiative came as a result of the near-total silenceof both the U.S. and UK governments regarding implementation of thisprogram.

Privacy International's 2004 UK Big Brother Awards page:

http://www.privacyinternational.org/bigbrother/uk2004

For more information about US-VISIT, see EPIC's US-VISIT Page:

http://www.epic.org/privacy/us-visit

EPIC JOINS COALITION TO FILE SPECTRUM PRIVACY COMMENTS
EPIC has joined a coalition of groups filing comments with the FederalCommunications Commission on the allocation of spectrum. Thecomments, drafted by the Media Access Project, support the opening ofthe 3650-3700 MHz band to unlicensed spectrum access, but ask theCommission to address the privacy issues that will be raised by suchaction.

The comments were submitted in response to a notice of proposed rulemaking, which proposed that every device using this spectrum shouldbroadcast identification information, including contact information ofthe owner or operator of the device. This requirement would mean thatan individual accessing this spectrum on his laptop would have tobroadcast his name and e-mail address. The coalition's commentsexplain why such identification is both unnecessary and harmful to theprivacy of the spectrum user.

Coalition comments to the Federal Communications Commission:

http://www.mediaaccess.org/36500_3700_72804.pdf

MEDIA, CIVIL LIBERTIES GROUPS FILE AMICUS BRIEF IN EPIC'S SUPPORT
A coalition of journalistic and civil liberties organizations hasfiled a "friend of the court" brief in support of EPIC's suit againstthe Department of Justice in a federal appeals court. EPIC is seekingreversal of a lower court's refusal to expedite processing of aFreedom of Information Act request seeking information about thecoordinated lobbying efforts of federal prosecutors to opposelegislation affecting the controversial USA PATRIOT Act. EPIC'sappeal concerns questions about what a Freedom of Information Actrequestor must demonstrate in order to receive expedited processing.
The coalition's interest in the appeal stems from the important roleexpedited processing plays in disseminating timely governmentalinformation in cases in which there is an urgency to inform thepublic. A decision by the appeals court will likely have asubstantial impact on the ability of requestors to obtain expeditedprocessing.

Coalition's amicus brief:

http://www.epic.org/open_gov/otter/otter_amicus.pdf

For more information about the case, see EPIC's EPIC v. DOJ Page:

http://www.epic.org/open_gov/otter

CONGRESS MAY LOOSEN JUNK FAX REGULATIONS IN SEPTEMBER
Congress is poised to loosen federal regulations protectingindividuals from unsolicited commercial fax messages, known as "junkfaxes." The House has already passed legislation eliminating aFederal Communications Commission regulation that would require junkfaxers to obtain written consent before transmitting messages. TheHouse bill also creates an established business relationship exemptionto the consent requirement, allowing any business to junk fax anyonewho makes any purchase for eternity. The Senate Commerce Committeeapproved identical legislation, but that version of the bill is likelyto be amended to limit the duration of the established businessrelationship exemption.

In response to House and Senate staff requests for advice on junkfaxing, EPIC recommended that the Federal Communications Commissionshould be empowered to reestablish the written consent requirementwith respect to junk faxers who routinely violate the law. However,
because of procedural rules invoked in the Senate Commerce Committee,
no amendments to the legislation were considered.

S. 2603, the Junk Fax Prevention Act of 2004:

http://thomas.loc.gov/cgi-bin/bdquery/z?d108:s.02603:

H.R. 4600, the Junk Fax Prevention Act of 2004:

http://thomas.loc.gov/cgi-bin/bdquery/z?d108:h.r.04600:



[7] EPIC Bookstore: A Little Knowledge


A Little Knowledge: Privacy, Security, and Public Information AfterSeptember 11, Peter M. Shane, John Podesta and Richard C. Leone, eds.
(The Century Foundation 2004).

http://www.powells.com/cgi-bin/biblio?inkey=62-0870784870-3
"Drawn from the proceedings of the 'Security, Technology, and Privacy'
conference, A Little Knowledge looks at the different ways publicsecurity and the individual's right to privacy have been placed atodds after September 11. Chapters address such specific topics as howtightening security and limiting communication can harm Americanparticipation in the international scientific community; howrestricting public access to information can result in a nation ofuninformed and unengaged citizens; and how American data security andprivacy practices compare with those of other nations. Cosponsored byCarnegie Mellon University's Heinz School and the GeorgetownUniversity Law Center. Featuring John Podesta on 'Governing inSecret'; Alice P. Gast on restricting the flow of scientificinformation; Baruch Fischhoff on disclosing risks; Victor W. Weedn ongovernment risk communications; George Duncan on optimizing privacyand utility in the management of online databases; Joel R. Reidenbergon international approaches to privacy; Sally Katzen on publicinformation rights; and Peter M. Shane on the new technologies anddemocratic empowerment."



EPIC Publications:

"The Public Voice WSIS Sourcebook: Perspectives on the World Summit onthe Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook

This resource promotes a dialogue on the issues, the outcomes, and theprocess of the World Summit on the Information Society (WSIS). Thisreference guide provides the official UN documents, regional andissue-oriented perspectives, as well as recommendations and proposalsfor future action, as well as a useful list of resources and contactsfor individuals and organizations that wish to become more involved inthe WSIS process.



"The Privacy Law Sourcebook 2003: United States Law, InternationalLaw, and Recent Developments," Marc Rotenberg, editor (EPIC 2003).
Price: $40. http://www.epic.org/bookstore/pls2003

The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists who needan up-to-date collection of U.S. and International privacy law, aswell as a comprehensive listing of privacy resources.



"FOIA 2002: Litigation Under the Federal Open Government Laws," HarryHammitt, David Sobel and Mark Zaid, editors (EPIC 2002). Price: $40.
http://www.epic.org/bookstore/foia2002

This is the standard reference work covering all aspects of theFreedom of Information Act, the Privacy Act, the Government in theSunshine Act, and the Federal Advisory Committee Act. The 21stedition fully updates the manual that lawyers, journalists andresearchers have relied on for more than 25 years. For those wholitigate open government cases (or need to learn how to litigatethem), this is an essential reference manual.



"Privacy & Human Rights 2003: An International Survey of Privacy Lawsand Developments" (EPIC 2002). Price: $35.
http://www.epic.org/bookstore/phr2003
This survey, by EPIC and Privacy International, reviews the state ofprivacy in over fifty-five countries around the world. The surveyexamines a wide range of privacy issues including data protection,
passenger profiling, genetic databases, video surveillance, ID systemsand freedom of information laws.



"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0

A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens free expression.



"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price: $40.
http://www.epic.org/cls
The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumersand the basic responsibilities for businesses in the online economy.



"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC 2000). Price:
$20. http://www.epic.org/bookstore/crypto00&

EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption to law enforcement.



EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:

EPIC Bookstore http://www.epic.org/bookstore

"EPIC Bookshelf" at Powell's Books http://www.powells.com/features/epic/epic.html



[8] Upcoming Conferences and Events


Crypto 2004: The Twenty-Fourth Annual IACR Crypto Conference.
International Association for Cryptologic Research, IEEE ComputerSociety Technical Committee on Security and Privacy, and the ComputerScience Department of the University of California, Santa Barbara.
August 15-19, 2004. Santa Barbara, CA. For more information:
http://www.iacr.org/conferences/crypto2004.

Transatlantic In-Security: Information, Privacy, and the Challenge ofSecurity in US-EU Relations. The American Consortium on EU Studies.
August 17, 2004. Washington, DC. E-mail lharris at american.edu.

Ninth National HIPAA Summit. September 12-14, 2004. Baltimore, MD.
For more information: http://www.HIPAASummit.com.

Public Voice Symposium: Privacy in a New Era: Challenges,
Opportunities and Partnerships. Electronic Privacy InformationCenter, European Digital Rights Initiative (EDRi), and PrivacyInternational. September 13, 2004. Wroclaw, Poland. For moreinformation:
http://www.thepublicvoice.org/events/wroclaw04/default.html.

The Right to Personal Data Protection -- the Right to Dignity. 26thInternational Conference on Data Protection and Privacy Commissioners.
September 14-16, 2004. Wroclaw, Poland. For more information:
http://26konferencja.giodo.gov.pl.

Health Privacy Seminar. Riley Information Services. September 17,
2004. Ottawa, Ontario. For more information:
http://www.rileyis.com/seminars/index.html.

Nethead/Bellhead: The FCC Takes on the Internet. Cardozo Law SchoolFlorsheimer Center for Constitutional Democracy and the Yale LawSchool Information Society Project. September 28, 2004. New York,
NY. For more information: http://www.cardozobellhead.net.

The Internet and the Law -- A Global Conversation. Law & TechnologyProgram, University of Ottawa. Ottawa, Ontario. October 1-2, 2004.
For more information:
http://web5.uottawa.ca/techlaw/symposium.php?idnt=99&v=22.

2004 Telecommunications Policy Research Conference. National Centerfor Technology & Law, George Mason University School of Law. October1-3, 2004. Arlington, VA. For more information:
http://www.tprc.org/TPRC04/call04.htm.

Health Privacy Conference. Office of the Information and PrivacyCommissioner of Alberta. October 4-5, 2004. Calgary, Alberta,
Canada. For more information:
http://www.oipc.ab.ca/home/DetailsPage.cfm?ID=1453.

Privacy and Identity: The Promise and the Perils of a TechnologicalAge. DePaul University Center for Intellectual Property Law andInformation Technology and School of Computer Science,
Telecommunications and Information Systems. October 14-15, 2004.
Chicago, IL. For more information:
http://facweb.cs.depaul.edu/research/vc/CIPLIT2004.

2004 Big Brother Awards Switzerland. October 16, 2004. Lucerne,
Switzerland. For more information: http://www.bigbrotherawards.ch.

DRM 2004: The Fourth ACM Workshop on Digital Rights Management.
Association for Computing Machinery Special Interest Group onSecurity, Audit and Control. October 25, 2004. Washington, DC. Formore info: http://mollie.engr.uconn.edu/DRM2004.

2004 Big Brother Awards Austria. October 26, 2004. Vienna, Austria.
For more information: http://www.bigbrotherawards.at.

IAPP Privacy and Data Security Academy & Expo. InternationalAssociation of Privacy Professionals. October 27-29, 2004. NewOrleans, LA. For more information:
http://www.privacyassociation.org/html/conferences.html.

Privacy and Security: Seeking the Middle Path. Office of theInformation & Privacy Commissioner of Ontario; Centre for InnovationLaw and Policy, University of Toronto; and Center for AppliedCryptographic Research, University of Waterloo. Toronto, Ontario,
Canada. October 28-29, 2004. For more information:
http://www.epic.org/redirect/uwaterloo_conf.html.

2004 Big Brother Awards Germany. October 29, 2004. Bielefeld,
Germany. For more information: http://www.bigbrotherawards.de.

CFP2005: Fifteenth Annual Conference on Computers, Freedom andPrivacy. April 12-15, 2005. Seattle, WA. For more information:
http://www.cfp2005.org.


Subscription Information


Subscribe/unsubscribe via web interface:

https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news

Back issues are available at:

http://www.epic.org/alert

The EPIC Alert displays best in a fixed-width font, such as Courier.


Privacy Policy


The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do not enhance (linkto other databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under"subscription information."


About EPIC


The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Actlitigation, and conducts policy research. For more information, seehttp://www.epic.org or write EPIC, 1718 Connecticut Ave., NW, Suite200, Washington, DC 20009. +1 202 483 1140 (tel), +1 202 483 1248(fax).

If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible. Checks should be made out to "EPIC" and sent to 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009. Or you cancontribute online at:

http://www.epic.org/donate

Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation ofencryption and expanding wiretapping powers.

Thank you for your support.

END EPIC Alert 11.15

.


WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2004/15.html