JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE Archives

CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE  October 2007

CYBER-SOCIETY-LIVE October 2007

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

[CSL]: EPIC Alert 14.20

From:

Joanne Roberts <[log in to unmask]>

Reply-To:

Interdisciplinary academic study of Cyber Society <[log in to unmask]>

Date:

Mon, 8 Oct 2007 08:01:59 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (724 lines)

From: [log in to unmask]
[mailto:[log in to unmask]] On Behalf Of EPIC News
Sent: 06 October 2007 19:20
To: [log in to unmask]
Subject: EPIC Alert 14.20



========================================================================
                             E P I C  A l e r t
========================================================================
Volume 14.20                                            October 6, 2007
------------------------------------------------------------------------

                              Published by the
                 Electronic Privacy Information Center (EPIC)
                              Washington, D.C.
               http://www.epic.org/alert/EPIC_Alert_14.20.html


========================================================================
Table of Contents
========================================================================
[1] EPIC to Senate: Impose Privacy Standards in Proposed Google Deal [2]
Release of Privacy and Human Rights Report [3] Challenge to Indiana
Voter ID Requirement Reaches Supreme Court [4] EPIC Spotlight: Secure
Flight Should Remain Grounded [5] Congress to Investigate Warrantless
Surveillance [6] News in Brief [7] EPIC Bookstore: "The Presidency,
Privacy, and Domestic Surveillance"
[8] Upcoming Conferences and Events
       - Subscription Information
       - Privacy Policy
       - About EPIC
       - Donate to EPIC

========================================================================
[1] EPIC to Senate: Impose Privacy Standards in Proposed Google Deal
========================================================================

In testimony before the Senate Judiciary Committee on September 27 about
the pending Google-DoubleClick merger, EPIC Executive Director Marc
Rotenberg said that the Federal Trade Commission should establish
privacy safeguards as a condition of the merger. EPIC filed a complaint
before the Commission in April regarding the merger, similar to other
complaints filed by EPIC in the DoubleClick-Abacus merger, the Microsoft
Passport matter, and Choicepoint. Since the filing of the EPIC
complaint, competition authorities around the world have opened
investigations.

At the hearing, entitled, "An Examination of the Google-DoubleClick
Merger and the Online Advertising Industry: What Are the Risks for
Competition and Privacy?," Senator Herb Kohl agreed that privacy is an
integral part of the antitrust review. "Some commentators believe that
antitrust policymakers should not be concerned with these fundamental
issues of privacy, and merely be content to limit their review to
traditional questions of effects on advertising rates. We disagree,"
Sen. Kohl said. "The antitrust laws were written more than a century ago
out of a concern with the effects of undue concentrations of economic
power for our society as a whole, and not just merely their effects on
consumers' pocketbooks. No one concerned with antitrust policy should
stand idly by if industry consolidation jeopardizes the vital privacy
interests of our citizens so essential to our democracy."

Google's David Drummond stated that the company has strong privacy
safeguards, and reiterated its call for global privacy standards based
on the APEC framework, which has been called weak. Google is under
investigation for possible violations of the current global privacy
standards, based on the consumer-protective OECD guidelines. Agencies in
the US, Canada, Australia and Europe are investigating Google's
policies.

Other participants at the hearing were Brad Smith of Microsoft, Scott
Cleland of Precursor, and Thomas Lenard of the Progress & Freedom
Foundation. Smith and Cleland both detailed significant antitrust
problems in the proposed merger. Smith said, "This merger will
undoubtedly result in higher profits for the operator of the dominant
advertising pipeline, but it will be bad for everyone else." He
continued, stating, "It will be bad for publishers, bad for advertisers
and, most importantly, bad for consumers."

On September 26, in a letter to the European Commissioner for
Competition, the Data Protection Commissioner of the German federal
state of Schleswig-Holstein urged the rejection of the proposed
Google-DoubleClick merger. "At present we have to assume that in the
event of a takeover of DoubleClick the databases of that company will be
integrated into those of Google, with the result that fundamental
provisions of the European Data Protection Directive will be violated,"
said Thilo Weichert. The European Commission Directorate on Competition
is currently investigating the proposed merger.

Testimony of EPIC before the Senate Judiciary Committee on Proposed
Google-DoubleClick Merger (Sept. 27, 2007) (PDF):

      http://www.epic.org/privacy/ftc/google/epic_test_092707.pdf

Letter from Thilo Weichert, Data Protection Commissioner of the German
federal state of Schleswig-Holstein, to the European Commissioner for
Competition (Sept. 26, 2007) (in German):

      http://www.epic.org/redirect/german1007.html

EPIC's Page on the Proposed Google-DoubleClick Merger (containing the
original FTC complaint and supplements):

      http://www.epic.org/privacy/ftc/google/

Senate Judiciary Committee, "An Examination of the Google-DoubleClick
Merger and the Online Advertising Industry: What Are the Risks for
Competition and Privacy?":

      http://judiciary.senate.gov/hearing.cfm?id=2955

APEC Privacy Framework:

      http://www.epic.org/redirect/apec_framework.html

Organization for Economic Cooperation and Development Privacy
Guidelines:

      http://www.epic.org/redirect/oecd_guidelines.html

========================================================================
[2] Release of Privacy and Human Rights Report
========================================================================

The Electronic Privacy Information Center (EPIC) and Privacy
International released the 9th "Privacy and Human Rights" report last
week at the International Conference of Data Protection and Privacy
Commissioners in Montreal. "Privacy and Human Rights: an international
survey of privacy laws and developments" provides an overview of key
privacy topics and reviews the state of privacy in over 75 countries
around the world. It singles out a number of global trends, such as
expansion of identification technologies, new data retention schemes,
and intensified international data transfers, among others.

According to EPIC's Executive Director, Marc Rotenberg, "the report
makes clear that what is needed today is the enforcement of privacy
rights as fundamental human rights and not ever-weaker policy frameworks
that allow governments and businesses to do whatever they wish with the
personal information of individuals."

The leading privacy resource for policymakers, experts, government
officials, and activists alike, "Privacy and Human Rights" is the most
comprehensive report on privacy and data protection ever published. By
publishing this report annually, EPIC and Privacy International seek to
make readers aware of recent developments and emerging issues. A few
examples of emerging issues include: the biometric identification of
individuals in Iraq, the proliferation of surveillance systems in China,
and global investigations into the proposed Google-DoubleClick merger.

"Privacy and Human Rights," which was written with the collaboration of
more than 300 privacy experts, and identifies continuing public
opposition to video surveillance, workplace monitoring and
privacy-infringing corporate practices. The current edition tracks the
adoption of new data protection and open government laws, and includes
new country reports for the Dominican Republic, Iraq, the United Arab
Emirates, Zimbabwe and the virtual world Second Life.

The Washington DC launch of "Privacy and Human Rights" will take place
on Friday, October 5, at the National Press Club. Speakers include EPIC
Chair Deborah Hurley, EPIC Executive Director Marc Rotenberg, UCLA Law
Professor Jerry Kang, and Sophie In't Veld, a member of the European
Parliament and a leading champion of privacy rights in the European
Union.

Privacy and Human Rights is available for sale at:

      http:/www.epic.org/phr06/

========================================================================
[3] Challenge to Indiana Voter ID Requirement Reaches Supreme Court
========================================================================

The Supreme Court has agreed to hear a challenge to the Indiana voter
identification requirement. The issue in this case is whether
voter-identification laws unfairly keep poor people and members of
minority groups from going to the polls. Experts have argued
successfully that voting practices that violate substantial privacy
interests (e.g. publication of the SSN in the state voting rolls) are an
impermissible burden on the right to vote.

An Indiana federal district judge and a panel of the United States Court
of Appeals for the Seventh Circuit upheld the state law which requires,
with certain exceptions, that someone wanting to vote in person in a
primary or general election present a government-issued photo
identification. Prior to the enactment of this law, voters were required
only to sign a book at the polling place, where a photocopy of the
voter's signature was kept on file.

Judge Posner, writing for the majority of the appeals panel,
acknowledged that the Indiana law favors one party, and said, "No doubt
most people who don't have photo ID are low on the economic ladder and
thus, if they do vote, are more likely to vote for Democratic than
Republican candidates." Despite this finding, the majority concluded
that the dilution of the right of legitimate voters to vote as a result
of voter fraud makes the law valid. The law was purportedly passed to
help stamp out voter fraud; however, no one in Indiana has even been
prosecuted for voter fraud. Further, the panel wrote that there was no
evidence to show that there are fewer cases of fraud than there are
eligible voters whom the new law will prevent from voting.

In dissent, Judge Evans wrote that "[t]he Indiana voter photo ID law is
a not-too-thinly-veiled attempt to discourage election-day turnout by
certain folks believed to skew Democratic." As a result, Judge Evans
concluded that the law "imposes an undue burden on a recognizable
segment of potential eligible voters and that it therefore violates
those voters' rights under the First and Fourteenth Amendments to the
Constitution."

National Committee for Voting Integrity:

      http://www.ncvi.org

EPIC's page on Voting Privacy:

      http://www.epic.org/privacy/voting/


========================================================================
[4] EPIC Spotlight: Secure Flight Should Remain Grounded
========================================================================

EPIC's Spotlight on Surveillance project is scrutinizing the Secure
Flight traveler prescreening program run by the Department of Homeland
Security's Transportation Security Administration. Spotlight details the
problems in the system; these issues are also discussed in recent
comments EPIC submitted to DHS about Secure Flight's proposed
rulemaking.

The Department of Homeland Security's Fiscal Year 2008 budget request is
an 8 percent increase over last year's request. Included in the $46.4
billion proposed budget for the agency is $38 million designated for
Secure Flight, on top of the $144 million that has been spent on the
program. Introduced in 2004, the Secure Flight has been roundly
criticized.

Secure Flight was intended to compare passenger information from
Passenger Name Records, which contain data given by passengers when they
book their flights, against watch lists maintained by the federal
government. However, Secure Flight morphed from a simple system of
comparing names on watchlists to a complex system where profiles are
created on passengers in order to assess the threat that they pose. TSA
sought to identify "suspicious indicators associated with travel
behavior" in passengers' itinerary PNR data.

The system was suspended in 2006, because it contained massive security
and privacy vulnerabilities. According to the Government Accountability
Office, "TSA may not have proper controls in place to protect sensitive
information." In addition to criticizing Secure Flight's lack of privacy
and security safeguards, GAO noted that the documents underlying the
program "contained contradictory and missing information."

In August, TSA detailed a revised Secure Flight program in which TSA
said Secure Flight would return to its original purpose and be used to
conduct watch-list matching. Although Secure Flight has been revamped,
it remains fundamentally flawed. The core of the program rests on
watchlists so full of errors that the Department of Justice's Inspector
General has suggested that there is "a deficiency in the integrity of
watchlist information."

In a review, the Inspector General was highly critical of the watch
lists and said the data collection and dissemination structure helped
cause "inaccurate and incomplete watchlist records." In fact, problems
at the Terrorist Screening Center, which controls the watch lists, meant
that "several known or suspected terrorists" were not on the lists,
although they should be. The Inspector General explained that this
oversight significantly affects travelers because "inaccurate,
incomplete, and obsolete watchlist information increases the chances of
innocent persons being stopped or detained during an encounter because
of being misidentified as a watchlist identity."

Accuracy and reliability problems need to be resolved before they are
used in yet another passenger profiling system to restrict the movement
of U.S. citizens. Full application of the Privacy Act requirements to
government record systems is the only way to ensure that data is
accurate and complete, which is especially important in the context of
watch lists and Secure Flight, where mistakes and misidentifications are
costly. Secure Flight should remain suspended until these problems are
resolved.

EPIC, Spotlight on Surveillance, "Secure Flight Should Remain Grounded
Until Security and Privacy Problems Are Resolved":

      http://www.epic.org/privacy/surveillance/spotlight/0807/

Department of Justice, Office of Inspector General "Follow-Up Audit of
the Terrorist Screening Center, Audit Report 07-41 (Redacted for Public
Release)" (Sept. 2007) (pdf):

      http://www.usdoj.gov/oig/reports/FBI/a0741/final.pdf

Department of Homeland Security, "Secure Flight Plan; Proposed Rule"
(Aug. 23, 2007):

      http://edocket.access.gpo.gov/2007/E7-15960.htm

EPIC's page on Secure Flight:

      http://www.epic.org/privacy/airtravel/secureflight.html

========================================================================
[5] Congress to Investigate Warrantless Surveillance
========================================================================

The US House Energy and Commerce committee announced that it would
investigate the current administration's domestic spying activities.
EPIC and other organizations have pressed the committee to investigate
the National Security Agency domestic spying program when it focused on
the Hewlett-Packard pretexting scandal. The committee is concerned
whether the spying program violated the Constitution and consumer
protection and privacy laws. The committee is also interested in the
position of the telephone companies and their exposure to liability for
participating in the wiretapping program in violation of the law.

The committee sent letters to AT&T, Verizon and QWEST questioning the
companies' participation in surveillance activities. It had been
reported earlier in the media that QWEST had refused participation the
program. The questions concern surveillance under the Foreign
Intelligence Surveillance Act and National Security Letter procedures;
the use of subscriber information outside of legal authorization; and
the installation of equipment to intercept communications without legal
authorization.

The committee also asked civil liberties and privacy groups, including
EPIC, about government databases. The committee is concerned about the
effect that increasing numbers of government databases have,
particularly when the security of those databases is breached. Further,
the committee asked about the likelihood that the government would use
information for purposes other than that for which it was collected.

In inquiring about National Security Letters, the Committee references
abuses of the PATRIOT Act National Security Letters powers. EPIC's
Freedom of Information Act requests as well as a March 2007 Inspector
General's report have shown evidence of FBI abuses of these powers, and
EPIC has urged Congress to repeal the PATRIOT Act expansion of the
National Security Letter authority.

Committee Opens Investigation on Warrantless Surveillance:

      http://energycommerce.house.gov/Press_110/110nr98.shtml

Joint Statement of EPIC and Other Groups To House Energy and Commerce
Committee (pdf):

      http://www.privacycoalition.org/coalition-ltr092806.pdf

EPIC Resources on Domestic Surveillance:

      http://epic.org/features/surveillance.html

========================================================================
[6] News in Brief
========================================================================

DHS Satellite Surveillance Program May Be Put On Hold

Democratic members of the Homeland Security Committee asked the House
Appropriations Subcommittee on Homeland Security to withhold funding for
domestic satellite surveillance programs. The National Applications
Office, a new DHS component, plans to share intelligence satellite
imagery inside the United States with non-intelligence state, local and
federal agencies. Democrats urged that funding be withheld until written
legal procedures for protecting privacy and civil liberties were
prepared.

EPIC's Resources on Domestic Surveillance:

      http://epic.org/features/surveillance.html


Congress Proposes Extension of Do Not Call Initiative

The Do Not Call Improvement Act aims to prevent numbers from being
removed from the Do Not Call list. Currently, numbers that are placed on
the list remain on the list for five years, and the first numbers are
set to expire in 2008. No notice is given that the enrollment has
expired. The proposed Act would allow numbers to remain permanently once
a consumer has enrolled. More than 100 million numbers are on the list.

Do Not Call Improvement Act (H.R. 3451):

      http://thomas.loc.gov/cgi-bin/bdquery/z?d110:h.r.03541:

EPIC's page on Telemarketing:

      http://www.epic.org/privacy/telemarketing/preemptiveattack.html


U.S. Sues Illinois over Law about Employment Eligibility System

On September 24, the federal government filed suit in a federal district
court seeking to block a new Illinois law, claiming it preempts federal
law. However, the state law does not place an outright ban on employer
use of the voluntary employment eligibility verification system called
E-Verify. Instead, the Illinois law prohibits employers from using the
system until the federal databases used can be certified as 99 percent
accurate. At a House Subcommittee on Social Security hearing on June 7,
EPIC urged the strengthening of privacy safeguards associated with
employment eligibility verification systems and said existing agency
database problems should be corrected before a nationwide expansion is
considered. Federal reviews have deemed the system "seriously flawed in
content and accuracy." For example, the Social Security Administration
database is estimated to include 18 million incorrect records.

U.S. v. Illinois, U.S. District Court for the Central District of
Illinois, Springfield Division (Sept. 24, 2007) (pdf):

      http://www.epic.org/privacy/ssn/usvill_gov_092407.pdf

Illinois's Right to Privacy in the Workplace Act (2007):

http://www.ilga.gov/legislation/publicacts/fulltext.asp?Name=095-0138

EPIC's Testimony on Employment Verification Systems before the House
Committee on Ways and Means (June 6, 2007) (pdf):

      http://www.epic.org/privacy/ssn/eevs_test_060707.pdf


Department of Homeland Security Tracks Travelers' Reading Habits

The Department of Homeland Security's files on travelers include data on
their race, religion, personal items they carry (including their books),
and with whom they stay or travel, according to documents disclosed to
the Identity Project pursuant to a Freedom of Information Act request.
These detailed files are created under the Automated Targeting System,
which creates secret, terrorist "risk assessments" on tens of millions
of U.S. citizens and foreign visitors and keeps the data for 15 years.
Last month, in comments to DHS, EPIC detailed significant security and
privacy problems in ATS, and urged the agency to either suspend the
system or to fully apply all Privacy Act safeguards to any individual
subject to ATS.

The Identity Project:

      http://www.papersplease.org/

EPIC's Page on the Automated Targeting System:

      http://www.epic.org/privacy/travel/ats/


Federal Agent Uses Government Database to Stalk Girlfriend

A federal agent accessed the Treasury Enforcement Communications System
(TECS) in order to stalk his former girlfriend. The agent has been
indicted on charges of making a false statement to a government agency
and unlawfully obtaining information from a protected computer. The TECS
system is designed to track individuals suspected of involvement in
violations of federal law. It links with the FBI's National Criminal
Information Center and state motor vehicle records. The Agent accessed
TECS 163 times between May of 2003 and March of 2004. He tracked the
whereabouts of his ex and her family.

EPIC's page on Domestic Violence and Privacy:

      http://www.epic.org/privacy/dv/


========================================================================
[7] EPIC Bookstore: "The Presidency, Privacy, and Domestic Surveillance"
========================================================================

"Takeover: The Return of the Imperial Presidency and the Subversion of
American Democracy" by Charlie Savage, (Little Brown & Co. 2007)

      http://www.powells.com/biblio/1-9780316118040-1

In 2002 Congress passed legislation that established the Department of
Homeland Security. Congress also provided the funding that made Homeland
Security the third largest agency in the federal Government. As a modest
check on the powers given to this new federal agency, Congress created a
privacy office and required that it publish regular reports about
privacy violations and compliance with federal privacy laws.

All of this would seem fairly straightforward, but for the fact that the
current occupants of the White House resent Congressional authority.  So
the President essentially rejected the reporting requirement, and the
agency that was putting cameras on city streets across America,
mandating national identity cards, and funding Orwellian "fusion
centers" ignored the privacy implications of its programs. One annual
report was delayed and later the President asserted in a signing
statement that he would construe the requirement for a privacy report,
"in a manner consistent with the President's constitutional authority to
supervise the unitary executive branch."

How did it get to the point that the President could choose which parts
of a law to follow and which parts of a law to ignore? That is the
question that Charlie Savage explores in this carefully argued and
thoroughly researched text on the reemergence of the imperial
presidency. Savage observes that Presidents of both parties have sought
expanded powers particularly during wartime. But President Bush's
campaign was backed by a small cadre of determined "presidentialists"
who used their knowledge of Washington and their high positions within
the administration to advance the goal of expanding Presidential powers.
Inherent powers of the President became exclusive powers of the
President. Signing statements that could provide interpretative material
for a court became definitive statements of the President's views of
constitutional authority. The "unitary executive" approached the powers
of a monarch, particularly during the six years that the President's
party controlled also the legislative and judicial branches of
government.

It may be tempting for the President's defenders to argue that much of
what the White House did was in direct response to 9-11, but Charlie
Savage's careful narrative destroys this myth. The aim to extend
Presidential powers long pre-dated the terrorist attacks. The use of
secrecy to reduce accountability was on the table with the Cheney energy
task force in the early days of the administration and continues with
current disputes about public access to information to evaluate the
effectives of the administration's education programs. And those who
remember Dick Cheney's contributions as chief of staff in the Ford
Administration know that he opposed open government laws almost thirty
years before he advised President Bush to limit public access to
information about government after 9-11. In other words, Cheney did not
respond to events of 9-11 with new rules on secrecy, but took the
occasion of 9-11 to establish long-sought secrecy rules.

What are consequences of the reemergence of the imperial presidency? The
answer may be found in the book's title. "American democracy," Savage
suggests, is based on an effective means of checks and balances, not
simply the ability to vote a leader out of office. Without this
Constitutional system of accountability, American democracy is
diminished.

- Marc Rotenberg

================================

EPIC Publications:

"Information Privacy Law: Cases and Materials, Second Edition" Daniel J.
Solove, Marc Rotenberg, and Paul Schwartz. (Aspen 2005). Price: $98.
http://www.epic.org/redirect/aspen_ipl_casebook.html

This clear, comprehensive introduction to the field of information
privacy law allows instructors to enliven their teaching of fundamental
concepts by addressing both enduring and emerging controversies. The
Second Edition addresses numerous rapidly developing areas of privacy
law, including: identity theft, government data mining and electronic
surveillance law, the Foreign Intelligence Surveillance Act,
intelligence sharing, RFID tags, GPS, spyware, web bugs, and more.
Information Privacy Law, Second Edition, builds a cohesive foundation
for an exciting course in this rapidly evolving area of law.

================================

"Privacy & Human Rights 2005: An International Survey of Privacy Laws
and Developments" (EPIC 2006). Price: $60.
http://www.epic.org/bookstore/phr2005/phr2005.html

This annual report by EPIC and Privacy International provides an
overview of key privacy topics and reviews the state of privacy in over
70 countries around the world. The report outlines legal protections,
new challenges, and important issues and events relating to privacy.
Privacy & Human Rights 2005 is the most comprehensive report on privacy
and data protection ever published.

================================

"FOIA 2004: Litigation Under the Federal Open Government Laws," Harry
Hammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004). Price:
$40. http://www.epic.org/bookstore/foia2004

This is the standard reference work covering all aspects of the Freedom
of Information Act, the Privacy Act, the Government in the Sunshine Act,
and the Federal Advisory Committee Act.  The 22nd edition fully updates
the manual that lawyers, journalists and researchers have relied on for
more than 25 years.  For those who litigate open government cases (or
need to learn how to litigate them), this is an essential reference
manual.

================================

"The Public Voice WSIS Sourcebook: Perspectives on the World Summit on
the Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook

This resource promotes a dialogue on the issues, the outcomes, and the
process of the World Summit on the Information Society (WSIS).  This
reference guide provides the official UN documents, regional and
issue-oriented perspectives, and recommendations and proposals for
future action, as well as a useful list of resources and contacts for
individuals and organizations that wish to become more involved in the
WSIS process.

================================

"The Privacy Law Sourcebook 2004: United States Law, International Law,
and Recent Developments," Marc Rotenberg, editor (EPIC 2005). Price:
$40. http://www.epic.org/bookstore/pls2004/

The Privacy Law Sourcebook, which has been called the "Physician's Desk
Reference" of the privacy world, is the leading resource for students,
attorneys, researchers, and journalists interested in pursuing privacy
law in the United States and around the world. It includes the full
texts of major privacy laws and directives such as the Fair Credit
Reporting Act, the Privacy Act, and the OECD Privacy Guidelines, as well
as an up-to-date section on recent developments. New materials include
the APEC Privacy Framework, the Video Voyeurism Prevention Act, and the
CAN-SPAM Act.

================================

"Filters and Freedom 2.0: Free Speech Perspectives on Internet Content
Controls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0

A collection of essays, studies, and critiques of Internet content
filtering.  These papers are instrumental in explaining why filtering
threatens free expression.

================================

EPIC publications and other books on privacy, open government, free
expression, crypto and governance can be ordered at:

EPIC Bookstore http://www.epic.org/bookstore

"EPIC Bookshelf" at Powell's Books
http://www.powells.com/features/epic/epic.html

================================

EPIC also publishes EPIC FOIA Notes, which provides brief summaries of
interesting documents obtained from government agencies under the
Freedom of Information Act.

Subscribe to EPIC FOIA Notes at:
https://mailman.epic.org/cgi-bin/control/foia_notes

========================================================================
[8] Upcoming Conferences and Events
========================================================================

University of Ottawa Faculty of Law: The Revealed "I". October 25-27,
2007. Ottawa, Canada. For more information:
http://www.idtrail.org/content/section/11/95/

ACI's 7th National Symposium on Privacy & Security of Consumer and
Employee Information.  January 23-24, 2008.  Philadelphia, PA.  For more
information: http://www.americanconference.com/privacy

Computer Professionals for Social Responsibility: Technology in Wartime
Conference. AJanuary 26, 2008. Stanford University. For more
information: http://cpsr.org/news/compiler/2007/Compiler200707#twc

Future of the Internet Economy - OECD Ministerial Meeting. June 17-18,
2008. Seoul, Korea. For more information:
http://www.oecd.org/document/19/0,2340,en_2649_37441_38051667
_1_1_1_37441,00.html

======================================================================
Subscription Information
======================================================================bu
t

Subscribe/unsubscribe via web interface:

      https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news

Back issues are available at:

      http://www.epic.org/alert

The EPIC Alert displays best in a fixed-width font, such as Courier.

========================================================================
Privacy Policy
========================================================================

The EPIC Alert mailing list is used only to mail the EPIC Alert and to
send notices about EPIC activities.  We do not sell, rent or share our
mailing list.  We also intend to challenge any subpoena or other legal
process seeking access to our mailing list.  We do not enhance (link to
other databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your e-mail address
from this list, please follow the above instructions under "subscription
information."

========================================================================
About EPIC
========================================================================

The Electronic Privacy Information Center is a public interest research
center in Washington, DC.  It was established in 1994 to focus public
attention on emerging privacy issues such as the Clipper Chip, the
Digital Telephony proposal, national ID cards, medical record privacy,
and the collection and sale of personal information. EPIC publishes the
EPIC Alert, pursues Freedom of Information Act litigation, and conducts
policy research.  For more information, see http://www.epic.org or write
EPIC, 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202
483 1140 (tel), +1 202 483 1248 (fax).

========================================================================
Donate to EPIC
========================================================================

If you'd like to support the work of the Electronic Privacy Information
Center, contributions are welcome and fully tax-deductible.  Checks
should be made out to "EPIC" and sent to 1718 Connecticut Ave., NW,
Suite 200, Washington, DC 20009.  Or you can contribute online at:

      http://www.epic.org/donate

Your contributions will help support Freedom of Information Act and
First Amendment litigation, strong and effective advocacy for the right
of privacy and efforts to oppose government regulation of encryption and
expanding wiretapping powers.

Thank you for your support.

------------------------- END EPIC Alert 14.20 -------------------------

.

************************************************************************************
Distributed through Cyber-Society-Live [CSL]: CSL is a moderated discussion
list made up of people who are interested in the interdisciplinary academic
study of Cyber Society in all its manifestations.To join the list please visit:
http://www.jiscmail.ac.uk/lists/cyber-society-live.html
*************************************************************************************

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
June 2022
May 2022
March 2022
February 2022
October 2021
July 2021
June 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager