You are here:
WorldLII >>
Databases >>
EPIC Alert >>
2005 >>
[2005] EPICAlert 3
Database Search
| Name Search
| Recent Articles
| Noteup
| LawCite
| Help
EPIC Alert 12.02 [2005] EPICAlert 3
EPIC ALERT
Volume 12.02 January 27, 2005
Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.
http://www.epic.org/alert/EPIC_Alert_12.02.html
Table of Contents
[1] EPIC Hosts Annual Privacy Coalition Summit
[2] EPIC FOIA Suit Reveals FBI Kept Millions of Passenger Records
[3] Inauguration Day Puts DC Under Unprecedented Surveillance
[4] Acxiom Lobbied for Broad Exemptions to Privacy Law After 9/11
[5] EPIC Urges Privacy Protections for Federal Employee ID Card
[6] News in Brief
[7] EPIC Bookstore: Prying Eyes
[8] Upcoming Conferences and Events
[1] EPIC Hosts Annual Privacy Coalition Summit
The Privacy Coalition's annual meeting took place in Washington, DC onJanuary 20-22. Over 30 state and national organizations comprised
ofprivacy, civil rights and civil liberties experts gathered to assessthe impact of emerging technology on privacy, government policy,
andbusiness activity over the past year. The group also assessed theprivacy climate for 2005.
Panel discussions covered a wide range of challenges to civilliberties, consumer rights, new technology and internationaldevelopments
in privacy policy. The challenges faced by civil rights,civil liberties, and privacy advocates are not just domestic butinternational.
It is anticipated that as technology is introduced inthe form of radio frequency identification (RFID), biometricidentification
systems, and the incorporation of global positioningsystems (GPS) in consumer products the lines between public andprivate activity
will continue to blur. The goal of many governmentactions post 9/11 has been to make surveillance more efficient and toencourage
the mutual exchange of data on citizens among nations.
The meeting was an opportunity for privacy experts specializing in awide range of areas to teach and learn from each other in an intensemini-course
environment. Those invited to join this annual gatheringare experts in their fields, which makes the summit unique and ahighly valued
experience. For more information on the PrivacyCoalition or joining this distinguished group, send your request toconeyepic.org.
Privacy Coalition web site:
http://privacycoalition.org
EPIC 2004 Privacy Year in Review/Issues to Watch:
http://www.epic.org/alert/EPIC_Alert_yir2004.html
[2] EPIC FOIA Suit Reveals FBI Kept Millions of Passenger Records
EPIC's Freedom of Information litigation has revealed that the FBI iskeeping 257.5 million records on people who flew on commercialairlines
prior to the 9/11 terrorist attacks in its permanentinvestigative database. The data retained by the FBI come fromPassenger Name
Records (PNR), which may include credit card numbers,travel itineraries, and meal requests.
In a sworn declaration explaining why the FBI made heavy redactions indocuments released to EPIC in September, the Bureau noted that
itobtained the passenger records from a number of airlines shortly afterSeptember 11, 2001. The FBI also obtained passenger data
from oneairline through a federal grand jury subpoena. Citing privacyconcerns, the FBI refused to name the airlines that turned
overpassenger records, the airline employees who disclosed it or the FBIspecial agents who collected it.
The declaration explains the data were stored and combined with otherinformation from PENTTBOMB, the FBI's investigation into the
9/11attacks. "[T]he Airline Data Sets have been entered by the CyberDivision into a 'Data Warehouse' and have been intertwined foranalytical
purposes with the information from several other PENTTBOMBData Sets," the declaration stated.
Another EPIC FOIA lawsuit revealed last year that the FBI obtained onefull year's worth of passenger data from Northwest Airlines
after9/11. The document revealed that the amount of personal data was sovast that the airline provided it to the FBI on 6000 CDs.
In anarticle based upon this information, the New York Times confirmed thatthe Bureau had acquired passenger data not only from
Northwest, butfrom other U.S. air carriers, as well.
Declaration from the FBI:
http://www.epic.org/privacy/airtravel/hardy_decl.pdf
FBI documents on collection of passenger data from airlines:
http://www.epic.org/privacy/airtravel/fbi_airdata.pdf
For more information on privacy of passenger data, see EPIC'sPassenger Profiling Page:
http://www.epic.org/privacy/airtravel/profiling.html
[3] Inauguration Day Puts DC Under Unprecedented Surveillance
President Bush's Inauguration on January 20 took Washington, DC to anew level of surveillance. Law enforcement conducted live videosurveillance
from helicopters and used hundreds of video camerasinstalled around the U.S. Capitol and along the parade route tomonitor the crowd
and demonstrators.
Most of the video surveillance monitoring technology in DC wasdeployed well before 9/11, prior to any threat of potential terroristattacks.
The DC Metropolitan Police Department (MPD) originallyinstalled cameras throughout the city to monitor demonstrators withoutnotifying
the DC Council until the cameras were installed, therebydenying the public a meaningful opportunity to comment. In 2002, EPICobtained
documentary evidence under the Freedom of Information Actthat DC's surveillance equipment is mainly directed towarddemonstrators.
In the last few years the MPD, FBI, and other lawenforcement agencies used live video surveillance from helicoptersmainly to control
peaceful demonstrations.
In 2004, a DC Council report found that the MPD maintained widespreadand extensive spying operations on political advocacy organizationsbased
on their political philosophies and conduct protected under theFirst Amendment, even in the absence of allegations of criminalactivity.
The Council recommended legislation to restrict MPDsurveillance of political organizations and preemptive arrests ofprotesters.
These findings underscore the need for public vigilance and oversightto make sure that new tools of surveillance do not impinge ondemonstrators'
civil liberties, are used for proper purposes and notsubsequently used for illegitimate objectives. The remotesurveillance of political
demonstrators raises important FirstAmendment issues: although police surveillance of protestors does notconstitute a direct ban
on demonstration activities, images could beused in retaliation against individuals for their political views andchill protestors'
freedom of speech, assembly and association.
Although the use of surveillance cameras raises far-reachingconstitutional questions that implicate the rights of people whoengage
in peaceful public protest, video surveillance is notregulated. In DC, the U.S. Park Police and the MPD use video camerasonly subject
to two weak guidelines, one of which was not evensubmitted to the public for comment. In testimony before Congress andthe DC Council,
EPIC and other civil liberties groups haveconsistently advocated that better privacy safeguards are necessary,and that the use of
video surveillance, if it sweeps broadly acrossinnocent activity and has an impact on First Amendment rights, must beregulated at
least as stringently as surveillance of electroniccommunications.
EPIC has documented the growing expansion of video surveillance inWashington through its Observing Surveillance Project:
http://www.observingsurveillance.org
For more information about law enforcement use of video surveillance,see EPIC's Video Surveillance Page:
http://www.epic.org/privacy/surveillance
For more information about surveillance of protestors, see EPIC'sProtestor Privacy and Free Expression Rights Page:
http://www.epic.org/privacy/protest
[4] Acxiom Lobbied for Broad Exemptions to Privacy Law After 9/11
EPIC has obtained documents showing that commercial data broker Acxiomlobbied to water down key federal privacy laws immediately after
theSeptember 11, 2001 terrorist attacks. Acxiom sought broader access to"credit headers" and drivers information to develop a system
for"identity and information verification that can be used byorganizations such as airlines, airports, cruise ships, and largebuildings
and other applications to better determine whether a personis actually who they say they are."
The documents consist mainly of notes prepared by Department ofJustice staff detailing conversations and communications between thenAttorney
General John Ashcroft and Acxiom president Charles Morgan andcompany attorney Jerry Jones. According to the documents, Morgan andJones
approached the Department of Justice on several occasions todiscuss "amendments to the Gramm Leach Bliley (GLB) and the DriversPrivacy
Protection Act (DPPA)" to accommodate a developing system for"identity and information verification." The documents also reference107
H.R. 1447, the Aviation Security Act, which ultimately became lawwithout Acxiom's proposed amendments. It also appears that Acxiomcourted
Senator Blanche Lincoln (D-AR) and former Senator TimHutchinson (R-AR) to support the amendments.
The Acxiom amendments would have created large loopholes in federalprivacy legislation. For instance, Acxiom's amendments to the
DPPAwould have allowed state motor vehicle administrations to releaseSocial Security numbers, photographs, and possibly biometricinformation
to any government agency or business "in order toauthenticate the identity or information relating to an individual."
That language is broad enough to justify release of drivers'
information for almost any transaction, down to opening an account ata video rental store.
The Acxiom language to amend the Gramm-Leach-Bliley Act would havecreated a broad exemption allowing disclosure of non-public personalinformation
not only for anti-terrorism purposes, but also toauthenticate "information provided by or concerning a consumer." Theprovision would
have superceded state law, and information fallingwithin this exemption would not have been subject to the Fair CreditReporting Act.
Because the proposed amendments allowed authenticationfor "legitimate commercial purposes," the language would havepermitted use
of "credit headers," compilations of personalidentification information, for even minor transactions.
EPIC documents on Acxiom's lobbying and proposed amendments:
http://www.epic.org/privacy/drivers/acxiomlobby.pdf
EPIC staff publication, Big Brother's Little Helpers:
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=582302
[5] EPIC Urges Privacy Protections for Federal Employee ID Card
In response to a Department of Homeland Security directive, theNational Institute for Science and Technology (NIST) is developing
anID system for federal employees and contractors. The directive callsfor the development of a mandatory, government-wide standard
forsecure and reliable forms of identification issued by the federalgovernment to its employees and contractors. In response, NIST
hascreated a set of Federal Information Processing Standards (FIPS 201)
known as the Personal Identity Verification Project. Outcry by thepublic and federal employee unions prompted NIST to hold a publicmeeting
on January 19 to discuss privacy concerns in theimplementation of federal employee ID cards.
At the meeting, EPIC Policy Analyst Frannie Wellings told NIST and theOffice of Management and Budget that while one of the functionalobjectives
of the proposal is to "protect the privacy of thecardholder," the standard they have developed does not includeadequate safeguards
to accomplish this goal. Wellings urged that aprivacy impact assessment must be performed for the proposalimmediately, and that
Fair Information Practices should be a minimalbaseline for protecting employee information. She argued that NISTmust incorporate
privacy protections into the decisionmaking processnow rather than awkwardly and inefficiently adjusting the standardlater.
Wellings noted that the standard's problems are numerous, including anoverextensive scope of data collection and storage. Data minimizationwould
reduce the likelihood that the card will be used for unrelatedor potentially risky purposes. The standard also involves contactlesscards
that use radio frequency identification (RFID). RFID poses asecurity risk, allowing for remote and covert monitoring. Thesecurity
of the information collected, displayed and made accessibleon the card requires a high level of security on the card itself aswell
as oversight and privacy training for all employees accessing,controlling, and storing the data.
Wellings also stated that the proposal must include explicit policieslimiting the collection, access and use of the data by governmentagencies
and the private sector. This standard could lead to thedevelopment of a large centralized bank of personal information, withno guarantees
on how government agencies or private contractors willuse the data. Federal employees and other cardholders will not knowhow each
agency is using this information. Furthermore, dataaggregated for specific security purposes intended to combat terrorismmight be
used for unrelated purposes.
Wellings also pointed out that the standard creates the potential foragencies to track employee movement within federal buildings,including
visits to other offices or possibly to a union office. Asthe cardholder uses the card to access various areas, a record ofthese
movements can be retained, creating a high volume of data aboutthe movements of federal employees, which could be exploited. Inaddition,
if an employee is wrongly identified as a terrorist or ifher information is used inappropriately, the proposal currentlyprovides
no methods of redress.
Wellings recommended that before this standard is further developed,NIST must conduct a privacy impact assessment, reduce the datacollected
and stored in accordance with Fair Information Practices,and cardholders must be provided with legally enforceable rights. Inorder
to protect the privacy of federal employees who are dedicatingthemselves to public service, legislation will be necessary to enforceemployees'
rights under the proposal.
For more information on employees' privacy rights, see EPIC'sWorkplace Privacy Page:
http://www.epic.org/privacy/workplace
More Information on biometrics, see EPIC's Biometrics Page:
http://www.epic.org/privacy/biometrics
Homeland Security Presidential Directive (HSPD-12) requiring thedevelopment of an ID system for federal employees and contractors:
http://csrc.nist.gov/policies/Presidential-Directive-Hspd-12.html
Personal Identity Verification Project:
http://www.csrc.nist.gov/piv-project
[6] News in Brief
HOMELAND SECURITY ABANDONS SWEEPING NON-DISCLOSURE AGREEMENTSSecrecy News reports that the Department of Homeland Security hasdecided
to stop making its employees sign non-disclosure agreements togain access to unclassified information that is marked "for officialuse
only" or "sensitive but unclassified." The non-disclosureagreements drew opposition from employees' unions and others partlybecause
they gave the government extraordinary power to "conductinspections at any time or place for the purpose of ensuringcompliance."
Department of Homeland Security Management Directive 11042.1,
"Safeguarding Sensitive by Unclassified (For Official Use Only)
Information":
http://www.fas.org/sgp/othergov/dhs-sbu-rev.pdf
Intra-agency memorandum on Management Directive 11042.1, "SafeguardingSensitive by Unclassified (For Official Use Only) Information":
http://www.fas.org/sgp/othergov/dhs20050111.pdfCOALITION CALLS FOR POSTAL PRIVACY REFORMAs the annual volume of junk mail approaches that of normal, firstclass missives, Private
Citizen and a coalition of privacy groups havecalled upon legislators to reform privacy protections against unwantedcommercial postal
mail. The groups wrote: "While American residentsnow enjoy substantial federal protection from telemarketing salescalls . . . the
U.S. Postal Service has not made significant stridesto reduce unwanted junk mail." The groups continued: "To illustratethe environmental,
and privacy impact of . . . one segment of the junkmail industry last year, consider that if each of the 5,340,243,500 .
. . trashed credit card mailings weighed just two-thirds of an ounce.
The aggregate wasted tonnage of those trashed mailings would exceedthe weight of a battle ready NIMITZ Class aircraft carrier."
The groups called for a national do-not-mail list, similar to theregistry now running for telemarketing; a no junk mail sticker formailboxes
that would allow individuals to mark their preference not toreceive "saturation" junk mail; improvements to existing methods ofblocking
mail from a certain company; an opt-out under the "NationalChange of Address" program, which would stop junk mailers from gettingaddresses
of movers; and a change to the "Cooperative Mail Rule,"
which allows for-profit mailers to partner with non-profitorganizations to send mail at a lower postage rate.
Coalition letter calling for do-not-mail postal privacy reform:
http://www.privatecitizen.com/mail/congress-109
USPS 2004 Annual Report, showing the volume of junk mail and standardmail:
http://www.usps.com/history/anrpt04/freview_006.htm
For more information about junk mail, see EPIC's Postal Privacy Page:
http://www.epic.org/privacy/postal
HIGH-LEVEL OFFICIALS RESIGN FROM THE FEDERAL COMMUNICATIONS COMMISSIONFederal Communications Commission Chairman Michael Powell,Commissioner
Kathleen Abernathy, and Media Bureau Chief Kenneth Ferreehave all announced they are stepping down from their posts. In thecoming
year, the Commission will continue to deal with questions ofwiretapping, broadband access and privacy, and restrictions ontelemarketing.
It remains to be seen whether the White House andCongress will select a Chairman and Commissioner who will respond tothe strong
public support for freedom of expression withoutsurveillance and for non-commercial use and public ownership ofcommunications channels.
Such public support has been demonstrated inrecent months by hundreds of thousands of comments filed on variousissues and public
attendance at hearings held around the country.
More information about public opinion on privacy is available at:
http://www.epic.org/privacy/survey
GOOGLE WATCH WARNS LIBRARIES ABOUT GOOGLE'S TRACKING POTENTIALIn a letter to the American Association of Libraries, Google Watch hasnoted
that Google's agreement to digitize material for certainlibraries creates enormous potential for tracking. Google Watchurged, "those
librarians who contract with Google for access to theirbooks and documents for purposes of digitization should require thatany future
searches done on Google that produce this material, mustrespect the anonymity of the searcher. This would mean that Googlecannot
record the IP address or unique ID from the cookie for suchsearches. Short of this, another alternative would be for librariesto
deny Google access to any literature that has political content orrelevance." Google Watch continued, "the ALA is already involved
withdiscovery and lobbying on this issue with the Justice Department overpractices that grew out of the USA Patriot Act. But keep
in mind thatthe scale of anything Google does is a million times larger than thescale of anything that involves discrete libraries,
access to paperhard copy, and occasional subpoenas for specific information."
The letter also noted that Google has made commitments to five majorlibraries to digitize much of the material in their catalogs --
andhas insisted that the libraries sign nondisclosure agreements inexchange for the service.
Google Watch appeal to the American Library Association:
http://www.google-watch.org/appeal.html
KOREAN MEDIATION COMMITTEE RELEASES REPORT ON MAJOR PRIVACY ISSUESThe Korean Personal Information Dispute Mediation Committee releasedits
2004 Annual Report. The report identifies the major privacyissues as the release and sale of customers' personal information by
amobile telecom company; the database-marketing of customers' personalinformation; the enactment of the Fundamental Law on Protection
ofPersonal Information; the increased use of blogs and the opening ofprivate life to the public; and the leaking of personal informationthrough
P2P and data retrieval sites.
The report is available online in English:
http://www.kopico.or.kr/eng/pub_01.jsp#1
For more information on privacy issues in Korea, see Privacy and HumanRights 2004:
http://www.epic.org/redirect/phr2004.html
EUROPEAN PARLIAMENT TO HOLD HEARING ON DATA PROTECTION AND TERRORISMThe European Parliament's Committee on Civil Liberties, Justice
andHome Affairs will hold a public seminar on January 31 to discuss thenecessary steps and data for law enforcement activities, commonprinciples
of protection for data used for security purposes, accessand re-use of private data for security purposes in the specific caseof
air passengers, Internet users' data, and financial data. Thehearing will feature many high level officials from European Uniondata
protection and security agencies.
European Parliament's Committee on Civil Liberties, Justice, and HomeAffairs:
http://www.europarl.eu.int/committees/libe_home.htm
NEW ON THE EPIC SITE: VICTORIA'S SECRET AND FINANCIAL PRIVACYOutside the Beltway, it is not well known that a Victoria's Secretcatalog
is one of the key reasons that Congress included privacyprotections for financial information when passing theGramm-Leach-Bliley
Act. A new web page on epic.org explains how oneMember of Congress was very upset that he started receiving Victoria'sSecret catalogs
at his home in Washington. He was convinced that hiscredit union sold his new address to Victoria's Secret, and as aresult, he supported
an amendment to add privacy protections tofederal financial services law.
EPIC's Victoria's Secret and Financial Privacy Page:
http://www.epic.org/privacy/glba/victoriassecret.html
[7] EPIC Bookstore: Prying Eyes
Eric Gertler, Prying Eyes: Protect Your Privacy From People Who Sellto You, Snoop on You, or Steal From You (Random House Reference
2004).
http://www.powells.com/s?kw=prying+eyes&Search.x=50&Search.y=10
"You leave an electronic trail every time you use a credit card, renta DVD, mail in a rebate form, go to the doctor, open a bank account,or
surf the Internet at home and at work.
"News stories about identity theft, anti-terrorist legislation,cyber-stalking, marketing databases, and employer surveillancepractices
are evidence that your privacy is violated more and moreevery day. Using examples from real-life situations, Prying Eyesreveals how,
often without your knowledge, people use your personalinformation to sell to you, snoop on you, and steal from you.
"Eric Gertler reveals how to minimize your exposure in every facet oflifeat home, at the office, on vacation, at the store, at thedoctor's
office, online, and on your cell phone. Beyond reporting andspeculation, Prying Eyes will empower you to take charge of yourpersonal
information before someone else does.
"You will learn:
* How information about your bank account, credit, and purchases istracked, stored, and accessed -- and how to limit your exposure.
* How to protect yourself from identity theftand how to recover ifyou've been a victim.
* Risks to your privacy at work -- why it is important to separateyour personal life from your business life.
* Threats to your medical files -- who has access to them how they'recommonly mishandled, and how to prevent information from getting
intothe wrong hands."
"The Public Voice WSIS Sourcebook: Perspectives on the World Summit onthe Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook
This resource promotes a dialogue on the issues, the outcomes, and theprocess of the World Summit on the Information Society (WSIS).
Thisreference guide provides the official UN documents, regional andissue-oriented perspectives, as well as recommendations and
proposalsfor future action, as well as a useful list of resources and contactsfor individuals and organizations that wish to become
more involved inthe WSIS process.
"The Privacy Law Sourcebook 2003: United States Law, InternationalLaw, and Recent Developments," Marc Rotenberg, editor (EPIC 2003).
Price: $40. http://www.epic.org/bookstore/pls2003
The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists
who needan up-to-date collection of U.S. and International privacy law, aswell as a comprehensive listing of privacy resources.
"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0
A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens
free expression.
"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price: $40.
http://www.epic.org/cls
The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested
in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumersand
the basic responsibilities for businesses in the online economy.
"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC 2000).
Price:
$20. http://www.epic.org/bookstore/crypto00&
EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption
products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption
to law enforcement.
EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:
EPIC Bookstore http://www.epic.org/bookstore
"EPIC Bookshelf" at Powell's Books target="new">http://www.powells.com/features/epic/epic.html
[8] Upcoming Conferences and Events
12th Annual Network and Distributed System Security Symposium. TheInternet Society. February 3-4, 2005. San Diego, CA. For moreinformation:
target="new">http://www.isoc.org/isoc/conferences/ndss/05/index.shtml.
14th Annual RSA Conference. RSA Security. February 14-18, 2005. SanFrancisco, CA. For more information:
target="new">http://2005.rsaconference.com/us/general/default.aspx.
The World Summit on the Information Society PrepCom 2. February17-25, 2005. Geneva, Switzerland. For more information:
target="new">http://www.itu.int/wsis/preparatory2/hammamet/index.html.
3rd International Conference of Information Commissioners. FederalInstitute of Access to Information. February 20-23, 2005. Cancun,Mexico.
For more information:
target="new">http://www.icic-cancun.org.mx/index.php?lang=eng.
The Concealed I: Anonymity, Identity, and the Prospect of Privacy. Onthe Identity Trail and the Law and Technology Program at theUniversity
of Ottawa. March 4-5, 2005. Ottawa, Canada. For moreinformation: target="new">http://www.anonequity.org/concealedI.
The Health Information Technology Summit West. eHealth Initiative.
March 6-8, 2005. San Francisco. For more information:
http://www.hitsummit.com.
IAPP National Privacy Summit 2005. International Association ofPrivacy Professionals. March 9-11, 2005. Washington, DC. For moreinformation:
http://privacyassociation.org.
O'Reilly Emerging Technology Conference. March 14-17, 2005. SanDiego, CA. For more Information:
target="new">http://conferences.oreillynet.com/etech.
Policy Options and Models for Bridging Digital Divides: Freedom,Sharing and Sustainability in the Global Network Society. March14-15,
2005. Project on Global Challenges of eDevelopment, HypermediaLaboratory, University of Tampere. Tampere, Finland. For moreinformation:
http://www.globaledevelopment.org/forthcoming.htm.
7th International General Online Research Conference. GermanSociety for Online Research. March 22-23, 2005. Zurich, Switzerland.
For more information: target="new">http://www.gor.de.
The 2005 Nonprofit Technology Conference. Nonprofit TechnologyEnterprise Network. March 23-25, 2005. Chicago, IL. For moreinformation:
target="new">http://www.nten.org/ntc.
Internet Corporation For Assigned Names and Numbers (ICANN) Meeting.
April 4-8, 2005. Mar del Plata, Argentina. For more information:
http://www.icann.org.
VoIP World Africa 2005. April 5-7, 2005. Terrapinn. Johannesburg,South Africa. For more information:
http://www.terrapinn.com/2005/voipza/confprog.stm.
5th Annual Future of Music Policy Summit. Future of MusicCoalition. April 10-11, 2005. Washington DC. For more information:
target="new">http://www.futureofmusic.org/events/summit05/index.cfm.
CFP2005: Fifteenth Annual Conference on Computers, Freedom andPrivacy. April 12-15, 2005. Seattle, WA. For more information:
http://www.cfp2005.org.
2005 IEEE Symposium on Security and Privacy. IEEE Computer SocietyTechnical Committee on Security and Privacy in cooperation with
TheInternational Association for Cryptologic Research. May 8-11, 2005.
Berkeley, CA. For more information:
target="new">http://www.ieee-security.org/TC/SP2005/oakland05-cfp.html.
SEC2005: Security and Privacy in the Age of Ubiquitous Computing.
Technical Committee on Security & Protection in Information ProcessingSystems with the support of Information Processing Society of
Japan.
May 30-June 1, 2005. Chiba, Japan. For more information:
http://www.sec2005.org.
Internet Corporation For Assigned Names and Numbers (ICANN) Meeting.
July 11-15, 2005. Luxembourg City, Luxenbourg. For more information:
http://www.icann.org.
3rd International Human.SocietyInternet Conference. July 27-29,
2005. Tokyo, Japan. For more information: http://hsi.itrc.net.
The World Summit on the Information Society. Government of Tunisia.
November 16-18, 2005. Tunis, Tunisia. For more information:
http://www.itu.int/wsis.
Internet Corporation For Assigned Names and Numbers (ICANN) Meeting.
November 30-December 4, 2005. Vancouver, Canada. For moreinformation: target="new">http://www.icann.org.
Subscription Information
Subscribe/unsubscribe via web interface:
target="new">https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news
Back issues are available at:
http://www.epic.org/alert
The EPIC Alert displays best in a fixed-width font, such as Courier.
Privacy Policy
The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or
share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do
not enhance (linkto other databases) our mailing list or require your actual name.
In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under"subscription
information."
About EPIC
The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus
public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord
privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Actlitigation, and conducts policy research. For more information,
seehttp://www.epic.org or write EPIC, 1718 Connecticut Ave., NW, Suite200, Washington, DC 20009. +1 202 483 1140 (tel), +1 202 483 1248(fax).
If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible.
Checks should be made out to "EPIC" and sent to 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009. Or you cancontribute
online at:
http://www.epic.org/donate
Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation
ofencryption and expanding wiretapping powers.
Thank you for your support.
.
WorldLII:
Copyright Policy
|
Disclaimers
|
Privacy Policy
|
Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2005/3.html