You are here:
WorldLII >>
Databases >>
EPIC Alert >>
2005 >>
[2005] EPICAlert 2
Database Search
| Name Search
| Recent Articles
| Noteup
| LawCite
| Help
EPIC Alert 12.01 [2005] EPICAlert 2
EPIC ALERT
Volume 12.01 January 13, 2005
Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.
http://www.epic.org/alert/EPIC_Alert_12.01.html
Table of Contents
[1] EPIC Testifies on RFID Uses for Health Care; Proposes Framework
[2] Landmark Privacy Bill Takes Effect in California
[3] Coalition Opposes Loophole to Do-Not-Call Registry
[4] EPIC Obtains FBI Reports to Congress on Carnivore
[5] Police Ask for DNA From Cape Cod Town's Male Residents
[6] News in Brief
[7] EPIC Bookstore: No Place to Hide
[8] Upcoming Conferences and Events
[1] EPIC Testifies on RFID Uses for Health Care; Proposes Framework
In testimony on January 11 before the Department of Health and HumanServices National Committee on Vital and Health StatisticsSubcommittee
on Privacy and Confidentiality, EPIC President andExecutive Director Marc Rotenberg proposed a new four-tier frameworkto regulate
radio frequency identification (RFID) in the health caresetting. Rotenberg testified that the existing legislative structureis inadequate
to regulate RFID use and should be strengthened withguidelines. He argued that privacy is best protected when an activityis regulated
from the beginning, and least protected when left toindustry self-regulation.
Rotenberg identified four types of RFID use in health care andproposed a separate tier of regulation for each. The first tierconcerns
the bulk distribution of products tagged with RFIDs that areneither linked to specific individuals nor collect personallyidentifiable
information. In these circumstances, there are noprivacy risks and therefore no obligation to protect privacy. Tier 2concerns products
tagged with RFIDs that are distributed and linked toidentified patients. In these cases, the privacy risks areproportional to the
collection of personally identifiable informationand should be regulated according to existing privacy rules, as wellas supplemented
with additional rules such as those urged by EPIC'sRFID Guidelines. The third tier concerns patients who are temporarilytagged with
RFIDs. In these cases, privacy and security risks becomegreater, and in addition to measures proposed under tier 2, identitytheft
and general security must also be addressed. The final tierconcerns patients permanently labeled with RFIDs imbedded in softtissue.
Rotenberg testified that this practice is coercive, profound,and has far-reaching ethical implications. The privacy risks here
arethe greatest since the person loses control over the disclosure of hisor her actual identity. In light of the extreme privacy
risks,Rotenberg recommended that this practice, which is currently used bythe Verichip Corporation, be banned.
Rotenberg testified on one of two RFID panels appearing before theSubcommittee. Daniel Solove, Associate Professor of Law at GeorgeWashington
Law School and an EPIC Advisory Board member, alsotestified on the substantial privacy risks posed by RFIDs, the lack ofan adequate
regulatory structure and the contribution of RFIDs to theoverarching context of data-collection and the compilation of digitaldossiers.
The other panel comprised industry representatives fromSurgichip and Verichip and a representative from the Food and DrugAdministration.
The FDA testified that it only has regulatoryjurisdiction over the medical use of RFIDs; consequently, other uses,such as for e-commerce,
are not regulated under FDA requirements orprivacy provisions of the Health Insurance Protability andAccountability Act (HIPPA).
An archived broadcast of the hearing is availble at:
http://www.va.gov/virtconf.htm
For more information about radio frequency identification, see EPIC'sRFID Page:
http://www.epic.org/privacy/rfid
For more information about the Verichip, see EPIC's Verichip Page:
http://www.epic.org/privacy/rfid/verichip.html
[2] Landmark Privacy Bill Takes Effect in California
On January 1, Senate Bill 27, the "Shine the Light" law, took effectin California. The landmark bill, now codified as California
CivilCode § 1798.83, provides California residents with the opportunity tocontact most businesses to request a disclosure of which
third partiesthe business has shared their information with during the past year.
Small businesses and federal banks are exempt from the requirement.
S.B. 27 is important because it is one of the first legislativeattempts to address "list brokerage," the compilation and sale ofindividuals'
personal information. List brokerage is used to fuelprivacy invasive marketing campaigns, including spamming,telemarketing, and
junk mail. List brokers collect personalinformation from many sources, including business transactions,warranty cards, and sweepstakes
entries. In many cases, businesses donot inform individuals of their information sales activities, andmajor companies, both online
and off, sell their customer lists tolist brokers. S.B. 27 will help individuals learn more about howtheir information is sold to
others and give then an opportunity tolimit the sale.
The new law requires businesses to notify customers of their rightsunder the statute by using a designated contact point (mailingaddress,
e-mail address, toll-free number or toll-free fax number) torequest a business's disclosure regarding how it shares personalinformation
with other businesses for direct marketing purposes. Uponreceiving such a request, companies must reveal to an individual whichthird
parties they have shared personal information for marketingpurposes within the last twelve months. Importantly, the law onlyallows
consumers to make such requests when companies have notprovided them with notice of privacy policies containing opt-outoptions.
This means that companies that have created a privacy policyand opt-out right compliant with S.B. 27 are not required to give adetailed
accounting of information sharing.
If a business fails to respond to a disclosure request, the customermay be entitled, in addition to the legal remedies provided undercurrent
law, to recover a civil penalty of up to $500 per violation,and up to $3,000 per willful, intentional or reckless violation), aswell
as attorneys' fees and costs.
S.B. 27:
http://www.epic.org/redirect/SB27.html
For more information about the law, see EPIC's S.B. 27 Page:
http://www.epic.org/privacy/profiling/sb27.html
[3] Coalition Opposes Loophole to Do-Not-Call Registry
In comments to the Federal Trade Commission, a coalition of privacyand consumer groups sharply criticized a proposed loophole to thefederal
Do-Not-Call Registry. The proposed loophole would allowtelemarketers to deliver prerecorded voice messages to their existingcustomers,
even if the customers' numbers are enrolled in theDo-Not-Call Registry. This usually takes the form of artificial orprerecorded
messages being played when an individual answers thephone. It would also allow companies to leave such messages onanswering machines.
The message would have to give the consumer anopportunity to opt out of the calls, either by pressing a button or bycalling a toll-free
number.
The coalition argued that the loophole's interaction with thedefinition of businesses' "current customers" is problematic. Undercurrent
Do-Not-Call regulations, a business relationship existswhenever an individual makes an inquiry about or buys any product orservice.
Inquiries create a relationship for three months; purchasesfor eighteen. During that period, the company can make telemarketingcalls
even if the individual is enrolled in the Do-Not-Call Registry,and the individual must opt out of each business relationshipindividually.
The coalition comments noted that the loophole could open the door tovolumes of prerecorded spam because businesses are now more aggressivein
obtaining identification information from consumers, and becausetelemarketing will become cheaper with the adoption of Internettelephony.
Furthermore, even where an individual creates a businessrelationship with a company, it is often not within the individuals'
expectation to receive telemarketing.
Finally, the coalition argued that the opt-out methods of providing atoll-free number were insufficient; that individuals should be
able tostop further calls by simply pressing a button on their telephonekeypad. The groups expressed concern that the Commission
proposed toweaken the Do-Not-Call Registry. Enrollment in the Registry nowexceeds 80 million numbers, representing a resounding
rejection oftelemarketing. The coalition argued that in light of this level ofenrollment, the priorities of the Commission should
be focused onheightening protections against invasions of privacy. For instance,the success of the Do-Not-Call Registry could be
expanded into a toolto that would allow individuals to opt out of prescreened offers ofcredit and non-affiliate financial information
sharing, or to shieldagainst junk mail. The Registry could become a platform that wouldallow people to opt out under many different
privacy laws at the sametime.
Coalition comments to the Federal Trade Commission on the proposedloophole:
http://www.epic.org/privacy/telemarketing/ebrcomments.html
For more information about telemarketing and the Do-Not-Call Registry,see EPIC's Telemarketing Page:
http://www.epic.org/privacy/telemarketing
[4] EPIC Obtains FBI Reports to Congress on Carnivore
Through the Freedom of Information Act, EPIC has obtained FBI reportsto Congress stating that the law enforcement agency did not use itsDCS 1000 Internet monitoring system
-- formerly known as Carnivore --
during fiscal years 2002 and 2003. The reports were prepared inaccordance with the 21st Century Department of Justice AppropriationsAct,
which requires the FBI to report annually to Congress on its useof DCS 1000 or later versions of the program.
The existence of Carnivore first came to light in 2000. Reportsindicated that the system could be installed at the facilities of
aninternet service provider and monitor all traffic moving through theISP. The FBI argued that Carnivore merely "filtered" data
traffic andensured that investigators collected only those "packets" they werelawfully authorized to obtain. However, because the
details of thesystem remain unknown, the public has long been left to trust theFBI's characterization of the system and -- more significantly
-- theFBI's compliance with legal requirements.
The first report obtained by EPIC states that the FBI usedcommercially available software -- rather than its own DCS 1000 system
-- to conduct court-ordered electronic surveillance five times infiscal year 2002. According to the FY2003 report, the FBI usedcommercially
available software to conduct court-ordered surveillanceeight times. The FBI reported that it did not use DCS 1000 to conductsurveillance
during either fiscal year.
The reports suggest that the FBI's need for Carnivore-like Internetsurveillance tools is decreasing, likely because ISPs are providingInternet
traffic information directly to the government.
FBI reports to Congress on use of DCS 1000:
http://www.epic.org/privacy/carnivore/2002_report.pdf
http://www.epic.org/privacy/carnivore/2003_report.pdf
For more information about Carnivore, see EPIC's Carnivore FOIALitigation Page:
http://www.epic.org/privacy/carnivore
To see more documents about Carnivore, see EPIC's Carnivore FOIADocuments Page:
http://www.epic.org/privacy/carnivore/foia_documents.html
[5] Police Ask for DNA From Cape Cod Town's Male Residents
Police are randomly approaching men in Truro, Massacusetts to ask forDNA samples in an effort to solve a three-year-old murder. Truro's
800male residents are being asked for saliva swabs at such communitymeeting places as groceries and the local post office.
Law enforcement believe the samples may help their investigationbecause evidence found at the scene of the crime indicates anunidentified
man had sex with the muder victim shortly before she waskilled. Though unsure the man had anything to do with the crime,police hope
he might yield clues to the killer's identity.
Police maintain that Truro's male residents are under no legalobligation to provide the police with a sample of their DNA. However,Cape
and Islands District Attorney Michael O'Keefe says that lawenforcement will be forced to look at those who refuse to submit to asaliva
swab.
Law enforcement officials have said they plan to destroy the geneticprofiles of the men whose DNA does not match the evidence taken
fromthe crime scene. It is unclear, however, whether the samples theprofiles are derived from will be destroyed when individuals
areeliminated as suspects.
Last year, EPIC filed two amicus briefs in cases examining whethercompelled production of DNA violates the Fourth Amendment. EPIC'sbriefs
poined out that DNA can reveal a vast amount of informationabout a person, including health, gender, and familial details.
Furthermore, because members of the same family have similar DNApatterns, an individual's DNA profile may indirectly implicate arelative.
Moreover, EPIC pointed out, there is no uniform storagepolicy for DNA samples collected for law enforcement purposes; rather,each
state has a different policy. Not only could samples end up inthe hands of researchers, but international cooperation among lawenforcement
agencies has opened up the national law enforcement DNAdatabase to other governments.
EPIC's amicus brief in United States v. Kincade:
http://www.epic.org/privacy/genetic/kincade_amicus.pdf
EPIC's amicus brief in Maryland v. Raines:
http://www.epic.org/privacy/genetic/raines_amicus.pdf
For more information about privacy of DNA, see EPIC's Genetic PrivacyPage:
http://www.epic.org/privacy/genetic
[6] News in Brief
EPIC CHALLENGES CHOICEPOINT TO PUBLIC HEARINGS ON CONSUMER PRIVACYIn December, EPIC wrote a complaint to the Federal Trade Commissionrequesting
an investigation into the field of commercial data brokers,companies such as Choicepoint that sell personal information to lawenforcement
and other entities (see EPIC Alert 11.24). Later inDecember, Choicepoint responded, criticizing EPIC for not havingmeetings with
the company and calling for a dialogue. EPIC acceptedthat invitation, and has challenged Choicepoint to a public discussionof the
scope of commercial data brokers' activities on the record atthe Federal Trade Commission and Congress. EPIC Executive DirectorMarc
Rotenberg wrote to Choicepoint Chief Operating Officer DouglasCurling: "You and your chairman have proposed a national debate on
theresponsible use of personal information. We support this. But it isnot a debate that should take place at industry trade shows
or closeddoor meetings with PR specialists and Washington lobbyists. We wouldwelcome a public hearing in Congress with balanced
representationbetween those in the information broker industry and those in theconsumer protection field, including state attorneys
general, todiscuss the scope and application of the Fair Credit Reporting Act tothe dossiers on American consumers now being sold
by companies such asyours."
EPIC complaint to the Federal Trade Commission:
http://www.epic.org/privacy/choicepoint/fcraltr12.16.04.html
Choicepoint's response:
http://www.choicepoint.com/news/2000election.html
EPIC's reply and challenge to Choicepoint:
http://www.epic.org/privacy/choicepoint/reply1.5.04.htmlUS-VISIT EXPANDS TO 50 BUSIEST LAND PORTS OF ENTRYThe United States Visitor and Immigrant Status Indicator Technology(US-VISIT) program
marked its first anniversary in early January andextended its entry/exit biometric capturing system to 50 of thebusiest land ports
of entry. The system requires two digital indexfinger scans as well as a digital photograph of the visitor, which areintended to
verify identity and are compared to a vast network ofgovernment databases. US-VISIT is now operational at 115 airports and15 seaports
and has "processed" approximately 16.9 million foreignvisitors. The system will be fully in place at all land ports by theend of
2005. Currently US-VISIT targets visitors entering the U.S.
However, a number of pilot programs are testing the extension of theprogram to capture biometric exit data.
For more information about US-VISIT, visit EPIC's US-VISIT Page:
http://www.epic.org/privacy/us-visit
TWO STUDIES SHOW TELEMARKETERS ONLY GIVE 1/3 TO CHARITIESReports issued in December by the New York and Massachusetts AttorneyGenerals'
offices state that in 2003 (the most recent year for whichdata is available), an average of only about 1/3 of funds raised forcharities
in solicitation campaigns are actually received by thecharities. In Massachusetts, charities received 29 cents of everydollar raised
in solicitation campaigns (including telemarketing,mailings and door-to-door solicitations), an increase of about 3 centsfrom the
previous year. In New York, meanwhile, charities retained33.67 cents of every dollar raised by telemarketing, also a slightincrease
from the previous year. The New York report notes that thereare some circumstances that cause elevated fundraising costs forcharities,
such as attempting to contact new donors, testing newfundraising methods, or bundling educational and fundraising goalstogether.
While the Supreme Court ruled in 1988 in Riley v. NationalFederation of the Blind that states cannot prescribe the percentage oftotal
funds that charities use for fundraising, a 2003 decision,Illinois v. Telemarketing Associations, found that telemarketerscannot
make deliberately false or fraudulent statements duringsolicitations. The Massachusetts report warns that by giving 100percent of
revenue to charities who then pay solicitors fees andexpenses, telemarketers can legally state that all proceeds go to thecharity.
Pennies for Charity 2004 (New York Attorney General's Report):
http://www.oag.state.ny.us/charities/pennies04/penintro.html
Massachusetts Attorney General's Report on Telemarketing for Charity:
http://www.ago.state.ma.us/filelibrary/telrep2004.pdf
For more information about telphone solicitations, see EPIC'sTelemarketing Page:
http://www.epic.org/privacy/telemarketing
MICHIGAN ID THEFT LAW SIGNED BY GOVERNOR GRANHOLMOn December 28, Michigan governor Jennifer Granholm signed into lawthe Identity Theft
Protection Act, a far-reaching series of billstoughening the state's identity theft laws. Several of the laws limitpublic exposure
of identity information by limiting companies' rightsto require customers' Social Security numbers in the course ofbusiness; prohibiting
the public display of social security numbers,as on health insurance cards and college IDs; prohibiting therecording and transmitting
of identifying information from ATM, debitand credit cards; and banning businesses from printing more than thelast four digits of
credit card numbers on receipts. Other laws aremeant to ease prosecution by strengthening the legal definition ofidentity theft;
redefining the term in the state criminal code;
establishing sentencing guidelines; extending the statute oflimitations for these crimes; and diminishing jurisdictional barriersthat
formerly made it difficult to prosecute identity thieves in theirhome cities or counties. Still other laws strengthen the rights
ofvictims by guaranteeing the right to have a police report taken andensuring victims' access to the report; and protecting victims
frombeing denied credit or utility service.
The texts of the Michigan ID theft bills are available at:
http://www.epic.org/redirect/mi_id_laws.html
Press release from the State of Michigan web site:
http://www.epic.org/redirect/mi_pr.html
For more information on ID theft, see EPIC's Social Security Number(SSN) Page:
http://www.epic.org/privacy/ssn
EBAY ABANDONS PASSPORT, CITES SECURITY CONCERNSEBay has announced that beginning in late January it will no longersupport Microsoft
Passport. This means that e Bay members will nolonger be able to sign in to eBay using the Microsoft Passport SignIn, and that eBay
will no longer use .NET alerts to send notificationsto members. This move is the latest among Internet companies that aredropping
the single sign-in identification scheme. Monster.com droppedPassport in October 2004.
Press release, eBay to Retire Microsoft Passport Sign In and .NETAlerts:
http://www2.ebay.com/aw/marketing.shtml - 2004-12-29114827
For more information about Passport, see EPIC's Sign Out of PassportPage:
http://www.epic.org/privacy/consumer/Microsoft
EUROPEAN BIOMETRIC VISA SCHEME TECHNICALLY UNWORKABLEThe European Union's plans to introduce biometric identifiers in visaand residence
permits have been revised due to technology issues.
While proposed regulations originally envisaged putting a "contactlesschip" into visas attached to passports, a November 2004 reportconcluded
that this will not be technically feasible due to"collision" problems between the chipped visa and other chipped visasand passports.
Specifically, the RFID signals would collide, makingcontactless readers ineffective. In late December the incomingLuxembourg presidency
of the European Union circulated a "Note" thatproposed two alternatives. The first involves matching biometricsagainst the Visa Information
System (VIS) database rather than againsta local document. The second would involve local matching, requiringthe traveler to carry
a nonchipped visa inside his or her passport, aswell as a separate chipped card.
In related news, the European Commission recently tabled a proposal forregulation of VIS. The proposed regulation would provide the
mandateto set up and maintain VIS, including articulating its purpose,setting out the responsibilities and functionalities of the
VIS andestablishing the conditions and procedures for the exchange of visadata between member states.
Note from incoming Luxembourg presidency to Visa Working Group:
http://www.statewatch.org/news/2005/jan/bio-visas-16257.pdf
Technical report to the European Council saying proposed scheme notfeasible:
http://www.statewatch.org/news/2004/dec/bio-visas.pdf
Proposal for a Regulation of the European Parliament and of theCouncil concerning the Visa Information System and the exchange ofdata
between Member States on short stay-visas:
http://www.epic.org/redirect/visa_proposal.hmtl
[7] EPIC Bookstore: No Place to Hide
Robert O'Harrow, No Place to Hide (Free Press 2005).
http://www.powells.com/cgi-bin/biblio?inkey=62-0743254805-0
Journalist Robert O'Harrow's first book, No Place to Hide, is aWashington insider's exposé of how the fast-developing datacollection,
analysis, and identification technologies first developedfor the marketing industry are increasingly used for law enforcementpurposes
since 9/11. O'Harrow's book recounts the development of theUSA PATRIOT Act in astonishing detail, complete with vignettes aboutthe
Act's authors sleeping in their offices while drafting thelegislation, and the refusal of government attorneys to engage civilliberties
advocates to discuss the legislation, even off the record.
O'Harrow obtained unprecedented access for this book, and as a result,No Place to Hide is an illuminating read for those interested
in civilliberties issues. He shows that John Poindexter is still involved inTotal-Information-Awareness-like activities. His interviews
with keypeople at Acxiom reveal the company has tricky methods of collecting datathat people think are private, such as unlisted
phone numbers. Butwhat is perhaps most interesting is how O'Harrow shows the peopleinvolved in creating new government powers and
data collection toolsare concerned about how their actions affect privacy.
- Chris Hoofnagle
"The Public Voice WSIS Sourcebook: Perspectives on the World Summit onthe Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook
This resource promotes a dialogue on the issues, the outcomes, and theprocess of the World Summit on the Information Society (WSIS).
Thisreference guide provides the official UN documents, regional andissue-oriented perspectives, as well as recommendations and
proposalsfor future action, as well as a useful list of resources and contactsfor individuals and organizations that wish to become
more involved inthe WSIS process.
"The Privacy Law Sourcebook 2003: United States Law, InternationalLaw, and Recent Developments," Marc Rotenberg, editor (EPIC 2003).
Price: $40. http://www.epic.org/bookstore/pls2003
The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists
who needan up-to-date collection of U.S. and International privacy law, aswell as a comprehensive listing of privacy resources.
"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0
A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens
free expression.
"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price: $40.
http://www.epic.org/cls
The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested
in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumersand
the basic responsibilities for businesses in the online economy.
"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC 2000).
Price:
$20. http://www.epic.org/bookstore/crypto00&
EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption
products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption
to law enforcement.
EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:
EPIC Bookstore http://www.epic.org/bookstore
"EPIC Bookshelf" at Powell's Books target="new">http://www.powells.com/features/epic/epic.html
[8] Upcoming Conferences and Events
3rd Annual Digital Rights Management Conference 2005. Ministry ofScience and Research of the State Northrhine Westfalia, Germany.
January 13-24, 2005. Berlin, Germany. For more information:
target="new">http://www.digital-rights-management.org/start.php.
Book Reading and Signing with Robert O'Harrow. January 15, 2005.
Politics & Prose, Washington, DC. For more information:
http://www.politics-prose.com/calendar.htm#j15b.
Book Party and Reception with Robert O'Harrow. Co-hosted by theStewart R. Mott Charitable Trust. January 24, 2005. The Mott House,
122 Maryland Avenue NE, Washington, DC.
12th Annual Network and Distributed System Security Symposium. TheInternet Society. February 3-4, 2005. San Diego, CA. For moreinformation:
target="new">http://www.isoc.org/isoc/conferences/ndss/05/index.shtml.
14th Annual RSA Conference. RSA Security. February 14-18, 2005. SanFrancisco, CA. For more information:
target="new">http://2005.rsaconference.com/us/general/default.aspx.
The World Summit on the Information Society PrepCom 2. February17-25, 2005. Geneva, Switzerland. For more information:
target="new">http://www.itu.int/wsis/preparatory2/hammamet/index.html.
3rd International Conference of Information Commissioners. FederalInstitute of Access to Information. February 20-23, 2005. Cancun,Mexico.
For more information:
target="new">http://www.icic-cancun.org.mx/index.php?lang=eng.
The Concealed I: Anonymity, Identity, and the Prospect of Privacy. Onthe Identity Trail and the Law and Technology Program at theUniversity
of Ottawa. March 4-5, 2005. Ottawa, Canada. For moreinformation: target="new">http://www.anonequity.org/concealedI.
The Health Information Technology Summit West. eHealth Initiative.
March 6-8, 2005. San Francisco. For more information:
http://www.hitsummit.com.
IAPP National Privacy Summit 2005. International Association ofPrivacy Professionals. March 9-11, 2005. Washington, DC. For moreinformation:
http://privacyassociation.org.
O'Reilly Emerging Technology Conference. March 14-17, 2005. SanDiego, CA. For more Information:
target="new">http://conferences.oreillynet.com/etech.
7th International General Online Research Conference. GermanSociety for Online Research. March 22-23, 2005. Zurich, Switzerland.
For more information: target="new">http://www.gor.de.
The 2005 Nonprofit Technology Conference. Nonprofit TechnologyEnterprise Network. March 23-25, 2005. Chicago, IL. For moreinformation:
target="new">http://www.nten.org/ntc.
Internet Corporation For Assigned Names and Numbers (ICANN) Meeting.
April 4-8, 2005. Mar del Plata, Argentina. For more information:
http://www.icann.org.
5th Annual Future of Music Policy Summit. Future of MusicCoalition. April 10-11, 2005. Washington DC. For more information:
target="new">http://www.futureofmusic.org/events/summit05/index.cfm.
CFP2005: Fifteenth Annual Conference on Computers, Freedom andPrivacy. April 12-15, 2005. Seattle, WA. For more information:
http://www.cfp2005.org.
2005 IEEE Symposium on Security and Privacy. IEEE Computer SocietyTechnical Committee on Security and Privacy in cooperation with
TheInternational Association for Cryptologic Research. May 8-11, 2005.
Berkeley, CA. For more information:
target="new">http://www.ieee-security.org/TC/SP2005/oakland05-cfp.html.
SEC2005: Security and Privacy in the Age of Ubiquitous Computing.
Technical Committee on Security & Protection in Information ProcessingSystems with the support of Information Processing Society of
Japan.
May 30-June 1, 2005. Chiba, Japan. For more information:
http://www.sec2005.org.
Internet Corporation For Assigned Names and Numbers (ICANN) Meeting.
July 11-15, 2005. Luxembourg City, Luxenbourg. For more information:
http://www.icann.org.
3rd International Human.SocietyInternet Conference. July 27-29,
2005. Tokyo, Japan. For more information: http://hsi.itrc.net.
The World Summit on the Information Society. Government of Tunisia.
November 16-18, 2005. Tunis, Tunisia. For more information:
http://www.itu.int/wsis.
Internet Corporation For Assigned Names and Numbers (ICANN) Meeting.
November 30-December 4, 2005. Vancouver, Canada. For moreinformation: target="new">http://www.icann.org.
Subscription Information
Subscribe/unsubscribe via web interface:
target="new">https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news
Back issues are available at:
http://www.epic.org/alert
The EPIC Alert displays best in a fixed-width font, such as Courier.
Privacy Policy
The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or
share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do
not enhance (linkto other databases) our mailing list or require your actual name.
In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under"subscription
information."
About EPIC
The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus
public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord
privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Actlitigation, and conducts policy research. For more information,
seehttp://www.epic.org or write EPIC, 1718 Connecticut Ave., NW, Suite200, Washington, DC 20009. +1 202 483 1140 (tel), +1 202 483 1248(fax).
If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible.
Checks should be made out to "EPIC" and sent to 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009. Or you cancontribute
online at:
http://www.epic.org/donate
Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation
ofencryption and expanding wiretapping powers.
Thank you for your support.
.
WorldLII:
Copyright Policy
|
Disclaimers
|
Privacy Policy
|
Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2005/2.html