WorldLII Home | Databases | WorldLII | Search | Feedback

EPIC Alert

You are here:  WorldLII >> Databases >> EPIC Alert >> 2003 >> [2003] EPICAlert 7

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

EPIC Alert 10.07 [2003] EPICAlert 7








EPIC ALERT


Volume 10.07 April 9, 2003


Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.

http://www.epic.org/alert/EPIC_Alert_10.07.html


Table of Contents



[1] National Coalition Urges Accuracy for FBI Database
[2] Documents Show Errors in TSA's "No-Fly" Watchlist
[3] ICANN Fails to Establish Adequate WHOIS Privacy Standards
[4] EPIC Opposes Preemption of State Privacy Enforcement
[5] News in Brief
[6] EPIC Bill-Track: New Bills in Congress
[7] EPIC Bookstore: "Your Body as Password"

[8] Upcoming Conferences and Events


[1] National Coalition Urges Accuracy for FBI Database


Thousands of individuals and a broad coalition of organizations acrossthe country are calling on the FBI to restore the accuracy requirementsfor the agency's National Crime Information Center (NCIC), the nation'slargest criminal justice database. On March 24, the Justice Departmentannounced that it would no longer comply with the obligation under the1974 Privacy Act to ensure the accuracy, completeness and timeliness ofthe 39 million criminal records maintained in the NCIC system.

Over 80,000 law enforcement agencies routinely access the NCIC, whichincludes data on wanted persons, missing persons, gang members andindividuals with arrest records, as well as records about stolen cars,
boats, and other information. Incorrect information in the databasehas subjected individuals to false arrests, and identity theft victimshave reported difficulty correcting erroneous information in thedatabase. The Supreme Court also has expressed concern about lawenforcement's reliance on inaccurate records in the NCIC.

Recognizing that exempting the NCIC from data quality obligations mayincrease risks for both individuals and law enforcement, over eighty-
five organizations have endorsed a letter to Office of Management andBudget (OMB) Director Mitchell Daniels urging him to exercise theagency's oversight authority and require that the FBI restore theaccuracy requirements.

Additionally, over 3,000 individuals from 47 states and the Districtof Columbia have signed an online petition demanding that the FBIrestore the accuracy requirements. While the coalition letter has beendelivered, the petition drive will continue until the OMB acts on therequest.

Individuals may sign the petition at:

http://www.petitiononline.com/ncic/petition.html

EPIC National Crime Information Center Page:

http://www.epic.org/actions/ncic/

The FBI National Crime Information Center (NCIC) 2000:

http://www.fbi.gov/hq/cjisd/ncic.htm



[2] Documents Show Errors in TSA's "No-Fly" Watchlist


EPIC recently obtained agency documents through the Freedom ofInformation Act (FOIA) that raise important questions about how theTransportation Security Administration (TSA) operates its "No-Fly"
watchlist. The documents preview several potential problems with dueprocess that may result from the proposed passenger profiling system,
CAPPS-II (the Enhanced Computer Assisted Passenger Pre-screeningSystem), including numerous complaints from passengers who have no ideawhy their names are on a list, or how to be removed. A few heavilyredacted agency memos concerning the operation of the watchlist werealso released in part.

The documents show that the TSA administers two lists: a "no-fly" listand a "selectee" list, which requires passengers to go throughadditional security measures. Names are provided to air carriersthrough Security Directives or Emergency Amendments, and are stored intheir computer systems so that an individual whose name matches a nameon the list can be flagged when getting a boarding pass. A "no-fly"
match requires the agent to call a law enforcement officer to detainand question the passenger. A "selectee" match causes an "S" orspecial mark to be printed on the boarding pass, and the personreceives additional screening at security. The TSA has withheld thenumber of names on each of the lists.

The watchlist was created in 1990, and contained names of individualswho had been "determined to pose a direct threat to U.S. civilaviation." This list was administered by the FBI before the FederalAviation Administration and the TSA assumed full administrativeresponsibility for the list in November 2001. Since the TSA took over,
the watchlist "has expanded almost daily as Intelligence Communityagencies and the Office of Homeland Security continue to request theaddition of individuals to the No-Fly and Selectee lists."

There appears to be no formal approval process whereby an independentthird party verifies that names are selected appropriately and thatthe information is accurate and up-to-date. There is also no apparentprocess for individuals to request that their names be removed fromthe list -- it appears that the standard TSA response is to directindividuals to their local FBI office. The litany of problems thatpassengers have faced is long, but they all point to a lack of trans-
parency and due process in the operation of the watchlists.

Full analysis and links to FOIA Documents:

http://www.epic.org/privacy/airtravel/foia/watchlist_analysis.html

EPIC's Passenger Profiling page:

http://www.epic.org/privacy/airtravel/profiling.html



[3] ICANN Fails to Establish Adequate WHOIS Privacy Standards


The WHOIS database was originally intended to allow network admini-
strators to access domain name registrants' information in order toeasily find and fix problems and maintain the stability of theInternet. Currently, it also exposes that personally identifiableinformation to spammers, stalkers, criminal investigators, andcopyright enforcers. On February 6, the WHOIS Task Force of theGeneric Names Supporting Organization posted its "Final Report onWHOIS Accuracy and Bulk Access" for comments and for consideration bythe Generic Names Supporting Organization Council. The report includedfour policies on accuracy and bulk access of WHOIS data along withother recommendations. These policies have been criticized as beingdeficient because they fail to establish adequate privacy safeguards(see EPIC Alert 9.24 and 10.04).

The Internet Corporation for Assigned Names and Numbers (ICANN) votedon and adopted the WHOIS Task Force's policies on accuracy and bulkaccess during its March 23-27 meeting in Rio de Janeiro, Brazil. Atthe meeting, ICANN also directed its President to appoint a President'sStanding Committee on Privacy to monitor the implications of existingand proposed ICANN policies on the handling of personal data. In themeantime, ICANN's Generic Names Supporting Organization initiated apolicy development process that may lead to the creation of a newprivacy task force that would serve to adequately address WHOIS-relatedprivacy issues.

The Organization for Economic Cooperation and Development (OECD)
Recommendations Concerning and Guidelines Governing the Protection ofPrivacy and Transborder Flows of Personal Data offer a sound andinternational framework for sensible WHOIS policies on privacy and dataprotection. EPIC prepared a privacy issues report on behalf of thenon-commercial constituency recommending that a new task force beformed to evaluate WHOIS policies and practices with respect to theOECD guidelines.

ICANN's RIO meeting report is available online at:

http://www.icann.org/minutes/prelim-report-27mar03.htm

WHOIS Task Force's policies on accuracy and bulk access of WHOIS data:

http://www.icann.org/gnso/whois-tf/report-19feb03.htm#I

EPIC's WHOIS Privacy Issues Report:

http://www.epic.org/privacy/whois/privacy_issues_report.pdf

For more information, see EPIC's Web site on WHOIS:

http://www.epic.org/privacy/whois/



[4] EPIC Opposes Preemption of State Privacy Enforcement


EPIC, joined by consumer advocacy group U.S. PIRG, filed comments thisweek with the Office of the Comptroller of the Currency (OCC) urgingthe agency to reject a proposed rule that would limit state enforcementof consumer privacy laws. In its proposed rule, the agency interpretedits regulatory jurisdiction over national banks so broadly that itwould prevent states from applying their consumer protection andprivacy laws to national banks. In its comments, EPIC argued that theagency exceeded its authority by attempting to make itself theexclusive enforcer of consumer protection and privacy laws againstbanks and their affiliates. It also failed to safeguard consumers, whoare best served when both state and federal officials can protect themagainst unlawful business practices.

The OCC's jurisdiction over national banks derives from the NationalBank Act of 1864. Congress passed that law to establish a nationalbanking system and to promote the development of one national currency.
Under the Act, Congress charged the OCC with ensuring national banks'
financial stability and compliance with banking law by granting it"visitorial powers" over national banks, including the right toconduct supervisory examinations of banks and to take administrativeenforcement actions, such as issuing cease and desist orders. Foryears, the Supreme Court and lower courts have concluded that thisstatute does not insulate national banks from state legal action, aslong as a state is not seeking to enforce a state law that conflictswith federal law or discriminates against national banks.

In February, the OCC announced a proposed rule that sharply departsfrom this long-standing interpretation. If enacted, the rule wouldeliminate the traditional right of the states to sue national banks instate courts to enforce state laws. The proposal has drawn sharpcriticism from state attorneys general, consumer advocates, and others,
because the rule would hinder the states' abilities to regulate in theareas of consumer protection and privacy.

As EPIC explained in its comments, federal privacy law generallyoperates as a regulatory baseline and allows states to enact greaterprotections if they so choose. States have taken the lead indeveloping and enforcing legislative safeguards for privacy. Connect-
icut, North Dakota and Vermont, for example, have enacted strongerfinancial privacy standards than those provided by the federal Gramm-
Leach-Bliley Act. EPIC argued to the OCC that its proposal wouldundermine the effectiveness of these laws and well-establishedprinciples of federalism, and urged the agency to reject the proposal.

Proposed Rule of the OCC:

http://www.occ.treas.gov/ftp/release/2003-07a.pdf

EPIC and U.S. PIRG's Comments to the OCC:

http://www.epic.org/privacy/preemption/occcomments4.8.03.html

EPIC's Fair Credit Reporting Act Page:

http://www.epic.org/privacy/fcra/

EPIC's Gramm-Leach-Bliley Act Page:

http://www.epic.org/privacy/glba/



[5] News in Brief


Open Government Community Mourns Passing of Senator Moynihan
Daniel Patrick Moynihan, the four-term Senator from New York whosewide-ranging interests, political ambition, and numerous books onsocial issues helped shape public policy in Washington for more than aquarter century, died last month. In recent years, Moynihan directedhis energies to the problems of government secrecy. He authoredlegislation to reduce government secrecy and published "Secrecy: TheAmerican Experience" (1998). In that book he wrote, "The Cold War hasbequeathed to us a vast secrecy system that shows no sign of receding.
It has become our characteristic mode of governance in the executivebranch."

Moynihan's Statement on the Secrecy Reform Act:

http://www.fas.org/sgp/congress/moynint.html

"Secrecy: The American Experience"

http://www.epic.org/bookstore/powells/redirect/alert1007.html

Justice Department Issues Quarterly FOIA Report
The Department of Justice Office of Information and Privacy has issueda useful report on recent Freedom of Information Act decisions,
including Dept. of Justice v. City of Chicago, the recent Supreme Courtcase concerning access to gun purchase records under the FOIA.

"New FOIA Decisions, January-March 2003":

http://www.usdoj.gov/oip/foiapost/2003foiapost13.htm

Medical Privacy Rule Compliance Deadline Nears
By Monday, April 14, the health care industry must be in compliancewith the Health Insurance Portability and Accountability Act (HIPAA)
Privacy Rule. The Privacy Rule provides the first baseline federalprotection for privacy of medical information communicated electron-
ically, by paper, or orally. Patients will now have the right toreceive notice of privacy policies, request restrictions on disclosure,
amend their records, receive an accounting of disclosures, and file acomplaint with the Secretary of Health and Human Services (HHS).
However, contrary to the Administration's claims, the Privacy Ruledoes allow marketing use of health information without patient consent.
This was accomplished by exempting advertisements for health-relatedproducts or services and "alternative" therapies from the regulation'sdefinition of "marketing."

HHS HIPAA Page:

http://www.hhs.gov/ocr/hipaa/

Senate Considers FISA "Lone Wolf" Amendment
This week the Senate is due to consider a bill, S.113, that would relaxa requirement for authorizing warrants under the Foreign IntelligenceSurveillance Act. The legislation would allow the government toconduct surveillance on a person, even if officials lacked evidenceconnecting the individual to a specific terrorist group or foreignpower that supported terrorism, as is now required. The bill wasamended on March 11 to exclude United States persons, and it contains asunset clause in line with the USA PATRIOT Act. The "lone wolf"
amendment to the FISA is supposedly aimed at addressing the allegedproblem in the case of Zacarias Moussaoui, where FBI lawyers failed toapply the correct standard to obtain a FISA warrant because they wereconfused about the law.

S.113, A bill to exclude United States persons from the definition of "foreign power" under the Foreign Intelligence Surveillance Act of 1978 relating to international terrorism:

http://thomas.loc.gov/cgi-bin/bdquery/z?d108:s.00113:

U.S. Big Brother Award Winners Announced at CFP 2003
At the 13th Annual Conference on Computers, Freedom and Privacy onApril 3, Privacy International announced the winners of the 5th AnnualU.S. "Big Brother" awards to the government and private sector organi-
zations that have done the most to invade personal privacy in theUnited States. "Brandeis" awards were also given to individuals whohave made an outstanding contribution to the protection of privacy.

A list of winners is available online at:

http://www.privacyinternational.org/bigbrother/us2003/



[6] EPIC Bill-Track: New Bills in Congress


*House*

H.R.781 Privacy Protection Clarification Act: To amend theGramm-Leach-Bliley Act to exempt attorneys from the privacy provisionsof that Act. Sponsor: Rep Biggert, Judy (R-IL) (introduced 2/13/2003)
Cosponsors: 7. Committees: House Financial Services. Latest MajorAction: 3/10/2003 Referred to House subcommittee. Status: Referred tothe Subcommittee on Financial Institutions and Consumer Credit.

H.R.818 Identity Theft Consumer Notification Act: To amend theGramm-Leach-Bliley Act to further protect customers of financialinstitutions whose identities are stolen from the financialinstitution, and for other purposes. Sponsor: Rep Kleczka, Gerald D.
(D-WI) (introduced 2/13/2003) Cosponsors: 6. Committees: HouseFinancial Services. Latest Major Action: 2/27/2003 Referred to Housesubcommittee. Status: Referred to the Subcommittee on FinancialInstitutions and Consumer Credit.

H.R.858 Identity Theft Penalty Enhancement Act: To amend title 18,
United States Code, to establish penalties for aggravated identitytheft, and for other purposes. Sponsor: Rep Tanner, John S. (D-TN)
(introduced 2/13/2003) Cosponsors: 6. Committees: House Judiciary.
Latest Major Action: 2/13/2003 Referred to House committee. Status:
Referred to the House Committee on the Judiciary.

H.R.1009 Clear Your Good Name Act: To require Federal law enforcementagencies to expunge voidable arrest records, to provide incentivefunds to States that have in effect a system for expunging suchrecords, and for other purposes. Sponsor: Rep Nadler, Jerrold (D-NY)
(introduced 2/27/2003) Cosponsors: 3. Committees: House Judiciary.
Latest Major Action: 2/27/2003 Referred to House committee. Status:
Referred to the House Committee on the Judiciary.

H.R.1037 Prevent Bank Fraud by Terrorists Act of 2003: To preventterrorists and money launderers from establishing accounts for illegalmoney transfers through the use of false Social Security numbers ortaxpayer identification numbers, and for other purposes. Sponsor: RepSweeney, John E. (R-NY) (introduced 2/27/2003) Cosponsors: (none).
Committees: House Financial Services. Latest Major Action: 2/27/2003Referred to House committee. Status: Referred to the House Committeeon Financial Services.

H.R.1066 Benefit Authors without Limiting Advancement or Net ConsumerExpectations (BALANCE) Act of 2003: To amend title 17, United StatesCode, to safeguard the rights and expectations of consumers wholawfully obtain digital entertainment. Sponsor: Rep Lofgren, Zoe(D-CA) (introduced 3/4/2003) Cosponsors: 2. Committees: HouseJudiciary. Latest Major Action: 3/4/2003 Referred to House committee.
Status: Referred to the House Committee on the Judiciary.

H.R.1157 Freedom to Read Protection Act of 2003: To amend the ForeignIntelligence Surveillance Act to exempt bookstores and libraries fromorders requiring the production of any tangible things for certainforeign intelligence investigations, and for other purposes. Sponsor:
Rep Sanders, Bernard (I-VT) (introduced 3/6/2003) Cosponsors: 53.
Committees: House Judiciary; House Intelligence (Permanent Select).
Latest Major Action: 3/6/2003 Referred to House committee. Status:
Referred to the Committee on the Judiciary, and in addition to theCommittee on Intelligence (Permanent Select), for a period to besubsequently determined by the Speaker, in each case for considerationof such provisions as fall within the jurisdiction of the committeeconcerned.

H.R.1161 Child Obscenity and Pornography Prevention Act of 2003: Toprevent trafficking in child pornography and obscenity, to proscribepandering and solicitation relating to visual depictions of minorsengaging in sexually explicit conduct, to prevent the use of childpornography and obscenity to facilitate crimes against children, andfor other purposes. Sponsor: Rep Smith, Lamar (R-TX) (introduced3/6/2003) Cosponsors: 43. Committees: House Judiciary. Latest MajorAction: 3/11/2003 House committee/subcommittee actions. Status:
Subcommittee Hearings Held.

H.R.1171 Iris Scan Security Act of 2003: To provide grants to lawenforcement agencies to use iris scanning technology to conductbackground checks on individuals who want to purchase guns. Sponsor:
Rep Andrews, Robert E. (D-NJ) (introduced 3/11/2003) Cosponsors:
(none). Committees: House Judiciary. Latest Major Action: 3/11/2003Referred to House committee. Status: Referred to the House Committeeon the Judiciary.

H.R.1303 To amend the E-Government Act of 2002 with respect torulemaking authority of the Judicial Conference. Sponsor: Rep Smith,
Lamar (R-TX) (introduced 3/18/2003) Cosponsors: 1. Committees: HouseJudiciary. Latest Major Action: 3/20/2003 House committee/subcommitteeactions. Status: Forwarded by Subcommittee to Full Committee (Amended)
by Voice Vote.

H.R.1365 To establish the United States Commission on an Open Societywith Security. Sponsor: Rep Norton, Eleanor Holmes (D-DC) (introduced3/19/2003) Cosponsors: (none). Committees: House Transportation andInfrastructure. Latest Major Action: 3/19/2003 Referred to Housecommittee. Status: Referred to the House Committee on Transportationand Infrastructure.

*Senate*

S.410 Foreign Intelligence Collection Improvement Act of 2003: A billto establish the Homeland Intelligence Agency, and for other purposes.
Sponsor: Sen Edwards, John (D-NC) (introduced 2/13/2003) Cosponsors:
(none). Committees: Senate Select Committee on Intelligence. LatestMajor Action: 2/13/2003 Referred to Senate committee. Status: Readtwice and referred to the Committee on Intelligence.

S.436 Domestic Surveillance Oversight Act of 2003: A bill to amend theForeign Intelligence Surveillance Act of 1978 to improve theadministration and oversight of foreign intelligence surveillance, andfor other purposes. Sponsor: Sen Leahy, Patrick J. (D-VT) (introduced2/25/2003) Cosponsors: 4. Committees: Senate Judiciary. Latest MajorAction: 2/25/2003 Referred to Senate committee. Status: Read twice andreferred to the Committee on the Judiciary.

S.660 A bill to extend limitations on certain provisions of State lawunder the Fair Credit Reporting Act. Sponsor: Sen Johnson, Tim (D-SD)
(introduced 3/19/2003) Cosponsors: (none). Committees: Senate Banking,
Housing, and Urban Affairs. Latest Major Action: 3/19/2003 Referred toSenate committee. Status: Read twice and referred to the Committee onBanking, Housing, and Urban Affairs.

EPIC Bill Track: Tracking Privacy, Speech, and Cyber-Liberties Billsin the 108th Congress, is available at:

http://www.epic.org/privacy/bill_track.html



[7] EPIC Bookstore: "Your Body as Password"


Biometrics: Identity Assurance in the Information Age. John D.
Woodward, Jr. et al (McGraw-Hill/Osborne 2003)

http://shop.osborne.com/cgi-bin/osborne/0072222271.html

Who Goes There? Authentication Through the Lens of Privacy. Stephen T.
Kent and Lynette I. Millett, Editors (National Research Council 2003)

http://www4.nationalacademies.org/news.nsf/isbn/0309088968/

Biometrics are on the rise. New systems of identification capturefingerprints, voiceprints, iris patterns, and even facial images.
Increasingly, air travelers, visitors to the United States, andlicensed drivers may confront these new hi-tech IDs. How do thesesystems work? Are they reliable, and how best is privacy preserved?
These issues are taken up in a new book from McGraw-Hill and a newreport from the National Research Council.

John Woodward and his colleagues provide a comprehensive introductionto biometric applications in "Biometrics: Identity Assurance in theInformation Age." Several chapters describe the major biometrictechniques, as well as methods for evaluation, testing and standard-
setting. The book notes problems and vulnerabilities with each of themajor biometric techniques. It also explores several case studies inapplications as far-ranging as a housing project in Chicago, a schoolin Stockholm, Las Vegas casinos, and the California Statewide Finger-
printing System.

Woodward also engages the major policy and legal objections to theexpanded use of biometric systems. While some may sense that he lacksthe skepticism about government abuse that has given rise to manyprivacy laws, it is hard not to recognize his efforts to assessbiometric systems from a wide range of perspectives, including theEuropean Union Data Directive as well as cultural, religious andphilosophical objections.

The National Research Council takes up the issue of privacy andbiometric identification in "Who Goes There: Authentication Throughthe Lens of Privacy?" Much of the report focuses on the privacyproblems that flow from systems that collect personally identifiableinformation. The report sensibly suggests limiting the collection anduse of data, and notes that discrete systems of identifications aremore likely to safeguard privacy than integrated identificationsystems.

In the end, one's willingness to support advanced identificationsystems, including a national ID card that Woodward and his colleaguesappear to favor, may depend on one's trust in the institutions thatoperate such systems.

- Marc Rotenberg



EPIC Publications:

"The Privacy Law Sourcebook 2002: United States Law, InternationalLaw, and Recent Developments," Marc Rotenberg, editor (EPIC 2002).
Price: $40. http://www.epic.org/bookstore/pls2002/

The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists who needan up-to-date collection of U.S. and International privacy law, aswell as a comprehensive listing of privacy resources.



"FOIA 2002: Litigation Under the Federal Open Government Laws," HarryHammitt, David Sobel and Mark Zaid, editors (EPIC 2002). Price: $40.
http://www.epic.org/bookstore/foia2002/

This is the standard reference work covering all aspects of theFreedom of Information Act, the Privacy Act, the Government in theSunshine Act, and the Federal Advisory Committee Act. The 21stedition fully updates the manual that lawyers, journalists andresearchers have relied on for more than 25 years. For those wholitigate open government cases (or need to learn how to litigatethem), this is an essential reference manual.



"Privacy & Human Rights 2002: An International Survey of Privacy Lawsand Developments" (EPIC 2002). Price: $25.
http://www.epic.org/bookstore/phr2002/

This survey, by EPIC and Privacy International, reviews the state ofprivacy in over fifty countries around the world. The survey examinesa wide range of privacy issues including data protection, telephonetapping, genetic databases, video surveillance, location tracking, IDsystems and freedom of information laws.



"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0/

A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens free expression.



"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price: $40.
http://www.epic.org/cls/

The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumersand the basic responsibilities for businesses in the online economy.



"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC 2000). Price:
$20. http://www.epic.org/crypto&/

EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption to law enforcement.



EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:

EPIC Bookstore http://www.epic.org/bookstore/

"EPIC Bookshelf" at Powell's Books http://www.powells.com/features/epic/epic.html



[8] Upcoming Conferences and Events


** Uniting Privacy and the First Amendment in the 21st Century **

May 9-10, 2003Oakland, CA
EPIC, the First Amendment Project, and the California Office ofPrivacy Protection are sponsoring this activist symposium designed toexplore the interplay between privacy and First Amendment rights, withthe goal of developing strategies for optimizing both.

For more information: http://www.epic.org/events/unitingsymposium/



28th Annual AAAS Colloquium on Science and Technology Policy. AmericanAssociation for the Advancement of Science. April 10-11, 2003.
Washington, DC. For more information:
http://www.aaas.org/spp/rd/colloqu.htm

Integrating Government With New Technologies '03: E-Government, Changeand Information Democracy. Riley Information Services. April 11, 2003.
Ottawa, Canada. For more information: http://www.rileyis.com/seminars/

RSA Conference 2003. RSA Security. April 13-17, 2003. San Francisco,
CA. For more information: http://www.rsaconference.com/

O'Reilly Emerging Technology Conference. April 22-25, 2003. SantaClara, CA. For more information: http://conferences.oreilly.com/etcon/

Mid Canada Information Security Conference. Information ProtectionAssociation of Manitoba. April 30, 2003. Winnipeg, Manitoba, Canada.
For more information: http://www.ipam.mb.ca/mcisc/

Collecting and Producing Electronic Evidence in Cybercrime Cases.
University of Namur. May 8-9, 2003. Namur, Belgium. For moreinformation:
http://www.ctose.org/info/events/workshop-8-9-may-2003.html

Little Sister 2003: Community Resistance, Security, Law andTechnology. May 9-11, 2003. Vancouver, British Columbia, Canada. Formore information: http://www.littlesister2003.org/

2003 IEEE Symposium on Security and Privacy. IEEE Computer SocietyTechnical Committee on Security and Privacy, in cooperation with theInternational Association for Cryptologic Research (IACR). May 11-14,
2003. Oakland, CA. For more information:
http://www.ieee-security.org/TC/SP-Index.html

Technologies for Protecting Personal Information. Federal TradeCommission. Workshop 1: The Consumer Experience. May 14, 2003.
Workshop 2: The Business Experience. June 4, 2003. Washington, DC. Formore information: http://www.ftc.gov/techworkshop/

ITS-2003: Third International Conference on "Information Technologiesand Security." June 23-27, 2003. Partenit, Crimea, Ukraine. For moreinformation: http://www.itb.conferen.ru/eng/info_e.html

Press Freedom on the Internet. The World Press Freedom Committee. June26-28, 2003. New York, NY. For more information: <mgreenewpfc.org>

Building the Information Commonwealth: Information Technologies andProspects for Development of Civil Society Institutions in theCountries of the Commonwealth of Independent States.
Interparliamentary Assembly of the Member States of the Commonwealthof Independent States (IPA). June 30-July 2, 2003. St. Petersburg,
Russia. For more information: http://www.communities.org.ru/conference/

O'Reilly Open Source Convention. July 7-11, 2003. Portland, OR. Formore information: http://conferences.oreilly.com/oscon/

1st Global Conference: Visions of Humanity in Cyberculture, Cyberpunkand Science Fiction. August 11-13, 2003. Prague, Czech Republic. Formore information: http://www.inter-disciplinary.net/vhccsf03cfp.htm

Privacy2003. Technology Policy Group. September 30 - October 2, 2003.
Columbus, OH. For more information:
http://www.privacy2000.org/privacy2003/


Subscription Information


Subscribe/unsubscribe via Web interface:

http://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news

Subscribe/unsubscribe via e-mail:

To: epic_news-requestmailman.epic.org
Subject line: "subscribe" or "unsubscribe" (no quotes)

Help with subscribing/unsubscribing:

To: epic_news-requestmailman.epic.org
Subject: "help" (no quotes)

Back issues are available at:

http://www.epic.org/alert/

The EPIC Alert displays best in a fixed-width font, such as Courier.


Privacy Policy


The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do not enhance (linkto other databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under"subscription information". Please contact infoepic.org if you wouldlike to change your subscription e-mail address, if you areexperiencing subscription/unsubscription problems, or if you have anyother questions.


About EPIC


The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Actlitigation, and conducts policy research. For more information,
e-mail infoepic.org, http://www.epic.org or write EPIC, 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009.
+1 202 483 1140 (tel), +1 202 483 1248 (fax).

If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible. Checks should be made out to "EPIC" and sent to1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009.
Or you can contribute online at:

http://www.epic.org/donate/

** Receive a free Observing Surveillance conference poster withdonation of $75 or more! **

Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation ofencryption and expanding wiretapping powers.

Thank you for your support.

END EPIC Alert 10.07


.


WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2003/7.html