=======================================================================
E
P I C A l e r t
=======================================================================
Volume 17.01
January 15, 2010
-----------------------------------------------------------------------
Published
by the
Electronic Privacy Information Center (EPIC)
Washington,
D.C.
http://www.epic.org/alert/epic_alert_1701.html
"Defend Privacy. Support EPIC."
http://epic.org/donate
=======================================================================
Table of Contents
=======================================================================
[1] Christmas Day Attack Prompts Renewed Debate about Body Scanners
[2] Documents Prove that Scanners Record, Store, and Transmit
Images
[3] FTC Tells FCC that it is Pursuing EPIC's Cloud Computing Complaint
[4] EPIC Files Supplemental Complaint Regarding Facebook
[5] Google to Stop Filtering Search Results in China
[6] News in Brief
[7] EPIC Bookstore: "Media Ownership and Concentration in
America"
[8] Upcoming Conferences and Events
TAKE ACTION: Stop Airport Strip Searches!
- JOIN Facebook Group "Stop Airport Strip
Searches" and INVITE Friends
- DISPLAY the IMAGE http://thepublicvoice.org/nakedmachine.jpg
- SUPPORT EPIC http://www.epic.org/donate/
=======================================================================
[1] Christmas Day Attack Prompts Renewed Debate about Body
Scanners
=======================================================================
On December 25, 2009, a Nigerian man named Umar
Farouk Abdulmutallab
concealed explosives in his underwear and attempted to detonate them on
a Northwest Airlines flight from Amsterdam
to Detroit. The attempt was
unsuccessful, thanks in part to the efforts of other passengers. The
public response to the incident
has reignited the debate over airport
security, especially body scanners.
In the days following the attack, some advocated for wider
implementation of whole body imaging machines. Privacy organizations
and others have continued to object to these devices, citing
the
invasive nature of the scans, the ineffectiveness of the machines, and
the lack of government transparency concerning privacy
safeguards.
In a series of responses to the American public, President Obama and
Homeland Security Secretary Janet Napolitano have
hesitated to put
forth body scanners as a wholesale solution to the problem. Instead
they have focused primarily on the "failure
to integrate and understand
the intelligence we already had," and recommended "smarter screening."
Obama noted that "There's no silver
bullet to securing the thousands of
flights into America each day."
The President pledged to investigate and address intelligence
failures
that allowed an Al Qaeda operative to board a plane with an explosive
device. President Obama stated "this was not a failure
to collect
intelligence, it was a failure to integrate and understand the
intelligence we already had." The President said that steps
would be
taken to improve watch lists.
Currently the Transportation Security Administration (TSA) operates
forty of the whole-body
imaging machines at nineteen domestic
airports as a secondary screening tool. In the wake of the attempted
attack, the agency has
ordered 150 more, and secured funding for
another 300, as part of a plan to begin implementing the machines as a
primary screening
tool, instead of reserving them for secondary
screening only, as had been the original policy. Britain, the
Netherlands, France,
and Italy have all announced their intention to
install the scanners at their own airports as well, although the
European Union's
justice commissioner-designate has urged the European
Parliament to look at less intrusive methods of screening.
Reactions around
the world are mixed. In widely reported remarks,
Viviane Reding, the Justice Minister for the 27-member European Union,
expressed
opposition to the US proposal to deploy body scanners.
Minister Reding told the European Parliament, "Our citizens are not
objects.
They are human beings." Ms. Reding also emphasized data
protection and the Charter of Fundamental Rights, which establishes new
rights
for EU citizens, including a right to information privacy.
Previous post-9/11 disputes between the US and the EU have involved the
transfer of Passenger Name Records and financial information.
EPIC: Whole Body Imaging
http://epic.org/privacy/airtravel/backscatter/
EPIC: Whole Body Imaging Documents Obtained by FOIA from TSA
http://epic.org/2010/01/update---epic-posts-tsa-docume.html
EPIC: Open Government
http://epic.org/privacy/litigation/
TSA: Imaging Technology
http://www.tsa.gov/approach/tech/imaging_technology.shtm
Privacy Coalition: Stop Whole Body Imaging
http://privacycoalition.org/stopwholebodyimaging/
=======================================================================
[2] Documents Prove that Scanners Record, Store, and Transmit
Images
=======================================================================
This week, EPIC obtained documents that prove that
whole body imaging
machines can record, store, and transmit images. This contradicts
repeated assurances made by the TSA on its
website and in the media.
These documents were obtained as part of a Freedom of Information
lawsuit against the Department of Homeland
Security. The lawsuit was
filed over a request that EPIC originally submitted to the Department
of Homeland Security in April 2009.
EPIC submitted the FOIA request after the TSA unilaterally decided to
replace metal detectors with body scanners, over the objections
of air
travel organizations, security experts, and members of the United
States Congress. In fact, more than 300 members of Congress
voted for
legislation to stop the deployment of body scanners as the primary
screening device.
The documents obtained by EPIC include
TSA Procurement Specifications,
TSA Operational Requirements, a TSA contract with L3, and two TSA
contracts with Rapiscan . The DHS
has withheld other documents that
EPIC is seeking.
The documents state that an unspecified number of Level Z users can
exercise
the full storage and data transfer capabilities of the
machines. These users can turn off image privacy filters, export raw
image
data, and access test mode. Test mode allows the user to transfer
raw image data in real time to a USB device. These documents also
reveal that there are numerous security threats inherent in the WBI
machines' design. The WBI machines are subject to outside security
threats because they employ Windows XP operating system and the
Ethernet network.
Contrary to TSA's claims about WBI machines, these
documents make clear
that the WBI machines are designed to allow for the production of
images with no privacy filters and to allow
for the storage and
transfer of those images. The capability to create unfiltered images
and to store and transmit those images was
expressly required by TSA in
its Operational Requirements and Procurement Specifications.
EPIC is continuing to pursue the unreleased
documents that are
responsive to its April 2009 request, as well as another related
request to the Department of Homeland Security.
The documents obtained by EPIC from the DHS concerning the actual
operation of the body scanners has been widely report in the
national
and the international meda, including CNN and The New York Time.
The Canadian Civil Liberties Association has also obtained
a copy of a
redacted report by the Canadian Air Transport Security Authority
regarding a pilot project that was done with WBI machines.
TSA, Procurement Specifications Document (September 23, 2008)
http://epic.org/open_gov/foia/TSA_Procurement_Specs.pdf
TSA, Operational Requirements Document (July 2006)
http://epic.org/open_gov/foia/TSA_Ops_Requirements.pdf
TSA, Contract with L3
http://epic.org/open_gov/foia/TSA_Millwave_Contract.pdf
TSA, Contract with Rapiscan (1)
http://epic.org/open_gov/foia/TSA_Rapiscan_Contract.pdf
TSA, Contract with Rapiscan (2)
http://epic.org/open_gov/foia/TSA_Rapiscan_Manufacturer.pdf
Canadian Air Transport Security Authority, report on WBI machines
http://ccla.org/?p=3039
=======================================================================
[3] FTC Tells FCC that it is Pursuing EPIC's Cloud Computing
Complaint
=======================================================================
In response to a Federal Communications Commission
(FCC) Notice of
Inquiry into how broadband relates to cloud computing and privacy, the
Federal Trade Commission (FTC) announced it
is investigating the
privacy implications of cloud computing for consumers. The FTC, which
shares jurisdiction with the FCC over
broadband issues, is now urging
the FCC to consider the privacy implications of cloud computing in
formulating the National Broadband
Plan, due to Congress next month.
The FTC's interest in cloud computing was prompted by an EPIC complaint
to the FTC in March 2009,
in which EPIC described numerous privacy and
security risk involving cloud-based applications. More specifically,
the complaint asked
the FTC to investigate Google's cloud computing
services and to determine the adequacy of the company's privacy and
security safeguards.
A subsequent letter from computer researchers and security experts
supported EPIC's findings. The letter, written to Google's CEO
Eric
Schmidt, asked the company to "honor the important privacy promises it
has made to its customers and protect users' communications
from theft
and snooping by enabling industry standard transport encryption
technology (HTTPS) for Google Mail, Docs, and Calendar."
The letter
was signed by 38 researchers and academics in the fields of computer
science, information security and privacy law.
In
a filing to the FCC, David Vladeck, head of FTC's consumer
protection bureau, recognized the cost-saving value of cloud computing
services. At the same time, Vladeck and the FTC believe such services
raise privacy and security concerns for consumers: "For example,
the
ability of cloud computing services to collect and centrally store
increasing amounts of consumer data, combined with the ease
with which
such centrally stored data may be shared with others, create a risk
that larger amounts of data may be used by entities
not originally
intended or understood by consumers."
FCC: National Broadband Plan
http://www.broadband.gov/
EPIC, Cloud Computing Complaint (March 17, 2009)
http://epic.org/privacy/cloudcomputing/google/ftc031709.pdf
EPIC, Letter to Google Regarding Cloud Computing (June 16, 2009)
http://files.cloudprivacy.net/google-letter-final.pdf
FTC, Filing for FCC Notice of Inquiry (December 9, 2009)
http://fjallfoss.fcc.gov/ecfs/document/view?id=7020352132
EPIC: Cloud Computing
http://epic.org/privacy/cloudcomputing/
=======================================================================
[4] EPIC Files Supplemental Complaint Regarding Facebook
=======================================================================
On January 14, 2010, EPIC filed a supplemental complaint
to the Federal
Trade Commission (FTC) discussing Facebook's recent privacy changes.
The supplemental complaint provides further evidence
of Facebook's
ongoing "unfair and deceptive trade practices" and relates to CEO Mark
Zuckerberg's public statements, the most recent
version of the Facebook
for iPhone application, Facebook Connect, and "web-suicide"
applications.
The supplemental filing comes
after Facebook made public statements
implying that the FTC approved the privacy changes. The original
complaint alleged that the
Facebook privacy "changes violate user
expectations, diminish user privacy, and contradict Facebook's own
representations." Subsequent
to the original FTC filing, Facebook
spokespersons made several public statements, asserting, "We discussed
the privacy program with
many regulators, including the FTC, prior to
launch."
EPIC filed a Freedom of Information Act (FOIA) request with the Federal
Trade Commission, seeking communications with Facebook discussing
the site's recent privacy changes.
Specifically, EPIC requested
documents pertaining to the communications Facebook allegedly had with
the federal agency.
Shortly
after EPIC filed the FOIA request, FTC Chairman Jon Leibowitz
denied Facebook's assertions that the federal agency approved
Facebook's
privacy changes. He stated, "We aren't generally in the
business of giving general advisory opinion in advance. I certainly
don't
think anyone would suggest that we would pre-clear their new
privacy policy. It may be good. It may be better or it may not be
better.
But we aren't the film industry; we don't greenlight like the
film industry does."
EPIC, Supplemental Complaint (January 14, 2010)
http://www.epic.org/privacy/inrefacebook/EPIC_Facebook_Supp.pdf
Facebook, statements regarding FTC complaint (January 14, 2010)
http://www.epic.org/redirect/011410fbstatements.html
EPIC, Facebook FOIA request (December 23, 2009)
http://epic.org/privacy/inrefacebook/FTC_Facebook_FOIA.pdf
Chairman Leibowitz's statement:
http://www.epic.org/redirect/011410leibowitzstmt.html
EPIC: In re Facebook:
http://epic.org/privacy/inrefacebook
=======================================================================
[5] Google to Stop Filtering Search Results in China
=======================================================================
Google has announced that it will no longer censor results on the
Chinese version of its search engine, Google.cn, after discovering
serious security breaches on its corporate cloud infrastructure
originating from China.
Chinese law requires Internet companies
to install Internet filters,
and up until now Google has complied. According to Human Rights Watch,
China has enacted several sets
of regulations aimed at controlling
Internet content, including access to content hosted outside of China,
since commercial Internet
accounts were first authorized in 1994. The
Chinese government continues to control journalists, and sanctions
individuals who "write
or post articles critical of the political system
or send news outside China."
Civil society groups have widely opposed mandated
filtering, censorship
of Internet content, surveillance of Internet users. In the Seoul and
the Madrid Declaration, advocates urged
governments and Internet firms
to uphold national and international human rights law that protects
privacy and freedom of expression.
Advocates warned that "the failure
to safeguard privacy jeopardizes associated freedoms, including freedom
of expression, freedom
of assembly, freedom of access to information."
The Declaration made clear objections to the "dramatic expansion of
secret and unaccountable
surveillance, as well as the growing
collaboration between governments and vendors of surveillance
technology that establish new
forms of social control," and warned
about "the growing consolidation of Internet-based services, and the
fact that some corporations
are acquiring vast amounts of personal data
without independent oversight."
In June 2009, EPIC has formally asked the Federal Trade
Commission to
open an investigation into Google's Cloud Computing Services to
determine "the adequacy of the privacy and security
safeguards." EPIC
cited the growing dependence of American consumers, businesses, and
federal agencies on cloud computing services,
and urged the Commission
to take "such measures as are necessary" to ensure the safety and
security of information submitted to Google.
The Madrid Declaration is a substantial document that reaffirms
international instruments for privacy protection, identifies new
challenges, and recommends specific actions. More than 250 individuals
and organizations have signed the Declaration. To sign on,
please send
an email to privacy@datos-personales.org.
Google, A new approach to China (January 12, 2010)
http://googleblog.blogspot.com/2010/01/new-approach-to-china.html
EPIC: Privacy and Human Rights Report: China
http://epic.org/phr06/
EPIC: Filters & Freedom 2.0
http://epic.org/bookstore/filters2.0/
EPIC: Faulty Filters
http://epic.org/reports/filter_report.html
Open Net Initiative: China Report
http://opennet.net/country/china
Human Rights Watch World Report 2005 & 2009: China Country Report
http://hrw.org/english/docs/2005/01/13/china9809.htm
http://www.hrw.org/en/node/79301
CSISAC, The Seoul Declaration (2008)
http://csisac.org/seoul.php
The Public Voice, The Madrid Declaration (2009)
http://thepublicvoice.org/madrid-declaration/
=======================================================================
[6] News in Brief
=======================================================================
Oral Arguments Begin in FB Beacon case
Oral arguments in Harris v. Blockbuster are scheduled to be heard on
March 1, 2010. The
case involves violations of the Video Privacy
Protection Act. The lawsuit was filed by Cathryn Harris and other
Facebook users after
Blockbuster made public their private video rental
information through Facebook Beacon. EPIC filed an amicus brief with
the Fifth
Circuit Court of Appeals urging the Court to enforce federal
privacy protections for Facebook users who rented videos from
Blockbuster.
EPIC: Harris v. Blockbuster
http://epic.org/amicus/blockbuster/default.html
Video Privacy Protection Act
http://epic.org/privacy/vppa/
EPIC’s amicus brief in Harris v. Blockbuster
http://epic.org/amicus/blockbuster/Blockbuster_amicus.pdf
EPIC: Facebook Privacy
http://epic.org/privacy/facebook/
Facebook CEO, Zuckerberg, says privacy is no longer a "social norm"
Last week Facebook CEO Marc Zuckerberg stated
in an interview that
privacy is no longer a "social norm" and that recent changes to
Facebook's privacy policy merely reflect that
change in social norms.
However, the response of Facebook users and critics to recent actions
by Facebook indicate that privacy is
a robust social norm. Facebook has
recently come under fire by EPIC and others for its Beacon advertising
platform, terms of service
changes, and privacy policy changes. That
inconsistency led the New York Times to argue that the "company's
justifications of the
claim that they are reflecting broader social
trends just aren't credible."
New York Times Story
http://www.epic.org/redirect/011410nytimestory.html
PC World Story
http://www.epic.org/redirect/011410pcworldstory.html
EPIC: Facebook Privacy
http://epic.org/privacy/facebook/
EPIC: In re Facebook
http://epic.org/privacy/inrefacebook/
EPIC: Frequently Asked Questions Regarding EPIC's Facebook Complaint
http://epic.org/privacy/socialnet/fbfaq.html
EPIC: Social Networking Privacy
http://epic.org/privacy/socialnet/
Obama Names Howard Schmidt Cybersecurity Czar
On December 22, 2009, President Obama announced Howard Schmidt as his
pick for
the position of Cybersecurity Coordinator. This is a new
position in the Obama administration and exists within the Executive
Office
of the President. According to the White House, the new
"cybersecurity czar" will be responsible for protecting America's
public
and private computer networks from attack. Schmidt has
previously served as special adviser for cyberspace security under
George
W. Bush from 2001 to 2003, and has also worked at Microsoft and
eBay in addition to serving in the Air Force and the FBI. He will
report to deputy national security adviser John O. Brennan.
White House, Introducing the New Cybersecurity Coordinator (December
22, 2009)
http://www.epic.org/redirect/011410whitehousecybersecur.html
EPIC: Critical Infrastructure Protection
http://epic.org/security/cip/
White House: Executive Office of the President
http://www.whitehouse.gov/administration/eop
President Obama Issues Order Regarding Classification Processes
President Obama has issued a new executive order
regarding Classified
National Security Information. President Obama's classified information
order establishes a National Declassification
Center to streamline the
declassification process and sets timetables for declassification. The
order states that "No information
may remain classified indefinitely."
The order also reverses an order by President George W. Bush that had
allowed the intelligence
community to block the release of a specific
document, even if an interagency panel decided the information wouldn't
harm national
security. The new order prohibits agencies from
classifying documents after the fact and also prohibits the withholding
of documents
that were created by one agency but are being held by
another, which should assist EPIC's pending Freedom of Information Act
request to the National Security Agency regarding NSPD 54, a classified
Directive that describes a NSA program to monitor American
computer
networks. EPIC's request was previously denied by the NSA because NSPD
54 "did not originate with" the NSA. For more information
see EPIC:
Open Government.
President Obama, Executive Order (December 29, 2009)
http://www.epic.org/redirect/011410execordertext.html
President Bush's Previous Order
http://www.fas.org/sgp/bush/eoamend.html
EPIC, FOIA Appeal for NSPD 54 (November 24, 2009)
http://www.epic.org/foia/FOIAapp112409.pdf
EPIC: Open Government
http://epic.org/privacy/litigation/
DHS Privacy Office Releases Data Mining Report
The Department of Homeland Security Privacy Office released its 2009
Data Mining
Report to Congress on January 4, 2010. The annual report,
which is required by statute as part of the Implementing
Recommendations
of the 9/11 Commission Act of 2007, contains the
office's report regarding all DHS activities that meet the law's
definition of "data
mining." The report identifies three such programs.
The first is the Customs and Border Protection's Automated Targeting
System,
which analyzes traveler, cargo and conveyance information and
compares it against law enforcement information. The second,
Immigration
and Customs Enforcement's Data Analysis and Research for
Trade Transparency , "analyzes trade and financial data to identify
statistically
anomalous transactions that may warrant investigation."
The third identified program is the Transportation Security
Administration's
Freight Assessment System, which analyzes freight
transportation data to identify cargo that might present a risk to
passenger aircraft.
The report concluded that for each project,
"necessary privacy protections have been implemented."
DHS: Data Mining Reports
http://www.dhs.gov/files/publications/editorial_0514.shtm#4
DHS: Privacy Office
http://www.dhs.gov/privacy
EPIC: DHS Privacy Office and Privacy
http://epic.org/privacy/dhs-cpo.html
Implementing Recommendations of the 9/11 Commission Act of 2007
http://www.epic.org/redirect/011410implementrecc.html
=======================================================================
[7] EPIC Bookstore: "Media Ownership and Concentration
in America"
=======================================================================
To purchase: http://www.epic.org/redirect/011410book.html
"When it comes to media concentration, views are strong, theories
abound, but numbers are scarce..." - Eli M. Noam
Eli Noam's new
book more than makes up for the previous dearth of
numbers regarding media concentration. Noam carefully investigates the
concentration
of media ownership in America by analyzing 100 key
industries to figure out whether or not fears about media mergers and
concentration
are really well founded. This book puts forth his
complex, objective, and detailed analysis on media ownership trends.
Noam begins
with an analysis of historical media trends. He breezes
through a brief and fascinating history of media in America and
concludes
that there has never truly been a "golden age" of American
media diversity. The research presented here and elsewhere in the book
suggest that there is a frequently repeated cycle of competitive entry,
instability, and consolidation in media. Through these cycles,
sources
of media expand and contract regularly.
Noam also addresses the ways in which technology changes the media
game. For example,
he confronts the oft-repeated idea the more voices
means more diversity of opinion. Noam argues that this is not
necessarily true
if one takes into consideration how loud some voices
are. Today's technology creates opportunities for a host of new voices,
but
they are relatively small, quiet voices, compared to big media
companies. A blog, for example, may present a unique viewpoint, but
may never be heard by more than its small group of readers.
Noam then charts the market concentration trends for 100 separate
information
industries, including cable TV, radio, local phone service,
internet service providers, daily newspapers, and TV set makers. He
analyzes
the trends in each industry carefully, with the help of
numerous charts and graphs.
In the end, Noam concludes that previous measurements
of both
concentration and diversity have proved insufficient, and he proposes a
new "Media Ownership Concentration and Diversity
Index", a complex
equation that takes into account not only the concentration
considerations of the Herfindahl-Hirschman Index, but
also the
diversity considerations of the Federal Communications' Voice Count
Index. Using this new index, as well as more traditional
measures, Noam
concludes that there is reason for both fear and optimism regarding
media concentration: media is, overall, becoming
more concentrated, but
in a way that is well within the cyclical nature of media concentration
over time.
--Ginger McCall
================================
EPIC Publications:
"Litigation Under the Federal Open Government Laws 2008," edited by
Harry A. Hammitt, Marc Rotenberg, John A.
Verdi, and Mark S. Zaid
(EPIC 2008). Price: $60.
http://epic.org/bookstore/foia2008/
Litigation Under the Federal Open Government Laws is the most
comprehensive, authoritative discussion of the federal open access
laws. This updated version includes new material regarding the
substantial FOIA amendments enacted on December 31, 2007. Many of
the
recent amendments are effective as of December 31, 2008. The standard
reference work includes in-depth analysis of litigation
under Freedom
of Information Act, Privacy Act, Federal Advisory Committee Act,
Government in the Sunshine Act. The fully updated 2008 volume is the
24th edition of
the manual that lawyers, journalists and researchers
have relied on for more than 25 years.
================================
"Information
Privacy Law: Cases and Materials, Second Edition" Daniel
J. Solove, Marc Rotenberg, and Paul Schwartz. (Aspen 2005). Price: $98.
http://www.epic.org/redirect/aspen_ipl_casebook.html
This clear, comprehensive introduction to the field of information
privacy law allows instructors to enliven their teaching of fundamental
concepts by addressing both enduring and emerging controversies. The
Second Edition addresses numerous rapidly developing areas of
privacy
law, including: identity theft, government data mining and electronic
surveillance law, the Foreign Intelligence Surveillance
Act,
intelligence sharing, RFID tags, GPS, spyware, web bugs, and more.
Information Privacy Law, Second Edition, builds a cohesive
foundation
for an exciting course in this rapidly evolving area of law.
================================
"Privacy & Human Rights
2006: An International Survey of Privacy Laws
and Developments" (EPIC 2007). Price: $75.
http://www.epic.org/phr06/
This annual report by EPIC and Privacy International provides an
overview of key privacy topics and reviews the state of privacy
in over
75 countries around the world. The report outlines legal protections,
new challenges, and important issues and events relating
to privacy.
Privacy & Human Rights 2006 is the most comprehensive report on privacy
and data protection ever published.
================================
"The Public Voice WSIS Sourcebook: Perspectives on the World Summit on
the Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook
This resource promotes a dialogue on the issues, the outcomes, and the
process of the World Summit on the Information Society (WSIS).
This
reference guide provides the official UN documents, regional and
issue-oriented perspectives, and recommendations and proposals
for
future action, as well as a useful list of resources and contacts for
individuals and organizations that wish to become more
involved in the
WSIS process.
================================
"The Privacy Law Sourcebook 2004: United States Law, International
Law,
and Recent Developments," Marc Rotenberg, editor (EPIC 2005). Price:
$40.
http://www.epic.org/bookstore/pls2004/
The Privacy Law Sourcebook, which has been called the "Physician's Desk
Reference" of the privacy world, is the leading resource
for students,
attorneys, researchers, and journalists interested in pursuing privacy
law in the United States and around the world.
It includes the full
texts of major privacy laws and directives such as the Fair Credit
Reporting Act, the Privacy Act, and the OECD
Privacy Guidelines, as
well as an up-to-date section on recent developments. New materials
include the APEC Privacy Framework, the
Video Voyeurism Prevention Act,
and the CAN-SPAM Act.
================================
"Filters and Freedom 2.0: Free Speech Perspectives
on Internet Content
Controls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0
A collection of essays, studies, and critiques of Internet content
filtering. These papers are instrumental in explaining why filtering
threatens free expression.
================================
EPIC publications and other books on privacy, open government, free
expression, crypto and governance can be ordered at:
EPIC Bookstore
http://www.epic.org/bookstore
================================
EPIC also publishes EPIC FOIA Notes, which provides brief summaries of
interesting documents
obtained from government agencies under the
Freedom of Information Act.
Subscribe to EPIC FOIA Notes at:
https:/mailman.epic.org/mailman/listinfo/foia_notes
=======================================================================
[8] Upcoming Conferences and Events
=======================================================================
"Critical Reflections
on the Growth of CCTV in the UK"
University of Toronto, Toronto, ON, January 20, 2010
For more information:
http://www.epic.org/redirect/011410ischool.html
"Annual Privacy Coalition meeting"
EPIC, Washington, DC,, January 21-23, 2010.
For more information: http://www.theprivacycoalition.org
"Reader Privacy: Should Library Standards Apply Online?"
University of North Carolina, Chapel Hill, January 22, 2010.
"Body Scanners
and Privacy"
EPIC Panel Discussion with Bruce Schneier, Security Expert, and Author,
and Anita Allen, Deputy Dean University of Penn.
Law School,
Washington, DC, January 25, 2010.
For more information:
http://epic.org/events/
"Privacy By Design: The Gold Standard"
Toronto Board of Trade, Toronto, ON, January 28, 2010.
For more information:
www.privacybydesign.ca
"Data Privacy Day"
Worldwide, January 28, 2010.
For more information:
http://www.thepublicvoice.org
"Computers, Privacy, and Data Protection: An Element of Choice,"
Brussels, Belgium, January 29-30, 2010.
For more information:
http://www.cpdpconferences.org/
"RSA 2010"
San Francisco, March 1-5, 2010.
For more information:
http://www.rsaconference.com/2010/usa/
"7th Conference on Privacy and Public Access to Court Records"
Williamsburg, VA, March 3-5, 2010.
For more information:
http://www.legaltechcenter.net/default.aspx
"Association for Practical and Professional Ethics"
Cincinnati,OH, March 5, 2010.
For more information:
http://www.indiana.edu/~appe/annualmeeting.html
"Privacy 2010"
Stanford, CA, March 23 - 25, 2010.
For more information:
http://codex.stanford.edu/privacy2010
=======================================================================
Join EPIC on Facebook
=======================================================================
Join the Electronic Privacy Information Center on Facebook
http//facebook.com/epicprivacy
http://epic.org/facebook
Start a discussion on privacy. Let us know your thoughts.
Stay up to date with EPIC's events.
Support EPIC.
=======================================================================
Privacy Policy
=======================================================================
The EPIC Alert mailing list is used only
to mail the EPIC Alert and to
send notices about EPIC activities. We do not sell, rent or share our
mailing list. We also intend
to challenge any subpoena or other legal
process seeking access to our mailing list. We do not enhance (link to
other databases)
our mailing list or require your actual name.
In the event you wish to subscribe or unsubscribe your e-mail address
from this list,
please follow the above instructions under "subscription
information."
=======================================================================
About EPIC
=======================================================================
The Electronic Privacy Information Center is
a public interest research
center in Washington, DC. It was established in 1994 to focus public
attention on emerging privacy issues
such as the Clipper Chip, the
Digital Telephony proposal, national ID cards, medical record privacy,
and the collection and sale
of personal information. EPIC publishes the
EPIC Alert, pursues Freedom of Information Act litigation, and conducts
policy research. For more information, see http://www.epic.org or write
EPIC, 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202
483 1140 (tel), +1 202 483 1248 (fax).
=======================================================================
Donate to EPIC
=======================================================================
If you'd like to support the work of the
Electronic Privacy Information
Center, contributions are welcome and fully tax-deductible. Checks
should be made out to "EPIC" and
sent to 1718 Connecticut Ave., NW,
Suite 200, Washington, DC 20009. Or you can contribute online at:
http://www.epic.org/donate
Your contributions will help support Freedom of Information Act and
First Amendment litigation, strong and effective advocacy for the right
of privacy and efforts to oppose government regulation
of encryption and
expanding wiretapping powers.
Thank you for your support.
=======================================================================
Subscription Information
=======================================================================
Subscribe/unsubscribe via web interface:
http://mailman.epic.org/mailman/listinfo/epic_news
Back issues are available at:
http://www.epic.org/alert
The EPIC Alert displays best in a fixed-width font, such as Courier.
------------------------- END EPIC Alert 17.01 ------------------------