You are here:
WorldLII >>
Databases >>
EPIC Alert >>
2006 >>
[2006] EPICAlert 6
Database Search
| Name Search
| Recent Articles
| Noteup
| LawCite
| Help
EPIC Alert 13.06 [2006] EPICAlert 6
EPIC ALERT
Volume 13.06 March 24, 2006
Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.
http://www.epic.org/alert/EPIC_Alert_13.06.html
Table of Contents
[1] EPIC, Archive File Brief Supporting Release of Abu Ghraib Images
[2] EPIC Testifies Against Social Security Number Expansion
[3] House Committee Approves Bill to Weaken Data Breach Laws
[4] Judge Restricts Justice Department's Demand for Google Records
[5] Security Flaws at Retailers Affect Thousands of Debit Card Holders
[6] News in Brief
[7] EPIC Bookstore: Mark S. Monmonier's "Spying with Maps"
[8] Upcoming Conferences and Events
[1] EPIC, Archive File Brief Supporting Release of Abu Ghraib Images
EPIC and the National Security Archive have filed an amicus brief urgingan appeals court to permit the disclosure of photos and videos
showingAmerican troops abusing detainees at Abu Ghraib prison in Iraq. ThePentagon has refused to release the information to the
American CivilLiberties Union under the Freedom of Information Act, claiming that itwould endanger U.S. soldiers serving in Iraq. EPIC and the Archive arguethat the government is turning FOIA on its
head by claiming thatinformation likely to expose government misconduct should be withheld toprevent public outrage.
In this case, the ACLU submitted Freedom of Information Act requests toseveral government agencies for information about the treatment ofdetainees in U.S. custody, including controversial images
of abuse thathad been reported in the media. When the government failed to respond tothe ACLU's request nearly a year later, the
organization filed suit inthe District Court for the Southern District of New York. U.S. DistrictJudge Alvin K. Hellerstein reviewed
a sampling of photos depicting abuseof detainees, and ordered the government to release them in redactedform to protect the privacy
of the pictured individuals.
The government appealed the ruling to the Second Circuit Court ofAppeals, arguing that disclosure of the images would "endanger the
lifeor physical safety" of U.S. troops and coalition forces by provokinginsurgent and terrorist attacks against them. The government
also saidthat the photos should not be released, even in the redacted formrequired by Judge Hellerstein, because such disclosure
could invade thepersonal privacy of the detainees.
The amicus brief written by EPIC and the Archive argues that thegovernment's claims undermine the FOIA's purpose of promoting open,honest
and accountable government. The brief shows that U.S. courtshave never allowed the potential for public anger to thwart the right
tofree expression guaranteed by the Constitution and reflected, in part,by the FOIA.
The brief also argues that disclosure of the photos will not threatenpersonal privacy because Judge Hellerstein has already taken
precautionsto safeguard the rights of the pictured detainees. Disclosure of theseredacted images will advance the public interest
in examining thepropriety of the U.S. soldiers' conduct. Such disclosure will also helpto hold higher government officials responsible
for the abuses at AbuGhraib.
Amicus Brief Filed by EPIC and the National Security Archive (pdf):
http://www.epic.org/open_gov/darby/darby_amicus.pdf
District Court Decision in ACLU v. Department of Defense (pdf):
http://www.gwu.edu/~nsarchiv/news/20060313/aOrder092905.pdf
National Security Archive Press Release:
http://www.gwu.edu/~nsarchiv/news/20060313/index.htm
[2] EPIC Testifies Against Social Security Number Expansion
In testimony before the House Subcommittee on Social Security, EPICExecutive Director Marc Rotenberg urged Congress not to expand
the usesof the Social Security number and the Social Security card. "Everysystem of identification is subject to error, misuse, and
exploitation,"
Rotenberg said.
The hearing was the fourth in a series held by Representative McCrery(R-LA) to focus on high-risk issues facing the Social Security
number.
The hearings, held over the course of the last four months, examinedfraud, the use of the number in verifying employment eligibility,
andpossible modification of the card.
Some members of Congress have proposed that the card contain digitalphotos, machine-readable identifiers, and biometric identifiers
thatcould turn the Social Security card into a national ID card. CurrentSocial Security cards, while bearing anti-counterfeiting
features suchas those used on banknotes, are not intended or designed to be used foridentification.
In creating the Social Security Administration in the 1930s, Congresswas concerned with the number being used as a universal identifier
thatcould aid in government tracking of activities, and that the first actof the newly formed Administration was to limit the card's
use. Congressalso halted later expansions of expansion of the card's role by passingSection 7 of the Privacy Act of 1974. Putting
the card to new,unintended uses, Rotenberg testified, would erode privacy, runningcounter to this trend of protection. Rotenberg
also noted that theimproper use of the SSN for identification by the private sectorcontributes to identity theft.
Nevertheless, members of Congress, including Representatives DavidDreier (R-CA) and Silvestre Reyes (D-TX), called for additions to
thecard. Representative Drier insisted both that Social Security numbersare already used for identification purposes by the private
sector, andalso that the new photograph-bearing, machine-readable card would not,in fact, be an identification document.
Frederick Streckewald of the Social Security Administration testifiedthat adding ID-like features to the Social Security card would
cost atleast $9.5 billion. Dr. Stephen Kent of the National Research Councilalso testified that complex ID systems like the one proposed
for theSocial Security card often are pressed into unintended secondary usesthat can cause privacy and security problems.
Testimony of EPIC Executive Director Marc Rotenberg before Subcommitteeon Social Security (pdf):
http://www.epic.org/privacy/ssn/mar_16test.pdf
Subcommittee on Social Security, Fourth Hearing on High-Risk SSN Issues:
http://www.epic.org/redirect/ssn_hearings.html
EPIC's SSN Page:
http://www.epic.org/privacy/ssn
[3] House Committee Approves Bill to Weaken Data Breach Laws
The House Financial Services Committee approved legislation last weekthat would roll back protections for many Americans' personal
records.
The Financial Data Protection Act would create a weak national standardfor consumer protection, overriding or "preempting" stronger
stateconsumer protection laws.
For instance, comapnies only have to notify consumer of data breacheswhere "information is reasonably likely to have been or to be
misused ina manner causing substantial harm or inconvenience." However, manystates have more stringent requirements that cause notices
to be issuedwhenever a security breach occurs. The reasoning behind theserequirements is that businesses have significant incentives
not to givenotice, and may overlook breaches and their potential harms to avoidembarrassment. But other loopholes in the language
further limit therequirement to give notice. These include that the information must be"sensitive financial personal information,"
and that the company mustknow the scope of the breach (in many cases, the scope is unknown).
The credit freeze provisions are similarly weak. Credit freeze is theability of an individual to limit disclosure of their consumer
report tonew creditors, thus stopping companies from opening new accounts. Thiserects a nearly perfect shield against identity theft.
Many states allowany concerned residents to freeze their credit as a precaution againstfuture fraud. H.R. 3997, however, only allows
credit freeze once someonehas become a victim of identity theft. Furthermore, H.R. 3997 creates adifficult to use freeze mechanism
that requires the victim to provideproof of the crime, to send the freeze request by certified mail, and itallows the consumer reporting
agency to wait five business days beforeimplementing the freeze. These inconveniences are designed to stopconsumers from freezing
their reports.
The main driver of this legislation is preemption
--
the desire of manybusinesses to supersede stricter state laws. Additionally, the billprohibits enforcement by the state attorneys
general, weakening anypossible enforcement of the law. The bill will next be considered byother committees in the House and Senate,
where there is a possibilitythat it could be strengthened.
H.R. 3997, the Financial Data Protection Act:
http://thomas.loc.gov/cgi-bin/query/z?c109:H.R.3997:
EPIC's Page on Choicepoint and Other Security Breaches:
http://www.epic.org/privacy/choicepoint/
Coalition letter on ID Theft Legislation:
http://www.epic.org/privacy/choicepoint/datamarker11.09.05.html
[4] Judge Restricts Justice Department's Demand for Google Records
On March 17, a federal district judge in California issued an orderlimiting the Justice Department's demand for records from Google.
WhileGoogle must still turn over a list of 50,000 web addresses, it will nothave to reveal any Internet search terms submitted by
users.
The government's demands had been significantly narrowed compared, tothe subpoena filed last August. That subpoena asked for the addresses
ofall web sites indexed by Google, as well as every search term enteredinto Google during a two-month period in 2005. Yahoo, Microsoft,
andAOL, were also asked to provide records. Of the companies, Google aloneobjected, claiming that the demand threatened Google's
trade secrets andits image as a protector of users' privacy.
In making the decision, Judge Ware of the Northern District ofCalifornia recognized that the demand affected not just Google, but
alsothe privacy rights of individual Google users. Not only do users wantthe terms they search for to be private, search terms alone
cansometimes reveal a user's identity, such as when people search for theirsocial security numbers or credit card numbers to see
if thatinformation is available on the Internet. The judge also noted that thegovernment might, in looking through search terms,
decide to follow upon information for unauthorized purposes, quoting a Justice Departmentspokesperson who said that "if something
raised alarms, we would hand itover…"
Because of these concerns, the judge ruled that Google did not have toturn over search terms, but that the list of web addresses,
since theydid not impact privacy, had to be turned over.
The Justice Department is seeking the records to conduct a statisticalstudy for the defense of the Child Online Protection Act, an
onlinecensorship law that was blocked as unconstitutional by the Supreme Courtin 2004. The government has given few details as to
how it intends touse the information
--
an omission that the judge called "particularlystriking," considering the time the government had to prepare the case,and given that
it already had essentially the same information from theother major search engines.
The Child Online Protection Act makes it a criminal offense for anyoneto post adult material on the web, unless they first collect
informationfrom users proving that the user is not a minor. The Supreme Courtbarred enforcement of the law, saying that the government
had not proventhat this restriction on free speech was the most effective means toprevent minors from viewing adult material on the
Internet.
Text of the Decision in Google v. Gonzales (pdf):
http://www.epic.org/privacy/gmail/doj_court_order.pdf
Supreme Court Ruling on the Child Online Protection Act, Ashcroft v.
ACLU:
http://supct.law.cornell.edu/supct/html/03-218.ZS.html
EPIC's Child Online Protection Act Page:
http://www.epic.org/free_speech/copa/
[5] Security Flaws at Retailers Affect Thousands of Debit Card Holders
Hundreds of thousands of debit cards may have been affected by fraud,but affected banks, card companies, and retailers are releasing
very fewdetails on the incident. Consumers first became aware of the problem asmajor banks, including Citibank, Wells Fargo, Washington
Mutual, andBank of America blocked ATM transactions in Canada, the United Kingdomand Russia, and quietly began issuing new debit
cards to customers.
The affected banks have since told reporters that the problems wererelated to fraudulent transactions that had been traced to data
breachesat unspecified retailers. Recent reports have named OfficeMax and Sam'sClub stores as likely sources for the breach, although
OfficeMaxcontinues to deny that it knew of any security mishaps.
Thieves have apparently been able to collect not only the data containedwithin the magnetic strips on victims' ATM cards, but also
the PIN codesthat allow access to their accounts. Fraudulent withdrawals in Canada,the United Kingdom, and Russia apparently triggered
the blocks in thosecountries, and have led to the arrests of 14 people in New Jersey.
When consumers purchase goods with an ATM card, the PIN entered into theregister is supposed to be encrypted when it is sent out forverification,
and deleted after the transaction is complete. For thebreaches to have occurred, the information must have been improperlyretained
on a computer and the thieves must have been able to decryptthe coded PINs, either because the encryption key was carelessly storedon
the same server, or through hacking by an insider.
The scope of the breach underscores the need for laws that will protectconsumers from such crimes, by notifying them when breaches
occur andallowing them to freeze accounts if they suspect fraud. Many billscurrently before Congress provide loopholes that would
allow breacheslike this one to go unreported, and would not allow victims to placesecurity freezes on their accounts unless they
first filed a policereport. Some of the proposed laws would also eliminate state strongerstate consumer protections.
EPIC's Identity Theft Page:
http://www.epic.org/privacy/idtheft/
Coalition letter on ID Theft Legislation:
http://www.epic.org/privacy/choicepoint/datamarker11.09.05.html
[6] News in Brief
Lawmakers Propose .xxx Domain
Senators Max Baucus (D-MT) and Mark Pryor (D-AR) have proposed the CyberSafety for Kids Act, a bill that would require the creation
of a .xxxtop-level domain. The law would require websites in the business ofdistributing adult material to register and host all
adult material atthe .xxx domain, instead of using any of the current top-level domains(such as .com, .net, .biz or others). Those
who fail to use the .xxxdomain would be subject to civil penalties by the Department ofCommerce. The bill has not yet been introduced.
Text of the .xxx TLD Bill (pdf):
http://www.boingboing.net/images/CyberSafetyforKids.pdfSupreme Court Limits Warrantless Searches of Homes by PoliceThe Supreme Court ruled Wednesday in Georgia v. Randolph that police,who
do not have a warrant, may not search a home when one residentallows entry but another refuses it. Officers found evidence of illegaldrugs
in a home after a woman had given her consent to the officers buther husband had objected. In 1974, the Supreme Court ruled in UnitedStates
v. Matlock that one occupant may give police permission to searcha residence without a warrant if the other resident either is absent
ordoes not object.
Supreme Court Opinion in Georgia v. Randolph (pdf):
http://www.supremecourtus.gov/opinions/05pdf/04-1067.pdfFederal Court: Fliers Must Complete Search Process Once It's BegunLast week, the Ninth Circuit Court of Appeals ruled in United States
v.
Aukai that travelers who begin the security screening process atairports cannot change their minds. The court said passengers who
walkthrough airport metal detectors implicitly consent to a search, and theycan't revoke that consent even if they are chosen to
undergo a moreextensive "secondary screening" process. The court did not rule onwhether a passenger could refuse searches that are
more invasive thansimple pat-downs.
Ninth Circuit Opinion in United States v. Aukai (pdf):
http://www.epic.org/redirect/airport_screening_opinion.html
EPIC's Passenger Profiling page:
http://www.epic.org/privacy/airtravel/profiling.htmlWashington State Passes Pretexting Law
Washington State appears to be the first to pass legislation to protecttelephone records. The House and Senate have passed SB 6776,
but thebill still awaits the Governor's signature. SB 6776 prohibits theintentional sale of phone records without consent of the
account holder.
It also prohibits pretexting. Under the law, it is a "class c felony" tosell, pretext, or knowingly purchase phone records, while
it is a "grossmisdemeanor" to knowingly receive records. There are also civilremedies, including a $5,000 liquidated damages award
and attorneys'
fees. Government entities and telephone companies are exempt from thelaw.
EPIC Illegal Access to Phone Records Page:
http://www.epic.org/privacy/iei/
Washington State Senate Bill 6776:
http://apps.leg.wa.gov/billinfo/summary.aspx?bill=6776&year=2006RFID Chips Vulnerable to VirusesA study by European researchers has revealed that radio frequencyidentification (RFID) systems can
be affected by viruses encoded intoindividual chips. Melanie Rieback, Bruno Crispo, and Andrew Tanenbaumhave authored a paper describing
how the remotely readable tags can beprogrammed to infect the machines that read them and the databases thatstore their information.
Such malicious programs could then force thesystems to produce more infected tags, further spreading the virus.
Text of the RFID Virus Paper (pdf):
http://www.rfidvirus.org/papers/percom.06.pdf
Paper Authors' Page on RFID Viruses:
http://www.rfidvirus.org/
EPIC's RFID page:
http://www.epic.org/privacy/rfid/Deleted Gmails to be Turned Over in FTC CaseA federal magistrate judge has ordered that Google turn over all of theemail correspondence
of a Gmail user, including emails that he hasdeleted. The Federal Trade Commission, investigating a credit counselingscam, subpoenaed
the emails of Peter Baker, the owner of a companylinked to the case. The subpoena asked not only for the email in Baker'sGmail mailboxes,
but also for deleted emails that were retained onGoogle computers. Google's privacy policy says that copies of deletedemail may remain
on active servers for up to 60 days, or indefinitely onoffline backup servers.
Google's Gmail Privacy Policy:
http://gmail.google.com/mail/help/privacy.html
EPIC's Gmail page:
http://www.epic.org/privacy/gmail/faq.htmlHomeland Security Gets Another 'F' for Computer SecurityA report by the House Government Reform Committee found that manyfederal agencies
are failing to protect their computer and informationnetworks. The committee gave the Department of Homeland Security an 'F'
for a third straight year. The departments of Agriculture, Defense,Energy, State, Health and Human Services, Transportation, and VeteransAffairs
also received failing grades again this year. The annual reportbases the grades on information the agencies submit to the White HouseOffice
of Management and Budget, and the agencies' own internalassessments.
Report and Testimony from Various Agency Leaders:
http://www.epic.org/redirect/dhs_computer_security.html
[7] EPIC Bookstore: Mark S. Monmonier's "Spying with Maps"
Mark S. Monmonier. "Spying with Maps: Surveillance Technologies and theFuture of Privacy" (University of Chicago Press, 2002).
http://www.powells.com/partner/24075/biblio/7-0226534278-1
"Maps, as we know, help us find our way around. But they're also powerfultools for someone hoping to find you. Widely available in
electronic andpaper formats, maps offer revealing insights into our movements andactivities, even our likes and dislikes. In Spying
with Maps, the"mapmatician" Mark Monmonier looks at the increased use of geographicdata, satellite imagery, and location tracking
across a wide range offields such as military intelligence, law enforcement, market research,and traffic engineering. Could these
diverse forms of geographicmonitoring, he asks, lead to grave consequences for society? To assessthis very real threat, he explains
how geospatial technology works, whatit can reveal, who uses it, and to what effect.
Despite our apprehension about surveillance technology, Spying with Mapsis not a jeremiad, crammed with dire warnings about eyes in
the sky andinvasive tracking. Monmonier's approach encompasses both skepticism andthe acknowledgment that geospatial technology brings
with itunprecedented benefits to governments, institutions, and individuals,especially in an era of asymmetric warfare and bioterrorism.
Monmonierframes his explanations of what this new technology is and how it workswith the question of whether locational privacy is
a fundamental right.
Does the right to be left alone include not letting Big Brother (or alegion of Little Brothers) know where we are or where we've been?
Whatsacrifices must we make for homeland security and open government?"
EPIC Publications:
"Information Privacy Law: Cases and Materials, Second Edition" Daniel J.
Solove, Marc Rotenberg, and Paul Schwartz. (Aspen 2005). Price: $98.
http://www.epic.org/redirect/aspen_ipl_casebook.html
This clear, comprehensive introduction to the field of informationprivacy law allows instructors to enliven their teaching of fundamentalconcepts
by addressing both enduring and emerging controversies. TheSecond Edition addresses numerous rapidly developing areas of privacylaw,
including: identity theft, government data mining,and electronicsurveillance law, the Foreign Intelligence Surveillance Act,intelligence
sharing, RFID tags, GPS, sypware, web bugs, and more.
Information Privacy Law, Second Edition, builds a cohesive foundationfor an exciting course in this rapidly evolving area of law.
"Privacy & Human Rights 2004: An International Survey of Privacy Lawsand Developments" (EPIC 2004). Price: $50.
http://www.epic.org/bookstore/phr2004
This annual report by EPIC and Privacy International provides anoverview of key privacy topics and reviews the state of privacy in
over60 countries around the world. The report outlines legal protections,new challenges, and important issues and events relating
to privacy.
Privacy & Human Rights 2004 is the most comprehensive report on privacyand data protection ever published.
"FOIA 2004: Litigation Under the Federal Open Government Laws," HarryHammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004).
Price:
$40.
http://www.epic.org/bookstore/foia2004
This is the standard reference work covering all aspects of the Freedomof Information Act, the Privacy Act, the Government in the Sunshine Act,and the Federal Advisory Committee Act. The 22nd edition fully updatesthe manual
that lawyers, journalists and researchers have relied on formore than 25 years. For those who litigate open government cases (orneed
to learn how to litigate them), this is an essential referencemanual.
"The Public Voice WSIS Sourcebook: Perspectives on the World Summit onthe Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook
This resource promotes a dialogue on the issues, the outcomes, and theprocess of the World Summit on the Information Society (WSIS).
Thisreference guide provides the official UN documents, regional andissue-oriented perspectives, and recommendations and proposals
forfuture action, as well as a useful list of resources and contacts forindividuals and organizations that wish to become more involved
in theWSIS process.
"The Privacy Law Sourcebook 2004: United States Law, International Law,and Recent Developments," Marc Rotenberg, editor (EPIC 2005).
Price:
$40.
http://www.epic.org/bookstore/pls2004/
The Privacy Law Sourcebook, which has been called the "Physician's DeskReference" of the privacy world, is the leading resource for
students,attorneys, researchers, and journalists interested in pursuing privacylaw in the United States and around the world. It
includes the fulltexts of major privacy laws and directives such as the Fair CreditReporting Act, the Privacy Act, and the OECD Privacy
Guidelines, as wellas an up-to-date section on recent developments. New materials includethe APEC Privacy Framework, the Video Voyeurism
Prevention Act, and theCAN-SPAM Act.
"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0
A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens
free expression.
EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:
EPIC Bookstore http://www.epic.org/bookstore
"EPIC Bookshelf" at Powell's Bookshttp://www.powells.com/features/epic/epic.html
EPIC also publishes EPIC FOIA Notes, which provides brief summaries ofinteresting documents obtained from government agencies under
theFreedom of Information Act.
Subscribe to EPIC FOIA Notes at:
https://mailman.epic.org/cgi-bin/control/foia_notes
[8] Upcoming Conferences and Events
Beyond the Basics: Advanced Legal Topics in Open Source andCollaborative Development in the Global Marketplace. University ofWashington
School of Law. March 21, 2006. Seattle, Washington. For moreinformation:
http://www.law.washington.edu/lct/Events/FOSS/
Call for papers for the 34th Research Conference on Communication,Information, and Internet Policy. Telecommunications Policy ResearchConference.
Proposals should be based on current theoretical orempirical research relevant to communication and information policy, andmay be
from any disciplinary perspective. Deadline is March 31, 2006.
For more information:
http://www.tprc.org/TPRC06/call06.htm
Making PKI Easy to Use. National Institutes of Health. April 4-6, 2006.
Gaithersburg, Maryland. For more information:
http://middleware.internet2.edu/pki06/
First International Conference on Availability, Reliability andSecurity. Vienna University of Technology. April 20-22, 2006. Vienna,Austria.
For more information:
http://www.ifs.tuwien.ac.at/ares2006/
Third International Conference on Security in Pervasive Computing.
University of York. April 19-20, 2006. York, United Kingdom. For moreinformation:
http://www.cs.york.ac.uk/security/spc-2006.html
CHI 2006 Workshop on Privacy-Enhanced Personalization. UC IrvineInstitute for Software Research and the National Science Foundation.
April 22-23. Montreal, Quebec, Canada. For more information:
http://www.isr.uci.edu/pep06/
The First International Conference on Legal, Security and Privacy Issuesin IT (LSPI). CompLex. April 30-May 2, 2006. Hamburg, Germany.
For moreinformation:
http://www.kierkegaard.co.uk/
Computers, Freedom, and Privacy Conference (CFP 2006). Association forComputing Machinery May 2-5, 2006. Washington, DC. For more
information:
http://cfp2006.org/
Infosecurity New York. Reed Exhibitions. September 12-14, 2006. NewYork, New York. For more information:
http://www.infosecurityevent.com
34th Research Conference on Communication, Information, and InternetPolicy. Telecommunications Policy Research Conference. September29-October
1, 2006. Arlington, Virginia. For more information:
http://www.tprc.org/TPRC06/2006.htm
International Conference on Privacy, Security, and Trust (PST 2006).
University of Ontario Institute of Technology. October 20-November 1,
2006. Oshawa, Ontario, Canada. For more information:
http://www.businessandit.uoit.ca/pst2006/
BSR 2006 Annual Conference. Business for Social Responsibility. November7-10, 2006. New York, New York. For more information:
http://www.bsr.org/BSRConferences/index.cfm
Subscription Information
Subscribe/unsubscribe via web interface:
https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news
Back issues are available at:
http://www.epic.org/alert
The EPIC Alert displays best in a fixed-width font, such as Courier.
Privacy Policy
The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or
share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do
not enhance (link toother databases) our mailing list or require your actual name.
In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under "subscriptioninformation."
About EPIC
The Electronic Privacy Information Center is a public interest researchcenter in Washington, DC. It was established in 1994 to focus
publicattention on emerging privacy issues such as the Clipper Chip, theDigital Telephony proposal, national ID cards, medical record
privacy,and the collection and sale of personal information. EPIC publishes theEPIC Alert, pursues Freedom of Information Act litigation, and conductspolicy research. For more information, see http://www.epic.org or writeEPIC, 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202483 1140 (tel), +1 202 483 1248 (fax).
If you'd like to support the work of the Electronic Privacy InformationCenter, contributions are welcome and fully tax-deductible.
Checksshould be made out to "EPIC" and sent to 1718 Connecticut Ave., NW,Suite 200, Washington, DC 20009. Or you can contribute
online at:
http://www.epic.org/donate
Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for the rightof privacy and efforts to oppose government regulation
of encryption andexpanding wiretapping powers.
Thank you for your support.
.
WorldLII:
Copyright Policy
|
Disclaimers
|
Privacy Policy
|
Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2006/6.html