You are here:
WorldLII >>
Databases >>
EPIC Alert >>
2004 >>
[2004] EPICAlert 18
Database Search
| Name Search
| Recent Articles
| Noteup
| LawCite
| Help
EPIC Alert 11.18 [2004] EPICAlert 18
EPIC ALERT
Volume 11.18 September 24, 2004
Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.
http://www.epic.org/alert/EPIC_Alert_11.18.html
Table of Contents
[1] Poland Conference Examines Privacy in a New Era
[2] Gov't Details Secure Flight; Documents Show CAPPS II Mission Creep
[3] Wireless Privacy Bill Moves Forward in Senate
[4] EPIC Challenges Dismissal of Privacy Claim Against Northwest
[5] EPIC Testifies on Voting and Privacy
[6] News in Brief
[7] EPIC Bookstore: Litigation Under the Federal Open Government Laws
[8] Upcoming Conferences and Events
[1] Poland Conference Examines Privacy in a New Era
The Public Voice hosted "Privacy in a New Era: Challenges,
Opportunities, and Partnerships" on September 13 in Wroclaw, Poland.
The conference provided an opportunity for civil society leaders andacademic experts to meet with European data protection authorities
andexplore emerging challenges to the protection of personal privacy. Theconference was held in conjunction with the annual meeting
of theInternational Data Protection and Privacy Commissioners. The event wasorganized by EPIC, Privacy International, and the European
DigitalRights Initiative.
Conference participants came from fifteen countries, seven of whichare New European Union Member States. Several privacy commissionersparticipated
in the conference, including Peter Hustinx, European DataProtection Supervisor; Dr. Ewa Kulesza, Inspector General for PersonalData
Protection in Poland; Karel Neuwirt, Data Protection Commissionerfor the Czech Republic; Jennifer Stoddart, Privacy Commissioner
forCanada; David Loukidales, Privacy Commissioner for British Columbia,
Canada; Raymond Tang, Privacy Commissioner for Hong Kong; and FrankWork, Information and Privacy Commissioner for Alberta, Canada.
Karel Neuwirt, Data Protection Commissioner for the Czech Republic,
spoke about the development of privacy protection, the relevantinternational instruments, and the establishment of the dataprotection
authority in the Czech Republic. Mr. Neuwirt emphasizedthe educative role of his office. "Education is an effective tool ofenforcement
for data protection principles," he said.
Gus Hosein of Privacy International discussed the relationship betweencivil society groups and data protection authorities. Hosein
pointedto several successful collaborations as well as important efforts thatdata protection authorities have taken to safeguard
privacy, andrecommended that civil society organizations acknowledge theseefforts. At the same time, he said, data protection authorities
mustpursue more campaigns to maintain public support.
Professor Arwid Mednis of the University of Wroclaw explored the legalbasis of the right to privacy, with a particular emphasis on
thedevelopment of privacy standards within the Council of Europe and theEuropean Union. Professor Mednis looked in particular at
recentdevelopments in privacy law and some of the new challenges resultingfrom efforts to combat computer crime and to fight terrorism.
Bogdan Manolea described how he established the Association for theBest Use of Electronic Services (ABUSE), the first association
ofinformation service providers in Romania. He examined the roots ofprivacy and the current threats to privacy, including theestablishment
of the Integrated Informational System, a centralizeddatabase which may become the electronic arm of the RomanianIntelligence Service.
Manolea suggested several strategies foreffective privacy protection, including the creation of an independentprivacy office, awareness
campaigns, and concrete programs incooperation with civil society organizations.
Ivan Székely of the Open Society Archives at Central EuropeanUniversity in Hungary candidly assessed the work of civil societygroups
in the data protection field. He discussed the need todistinguish real civil society organizations from front groups, aswell as
the complimentary roles of expert privacy groups and radicalprivacy groups. He made recommendations about how to developeffective
public education campaigns, including the need to developphrases and themes that speak to a broad public.
Conference web site:
http://www.thepublicvoice.org/events/wroclaw04
The Public Voice:
http://www.thepublicvoice.org
Privacy International:
http://www.privacyinternational.org
European Digital Rights Initiative:
http://www.edri.org
[2] Gov't Details Secure Flight; Documents Show CAPPS II Mission Creep
The Transportation Security Administration has released moreinformation about Secure Flight, the government's new passengerprescreening
initiative which is being developed to replace thecontroversial second generation Computer Assisted PassengerPrescreening System
(CAPPS II). CAPPS II was dropped just months agodue to unresolvable concerns about the program's effectiveness andimplications for
individual privacy.
As described by the TSA, Secure Flight will compare Passenger NameRecords (PNRs) against information compiled by the Terrorist ScreeningCenter,
which will include expanded "selectee" and "no fly" lists. TSAwill also seek to identify "suspicious indicators associated withtravel
behavior" in passengers' itinerary PNR data. Furthermore, theagency is planning to test the use of commercial databases to verifythe
accuracy of information provided by travelers. TSA willadminister the program, removing all passenger screeningresponsibility from
the airlines. The agency has issued a proposedorder that directs airlines to turn over passenger records from June2004 so that Secure
Flight can be tested this fall.
Like its predecessor, Secure Flight has been exempted from crucialprovisions of the Privacy Act, which will severely limit the rightsindividuals
typically would have in the personal information thegovernment maintains about them. For instance, Secure Flight maycollect and
use personal information irrelevant and unnecessary foraviation security. Furthermore, passengers will have no judiciallyenforceable
rights to access and correct the personal informationmaintained about them for the program.
TSA assures the public, however, that "upon completion of the testingphase, and before Secure Flight is operational, TSA will establishcomprehensive
passenger redress procedures and personal data and civilliberties protections for the Secure Flight program." No detailsabout these
protections are available, nor information about how longTSA will keep PNR data that it collects for Secure Flight, even thoughthe
agency intends to launch the program early next year.
In related news, EPIC's Freedom of Information Act litigation with theTSA has revealed three heavily redacted draft privacy impactassessments the agency performed last year for CAPPS
II. The drafts,
dated April 17, 2003, July 29, 2003, and July 30 2003, reflect adramatic expansion over just three and a half months in the wayspassenger
information collected for the program would have been shared.
Privacy Act notice for Secure Flight:
http://www.epic.org/privacy/airtravel/sf_sorn__9.21.04.pdf
Secure Flight privacy impact assessment:
http://www.epic.org/privacy/airtravel/sf_pia__9.21.04.pdf
Proposed order directing airlines to turn over June 2004 passengerrecords:
http://www.epic.org/privacy/airtravel/sf_pra_9.21.04.pdf
Privacy impact assessments obtained through the FOIA showing CAPPS IImission creep:
http://www.epic.org/privacy/airtravel/foia/4-17-03.pdf
http://www.epic.org/privacy/airtravel/foia/7-29-03.pdf
http://www.epic.org/privacy/airtravel/foia/7-30-03.pdf
[3] Wireless Privacy Bill Moves Forward in Senate
The Senate Commerce Committee has approved S. 1963, the Wireless 411Privacy Act. Authored by Senators Specter (R-PA) and Boxer (D-CA),
the legislation would require wireless carriers to obtain consentbefore listing current subscribers a wireless directory, but newsubscribers
could be listed on an opt-out basis. The bill prohibitscharging for listing or for revoking a listing. Representatives Pitts(R-PA)
and Markey (D-MA) have introduced companion legislation in theHouse as H.R. 3558.
Earlier in the week, EPIC Executive Director Marc Rotenberg testifiedbefore the Committee on the need to create privacy protections
for awireless phone number directory being created by Qsent for wirelessproviders, AT&T, Sprint, Cingular, T-Mobile, Nextel, and
ALLTEL. Whilegiving individuals a convenient way to find wireless phone numbers,
such a directory may subject users to unwanted telemarketing, spam,
viruses, junk faxes, and harassing calls.
EPIC made the case that opt-in and other legislative protections areneeded because many profitable and reputable companies have promisedstrong
privacy safeguards only to renege with the adoption of newbusiness models. Furthermore, although the wireless industry's tradegroup,
CTIA, has promised that the system will be opt-in, theirrepresentations are illusory because the carriers themselves will setthe
privacy practices for the wireless directory. Carriers would befree to adopt opt-out standards, and thus far, the participatingcarriers
have been reticent and were unwilling to testify before theCommittee.
Not so with Verizon Wireless. In its testimony, the company stronglyopposed the creation of a wireless directory, calling it a "dumb
idea"
and claiming that opt-in is not enough to protect subscribers' privacyrights. It pledged not to participate in the wireless directory,
noting that those who wish to be listed can do so free online, and fora small charge in print directories.
Qsent, the company tasked to architect the wireless directory,
testified that consumers will get to choose to be listed, but stoppedshort of using the term "opt-in." The company claimed that wirelessnumbers
will only be distributed to those who call "411," and that itwill never appear in print or electronic form, nor will it beavailable
on the Internet. The company also promised securitysafeguards for the wireless directory. However, it is unclear whatrecourse exists
if there is accidental disclosure or security breach.
In the wireline context, the disclosure of an unpublished or unlistednumber usually results in the carrier issuing a new phone number
toaffected subscribers. It is unclear whether wireless users will enjoythat benefit.
California is on the cusp of creating the strongest protections forwireless directory information. California AB 1733 creates opt-inrequirements
for wireless directory listing and for the sale ofwireless telephone numbers. Individuals can revoke their consent tolisting at
any time, and carriers could not charge consumers forlisting or for revoking a listing. AB 1733 also allows individuals tobring
suit against those who deliberately violate the protections. Thebill passed the Senate and Assembly and is awaiting GovernorSchwarzenegger's
signature.
EPIC testimony on Wireless Directory Privacy:
http://www.epic.org/privacy/wireless/dirtest_904.html
Wireless 411 Privacy Act:
http://thomas.loc.gov/cgi-bin/bdquery/z?d108:s.1963:
California AB 1733:
http://www.epic.org/redirect/ab1733.html
[4] EPIC Challenges Dismissal of Privacy Claim Against Northwest
In a petition for review filed this week, EPIC urged the Department ofTransportation to reverse its recent decision that Northwest
Airlinesdid not break the law when it disclosed millions of passenger recordsto NASA. EPIC charged that Northwest Airlines commited
an unfair anddeceptive trade practice by giving passengers' personal information tothe agency in direct violation of its privacy
policy.
EPIC's petition argued that Northwest's Internet privacy policyassured its customers that their sensitive personal information wouldremain
protected unless the airline had a legal obligation to sharethe data with the government. The policy promised customers: "As aUser
of nwa.com Reservations you are in complete control of yourtravel planning needs. This includes controlling the use ofinformation
you provide to Northwest Airlines, its airline affiliates,
and WorldPerks partners." According to EPIC's appeal, Northwestviolated that agreement when it voluntarily released passenger recordsto
NASA for use in a now-defunct data mining study.
In an order dated September 10, the Department of Transportationinitially dismissed the complaint. The Department, which has publiclystated
that it "encourages self-regulation as the least intrusive andmost efficient means of ensuring the privacy of information providedby
consumers to airlines," proclaimed that in this case "Northwest hasnot violated its privacy policy, and . . . if it did, such a violationdoes
not warrant the initiation of enforcement proceedings."
In its petition filed September 20, EPIC asserted that that thegovernment blatantly ignored the established test for deceptive tradepractices
in declining to find that Northwest violated its privacypolicy. The petition asks the Department to reverse its dismissal,
apply the proper legal standard to the Northwest violation, andenforce the airline's privacy policy.
EPIC's petition for review of the Department of Transportation'sorder:
http://www.epic.org/privacy/airtravel/nasa/nwa_petition.pdf
The Department of Transportation's order dismissing EPIC's complaintagainst Northwest:
http://www.epic.org/privacy/airtravel/nasa/dot_order.pdf
For more information, see EPIC's Northwest disclosure page:
http://www.epic.org/privacy/airtravel/nasa
[5] EPIC Testifies on Voting and Privacy
EPIC Senior Policy Analyst Lillie Coney testified before the ElectionAssistance Commission's Technical Guidelines Development Committee
onSeptember 22 on the importance of voter privacy. Coney noted that thedelicate balance between the state's right to ensure that
intimidationand election fraud are not present in public elections and the voter'sright to privacy have resulted in the development
of the secret ballotand restricted zones around voting compartments. Because of thedocumented history of voter intimidation, coercion,
and fraudassociated with third party knowledge of how individual voters casttheir ballots, it is important not to underestimate the
importance ofvoter privacy. However, attempts to address fraud have led to voterintimidation and stringent measures to screen out
illegal voters,
which result in legitimate voters being denied their right to vote.
Coney noted that elections systems rely on voluntary participation ofpoll workers and voters. The major challenge of election systems
isto create ease of use in a process that is done very infrequently. Atmost the greatest voter participation is seen during presidentialelection
years, which occur once every four years. Recent reports ofpoll workers struggling to deal with malfunctioning voting technologyis
not new to paperless DRE voting machines. In the Florida 2000presidential election poll workers did not take malfunctioningpunchcard
voting machines out of service. It was reported that 20[punchcard voting] machines in two Miami-Dade County precincts withthe highest
rate of discarded punchcard ballots did not show votes forat least some candidates during a test-vote minutes before pollsopened
on November 7.
Poll workers provide the human judgment used in a gatekeeper functionto determine who may vote in public elections. There is very
littleif any due process accorded to voters who are judged to be invalid.
Unfortunately, the experience for voters who are in the "out group" --
minorities, new citizens, language minorities, and disabled voters --
are most at risk of being disenfranchised. Those voters notidentified with by poll workers often find the hurdles to voting aremuch
higher and problematic. For example, in the State of Floridavoters erroneously included on a list of felons, who are prevented bystate
law to vote, were predominately minority.
The subjective nature of the polling operation meant that some pollworkers were able to recognize the errors on the list and allowedvoters
to vote, while others could or would not allow theseindividuals to vote. As little as possible should rely upon thesubjective judgment
of poll workers, as gatekeepers to the ballot box,
but the focus should be on facilitating participation in the electionprocess.
According to the CalTech MIT Study "Voting: What Is What Could Be,"
between 4 and 6 million votes were lost in the 2000 election. Thestudy attributed the loss to problems with voter registration orpolling
place practices and problems with ballots. In response tothis situation, the Help America Vote Act became law. Thislegislation
made it a priority to making voting more accessible forall voters, especially those with disabilities or who were languageminorities.
Although the law requires only one accessible votingmachine per polling location, many states have interpreted that tomean touchscreen
direct recording electronic (DRE) voting machines andhave adopted the technology universally for all voters and votinglocations used
on Election Day.
The greatest privacy benefits of DRE voting machines accrue to thosewho are visually disabled, language minorities, or have literacychallenges.
Critics of paperless DRE voting technology acknowledgethe apparent usability benefits to some voters, but point to acritical vulnerability
in their design. Another privacy concern ispresented by the implementation of the voter interface, which on somemachines is done
at nearly a 75-80-degree angle to the horizontal.
Current machine set up in polling locations requires that the machinesbe in full view of the poll workers. This is done in such a
mannerthat the display screen is exposed to those present in the pollinglocation, including other voters. If the restricted space
around DREvoting machines is too small, this would also threaten voter privacy.
The hearing was an opportunity for the committee charged with makingrecommendations on voluntary standards for election systems and
votingtechnology. The committee is expected to make its recommendations tothe full Election Assistance Commission board sometime
next summer foradoption and implementation in 2006.
EPIC's testimony on voting and privacy:
http://www.epic.org/privacy/voting/Voting_Statement.pdf
National Committee for Voting Integrity:
http://www.votingintegrity.org
For more information about electronic voting, see EPIC's Voting Page:
http://www.epic.org/privacy/voting
[6] News in Brief
EPIC FILES SUIT AGAINST CENSUS, HOMELAND SECURITY
EPIC has filed suit against two federal agencies for failing torespond to Freedom of Information Act appeals regarding lawenforcement requests for completed census questionnaires or othercensus data. The Census Bureau responded to
EPIC's initial Freedom ofInformation request with, among other things, a series of emailsbetween Census and the Department of Homeland
Security's Customs andBorder Protection concerning special tabulations that Censuseventually created for Customs concerning people
of Arab ancestry.
However, at Customs' request, all but one of its communications toCensus were blacked out. The disclosure also did not indicate whetherany
other relevant communications were located but withheld. EPICappealed the decision to withhold this information to both Census andCustoms,
and was forced to file suit when it did not receive adetermination from either agency within the time frame required bylaw.
EPIC's complaint:
http://www.epic.org/privacy/census/foia/complaint.pdf
For more information about the documents obtained by EPIC from theCensus Bureau, see EPIC's Census FOIA page:
http://www.epic.org/privacy/census/foiaCOURT SAYS GOVERNMENT MUST MAKE ID ARGUMENTS PUBLICLY
The Ninth Circuit Court of Appeals rejected the Department ofJustice's request to seal from public view its arguments supporting anunpublished
federal regulation requiring passengers to showidentification before boarding airplanes. The Justice Departmentfiled a motion requesting
the court to reconsider, and informed thecourt that while it intends to file its brief in Gilmore v. Ashcroftby its September 29
deadline, the brief will not contain theinformation it wishes to keep secret, including whether the federalregulation even exists.
The agency sought to make its argument infront of a closed court without appellant John Gilmore or his counselpresent.
EPIC has filed an amicus brief in the case, arguing that meaningfuljudicial review is necessary to prevent the government from imposing
asecret, vague law upon the public in violation of constitutional dueprocess rights.
Gilmore v. Ashcroft web site:
http://www.gilmorevashcroft.com
EPIC's amicus brief in Gilmore v. Ashcroft:
http://www.epic.org/privacy/airtravel/gilmore_amicus.pdf
For more information about air travel privacy, see EPIC's PassengerProfiling page:
http://www.epic.org/privacy/airtravel/profiling
SPYWARE PRIVACY BILL ADVANCES IN SENATE
The Senate Commerce Committee has unanimously approved the SoftwarePrinciples Yielding Better Levels of Consumer Knowledge (SPY BLOCK)
Act, an anti-spyware bill which would prohibit the surreptitiousinstallation of software on computers. If approved by the fullSenate,
the legislation will not allow software vendors to usemisleading means to induce consumers to install software, prohibitsoftware
that prevents reasonable efforts to uninstall or disable it,
and outlaw installing software that automatically collects andtransmits information about the user without permission.
In June, the House Energy and Commerce Committee passed a similaranti-spyware bill entitled the Securely Protect Yourself Against
CyberTrespass Act (SPY Act).
Software Principles Yielding Better Levels of Consumer Knowledge Act:
http://thomas.loc.gov/cgi-bin/bdquery/z?d108:s.2145:
Securely Protect Yourself Against Cyber Trespass Act:
http://thomas.loc.gov/cgi-bin/bdquery/z?d108:h.r.2929:
HOUSE PASSES BILL TO CRIMINALIZE INACCURATE DOMAIN REGISTRATIONS
The House of Representatives has passed a bill that imposes fines andprison terms of up to seven years upon individuals who intentionallyprovide
inaccurate personal information to register an Internetdomain, and then use that information to commit a felony such asspamming or
copyright infringement. The legislation would notpenalize individuals who provide false registration information simplyto keep their
identitities anonymous or protect their information fromspammers and criminals. The bill now moves to the full Senate forconsideration.
Fraudulent Online Identity Sanctions Act:
http://thomas.loc.gov/cgi-bin/bdquery/z?d108:h.r.3754:
CHICAGO PLANS SYSTEM TO UNIFY 2,000 PUBLIC CAMERAS
Chicago will link more than 2,000 cameras located in public placesthroughout the city in a network intended to spot emergencies andsuspicious
behavior, Mayor Richard Daley announced earlier this month.
Most of the cameras are already installed and in use, withapproximately 1,000 located at O'Hare International Airport and otherspositioned
in public locations such as schools and train platforms.
The city will install an additional 250 cameras, most of them downtownin areas the city considers high risk.
For more information about video surveillance, see ObservingSurveillance:
http://www.observingsurveillance.org
[7] EPIC Bookstore: Litigation Under the Federal Open Government Laws
JUST PUBLISHED!
Litigation Under the Federal Open Government Laws 2004 (EPIC 2004),
572 pages, $40.00.
http://www.epic.org/bookstore/foia2004
"Deserves a place in the library of everyone who is involved in, or thinking about, litigation under the Freedom of Information Act."
- Steve Aftergood Federation of American Scientists
This is the standard reference work covering all aspects of theFreedom of Information Act, the Privacy Act, the Government in theSunshine Act, and the Federal Advisory Committee Act. EPIC haspublished the book jointly
with Access Reports and the James MadisonProject.
This 22nd edition fully updates the manual that lawyers, journalistsand researchers have relied on for more than 25 years. The book
drawsupon the expertise of practicing attorneys who are recognized leadersin the field. This edition includes recent case developments,
including an analysis of the Supreme Court's decision in Favish, andan index to key terms.
Appendices include the text of the relevant acts and sample pleadingsfor litigators. Litigation Under the Federal Open Government
Laws2004 adheres to the same high standards as previous editions and isintended as a guide for Freedom of Information requesters
andplaintiff litigators. For those who litigate open government cases(or need to learn how to litigate them), this is an essentialreference
manual.
Order Litigation Under the Federal Open Government Laws 2004 usingEPIC's secure order form:
https://bookstore.epic.org
EPIC Publications:
"FOIA 2004: Litigation Under the Federal Open Government Laws," HarryHammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004).
Price:
$40. http://www.epic.org/bookstore/foia2004
This is the standard reference work covering all aspects of theFreedom of Information Act, the Privacy Act, the Government in theSunshine Act, and the Federal Advisory Committee Act. The 22ndedition fully updates the manual
that lawyers, journalists andresearchers have relied on for more than 25 years. For those wholitigate open government cases (or
need to learn how to litigatethem), this is an essential reference manual.
"The Public Voice WSIS Sourcebook: Perspectives on the World Summit onthe Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook
This resource promotes a dialogue on the issues, the outcomes, and theprocess of the World Summit on the Information Society (WSIS).
Thisreference guide provides the official UN documents, regional andissue-oriented perspectives, as well as recommendations and
proposalsfor future action, as well as a useful list of resources and contactsfor individuals and organizations that wish to become
more involved inthe WSIS process.
"The Privacy Law Sourcebook 2003: United States Law, InternationalLaw, and Recent Developments," Marc Rotenberg, editor (EPIC 2003).
Price: $40. http://www.epic.org/bookstore/pls2003
The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists
who needan up-to-date collection of U.S. and International privacy law, aswell as a comprehensive listing of privacy resources.
"Privacy & Human Rights 2003: An International Survey of Privacy Lawsand Developments" (EPIC 2002). Price: $35.
http://www.epic.org/bookstore/phr2003
This survey, by EPIC and Privacy International, reviews the state ofprivacy in over fifty-five countries around the world. The surveyexamines
a wide range of privacy issues including data protection,
passenger profiling, genetic databases, video surveillance, ID systemsand freedom of information laws.
"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0
A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens
free expression.
"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price: $40.
http://www.epic.org/cls
The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested
in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumersand
the basic responsibilities for businesses in the online economy.
"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC 2000).
Price:
$20. http://www.epic.org/bookstore/crypto00&
EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption
products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption
to law enforcement.
EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:
EPIC Bookstore http://www.epic.org/bookstore
"EPIC Bookshelf" at Powell's Books http://www.powells.com/features/epic/epic.html
[8] Upcoming Conferences and Events
Nethead/Bellhead: The FCC Takes on the Internet. Cardozo Law SchoolFlorsheimer Center for Constitutional Democracy and the Yale LawSchool
Information Society Project. September 28, 2004. New York,
NY. For more information: http://www.cardozobellhead.net.
IAPP Privacy and National Security Forum. International Associationof Privacy Professionals. September 30, 2004. Washington, DC.
Formore information:
http://www.privacyassociation.org/html/conferences.html.
The Internet and the Law -- A Global Conversation. Law & TechnologyProgram, University of Ottawa. Ottawa, Ontario. October 1-2,
2004.
For more information:
http://web5.uottawa.ca/techlaw/symposium.php?idnt=99&v=22.
2004 Telecommunications Policy Research Conference. National Centerfor Technology & Law, George Mason University School of Law.
October1-3, 2004. Arlington, VA. For more information:
http://www.tprc.org/TPRC04/call04.htm.
Health Privacy Conference. Office of the Information and PrivacyCommissioner of Alberta. October 4-5, 2004. Calgary, Alberta,
Canada. For more information:
http://www.oipc.ab.ca/home/DetailsPage.cfm?ID=1453.
IAPP Entertainment and Privacy Forum. International Association ofPrivacy Professionals. October 7, 2004. Los Angeles, CA. For
moreinformation: http://www.privacyassociation.org/html/conferences.html.
Privacy and Identity: The Promise and the Perils of a TechnologicalAge. DePaul University Center for Intellectual Property Law andInformation
Technology and School of Computer Science,
Telecommunications and Information Systems. October 14-15, 2004.
Chicago, IL. For more information:
http://facweb.cs.depaul.edu/research/vc/CIPLIT2004.
2004 CPSR Annual Conference: Making the Grade?: A Report Card on USPolicies for the Information Society. Computer Professionals forSocial
Responsibility. October 16, 2004. Washington, DC. For moreinformation: http://cpsr.org/conferences/annmtg04.
2004 Big Brother Awards Switzerland. October 16, 2004. Lucerne,
Switzerland. For more information: http://www.bigbrotherawards.ch.
DRM 2004: The Fourth ACM Workshop on Digital Rights Management.
Association for Computing Machinery Special Interest Group onSecurity, Audit and Control. October 25, 2004. Washington, DC. Formore
info: http://mollie.engr.uconn.edu/DRM2004.
2004 Big Brother Awards Austria. October 26, 2004. Vienna, Austria.
For more information: http://www.bigbrotherawards.at.
Private and Private International Law Issues Raised by ElectronicCommerce. The Hague Conference on Private International Law, theNetherlands
Government and the International Chamber of Commerce.
October 26-27, 2004. The Hague, Netherlands. For more information:
http://www.hcch.net/doc/e-comm_infoe.pdf.
IAPP Privacy and Data Security Academy & Expo. InternationalAssociation of Privacy Professionals. October 27-29, 2004. NewOrleans,
LA. For more information:
http://www.privacyassociation.org/html/conferences.html.
Privacy and Security: Seeking the Middle Path. Office of theInformation & Privacy Commissioner of Ontario; Centre for InnovationLaw
and Policy, University of Toronto; and Center for AppliedCryptographic Research, University of Waterloo. Toronto, Ontario,
Canada. October 28-29, 2004. For more information:
http://www.epic.org/redirect/uwaterloo_conf.html.
2004 Big Brother Awards Germany. October 29, 2004. Bielefeld,
Germany. For more information: http://www.bigbrotherawards.de.
The 2004 Isaac Pitblado Lectures: Privacy -- Another Snail in theGinger Beer. The Law Society of Manitoba, The Manitoba BarAssociation
and the University of Manitoba Faculty of Law. November19-20, 2004. Manitoba, Canada. For more information:
http://www.lawsociety.mb.ca/shopping/default.asp.
National Security, Law Enforcement and Data Protection. BritishInstitute of International and Comparative Law Data ProtectionResearch
and Policy Group. December 8, 2004. London, UK. For moreinformation: http:www.biicl.org.
Seventh International General Online Research Conference. GermanSociety for Online Research. March 22-23, 2005. Zurich, Switzerland.
For more information: http://www.gor.de.
CFP2005: Fifteenth Annual Conference on Computers, Freedom andPrivacy. April 12-15, 2005. Seattle, WA. For more information:
http://www.cfp2005.org.
Subscription Information
Subscribe/unsubscribe via web interface:
https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news
Back issues are available at:
http://www.epic.org/alert
The EPIC Alert displays best in a fixed-width font, such as Courier.
Privacy Policy
The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or
share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do
not enhance (linkto other databases) our mailing list or require your actual name.
In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under"subscription
information."
About EPIC
The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus
public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord
privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Actlitigation, and conducts policy research. For more information,
seehttp://www.epic.org or write EPIC, 1718 Connecticut Ave., NW, Suite200, Washington, DC 20009. +1 202 483 1140 (tel), +1 202 483 1248(fax).
If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible.
Checks should be made out to "EPIC" and sent to 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009. Or you cancontribute
online at:
http://www.epic.org/donate
Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation
ofencryption and expanding wiretapping powers.
Thank you for your support.
END EPIC Alert 11.18
.
WorldLII:
Copyright Policy
|
Disclaimers
|
Privacy Policy
|
Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2004/18.html