WorldLII Home | Databases | WorldLII | Search | Feedback

EPIC Alert

You are here:  WorldLII >> Databases >> EPIC Alert >> 2003 >> [2003] EPICAlert 22

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

EPIC Alert 10.22 [2003] EPICAlert 22









EPIC ALERT


Volume 10.22 October 30, 2003


Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.

http://www.epic.org/alert/EPIC_Alert_10.22.html


Table of Contents



[1] Supreme Court to Review Nevada ID Law
[2] Senate Approves Weak Spam Legislation
[3] Maryland Legislators Question Voting Machine Report
[4] Worldwide NGO Coalition Urges ICANN To Safeguard Privacy
[5] EU Set to Implement Privacy Directive
[6] News in Brief
[7] EPIC Bookstore: How to Get Anything on Anybody
[8] Upcoming Conferences and Events


[1] Supreme Court to Review Nevada ID Law


The United States Supreme Court has agreed to consider a case that maydetermine whether an individual who has not been arrested may refuseto identify himself to a law enforcement officer. The case, Hiibel v.
Sixth Judicial District Court of Nevada, raises numerous privacyissues such as Fourth Amendment protections against unreasonablegovernment search and seizure, the right to anonymity, and lawenforcement accumulation and use of personal information. EPIC andothers plan to file "friend of the court" briefs in December.
Larry Hiibel challenged the constitutionality of a Nevada law thatallows a police officer to detain a person to determine his identitywhen there are circumstances reasonably indicating that person hascommitted, is committing, or is about to commit a crime. Hiibel wasarrested pursuant to this law when he refused eleven times to identifyhimself to an officer investigating a report of domestic violence,
explaining that he was willing to cooperate with the officer but haddone nothing wrong. Hiibel was subsequently charged with andconvicted of resisting a police officer.

On appeal, the Supreme Court of Nevada determined that the law doesnot violate Fourth Amendment protections against unreasonable searchand seizure because it "strikes a balance between constitutionalprotections of privacy and the need to protect police officers and thepublic." The court found that permitting officers to requireidentification allows them to more safely conduct investigations, andis not as invasive as a pat-down, which the law allows.
In a strongly worded dissenting opinion, three of the Nevada SupremeCourt's seven Justices criticized the majority for "reflexivelyreasoning that the public interest in police safety outweighs Hiibel'sinterest in refusing to identify himself," noting that no evidenceexists that an officer is safer for knowing a suspect's identity.
"What the majority fails to recognize," the dissenting opinioncontinued, "is that it is the observable conduct, not the identity, ofa person, upon which an officer must legally rely when investigatingcrimes and enforcing the law." The dissenting Justices also notedthat anonymity is included in the right to privacy, which in turn isprotected during pre-arrest frisks performed by officers.

The Supreme Court will hear oral arguments in the case early nextyear.

Nevada Revised Statute 171.123(3) is available at:

http://www.leg.state.nv.us/NRS/NRS-171.html

The Nevada Supreme Court opinion is available at:

http://www.epic.org/redirect/hiibel.html

For background information, see EPIC's Hiibel v. Nevada Page at:

http://www.epic.org/privacy/hiibel/default.html



[2] Senate Approves Weak Spam Legislation


On October 22 the Senate unanimously passed anti-spam legislation thatwould set a federal standard, preempting the laws of more than 35states that have attempted to reduce the number of unsolicitedcommercial e-mails. The legislation, S. 877, known as the Can-SpamAct of 2003, was enacted to attack the 13 billion e-mails that cloge-mail in-boxes across the globe each day. Yet, the preemptionprovision would do away with some stronger state privacy regulations,
such as the regulations that just were signed into law by Gov. GrayDavis in California.

The Act, sponsored by Sens. Conrad Burns (R-MT) and Ron Wyden (D-OR),
originally created only civil penalties for fraudulent, unsolicitedcommercial e-mails. However, Sens. Patrick Leahy (D-VT) and OrrinHatch (R-UT) added amendments creating criminal penalties for the actsof disguising a commercial sender's identity or a computer's location,
cracking a computer system to send bulk spam, and sending spam fromseveral falsified accounts.

In addition, Sen. Charles Schumer (D-NY) added an amendment that wouldgive the Federal Trade Commission (FTC) the authority to create a"do-not-spam" list similar to the "do-not-call" list implemented thisfall. However, serious technical and practical questions remainregarding whether the FTC has the resources to enforce a do-not-spamlist, especially as the agency currently does not pursue individualcomplaints.

On July 18, thirteen consumer protection and public interest groups,
led by EPIC, sent a letter to Congress urging enactment of certain keyprovisions to assure strong anti-spam protection. Those provisionsincluded an opt-in system for the receipt of bulk commercial e-mails,
private rights of action, international collaboration and nopreemption of stronger state laws. None of these provisions areincluded in the Can-Spam Act; in fact, just the opposite; the Act setsout an opt-out scheme, provides for no private right of action orinternational collaboration, and preempts all state law.
In addition, the Act appears to legalize non-fraudulent spam, andincludes a very broad exception for any business that has obtained arecipient's e-mail address in any way from the recipient. The broadexceptions will likely lead to more and more businesses requiring ane-mail address to access the company's site or for any transactionwith a recipient, allowing the business to then legally spam.

A survey of state spam laws is available at:

http://www.spamlaws.com/us.html

The text of the Can-Spam Act is available at:

http://thomas.loc.gov/cgi-bin/query/z?c108:S.877:

For background information, see EPIC's Spam Page at:

http://www.epic.org/privacy/junk_mail/spam/



[3] Maryland Legislators Question Voting Machine Report


Two Democratic legislators in Maryland have called for an independentaudit of the computerized voting machines the state recentlycontracted to purchase from Diebold Election Systems, Inc. In aletter to the director of the Maryland Department of LegislativeServices, Sen. Paula C. Hollinger (D-Baltimore County) and Del. SheilaEllis Hixson (D-Montgomery) expressed concern that a report issued inSeptember by Science Application International Corp. (SAIC) onsecurity weaknesses in the system was not reliable and requested anunbiased examination.

Computer scientists from Johns Hopkins and Rice Universities releaseda study in July that found serious security weaknesses in Diebold'sAccu-Vote TS voting system. In response, Maryland Governor Robert L.
Ehrlich (R) commissioned a report by SAIC of San Diego to investigatethe system's integrity. The SAIC study also found that Diebold'svoting machines had serious security vulnerabilities, but went on tostate that the authors of the Hopkins study "did not have a completeunderstanding of the State of Maryland's implementation of theAccuVote-TS voting system, and the election process controls orenvironment." The SAIC study followed with recommendations for how toremedy the machines security flaws. Based on this report and stepstaken by Diebold, Governor Ehrlich gave the state the go-ahead toinstall the system, which it has begun to do.

Sen. Hollinger and Del. Hixson, however, have raised questions as tothe impartiality of SAIC, a research company that has had a standingcontract with the state government since 2002 for informationtechnology consulting. Hollinger and Hixson have called on theDepartment of Legislative Services to look into the process used toselect SAIC and to ensure that "the SAIC analysis was objective,
balanced, impartial, and free of outside influence or otherconflicts." The legislators also expressed their displeasure withtheir lack of involvement in discussing and debating the votingmachines issues that have arisen.

The Johns Hopkins Report is available at:

http://avirubin.com/vote.pdf

The Science Application International Corp. report is available at:

http://www.dbm.maryland.gov/

Gov. Ehrlich's press release on the voting systems is available at:

http://www.gov.state.md.us/PressReleases/092303-votingmachine.asp



[4] Worldwide NGO Coalition Urges ICANN To Safeguard Privacy


More than 50 consumer and civil liberties organizations from 22countries around the world have urged Internet Corporation forAssigned Names and Numbers (ICANN) President Paul Twomey to limit theuse and scope of the WHOIS database to its original purpose (theresolution of technical network issues) and to establish strongprivacy protections based on internationally accepted privacystandards. ICANN recently met in Carthage, Tunisia, to discuss theprivacy issues surrounding the use of the WHOIS database.
ICANN is the non-profit corporation that is assuming responsibilityfrom the United States Government for coordinating certain Internettechnical functions, including the management of the Internet domainname system. WHOIS is a database that contains information for everyregistered Internet domain. It includes registrant's contactinformation (names, postal and e-mail addresses, and telephone numbersof technical, administrative and billing contacts); registrationstatus and expiration date; as well as technical information about thedomain name.

While ICANN has moved aggressively to establish accuracy requirementsfor domain name registrants, the signatories of the letter assertedthat it had failed to establish corresponding protections for personalinformation that is provided. ICANN's role is to ensure that thepolicies developed for the WHOIS database respect the privacy of everyindividual who registers Internet domains. This includes implementingreduced access, purpose specification, minimal data collection andlegitimate secondary use requirements, compatible with internationalprivacy standards. The publication of individuals' registrationinformation on the Internet through the WHOIS database cannot bemandatory, and the disclosure of WHOIS information to a lawenforcement official, or in the context of civil litigation, must bepursuant to explicit legal authority set out in statute.

The use and management of the WHOIS database without adequate dataprotection safeguards raises serious risks for domain name holders,
not only to their right to privacy, but also to their freedom ofexpression. Many users, particularly in the non-commercial world,
have valid reasons to conceal their identities while registeringdomain names. Political, cultural, and religious groups, as well asmedia organizations, non-profits and public interest groups around theworld rely on anonymous access to the Internet to publish theirmessages. Anonymity is critical for them to avoid persecution.

The main purpose of the WHOIS database should be to resolve technicalnetwork issues, the most important being the problem of unsolicitedcommercial e-mails, or "spam," the letter states. A sensible WHOISpolicy would improve contact-ability and data accuracy for networkadministrators. It would not make personal information widelyaccessible to third parties, particularly spammers, stalkers, and lawenforcement agents without proper legal authority. Such a policywould not hamper lawful criminal investigations but would insteadestablish necessary privacy safeguards, while reducing the risk thatthe widespread availability of WHOIS information will lead to greaterfraud, more spam, and jeopardize freedom of expression.

The letter to ICANN with the list of signatories is available at:

http://www.thepublicvoice.org/whoisletter.html

http://www.thepublicvoice.org/whoisfrench.html (French version)

http://www.thepublicvoice.org/whoisspanish.html (Spanish version)

Information on the ICANN meeting in Carthage is available at:

http://www.icann.org/carthage/

For background information, see EPIC's WHOIS page at:

http://www.epic.org/privacy/whois/



[5] EU Set to Implement Privacy Directive


The Directive on Privacy and Electronic Communications (2002/58/EC),
that entered into force in July 2002, must be transposed in EuropeanUnion (EU) Member States by October 31, 2003. It provides, as ageneral rule, for the confidentiality of communications and relatedtraffic data, and prohibits, in particular, any unauthorizedlistening, tapping, storage or other type of interception orsurveillance of electronic communications by persons other than users,
without users' consent. The Directive prohibits, for example,
unsolicited commercial e-mail ("spam") without the recipient's consent(opt-in), and protects mobile phone users from precise locationtracking and surveillance. It also provides that EU Member Statesmay, for reasons of national security, defense, public security andthe prevention, investigation and prosecution of criminal offences,
enact legislation providing for the retention of traffic and locationdata by telecommunications operators.

So far Austria, Belgium, Denmark, and Italy have implemented theopt-in regime for unsolicited commercial e-mail, while eight EUcountries have adopted laws providing for the retention of trafficdata for periods ranging from three months to a year. A Council ofthe EU Framework Decision is currently being drafted that would compelevery Member State to implement EU-wide uniform data retention rulesfor periods ranging from 12 to 24 months.

The road to the implementation of Directive 2002/58 in the area ofdata retention is bumpy, as several privacy experts and EUinstitutions have criticized the concept that traffic data of allusers of electronic communications should be retained for longperiods. In January 2003, the Data Protection Working Party - Article29 recommended that electronic communications traffic data, collectedin connection with services that have been paid for, be kept for amaximum of three to six months in order to comply with EU dataprotection rules. At the International Conference of PrivacyCommissioners in Cardiff in September 2002, the European DataProtection Commissioners declared that keeping "all kinds of trafficdata for a period of one year or more would be clearlydisproportionate and therefore unacceptable in any case." A recentlegal opinion by Privacy International and the international law firmof Covington & Burling, that reviews the compatibility of dataretention provisions in Europe with the existing legal framework,
concludes that "the data retention regime envisaged by the [EU]
Framework Decision, and now appearing in various forms at the MemberState level, is unlawful" with regard to Article 8 of the EuropeanConvention on Human Rights and the case law of the European Court ofHuman Rights.

Directives are a form of EU regulation that are binding for MemberStates, but only as to the result to be achieved. They leave thenational authorities choose the form and methods of theirimplementation. The rules of law applicable in each Member State arethe national laws implementing the directives and not the directiveitself. However, the directive has a "direct effect" on individuals:
it grants them rights that can be upheld by national courts in theirrespective countries if their governments have not implemented thedirective by the set deadline.

The text of Directive 2002/58/EC is available at:

http://register.consilium.eu.int/pdf/en/02/st03/03636en2.pdf

For background information, see EPIC's International Data Retentionpage at:

http://www.epic.org/privacy/intl/data_retention.html



[6] News in Brief


SENATE ACTION ON CREDIT PRIVACY IMMINENT
The Senate will consider legislation to amend the federal Fair CreditReporting Act early next week that, if passed, will invalidate stateprivacy and identity theft laws. The legislation, S. 1753, willpermanently preempt state financial privacy laws, and bar states frompassing legislation to restrict affiliate information sharing.
Affiliate sharing represents a major threat to individuals' privacy,
as it allows banks to exchange Social Security Numbers, balances,
payment, purchase, and other information to an unlimited degree.
Large banks have sought broad affiliate sharing relationships, arguingthat it lowers costs to consumers. But a 2003 report by the FederalReserve indicates that fees at large banks are up, and the number ofservices offered are shrinking. Furthermore, provisions in thelegislation have been engineered to reduce states' ability to passidentity theft laws.

Sens. Boxer (D-CA) and Feinstein (D-CA) are supporting an amendment tothe legislation that would create an opt-out right for affiliatesharing that closely resembles consumer protections in California'sSenate Bill 1 passed earlier this year (See EPIC Alert 10.17). Abroad coalition of groups, including Consumers Union, AARP, and U.S.
PIRG, are urging individuals to contact the Senate in support of theBoxer/Feinstein Amendment.

The text of S. 1753, National Consumer Credit Reporting SystemImprovement Act of 2003, is available at:

http://thomas.loc.gov/cgi-bin/bdquery/z?d108:s.01753:

The Federal Reserve Annual Report on Retail Fees and Services ofDepository Institutions is available at:

http://www.federalreserve.gov/boarddocs/rptcongress/2003fees.pdf

The Boxer/Feinstein Amendment page is at:

http://feinstein.senate.gov/03Releases/r-affiliateamendment.htm

Consumers Union's FCRA Action Page is at:

http://www.epic.org/redirect/consumersunion.html

US PIRG's FCRA Action Page is at:

http://uspirg.org/uspirg.asp?id=6&id3=USPIRG&id4=ES&

For background information, see EPIC's FCRA page at:

http://www.epic.org/privacy/fcra/

MIT RETREATS FROM RFID; U.S. GOVERNMENT EMBRACES TECHNOLOGY
As radio frequency identification (RFID) technology is being appliedin more and more ways, the U.S. and local governments are coming upwith their own applications and MIT is getting out of the businessaltogether. The U.S. government announced plans to employ RFID tagsin supplies for the nation's defense by 2005. The Department ofDefense presented plans earlier this month to attach RFID tags to allmilitary supplies -- from tanks and weapons to crates of food -- inorder to keep better tabs on the items. On a local level, the SanFrancisco Public Library wants to keep better watch over the city'slibrary books. The plan, also predicted to be functional by 2005,
would tag the library's 2 million books, CDs and other materials thatare accessible to patrons. Library officials assure that the tagswould be deactivated before a patron left with the books, but concernsstill linger over the retention and accessibility of the informationgenerated by the tags. Finally, MIT announced that RFID technologyhas gone beyond the university's mission. The technology, now beyondthe research stage and into the deployment stage, has been handed offto the global research company EPCglobal to oversee internationalstandards. The transfer rids MIT of not only the technology for atime, but also the barrage of public relations attacks from thoseopposed to the privacy implications.

For background information, see EPIC's RFID page at:

http://www.epic.org/privacy/rfid/

U.S. POST OFFICE PROPOSES SENDER ID
On October 21, the United States Postal Service proposed newrequirements for sender identification for users of "discount" mailrates. Under the system, discount mail senders would have to identifythemselves in order to "facilitate investigations into the origin ofsuspicious mail." The notice cited a report issued by the President'sCommission on the United States Postal Service that recommended asystem of "intelligent mail" for the country, one in which all senderswould be required to identify themselves on the mail piece. ThePostal Service explained that "requiring sender-identification fordiscount rate mail is an initial step on the road to intelligentmail."

On October 28, the Postal Service announced that it would withdraw thenotice requiring sender identification and reissue it, claiming thatthe notice, "has caused misunderstanding in some quarters."
Information on Sender-Identified Mail: Enhanced Requirement for
Discount Rate Mailings is available at:

http://www.epic.org/redirect/senderid.html

The Postal Notice Announcing Withdrawal, Reissuance of Sender IDRequirements is available at:

http://www.epic.org/redirect/postalnotice.html

SENATORS CALL FOR JETBLUE INVESTIGATION
On October 17, three ranking members of the U.S. Senate sent a letterto Secretary of Defense Donald Rumsfeld questioning the legality of agovernment contractor's transaction with JetBlue Airways.
Governmental Affairs Committee Chairman Susan Collins (R-ME) andranking Democrat Joseph Lieberman (D-CT) as well as Armed ServicesCommittee ranking member Carl Levin (D-MI) urged Rumsfeld to explainwhy a government contractor, Torch Concepts, collected more than fivemillion passenger names, addresses, phone numbers and travelitineraries from JetBlue. The Senators asked Rumsfeld whether he hadrequested an investigation of possible violation of federal privacyprotection laws by both Torch Concepts and the Department of Defense.
They believe that the database established by Torch Concepts may becovered under the Privacy Act of 1974, in which case the DOD and TorchConcepts could be in violation for failure to publish notice of thecollection and for sharing the data between agencies.

The text of the Senators' letter to Secretary Rumsfeld is available at:

http://lieberman.senate.gov/newsroom/release.cfm?id=213653

For background information on the data transfer, see EPIC's PassengerProfiling page at:

http://www.epic.org/privacy/airtravel/profiling.html



[7] EPIC Bookstore: How to Get Anything on Anybody


Lee Lapin, How to Get Anything on Anybody Book 3. IntelligenceHere, 2003.

http://intelligencehere.com/

EPIC recently received a free copy of Lee Lapin's third installment of"How to Get Anything on Anybody," which is the "Bible" of privacyinvasion. The promotional materials accompanying the book poke fun atfederal investigators, pointing out that for all of their recentintelligence failures, they did find Patty Hearst. Lapin's newpublication promises to put readers "ahead of most federalintelligence agencies when it comes to cutting edge electronicsurveillance, people tracking, asset discovery and dossierassimilation."

Although the book is a step-by-step guide to committing, in somecases, illegal activity, it provides valuable insights oninvestigatory measures and on protecting privacy. Some of theinvestigatory advice is on simple social engineering, and surveillancetechniques that are known to individuals with basic knowledge ofelectronics. However, some of Lapin's tricks are brilliant,
especially in regard to avoiding privacy violations. It, forinstance, points out that in order to avoid pretexting, one shouldnever give personal information over the phone -- even confirmingone's name can provide a hook for a smart investigator to pretext. Herecommends that if a bank or other company calls, the individualshould call the business back, thereby reducing impostors' chances oftricking you into providing personal information.

Chapters in Lapin's book on "How to Hide a Message" are followed bychapters on "How to Detect Hidden Messages." The book also contains alist of 30 sources for individuals' Social Security Numbers, furtherpointing out that uncontrolled collection of the identifier raisesserious privacy risks. The book contains a list of 104 rules to liveunder the surveillance radar, which include the obvious, such as"don't sue anyone," to the more obscure, including avoiding the use oftoll-free numbers, as embedded systems transmit your name and addressto the company when you dial them.

--
Chris Jay Hoofnagle


EPIC Publications:

"The Privacy Law Sourcebook 2002: United States Law, InternationalLaw, and Recent Developments," Marc Rotenberg, editor (EPIC 2002).
Price: $40. http://www.epic.org/bookstore/pls2002/

The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists who needan up-to-date collection of U.S. and International privacy law, aswell as a comprehensive listing of privacy resources.



"FOIA 2002: Litigation Under the Federal Open Government Laws," HarryHammitt, David Sobel and Mark Zaid, editors (EPIC 2002). Price: $40.
http://www.epic.org/bookstore/foia2002/

This is the standard reference work covering all aspects of theFreedom of Information Act, the Privacy Act, the Government in theSunshine Act, and the Federal Advisory Committee Act. The 21stedition fully updates the manual that lawyers, journalists andresearchers have relied on for more than 25 years. For those wholitigate open government cases (or need to learn how to litigatethem), this is an essential reference manual.



"Privacy & Human Rights 2003: An International Survey of Privacy Lawsand Developments" (EPIC 2002). Price: $35.
http://www.epic.org/bookstore/phr2003/

This survey, by EPIC and Privacy International, reviews the state ofprivacy in over fifty-five countries around the world. The surveyexamines a wide range of privacy issues including data protection,
passenger profiling, genetic databases, video surveillance, ID systemsand freedom of information laws.



"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0/

A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens free expression.



"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price: $40.
http://www.epic.org/cls/

The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumersand the basic responsibilities for businesses in the online economy.



"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC 2000). Price:
$20. http://www.epic.org/bookstore/crypto00&/

EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption to law enforcement.



EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:

EPIC Bookstore http://www.epic.org/bookstore/

"EPIC Bookshelf" at Powell's Books http://www.powells.com/features/epic/epic.html



[8] Upcoming Conferences and Events


IAPP Privacy and Data Security Academy and Expo. October 29-31, 2003.
Chicago, IL. For more information: http://www.privacyassociation.org

Business for Social Responsibility Annual Conference - Building andSustaining Solutions. November 11-14. Los Angeles, CA. For moreinformation: http://www.bsr.org

RFID Privacy Workshop. Massachusetts Institute of Technology.
November 15, 2003. Boston, Massachusetts. For more information:
http://www.rfidprivacy.org

Trespassing in Cyberspace. Justice Talking - National Public Radio.
November 18, 2003. Philadelphia, PA. For more information:
http://www.justicetalking.org.

American Society of Access Professionals Workshop. November 18-19,
2003. St. Louis, Missouri. For more information:
http://www.acesspro.org

Media Freedoms and the Arab World. The Arab Archives Institute.
December 6-8, 2003. Amman, Jordan. For more information: emailaainstituteyahoo.com or seehttp://www.ijnet.org/FE_Article/newsarticle.asp?UILang=1&CId=115794&
CIdLang=1
.

WHOLES - A Multiple View of Individual Privacy in a Networked World.
Swedish Institute of Computer Science. January 30-31, 2004. Stockholm,
Sweden. For more information: http://www.sics.se/privacy/wholes2004.

O'Reilly Emerging Technology Conference. February 9-12, 2004. SanDiego, CA. For more information: http://conferences.oreilly.com/etech.

Securing Privacy in the Internet Age. Stanford Law School. March13-14, 2004. Palo Alto, CA. For more information:
http://cyberlaw.stanford.edu/privacysymposium/.

International Conference on Data Privacy and Security in a GlobalSociety. Wessex Institute. May 11-14, 2004. Skiathos, Greece. Formore information:
http://www.wessex.ac.uk/conferences/2004/datasecurity04/index.html.

O'Reilly Open Source Convention. July 26-30, 2004. Portland, OR. Formore information: http://conferences.oreilly.com/oscon.


Subscription Information


Subscribe/unsubscribe via Web interface:

http://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news

Subscribe/unsubscribe via e-mail:

To: epic_news-requestmailman.epic.org
Subject: "subscribe" or "unsubscribe" (no quotes)

Automated help with subscribing/unsubscribing:

To: epic_news-requestmailman.epic.org
Subject: "help" (no quotes)

Problems or questions? e-mail <infoepic.org

Back issues are available at: http://www.epic.org/alert/

The EPIC Alert displays best in a fixed-width font, such as Courier.


Privacy Policy


The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do not enhance (linkto other databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under"subscription information". Please contact infoepic.org if you wouldlike to change your subscription e-mail address, if you areexperiencing subscription/unsubscription problems, or if you have anyother questions.


About EPIC


The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Actlitigation, and conducts policy research. For more information,
e-mail infoepic.org, http://www.epic.org or write EPIC, 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202 483 1140(tel), +1 202 483 1248 (fax).

If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible. Checks should be made out to "EPIC" and sent to 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009. Or you cancontribute online at:

http://www.epic.org/donate/

Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation ofencryption and expanding wiretapping powers.

Thank you for your support.

END EPIC Alert 10.22

.


WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2003/22.html