You are here:
WorldLII >>
Databases >>
EPIC Alert >>
2006 >>
[2006] EPICAlert 5
Database Search
| Name Search
| Recent Articles
| Noteup
| LawCite
| Help
EPIC Alert 13.05 [2006] EPICAlert 5
EPIC ALERT
Volume 13.05 March 10, 2006
Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.
http://www.epic.org/alert/EPIC_Alert_13.05.html
Table of Contents
[1] Former DOJ Official Doubted Legal Basis For NSA Program
[2] DOJ Inspector General Reports on Possible Intelligence Violations
[3] Phone Records and Pretexting Capture Attention of Congress, States
[4] Patriot Act Renewed, Some Civil Liberties Safeguards Added
[5] Congress Presses for More Information on NSA Surveillance Program
[6] News in Brief
[7] EPIC Bookstore: Glenn Reynolds's "An Army of Davids"
[8] Upcoming Conferences and Events
[1] Former DOJ Official Doubted Legal Basis For NSA Program
Documents obtained by EPIC this week in a Freedom of Information Actlawsuit against the Department of Justice reveal that a former
topofficial in the Justice Department was skeptical of the BushAdministration's legal justification for its controversial warrantlesssurveillance
program.
Among the released documents was a series of e-mails from formerAssociate Deputy Attorney General David S. Kris. Kris -- now ChiefEthics
and Compliance Officer at Time Warner, Inc. -- provided hisformer colleague a legal analysis concluding that the Authorization forUse
of Military Force Resolution likely did not authorize thesurveillance program. He also said that the DOJ's statutory arguments"had
a slightly after-the-fact quality or feeling to them."
The DOJ refused to disclose much additional information related to itssecretive warrantless surveillance program. Most of the documentsreleased
this week are previously published justifications for theprogram and transcripts of television appearances by the AttorneyGeneral.
The documents disclosed by the DOJ this week cover only a small fractionof the material at issue in the lawsuit. In legal papers filed
the nightbefore the Justice Department's court-imposed deadline for releasing thedocuments, the agency requested a delay of four
months to complete isprocessing of classified information related to the program.
The case arises from the New York Times' report in December thatPresident Bush secretly issued an executive order in 2002 authorizingthe
National Security Agency to conduct warrantless surveillance ofinternational telephone and Internet communications on American soil.
EPIC submitted FOIA requests to four DOJ components just hours after thewarrantless surveillance program's existence was first reported.
Notingthe extraordinary public interest in the program -- and its potentialillegality -- EPIC asked the agencies to expedite the
processing of itsrequests. The DOJ agreed that the requests deseved priority treatment,but failed to comply with the FOIA's usual
time limit of twenty workingdays. The court's February 16 order found that delay to be unreasonable,and ordered the Justice Department
to disclose all responsive documentsby March 8, or to describe the information it sought to withhold andprovide legal justifications
for non-disclosure.
"President Bush has invited meaningful debate about the warrantlesssurveillance program," U.S. District Judge Henry H. Kennedy wrote.
"Thatcan only occur if DOJ processes [EPIC's] FOIA requests in a timelyfashion and releases the information sought."
EPIC's case has been consolidated with a lawsuit filed by the AmericanCivil Liberties Union and the National Security Archive concerning
manyof the same documents.
DOJ's Motion Requesting More Time to Process Classified Material (pdf):
http://www.epic.org/privacy/nsa/motion_relief.pdf
Judge Kennedy's Order (pdf):
http://www.epic.org/privacy/nsa/pi_order.pdf
More Information About EPIC's Case, EPIC v. Department of Justice:
http://www.epic.org/privacy/nsa/foia/
[2] DOJ Inspector General Reports on Possible Intelligence Violations
In response to accounts of apparent intelligence violations uncovered byEPIC last year, the Department of Justice Inspector General
has examinedthe FBI's procedures for reporting possible agent misconduct. Thefindings were relayed in a semiannual report to Congress
about civilrights or civil liberties complaints made against Justice Departmentemployees.
According to the Inspector General, the FBI reported more than a hundredinstances of possible intelligence misconduct to the IntelligenceOversight
Board (IOB) in the past two years. The report says a number ofthese matters were "significant," including one instance in which theFBI
collected the full content of 181 phone calls instead of justbilling and toll records. The Inspector General also found that possibleviolations
of the Foreign Intelligence Surveillance Act accounted fornearly 70 percent of reports to the board in 2005, up from 48 percent in2004.
The Inspector General's examination was sparked by a series of redactedFBI reports to the board obtained last year by EPIC through
Freedom ofInformation Act litigation. The apparent intelligence violationsdescribed in that material included improper e-mail collection,eavesdropping
on the wrong person's telephone calls, investigationsconducted for months without proper reporting or oversight, an FBIagent's seizure
of financial records in violation of federal privacylaw, and an unidentified intelligence agency's unlawful physical search.
Under an executive order, inspectors general and general counselthroughout the intelligence community must inform the IntelligenceOversight
Board about "intelligence activities that they have reason tobelieve may be unlawful or contrary to Executive order or Presidentialdirective."
The board is required to forward to the Attorney Generalreports of activities that it finds likely to have violated laws,executive
orders or directives.
In January, EPIC filed a Freedom of Information Act lawsuit against theDepartment of Justice for all reports of apparent intelligencemisconduct made to the Intelligence Oversight Board
since 9/11. EPICalso requested reports forwarded from the board to the Attorney Generaland documentation of its responsive actions.
The Attorney General'sOffice recently reported that it has no information responsive to EPIC'srequest for documents.
Department of Justice Inspector General, Report to Congress onImplementation of Section 1001 of the USA PATRIOT Act:
http://www.usdoj.gov/oig/special/s0603/final.pdf
Executive Order 12863:
http://www.epic.org/redirect/eo12863.html
EPIC FOIA Note #9: Possible Patriot Act Abuses Released by FBI
http://www.epic.org/foia_notes/note9.html
EPIC FOIA Documents on Possible Intelligence Abuses (pdf):
http://www.epic.org/privacy/terrorism/usapatriot/foia/iob.pdf
http://www.epic.org/privacy/terrorism/usapatriot/foia/iob2.pdf
http://www.epic.org/privacy/terrorism/usapatriot/foia/iob3.pdf
http://www.epic.org/privacy/terrorism/usapatriot/foia/iob4.pdf
[3] Phone Records and Pretexting Capture Attention of Congress, States
Federal and state lawmakers are focusing attention on protecting phoneand other customer records from pretexting. These new developments
are aresult of a complaint and a petition EPIC filed with federal agenciesdetailing how phone records are sold through "pretexting."
Since filingthose documents, Congress, the Federal Communications Commission, theFederal Trade Commission, and state attorneys general
have all filedsubpoenas or brought lawsuits against pretexters.
The U.S. Senate and House Judiciary Committees approved legislationestablishing criminal penalties for obtaining phone records throughpretexting.
In the House, the Judiciary Committee approved H.R. 4709,the bi-partisan "Law Enforcement and Phone Privacy Protection Act of2006."
The legislation makes it a crime to acquire, purchase, or selltelephone or VoIP records without the account holder's consent.
Violators are subject to fines and up to 20 years in jail. The SenateJudiciary committee reported out the bi-partisan S. 2178, the
"ConsumerTelephone Records Protection Act of 2006." The Senate legislation issimilar to the House version, but provides for less
severe penalties.
In Illinois, the state Senate passed SB 2554. The Illinois bill differsfrom other anti-fraud efforts in that it broadly prohibits
allpretexting by classifying it as an identity theft crime. Specifically,the measure prohibits the use of impersonation or pretexting
to accessalmost any type of personal information held by others, or to gainaccess "to any record of the actions taken, communications
made orreceived, or other activities or transactions" of another. The measurestill needs to be approved by the State's lower House.
GovernorBlagojevich has already announced his support for the privacy bill.
In Florida, S. 1488 is moving swiftly through committees of the state'sSenate. The bill would prohibit using false statements in order
toobtain phone records of another. In addition, Florida Attorney GeneralCrist has brought suit against Global Information Group for
pretextingphone records. In the complaint, it is alleged that Verizon Wirelessalone received over 5,100 calls from Global Information
Group'stelephone number.
In California, the Assembly Public Safety Committee held a hearing on SB202, a bill that would broadly prohibit the sale or purchase
of phonerecords. It is sponsored by Senator Joe Simitian (D-San Mateo), authorof the state's security breach notification law. At
the hearing,Assembly members were receptive to the bill, and it received supportfrom several telecommunications companies. The Committee
held the billin order to digest last-minute amendments, but is likely to advance thelegislation to the floor at its next meeting.
EPIC Illegal Access to Phone Records Page:
http://epic.org/privacy/iei/
HR 4709, the Law Enforcement and Phone Privacy Protection Act of 2006:
http://thomas.loc.gov/cgi-bin/query/z?c109:H.R.4709:
S. 2178, the Consumer Telephone Records Protection Act of 2006:
http://thomas.loc.gov/cgi-bin/bdquery/z?d109:s.02178:
Illinois Senate Bill 2554:
http://www.epic.org/redirect/il_pretext_bill.html
Florida Senate Bill 1488:
http://www.epic.org/redirect/fl_cpni_bill.html
[4] Patriot Act Renewed, Some Civil Liberties Safeguards Added
On March 9, Prseident Bush signed a bill renewing the Patriot Act underthe terms of a Senate-approved compromise measure. The measure
makespermanent most of the provisions of the 2001 law, which was originallyslated to expire at the end of last year. Intense debate
over the Act'sexpansion of search and surveillance powers delayed Congressionalaction, and lawmakers twice extended the deadline
for the Act'sexpiration in order to continue debate.
A handful of the most controversial aspects of the law were curbed inits renewal. The government may no longer use "National SecurityLetters"
to obtain library loan records. The letters, which do notrequire judicial oversight, require recipients to turn over information,while
preventing them from speaking about it. However, the newlegislation eliminates an earlier provision that required recipients tonotify
the FBI of any attorney they have consulted regarding receipt ofthe letter. The renewal also specifies that recipients of so-called"Section
215 subpoenas," which are issued under the Foreign IntelligenceSurveillance Act, can challenge gag orders attached to these subpoenasin
court.
While the majority of the Patriot Act is now made permanent, twoparticular provisions are left with expiration dates. One is the FBI'spower
to conduct "roving wiretaps" that eavesdrop on a target'scommunications across multiple phone numbers of email accounts. Anotheris
the government's power to seize business records under the ForeignIntelligence Surveillance Act. Each of these provisions is now
set toexpire at the end of 2009.
These limited safeguards, however, are still not enough in the eyes ofsome legislators. Senate Judiciary Chairman Arlen Specter (R-PA),Ranking
Member Patrick Leahy (D-VT), and ten other senators haveintroduced a bipartisan bill that would reinstate safeguards that hadbeen
removed from the renewal act during debate. The safeguards includeincreased judicial review of national security letters, requiring
thegovernment to show a stronger connection to terrorism before searchingpersonal records, reducing the amount of time that the government
canconduct a search before notifying its target, and adding a 4-yearexpiration date on the power to use National Security Letters.
EPIC's Patriot Act page:
http://www.epic.org/privacy/terrorism/usapatriot/
The USA PATRIOT Improvement and Reauthorization Act of 2005:
http://thomas.loc.gov/cgi-bin/bdquery/z?d109:H.R.3199:
S. 2369, Senate Bill Further Amending the Patriot Act:
http://thomas.loc.gov/cgi-bin/bdquery/z?d109:s.02369:
[5] Congress Presses for More Information on NSA Surveillance Program
Members of Congress have continued to push for more information aboutthe Bush Administration's controversial warrantless surveillanceprogram.
Last week, the Senate Judiciary Committee held its second hearing on theoperation, asking legal experts to weigh in on the legality
of thesurveillance program. The hearing followed Attorney General AlbertoGonzales' defense of the program last month, which he followed
up with aletter to the committee to "clarify" his testimony. Among other things,the letter stated that the Administration's legal
rationale for theprogram "has evolved over time," and emphasized that his testimony didnot address "other classified intelligence
activities." Senator PatrickLeahy, the ranking Democrat on the committee, has demanded that theAttorney General clarify his statements.
The committee's chair, Senator Arlen Specter, has also been an outspokencritic of the Administration's failure to provide information
about theprogram. He has urged fellow members of Congress to press for a courtruling on the legitimacy of the NSA's surveillance
activities and imposegreater oversight over the program. This week, he also threatened tomove to block the Bush Administration's
funding if Attorney GeneralGonzales is not more forthcoming with details about the program.
The Senate Intelligence Committee has voted not to launch an inquiryinto the program, but has proposed legislation that would form
asubcommittee to oversee the NSA's surveillance activities. However, thelegislation would also permit the President to authorize
warrantlesssurveillance for up to 45 days in cases where the interceptedcommunication involves someone suspected of being associated
withcertain terrorist organizations and if at least one party to thecommunication is on foreign soil.
The House Intelligence Committee has also pushed for additionalbriefings so that they can consider making changes to the ForeignIntelligence
Surveillance Act.
Attorney General Alberto Gonzales' letter to the Senate JudiciaryCommittee (pdf):
http://www.epic.org/redirect/gonzalesletter.html
Press Release, "Leahy Presses Gonzales on Delayed 'Clarifications' toHis Testimony on Domestic Spying":
http://leahy.senate.gov/press/200603/030106a.html
[6] News in Brief
Citibank Freezes Debit Cards After Major Fraud ActionAn undisclosed but possibly large number of Citibank customers inCanada, the
UK, and Russia were recently left unable to use their ATMcards. Initial inquiries by customers to the bank were met with littleinformation,
though the company now says that an unspecified number offraudulent withdrawals had been detected. Other banks, including WellsFargo,
Bank of America, and Washington Mutual, have reportedly takensimilar steps. Some reports have indicated that the breach may haveoriginated
with data stolen from OfficeMax, though OfficeMax denies itwas aware of any security breach.
EPIC's Identity Theft Page:
http://www.epic.org/privacy/idtheft/Ireland Halts National ID Card PlanIreland will not introduce national ID cards in response to such cardsin Britain. Last year, the
Minister for Justice said he reluctantlyaccepted that Ireland might have to introduce identity cards whenBritain went ahead with
its scheme. However, changes in the Britishlegislation mean that the new British ID cards will not affect Irishcitizens traveling
between the two countries. After a protracted battlebetween national ID card advocates and opponents, British MPs voted lastmonth
to create the cards. However, further legislation will be neededto make carrying the cards compulsory.
EPIC's National ID and REAL ID Cards page:
http://www.epic.org/privacy/id_cards/
Intelligence Agencies Ordered to Halt Reclassification ProgramThe country's head archivist has demanded that intelligence agenciesstop
reclassifying public documents held by the National Archives untilan investigation can be conducted into the practice. The New York
Timesreported last month that a group of intelligence agencies hasreclassified thousands of documents since 1999, including decades-oldreports
from the State Department and historical documents thatresearchers have photocopied and stored in their personal files. AllenWeinstein,
Archivist of the United States, urged the intelligenceagencies to return as much reclassified material as possible to theNational
Archives' shelves until the agency can complete its audit ofthe program.
National Archives Press Release on Reclassification Hold:
http://www.archives.gov/press/press-releases/2006/nr06-67.html
National Archives Information on Declassification:
http://www.archives.gov/about/regulations/part-1260.html
EPIC's Open Government Litigation Page:
http://www.epic.org/privacy/litigation/
Google Moves Search Records Out of ChinaGoogle recently announced that it was moving records of users' searchesoutside of the borders
of the People's Republic of China. The move isintended to protect users from having records of their searches seizedby the Chinese
government, which often enforces strict speechrestrictions on the Internet. Google and other technology companiesrecently came under
fire for censoring search results to accommodateChinese governmental policy. The removal of servers from China will notaffect the
Google.cn search engine's filtered search results, but willprevent the company from having to comply with orders to turn overinformation
resulting in the imprisonment of dissidents. Yahoo has beenwidely criticized lately for its role in the imprisonment of dissidentsShi
Tao and Li Zhi.
EPIC's 2004 Privacy and Human Rights Report on China:
http://www.epic.org/redirect/phr2004china.html
U.S. State Department's 2005 Report on Human Rights in China:
http://www.state.gov/g/drl/rls/hrrpt/2005/61605.htm
Student Wins Open Government Suit, Gains Access to Email ListsA high school student in Kokomo, Indiana, won an open government lawsuitwon
a case against the city to obtain an email list that he thought themayor was misusing. The student, Ryan Nees, wanted to ensure that
thesubscriber list for the city's e-newsletter wasn't being misappropriatedto send political spam on behalf of the mayor, Matt McKillip.
The cityargued that while Nees should have access to the email addresses, heshould not be allowed to keep a copy, since a provision
of Indiana'sopen government laws limits the distribution of "addresses" in order toprotect residents' privacy. The court held that
"addresses" did notcover email addresses, and that Nees should therefore be given a copy ofthe list.
Court Order in Nees v. McKillip (pdf):
http://www.epic.org/redirect/neesorder.html
Indiana's Access to Public Records Act:
http://www.in.gov/legislative/ic/code/title5/ar14/ch3.html
EPIC's Open Government Page:
http://www.epic.org/open_gov/
European Advisory Body: Webmail Scanning Can Be InterceptionThe Article 29 Data Protection Working Party, an independentconsultative
body affiliated with the European Commission, issued anopinion stating that some email screening services may not comply withEuropean
data protection legislation. In some cases, the group said,filtering based on content may constitute an "unjustifiable interceptionof
communications." While EU laws allow email screening for viruses,spam or other content filtering could abridge individuals' free
speechif it blocks legitimate emails from reaching their recipients. Scanningthe content of emails can also be a violation of data
protection laws,unless Internet service providers or email service providers mustadequately inform email software users of the blocking.
Working Party Opinion on Privacy Issues and Email Screening Services(pdf):
http://www.epic.org/redirect/wp29gmail.html
Proposed New Jersey Ban on Anonymous Internet SpeechNew Jersey Assemblyman Peter Biondi has proposed a bill that wouldprohibit Internet
users from posting content anonymously. The billrequires Internet service providers and providers of "interactivecomputer services"
to collect a legal name and address from anyone whoposts information on the Internet through their sites. The law alsorequires service
providers to have procedures in place to disclose auser's name and address if the user posts "false or defamatoryinformation" on
a website. The bill draws no distinction betweendefamation and information that is merely untrue, nor does it accountfor the First
Amendment right to anonymous free speech, as outlined bythe U.S. Supreme Court and New Jersey appeals courts.
Text of the New Jersey Bill Banning Online Anonymous Speech:
http://www.njleg.state.nj.us/2006/Bills/A1500/1327_I2.HTM
EPIC's Page on Free Speech:
http://www.epic.org/free_speech/
EPIC's Page on Watchtower Bible v. Stratton (U.S. Supreme Court Case onAnonymous Speech):
http://www.epic.org/free_speech/watchtower.html
Post Office Sends More Junk than Regular Mail
The United States Postal Service now delivers more junk than regularmail. In 2005, the volume of "Standard Mail" exceeded that of
FirstClass, Priority, and Express Mail. Over 100 billion pieces of junk mailwere delivered, while the later categories accounted
for 99 billion mailpieces. Junk mail, while weighing almost twice as much as regular mail,raised only $19 billion in revenue while
regular mail raised $41billion. As a result of increasing junk mail volumes and fraud committedthrough sweepstakes, legislators from
Missouri, Illinois, and New Yorkhave introduced Do-Not-Mail legislation. These bills are modeled on thehighly successful Do-Not-Call
Registry, which also began in statelegislatures. But the legislation faces many opponents. In addition todirect marketers, Do-Not-Mail
is disfavored by many who profit from junkmail, including advertisers, printers, news media organizations, lettercarriers, and the
Postal Service itself.
USPS Annual Report:
http://www.usps.com/history/anrpt05/
EPIC Postal Privacy Page:
http://epic.org/privacy/postal/
[7] EPIC Bookstore: Glenn Reynolds's "An Army of Davids"
Glenn Reynolds. "An Army of Davids: How Markets and Technology EmpowerOrdinary People to Beat Big Media, Big Government, and Other
Goliaths"
(Nelson Current, 2006).
http://www.powells.com/partner/24075/biblio/61-1595550542-0
At last count, there were an estimated 30.2 million blogs. Many of theseweb sites begin and end with vacation photos or an excellent
recipe forchile rellenos. But a few blogs establish followings that are comparableto small town newspapers or a popular talk show
radio stations. Thesefollowings evolve from simple lists of subscribers into communities andeven political movements.
Glenn Reynolds is one of the celebrity bloggers whose web siteinstapundit.com typically ranks up near the top of blog rankings, asmeasured
by Technorati and others.
Reynolds's book, which is only partialy about the blog phenomenon,reveals many of the tricks of the political blogger -- well respectedpersonal
hobbies (brewing beer, producing CDs), quirky political views(put more guns on planes), commitment to futurism (ideas on terraformingMars),
and a general optimism about the ability of technology to levelthe playing field, eliminate the dinosaurs, and solve world problems.
There is much in the book to debate. But that is, after all, also thematerial of a good political blog.
Marc Rotenberg
EPIC Publications:
"Information Privacy Law: Cases and Materials, Secod Edition" Daniel J.
Solove, Marc Rotenberg, and Paul Schwartz. (Aspen 2005). Price: $98.
http://www.epic.org/redirect/aspen_ipl_casebook.html
This clear, comprehensive introduction to the field of informationprivacy law allows instructors to enliven their teaching of fundamentalconcepts
by addressing both enduring and emerging controversies. TheSecond Edition addresses numerous rapidly developing areas of privacylaw,
including: identity theft, government data mining,and electronicsurveillance law, the Foreign Intelligence Surveillance Act,intelligence
sharing, RFID tags, GPS, sypware, web bugs, and more.
Information Privacy Law, Second Edition, builds a cohesive foundationfor an exciting course in this rapidly evolving area of law.
"Privacy & Human Rights 2004: An International Survey of Privacy Lawsand Developments" (EPIC 2004). Price: $50.
http://www.epic.org/bookstore/phr2004
This annual report by EPIC and Privacy International provides anoverview of key privacy topics and reviews the state of privacy in
over60 countries around the world. The report outlines legal protections,new challenges, and important issues and events relating
to privacy.
Privacy & Human Rights 2004 is the most comprehensive report on privacyand data protection ever published.
"FOIA 2004: Litigation Under the Federal Open Government Laws," HarryHammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004).
Price:
$40.
http://www.epic.org/bookstore/foia2004
This is the standard reference work covering all aspects of the Freedomof Information Act, the Privacy Act, the Government in the Sunshine Act,and the Federal Advisory Committee Act. The 22nd edition fully updatesthe manual
that lawyers, journalists and researchers have relied on formore than 25 years. For those who litigate open government cases (orneed
to learn how to litigate them), this is an essential referencemanual.
"The Public Voice WSIS Sourcebook: Perspectives on the World Summit onthe Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook
This resource promotes a dialogue on the issues, the outcomes, and theprocess of the World Summit on the Information Society (WSIS).
Thisreference guide provides the official UN documents, regional andissue-oriented perspectives, and recommendations and proposals
forfuture action, as well as a useful list of resources and contacts forindividuals and organizations that wish to become more involved
in theWSIS process.
"The Privacy Law Sourcebook 2004: United States Law, International Law,and Recent Developments," Marc Rotenberg, editor (EPIC 2005).
Price:
$40.
http://www.epic.org/bookstore/pls2004/
The Privacy Law Sourcebook, which has been called the "Physician's DeskReference" of the privacy world, is the leading resource for
students,attorneys, researchers, and journalists interested in pursuing privacylaw in the United States and around the world. It
includes the fulltexts of major privacy laws and directives such as the Fair CreditReporting Act, the Privacy Act, and the OECD Privacy
Guidelines, as wellas an up-to-date section on recent developments. New materials includethe APEC Privacy Framework, the Video Voyeurism
Prevention Act, and theCAN-SPAM Act.
"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0
A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens
free expression.
EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:
EPIC Bookstore http://www.epic.org/bookstore
"EPIC Bookshelf" at Powell's Bookshttp://www.powells.com/features/epic/epic.html
EPIC also publishes EPIC FOIA Notes, which provides brief summaries ofinteresting documents obtained from government agencies under
theFreedom of Information Act.
Subscribe to EPIC FOIA Notes at:
https://mailman.epic.org/cgi-bin/control/foia_notes
[8] Upcoming Conferences and Events
Beyond the Basics: Advanced Legal Topics in Open Source andCollaborative Development in the Global Marketplace. University ofWashington
School of Law. March 21, 2006. Seattle, Washington. For moreinformation:
http://www.law.washington.edu/lct/Events/FOSS/
Call for papers for the 34th Research Conference on Communication,Information, and Internet Policy. Telecommunications Policy ResearchConference.
Proposals should be based on current theoretical orempirical research relevant to communication and information policy, andmay be
from any disciplinary perspective. Deadline is March 31, 2006.
For more information:
http://www.tprc.org/TPRC06/call06.htm
Making PKI Easy to Use. National Institutes of Health. April 4-6, 2006.
Gaithersburg, Maryland. For more information:
http://middleware.internet2.edu/pki06/
First International Conference on Availability, Reliability andSecurity. Vienna University of Technology. April 20-22, 2006. Vienna,Austria.
For more information:
http://www.ifs.tuwien.ac.at/ares2006/
Third International Conference on Security in Pervasive Computing.
University of York. April 19-20, 2006. York, United Kingdom. For moreinformation:
http://www.cs.york.ac.uk/security/spc-2006.html
CHI 2006 Workshop on Privacy-Enhanced Personalization. UC IrvineInstitute for Software Research and the National Science Foundation.
April 22-23. Montreal, Quebec, Canada. For more information:
http://www.isr.uci.edu/pep06/
The First International Conference on Legal, Security and Privacy Issuesin IT (LSPI). CompLex. April 30-May 2, 2006. Hamburg, Germany.
For moreinformation:
http://www.kierkegaard.co.uk/
Computers, Freedom, and Privacy Conference (CFP 2006). Association forComputing Machinery May 2-5, 2006. Washington, DC. For more
information:
http://cfp2006.org/
Infosecurity New York. Reed Exhibitions. September 12-14, 2006. NewYork, New York. For more information:
http://www.infosecurityevent.com
34th Research Conference on Communication, Information, and InternetPolicy. Telecommunications Policy Research Conference. September29-October
1, 2006. Arlington, Virginia. For more information:
http://www.tprc.org/TPRC06/2006.htm
International Conference on Privacy, Security, and Trust (PST 2006).
University of Ontario Institute of Technology. October 20-November 1,
2006. Oshawa, Ontario, Canada. For more information:
http://www.businessandit.uoit.ca/pst2006/
BSR 2006 Annual Conference. Business for Social Responsibility. November7-10, 2006. New York, New York. For more information:
http://www.bsr.org/BSRConferences/index.cfm
Subscription Information
Subscribe/unsubscribe via web interface:
https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news
Back issues are available at:
http://www.epic.org/alert
The EPIC Alert displays best in a fixed-width font, such as Courier.
Privacy Policy
The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or
share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do
not enhance (link toother databases) our mailing list or require your actual name.
In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under "subscriptioninformation."
About EPIC
The Electronic Privacy Information Center is a public interest researchcenter in Washington, DC. It was established in 1994 to focus
publicattention on emerging privacy issues such as the Clipper Chip, theDigital Telephony proposal, national ID cards, medical record
privacy,and the collection and sale of personal information. EPIC publishes theEPIC Alert, pursues Freedom of Information Act litigation, and conductspolicy research. For more information, see http://www.epic.org or writeEPIC, 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202483 1140 (tel), +1 202 483 1248 (fax).
If you'd like to support the work of the Electronic Privacy InformationCenter, contributions are welcome and fully tax-deductible.
Checksshould be made out to "EPIC" and sent to 1718 Connecticut Ave., NW,Suite 200, Washington, DC 20009. Or you can contribute
online at:
http://www.epic.org/donate
Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for the rightof privacy and efforts to oppose government regulation
of encryption andexpanding wiretapping powers.
Thank you for your support.
.
WorldLII:
Copyright Policy
|
Disclaimers
|
Privacy Policy
|
Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2006/5.html