WorldLII Home | Databases | WorldLII | Search | Feedback

EPIC Alert

You are here:  WorldLII >> Databases >> EPIC Alert >> 2004 >> [2004] EPICAlert 13

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

EPIC Alert 11.13 [2004] EPICAlert 13








EPIC ALERT


Volume 11.13 July 12, 2004


Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.

http://www.epic.org/alert/EPIC_Alert_11.13.html


Table of Contents



[1] Supreme Court Upholds Block on Web Censorship Law
[2] EPIC Calls for Suspension of Registered Traveler Program
[3] Federal Court OKs Service Provider E-mail Interception
[4] Judge Upholds Country's Strongest State Financial Privacy Law
[5] Voter Identification Bills Introduced in Congress
[6] News in Brief
[7] EPIC Bookstore: Jennifer Government
[8] Upcoming Conferences and Events


[1] Supreme Court Upholds Block on Web Censorship Law


The Supreme Court recently upheld in Ashcroft v. ACLU a lower court'sinjunction against enforcement of the Child Online Protection Act(COPA). COPA, passed by Congress in 1998, is a broad censorship lawthat restricts Internet speech and imposes penalties of up to $50,000and six months in prison for posting, for commercial purposes, contentthat is "harmful to minors." In a 5-4 decision, the Court upheld theinjunction on the basis that the government failed to rebut theargument that software filtering is a plausible, less-restrictivealternative to COPA's content-based regulation of Internet speech.

Congress passed COPA in 1998 after the Supreme Court's 1997 ruling inReno v. ACLU that the law's predecessor, the Communications DecencyAct, was unconstitutional. EPIC joined with the ACLU to serve asplaintiff and co-counsel in the constitutional challenges to bothlaws.

The Supreme Court's majority opinion, written by Justice Kennedy andjoined by Justices Stevens, Souter, Thomas, and Ginsburg, held that"there is a potential for extraordinary harm and a serious chill uponprotected speech" if the law goes into effect. The Court found thatfiltering software is likely a less restrictive means to regulateminors' access to harmful material because "filters impose selectiverestrictions on speech at the receiving end, not universalrestrictions at the source." The Court also found that promotingfilters is less damaging to First Amendment principles because COPAcondemns as criminal entire categories of speech. Justice Kennedyalso noted that COPA fails to effectively serve the government'sinterest in protecting children because the law does not preventchildren from seeing inappropriate material originating outside theUnited States.

In his dissenting opinion, Justice Breyer contended that the Court waswrong to conclude that Congress could have accomplished its goal ofprotecting children from Internet pornography in less restrictiveways. Breyer argued that the monetary and social costs of COPA'sidentification requirement impose only "a modest additional burden" onadult access to Internet content.

The case has been remanded to the lower court for further proceedings.

The opinion in Ashcroft v. ACLU is available at:

http://www.supremecourtus.gov/opinions/03pdf/03-218.pdf

EPIC's testimony concerning the privacy implications of COPA'sidentification requirement:

http://www.epic.org/free_speech/copa/statement_6_00.html

For more information about the case, see EPIC's COPA Litigation Page:

http://www.epic.org/free_speech/copa



[2] EPIC Calls for Suspension of Registered Traveler Program


In formal comments to the Transportation Security Administration(TSA), EPIC has urged the agency not to deploy the final phase of theRegistered Traveler program until it conducts a full evaluation of theprogram's privacy implications. EPIC argued that the agency shouldrevise its information collection and maintenance practices to complyfully with the intent of the Privacy Act.

EPIC made its recommendation in response to the agency's publicationof a notice describing its plans to launch the pilot phase ofRegistered Traveler. The program asks individuals to volunteer toundergo invasive background checks and provide biometric informationin exchange for the assurance that they will not be subjected torandom secondary screening at airports.

EPIC's comments noted the agency's record of secrecy and little regardfor individual privacy interests in the development of other programs,
pointing out that the agency has disclosed little information aboutthe controversial second generation Computer Assisted PassengerPrescreening System (CAPPS II) in response to EPIC's repeated Freedomof Information Act requests and has also exempted the system from keyPrivacy Act provisions.

EPIC noted that TSA has unnecessarily exempted Registered Travelerfrom crucial safeguards intended to promote record accuracy and securethe privacy of individuals whose information is maintained within thesystem. EPIC's comments addressed TSA's failure to provideindividuals with meaningful access to personal information andmeaningful opportunities to correct inaccurate, irrelevant, untimelyand incomplete information. EPIC also noted Registered Traveler'sexemption from the requirement that a system maintain only informationthat is "relevant and necessary" to perform the system's function, andasserted that TSA's broadly drawn "routine uses" of RegisteredTraveler data would only heighten the system's privacy problems.

The Transportation Security Administration's notice on RegisteredTraveler is available at:

http://www.tsa.gov/public/interweb/assetlibrary/Notice5-27-04.pdf
EPIC's comments are available at:

http://www.epic.org/privacy/airtravel/profiling/rt_comments.pdf

More information about CAPPS II and passenger profiling is availableat EPIC's Passenger Profiling Page:

http://www.epic.org/privacy/airtravel/profiling.html



[3] Federal Court OKs Service Provider E-mail Interception


The U.S. Court of Appeals for the First Circuit has ruled that acompany did not violate federal wiretap law when it used the e-mailservice it provided to its subscribers to access their e-mail so itcould review messages sent to them by a rival company. The issue inUnited States v. Councilman was whether an "intercept" of acommunication occurred within the meaning of the Wiretap Act. In a2-1 ruling, the court held that electronic communications are not"intercepted" if the communication is accessed while it is intemporary storage.

This case involved the conduct of Interloc, an online literaryclearinghouse that sought to pair its subscribers -- rare and usedbook dealers -- with book buyers. Bradford C. Councilman, formerexecutive of the company, directed Interloc employees to writecomputer code to intercept and copy all incoming communications fromAmazon.com to the subscriber book dealers, whom had been providede-mail service by Interloc. According to the indictment, the Interlocsystems administrator wrote a revision to the mail processing codedesigned to intercept, copy, and store all incoming messages fromAmazon.com before they were delivered to the subscribers, andtherefore, before the e-mail was read by the intended recipient.
Councilman was charged with using the code to intercept thousands ofmessages. Councilman and other Interloc employees routinely read thee-mails sent to Interloc subscribers seeking to gain a commercialadvantage.

The law at issue in this case involved the 1986 amendments to federalwiretap law. Prior to the amendments, only wire and oralcommunications were protected from interception under the Wiretap Act.
The amendments extended protections against interception to electroniccommunications, and also sought to establish legal standards foraccess to email in the possession of a service provider. The changescreated two categories of electronic communications -- those "intransit," which enjoy relatively generous protection under the law,
and those "in storage," which receive a lesser degree of legalprotection. The categories that resulted from the amendments wereviewed as complimentary efforts to protect the privacy of electroniccommunications. The "tiering" of communications resulted more fromthe effort to address specific concerns -- such as extendingprotections to electronic communications and creating safeguards forstored communications -- than to formally categorize the privacyprotection for each type of information. Thus, it is unlikely thatthe Congress that passed the 1986 amendments believed that an ISPshould be able to routinely review the contents of subscriber email.

The Court, however, determined that the plain language of the lawshowed that Congress did not intend for the law's interceptionprovisions to apply to electronic communications in electronicstorage. The Court also found that when the company obtained thee-mails, the messages were in temporary storage in a computer system.
The Court noted that the parties had stipulated that the e-mails werenot affected while they were transmitted through wires or cablesbetween computers. In light of these findings, the Court determinedthat the e-mails were not in transit and subject to interception, butwere instead stored communications. Because no "intercept" occurred,
the Court held that the Wiretap Act could not have been violated. Indissent, Judge Kermit V. Lipez warned that this interpretation of theWiretap Act "would undo decades of practice and precedent regardingthe scope of the Wiretap Act and would essentially render the actirrelevant to the protection of wire and electronic privacy."

The opinion in United States v. Councilman is available at:

http://www.ca1.uscourts.gov/pdf.opinions/03-1383-01A.pdf
For more information about electronic surveillance, see EPIC'sWiretapping Page:

http://www.epic.org/privacy/wiretap



[4] Judge Upholds Country's Strongest State Financial Privacy Law


A federal district judge in Sacramento, California has upheld thestate's financial privacy law, SB1, against a challenge brought byfinancial services trade groups. The groups were unsuccessful inarguing that the law, known as the California Financial InformationPrivacy Act, was preempted by the federal Fair Credit Reporting Act(FCRA). SB1 is the strongest financial privacy law in the nation. Itallows individuals to opt out of affiliate information sharing, andrequires opt-in consent before financial services institutions sellpersonal data to third parties (see EPIC Alert 10.17.)

SB1 was signed by former Governor Gray Davis after a four-yearlegislative battle. It became law only after major financial servicescompanies, some of which have hundreds or even thousands ofaffiliates, dropped their opposition to the legislation. However,
those companies later attempted to eliminate SB1's protections bypreempting the law at the federal level in passing amendments to theFCRA.

In holding that SB1 was not preempted by federal law, the Courtreasoned that the FCRA does not trump all state laws regulatinginformation sharing by affiliates. Rather, the FCRA pertains only tothe sharing of consumer reports among affiliates; that is, informationthat is used for an enumerated purpose of the FCRA, such as creditgranting.

The court found that the Gramm-Leach-Bliley Act was the controllinglaw for the regulation of affiliate information sharing. That law, asa result of the "Sarbanes Amendment," preserves the right of states topass more stringent protections for personal information that isexploited by financial services companies.

California's SB1 took effect on July 1, and contains substantialmonetary penalties for violation. It appears as though the financialservices industry did not take steps to comply with the law, and as aresult, is likely to pursue an injunction to delay implementation ofthe law and an expedited appeal.

The opinion in ABA v. Lockyer is available at:

http://www.epic.org/privacy/preemption/sb1dctorder.pdf

SB 1, the California Financial Information Privacy Act:

http://www.epic.org/redirect/sb-1.html

EPIC Financial Privacy Resources:

http://www.epic.org/privacy/financialresources.html



[5] Voter Identification Bills Introduced in Congress


Two bills introduced in this session of Congress would place moreidentification requirements on those seeking to register to vote. Rep.
Phil Gringrey (R-GA) has introduced H.R. 4174, a bill that wouldrequire individuals to provide proof of United States citizenship as acondition of registering to vote. Rep. Henry Hyde (R-IL) hasintroduced H.R. 4530, a bill that would require any person registeringor reregistering to vote to provide proof of citizenship. H.R. 4530directs states not to provide a ballot to any individual unless heshows proof of citizenship. The states are to determine whichdocuments will be acceptable proof of citizenship under the advisementof the Election Assistance Commission, Secretary of Homeland Security,
and Secretary of State. The two bills have a total of eightco-sponsors between them, with two members' names appearing on bothbills.

A trade-off in privacy exists in the legal requirement of voterregistration to participate in publicly held elections. Voterregistration began its trek into common practice in the late 1890s,
when it was championed as a means of discouraging repeat voting andthe importation of voters from other jurisdictions to cast votes inlocal and some state elections. Each state is responsible foradministering voter registration within its boundaries. Today, voterregistration forms may include requests for name, current and previousaddress, home and work telephone numbers, birthplace, Social Securitynumber, birth date, race, gender, and party affiliation.

The Help America Vote Act, which became law in October 2002, requiresvoter registrants to submit proof of identity by providing a stateissued identity document or the last four digits of their SocialSecurity number. Since 1997, non-citizens may be deported for votingin local, state, or federal elections.

HAVA also establishes a computerized statewide voter registration listrequirement. Each state's election officer is directed to create auniform centralized interactive computerized statewide voterregistration list. The list is to be defined, maintained, andadministered at the state level and contains information for everylegally registered voter in each state. Under this system, the lawdirects that a "unique identifier" is to be assigned to each legallyregistered voter in a state. Further, the law directs that the listshould be coordinated with other agency databases within the state.
The system must be designed to allow any election official in thestate, including local election officials, to obtain immediateelectronic access to the information contained in the voterregistration database. The system must also allow unlimited access toany local election official to the computerized list. This list willserve as the official index of registered voters for any federal orstate election.

The law does require that the appropriate state or local officialshall provide adequate technological security measures to preventunauthorized access to the computerized list.

H.R. 4174:

http://thomas.loc.gov/cgi-bin/bdquery/z?d108:h.r.4174:

H.R. 4530:

http://thomas.loc.gov/cgi-bin/bdquery/z?d108:h.r.4530:

The Help America Vote Act is available at:

http://www.fec.gov/hava/hava.htm
National Committee for Voting Integrity:

http://www.votingintegrity.org

For more information about voter privacy, see EPIC's Voting Page:

http://www.epic.org/privacy/voting



[6] News in Brief


FEDERAL TRADE COMMISSION SANCTIONS COMPANY FOR PRIVACY VIOLATIONS
The Federal Trade Commission has charged Gateway Learning Corp., makerof Hooked on Phonics products, with violating federal law by rentingout personally identifiable consumer information collected through itsweb site to direct marketers in violation of the company's privacypolicy. The company had changed its privacy policy to allow sale ofpersonal information, and attempted to apply the new policyretroactively without first obtaining customers' consent for dataexploitation. The Commission noted that the disclosure includedinformation provided directly to the company by consumers who boughtHooked on Phonics, including names, addresses, phone numbers, and ageranges and gender of the consumers' children.

To settle the Commission's claims, Gateway has agreed not to makedeceptive claims about how it will use consumer information in thefuture, promised not to make material changes to its privacy policyretroactively without obtaining consumers' consent, and forfeited the$4,608 it earned from leasing the consumer information.

Federal Trade Commission press release:

http://www.ftc.gov/opa/2004/07/gateway.htm

In the Matter of Gateway Learning Corp.:

http://www.ftc.gov/os/caselist/0423047/0423047.htm

EPIC UNDERSCORES ROLE OF SOCIAL SECURITY NUMBER IN IDENTITY THEFT
In a follow-up letter to testimony on enhancing Social Security number(SSN) privacy, EPIC and U.S. PIRG detailed the role that the SSN playsin identity theft. EPIC and U.S. PIRG explained to the House Ways andMeans Subcommittee on Social Security that widespread business andgovernment use of the SSN contributes to identity theft. The letterhighlighted bad privacy practices, including the general use of theSSN as both an identifier and an authenticator, and sloppy creditgranting practices where creditors facilitate identity theft byopening new accounts in victim's names. The letter also argued thatprivate investigators and others who have access to SSN databasesshould be subject to the full privacy responsibilities established bythe Fair Credit Reporting Act.

EPIC's Letter on SSN and Identity Theft:

http://www.epic.org/privacy/ssn/ssnanswers7.2.04.html

EPIC Testimony on SSN Privacy:

http://www.epic.org/privacy/ssn/ssntestimony6.15.04.html

For more information about the role of Social Security Numbers inidentity theft, see EPIC's SSN Privacy Page:

http://www.epic.org/privacy/ssn

EUROPEAN PARLIAMENT SUES TO VOID PASSENGER DATA AGREEMENT
European Parliament President Pat Cox has announced his decision toask the European Union Court of Justice to annul the Council ofEurope's agreement between the European Community and the UnitedStates, allowing for transfer of Passenger Name Record (PNR) data onEU citizens to the U.S. Department of Homeland Security Bureau ofCustoms and Border Protection. Cox will also appeal the EuropeanCouncil's finding that the Bureau ensures adequate protection oftransferred PNR data, satisfying the EU's Data Protection Directive(EU Directive 95/46/EC). Mr. Cox said the request "reflects theconcern felt by a large majority in the European Parliament on theneed to defend European citizens' fundamental rights and freedoms ...
[B]oth the EU and the U.S. must guard against a new form of creepingextra-territoriality."

EU Commission's Decision on Adequacy:

http://www.epic.org/redirect/eu_adequacy.html
EU-U.S. Agreement:

http://europa.eu.int/eur-lex/en/com/pdf/2004/com2004_0190en01.pdf

U.S.'s Undertakings:

http://europa.eu.int/eur-lex/en/com/pdf/2004/com2004_0190en01.pdf

For more information on the PNR transfer, see EPIC's Page on EU-U.S.
Airline Passenger Data Disclosure:

http://www.epic.org/privacy/intl/passenger_data.html

SPYWARE BILL APPROVED BY HOUSE COMMITTEE
The House Energy and Commerce Committee has voted 45-4 in favor of ananti-spyware bill, setting the stage for its consideration by the fullHouse. The bill, termed the SPY ACT (Securely Protect YourselfAgainst Cyber Trespass Act), was passed after several changes weremade to the original draft sent up by the House Subcommittee onCommerce, Trade, and Consumer Protection.

The original draft of the bill prohibited deceptive practices relatedto spyware such as hijacking a computer's functions, changinghomepages without authorization, and surreptitious keystroke logging.
It also regulated "information collection programs" by mandatingexpress consent before installation, the provision of an uncomplicateddisabling function, and the disclosure of the type and purpose ofcollected information. The Federal Trade Commission was charged withenforcement and authorized to levy fines as large as $3 million forcertain violations. Recent changes to the bill effectively exemptsoftware located on servers from SPY ACT regulation, while alsoproviding an explicit exemption for monitoring software used bynetwork providers for security and anti-fraud purposes. The changesalso allow bundled multiple information collection programs to seekuser approval via a single notice, and water down the definition ofwhen there is a change in collected information for which new usernotice and consent will be required. The bill's sunset date has alsobeen extended by a year to December 31, 2009.

The current version of H.R. 2929 is available at:

http://www.epic.org/redirect/hr2929_rev.html

NATIONAL COMMITTEE FOR VOTING INTEGRITY LAUNCHES WEB SITE
The National Committee on Voting Integrity, established to promotevoter-verified balloting and to preserve privacy protections forelections in the United States, recently launched its web site,
www.votingintegrity.org. The web site provides news about importantdevelopments in voting practice and the Committee's continuingactivities, as well as an archive of letters, hearing testimony andother public Committee statements. The web archive includes theCommittee's recent written testimony to the U.S. Election AssistanceCommission hearing to review the use, security, and reliability ofelectronic voting systems, and its letter congratulating CommissionChairman Soaries for his "bold and decisive call for electronic votingcompanies to make the underlying software code of electronic votingtechnology available to election administrators." In addition, the website provides a valuable resource for researchers to familiarizethemselves with the key issues related to verifiable, private,
democratic elections. Coverage includes direct record electronicvoting machines, the Help America Vote Act, and centralized voterregistration databases.

Visit the National Committee on Voting Integrity web site at:

http://www.votingintegrity.org

ANONYMITY PROJECT WEB SITE NOW ONLINE
The Anonymity Project has launched a web site that provides adescription of research areas, interviews with project members, andother project information. Although the project iscross-disciplinary, it is based at the University of Ottawa, Facultyof Law. EPIC is a collaborator. The project consists of three broadresearch streams -- the nature and value of identity, anonymity andauthentication; the constitutional and legal aspects of anonymity; andtechnologies that identify, anonymize and authenticate. Researchresults will be made publicly available on the web site.

Visit "On the Identity Trail: Understanding the Importance ofAnonymity and Authentication in a Networked Society" at:

http://www.anonequity.org



[7] EPIC Bookstore: Jennifer Government


Max Berry, Jennifer Government (Vintage 2004).

http://www.powells.com/cgi-bin/biblio?inkey=1-1400030927-4

"In Max Barry's twisted, hilarious vision of the near future, theworld is run by giant American corporations (except for a few deludedholdouts like the French); taxes are illegal; employees take the lastnames of the companies they work for; The Police and The NRA arepublicly-traded security firms; the U.S. government may onlyinvestigate crimes if they can bill a citizen directly. It's a freemarket paradise!

"Hack Nike is a lowly Merchandising Officer who's not very good atnegotiating his salary. So when John Nike and John Nike, executivesfrom the promised land of Marketing, offer him a contract, he signswithout reading it. Unfortunately, Hack's new contract involvesshooting teenagers to build up street cred for Nike's new line of$2,500 sneakers. Scared, Hack goes to The Police, who assume he'sasking for a subcontracting deal and lease the assassinations to theNRA.

"Soon Hack finds himself pursued by Jennifer Government, atough-talking agent with a barcode tattoo under her eye and a rabiddetermination to nail John Nike (the boss of the other John Nike). Ina world where your job title means everything, the most cherishedpossession is a platinum credit card, and advertising jingles give wayto automatic weapons in the fight for market share, JenniferGovernment is the consumer watchdog from hell."



EPIC Publications:

"The Public Voice WSIS Sourcebook: Perspectives on the World Summit onthe Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook

This resource promotes a dialogue on the issues, the outcomes, and theprocess of the World Summit on the Information Society (WSIS). Thisreference guide provides the official UN documents, regional andissue-oriented perspectives, as well as recommendations and proposalsfor future action, as well as a useful list of resources and contactsfor individuals and organizations that wish to become more involved inthe WSIS process.



"The Privacy Law Sourcebook 2003: United States Law, InternationalLaw, and Recent Developments," Marc Rotenberg, editor (EPIC 2003).
Price: $40. http://www.epic.org/bookstore/pls2003

The "Physicians Desk Reference of the privacy world." An invaluableresource for students, attorneys, researchers and journalists who needan up-to-date collection of U.S. and International privacy law, aswell as a comprehensive listing of privacy resources.



"FOIA 2002: Litigation Under the Federal Open Government Laws," HarryHammitt, David Sobel and Mark Zaid, editors (EPIC 2002). Price: $40.
http://www.epic.org/bookstore/foia2002

This is the standard reference work covering all aspects of theFreedom of Information Act, the Privacy Act, the Government in theSunshine Act, and the Federal Advisory Committee Act. The 21stedition fully updates the manual that lawyers, journalists andresearchers have relied on for more than 25 years. For those wholitigate open government cases (or need to learn how to litigatethem), this is an essential reference manual.



"Privacy & Human Rights 2003: An International Survey of Privacy Lawsand Developments" (EPIC 2002). Price: $35.
http://www.epic.org/bookstore/phr2003

This survey, by EPIC and Privacy International, reviews the state ofprivacy in over fifty-five countries around the world. The surveyexamines a wide range of privacy issues including data protection,
passenger profiling, genetic databases, video surveillance, ID systemsand freedom of information laws.



"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0

A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens free expression.



"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price: $40.
http://www.epic.org/cls

The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumersand the basic responsibilities for businesses in the online economy.



"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC 2000). Price:
$20. http://www.epic.org/bookstore/crypto00&

EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption products have largely succeeded, although severalgovernments are gaining new powers to combat the perceived threats ofencryption to law enforcement.



EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:

EPIC Bookstore http://www.epic.org/bookstore

"EPIC Bookshelf" at Powell's Books http://www.powells.com/features/epic/epic.html



[8] Upcoming Conferences and Events


O'Reilly Open Source Convention. July 26-30, 2004. Portland, OR.
For more information: http://conferences.oreilly.com/oscon.

2004 UK Big Brother Awards. Privacy International. July 28, 2004.
London, UK. For more information:
http://www.privacyinternational.org/bigbrother/uk2004.

First Conference on Email and Anti-Spam. American Association forArtificial Intelligence and IEEE Technical Committee on Security andPrivacy. July 30-31, 2004. Mountain View, CA. For more information:
http://www.ceas.cc.

Crypto 2004: The Twenty-Fourth Annual IACR Crypto Conference.
International Association for Cryptologic Research, IEEE ComputerSociety Technical Committee on Security and Privacy, and the ComputerScience Department of the University of California, Santa Barbara.
August 15-19, 2004. Santa Barbara, CA. For more information:
http://www.iacr.org/conferences/crypto2004.

Ninth National HIPAA Summit. September 12-14, 2004. Baltimore, MD.
For more information: http://www.HIPAASummit.com.

Public Voice Symposium: Privacy in a New Era: Challenges,
Opportunities and Partnerships. Electronic Privacy InformationCenter, European Digital Rights Initiative (EDRi), and PrivacyInternational. September 13, 2004. Wroclaw, Poland. For moreinformation:
http://www.thepublicvoice.org/events/wroclaw04/default.html.

The Right to Personal Data Protection -- the Right to Dignity. 26thInternational Conference on Data Protection and Privacy Commissioners.
September 14-16, 2004. Wroclaw, Poland. For more information:
http://26konferencja.giodo.gov.pl.

2004 Telecommunications Policy Research Conference. National Centerfor Technology & Law, George Mason University School of Law. October1-3, 2004. Arlington, VA. For more information:
http://www.tprc.org/TPRC04/call04.htm.

Health Privacy Conference. Office of the Information and PrivacyCommissioner of Alberta. October 4-5, 2004. Calgary, Alberta, Canada.
For more information:
http://www.oipc.ab.ca/home/DetailsPage.cfm?ID=1453.

IAPP Privacy and Data Security Academy & Expo. InternationalAssociation of Privacy Professionals. October 27-29, 2004. NewOrleans, LA. For more information:
http://www.privacyassociation.org/html/conferences.html.

Privacy and Security: Seeking the Middle Path. Office of theInformation & Privacy Commissioner of Ontario; Centre for InnovationLaw and Policy, University of Toronto; and Center for AppliedCryptographic Research, University of Waterloo. Toronto, Ontario,
Canada. October 28-29, 2004. For more information:
http://www.epic.org/redirect/uwaterloo_conf.html.

CFP2005: Fifteenth Annual Conference on Computers, Freedom andPrivacy. April 12-15, 2005. Seattle, WA. For more information:
http://www.cfp2005.org.


Subscription Information


Subscribe/unsubscribe via web interface:

https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news

Back issues are available at:

http://www.epic.org/alert

The EPIC Alert displays best in a fixed-width font, such as Courier.


Privacy Policy


The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do not enhance (linkto other databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under"subscription information."


About EPIC


The Electronic Privacy Information Center is a public interestresearch center in Washington, DC. It was established in 1994 tofocus public attention on emerging privacy issues such as the ClipperChip, the Digital Telephony proposal, national ID cards, medicalrecord privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Actlitigation, and conducts policy research. For more information, seehttp://www.epic.org or write EPIC, 1718 Connecticut Ave., NW, Suite200, Washington, DC 20009. +1 202 483 1140 (tel), +1 202 483 1248(fax).

If you'd like to support the work of the Electronic PrivacyInformation Center, contributions are welcome and fullytax-deductible. Checks should be made out to "EPIC" and sent to 1718Connecticut Ave., NW, Suite 200, Washington, DC 20009. Or you cancontribute online at:

http://www.epic.org/donate

Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for theright of privacy and efforts to oppose government regulation ofencryption and expanding wiretapping powers.

Thank you for your support.

END EPIC Alert 11.13

.


WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2004/13.html