WorldLII Home | Databases | WorldLII | Search | Feedback

EPIC Alert

You are here:  WorldLII >> Databases >> EPIC Alert >> 2006 >> [2006] EPICAlert 3

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

EPIC Alert 13.03 [2006] EPICAlert 3









EPIC ALERT


Volume 13.03 February 10, 2006

Published by the Electronic Privacy Information Center (EPIC)
Washington, D.C.

http://www.epic.org/alert/EPIC_Alert_13.03.html
Table of Contents


[1] FCC Grants EPIC Petition on Protecting Telephone Records
[2] EPIC Seeks Spy Documents in Federal Court
[3] EPIC Testifies Before Congress on Illegal Record Sales
[4] Secure Flight Placed on Standby
[5] Federal Budget Pumps Money Into Surveillance Projects
[6] News in Brief
[7] EPIC Bookstore: Robert Sherrill's "First Amendment Felon"


[8] Upcoming Conferences and Events


[1] FCC Grants EPIC Petition on Protecting Telephone Records

On February 10, the Federal Communications Commission announced a formalrulemaking to create rules strengthening the security of consumers'
phone records. This action grants EPIC's August 2005 petition, which wasfiled out of concerns that consumer records were too easily beingacquired and sold online. Data brokers are thought to obtain theinformation either by taking advantage of lax authentication methods(otherwise known as “pretexting”) or by bribing insiders forinformation.

"I am deeply concerned about reports of companies trafficking inpersonal telephone records," said Kevin Martin, Chairman of theCommission. Commissioner Jonathan Adelstein agreed, saying, "Telephonecompanies are required to have firewalls in place to protect consumers'
private information but instead these records are blazing all over theInternet."

The Commission is asking for comment addressing five specificrecommendations made by EPIC in its 2005 petition, including thecreation of consumer-set passwords; tracking who within the companiesviews and transfers customer data; encrypting consumer data; limitingthe information collected and retained; and notifying consumers when abreach of data has occurred.

Industry representatives were resistant to the idea of furtherregulation last year, but since then, major news coverage of thevulnerability of cell records has placed additional pressure oncommunications providers. At a hearing held before a Senatesubcommittee, industry spokesman Steve Largent admitted that bettertraining and baseline authentication standards were necessary to betterprotect consumers' records.

The FCC has taken additional action against poor security standards,recently fining AT&T and Alltel for failing to comply with existingsecurity rules. The Text of the proposed rulemaking should be availablenext week.

EPIC's Petition to the FCC:

http://www.epic.org/privacy/iei/cpnipet.html

FCC Press Release on Rulemaking:

http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-263765A1.pdf

EPIC's Illegal Sale of Phone Records Page:

http://www.epic.org/privacy/iei




[2] EPIC Seeks Spy Documents in Federal Court

This week, the Senate Judiciary Committee heard a full day of testimonyfrom Attorney General Alberto Gonzales on the National Security Agency'swarrantless surveillance program. The Attorney General reiteratedearlier Administration arguments about the purported legality of theprogram, but would not discuss operational details.

Despite repeated requests, the Administration has refused to provideCongress or the public with legal opinions or other documents concerningthe controversial program. Next Wednesday, the House JudiciaryCommittee will vote on resolutions that would direct the AttorneyGeneral to turn over materials related to the program to the House ofRepresentatives.

In a related development, U.S. District Judge Henry Kennedy heard oralarguments this morning on EPIC's request for an emergency orderrequiring the Justice Department to release documents about the programwithin 20 days. EPIC filed a Freedom of Information Act lawsuit againstthe agency last month, stating that the Justice Department agreed togive EPIC's Freedom of Information Act requests priority treatment, buthas failed to process them even within the FOIA's usual time limit oftwenty working days. The American Civil Liberties Union and NationalSecurity Archive have filed a similar lawsuit, which Judge Kennedyconsolidated with EPIC's case.

Though he has not yet ruled on EPIC's motion, Judge Kennedy suggestedthat a failure by the Justice Department to release the documentsquickly will cause irreparable harm to EPIC and the public. EPIC hasargued in court papers that such a failure would make it impossible forEPIC and the public to participate in the debate on the controversialprogram -- a debate which "cannot be based solely upon information thatthe Administration voluntarily chooses to disseminate."

Earlier this week, EPIC also filed a second FOIA lawsuit for documentsrelated to the program against the National Security Agency.

Transcript of the Senate Judiciary Committee Hearing on the NationalSecurity Agency's Warrantless Surveillance Program:

http://www.epic.org/redirect/nsa_transcript.html

EPIC's Complaint Against the Justice Department (pdf):

http://www.epic.org/privacy/nsa/complaint_doj.pdf

EPIC's Motion for a Preliminary Injunction (pdf):

http://www.epic.org/privacy/nsa/pi_motion_doj.pdf

EPIC's Complaint Against the National Security Agency (pdf):

http://www.epic.org/privacy/nsa/amended_complaint.pdf

EPIC's NSA Warrantless Surveillance FOIA Page:

http://www.epic.org/privacy/nsa/foia/default.html




[3] EPIC Testifies Before Congress on Illegal Record Sales

Two Congressional committees held hearings this month on the illegalsale of consumers' communications records. EPIC Executive Director MarcRotenberg testified before both the House Energy and Commerce Committeeand the Senate Commerce Committee's Subcommittee on Consumer Affairs.
“A ban on the sale of these records will dry up the market for illegallyobtained records,” Rotenberg said.

EPIC also called for a end to “pretexting,” the major practice by whichdata brokers acquire consumer records. Pretexters will misrepresentthemselves, often posing as the customer, in order to gain access to thecustomer's records. “A ban on pretexting would make unmistakably clearthe fact that such practices are unfair, deceptive, illegal, and wrong,”
said Rotenberg.

Lawmakers were eager to take action against the sale oftelecommunications records, and already, two bills have been introducedin the Senate, and two in the House, to address the problem. At leasttwo more bills are expected to emerge in Congress soon. Some of thebills focus upon making the commercial sale of call information illegal,while others ban the pretexting of phone records.

However, privacy advocates indicated that these were only first steps insolving the problem. Robert Douglas, CEO of PrivacyToday.com and aformer private investigator, indicated that more than just phone recordswere at stake, noting that pretexting is used to obtain a wide varietyof private consumer information. Some of this information includes theidentities of email account holders, P.O. Box owners, and the identitiesof those using online dating services.

EPIC also warned that the communications companies who hold theinformation must secure the information they collect, as well as tolimit the amount of information stored. Rotenberg emphasized that thosewho store consumer information have a responsibility. “The idea issimple: if you can't protect it, don't collect it,” he said.

EPIC Testimony Before House (pdf):

http://www.epic.org/privacy/iei/pretext_testimony.pdf

EPIC Testimony Before Senate:

http://www.epic.org/privacy/iei/sencomtest2806.html

EPIC's Illegal Sale of Phone Records Page:

http://www.epic.org/privacy/iei

Privacy Today Home Page:

http://www.privacytoday.com/




[4] Secure Flight Placed on Standby

On February 9, the head of the Transportation Security Administrationtold a congressional committee that Secure Flight has been suspended fora comprehensive review of the program's information security measures.
Testimony from the General Accountability Office revealed that TSAapproved Secure Flight to become operational in September, despiteinconclusive risk assessments and 144 known security vulnerabilities.
"TSA may not have proper controls in place to protect sensitiveinformation," the GAO said.

The Secure Flight program was introduced a successor to thenow-abandoned second generation Computer Assisted Passenger PrescreeningSystem (CAPPS II). Many of the problems with CAPPS II that led to itsdemise continued to plague Secure Flight in its test phase. Thecontroversial program has been the focus of two governmentinvestigations and is conducting an internal audit of its procedures.
There is no deadline for the completion of the current audit.

EPIC has criticized the Secure Flight program in the past for secretlyobtaining passenger information in violation of federal privacy law, aswell as its initial efforts to use inaccurate commercial data in makingpassenger threat determinations.

In addition to criticizing Secure Flight's lack of privacy safeguardsand security vulnerabilities, the GAO also noted that the documentsunderlying the program "contained contradictory and missinginformation."

EPIC testified before a House committee in November 2005 about theRegistered Traveler program, a similar effort to profile airlinepassengers, and warned that there were significant problems with dataaccuracy, as well as ongoing concerns about the compliance with thePrivacy Act and the risk of mission creep.

GAO Report on Secure Flight (pdf):

http://www.gao.gov/new.items/d06374t.pdf

EPIC's Secure Flight Page:

http://www.epic.org/privacy/airtravel/secureflight.html

EPIC Testimony on Registered Traveler, Nov. 3, 2005 (pdf):

http://epic.org/privacy/airtravel/rt_test_110305.pdf




[5] Federal Budget Pumps Money Into Surveillance Projects

President Bush's proposed $2.77 trillion budget for Fiscal Year 2007increases spending on surveillance projects while making substantialcuts in education, housing, and farm programs. This is 2.3 percentincrease over projected spending for Fiscal Year 2006. President Bushhad requested $2.57 trillion, but spending is projected to total $2.71trillion.

The Department of Homeland Security has requested $42.7 billion, a 6percent increase from FY 2006. Of this, the US-VISIT border programwould receive $399.5 million, an increase of $62.9 million. Most of theincrease will go toward the expansion of US-VISIT's fingerprint system;
it will now capture all 10 fingerprints instead of two.

DHS's budget request also includes $3.96 million for the Office ofScreening Coordination and Operations. This amount is significantlylower than its $847 million request last year, reflecting the decisionnot to combine eight different screening programs under the office,instead funding each program separately. The current budget requeststates that the money will be used to set common standards forgovernment screening as well as for Registered Traveler screeningprograms run by private companies. Participants in the programs mustprovide iris scans and fingerprints and pass a background check by theTransportation Security Administration. It is unknown what percentage ofTSA's $6.3 billion request would pay for these background checks, whicheach cost $30 to $50. EPIC's October 2005 Spotlight on Surveillancereport found that Registered Traveler had significant security andprivacy problems.

However, several homeland security programs were apparently slated forcuts under the President's Management Agenda. In a speech earlier thisweek, President Bush explained the program: "We ask federal managers toachieve good results at reasonable costs, and we measure them. The pointis, is that if they can't prove they're achieving good results, then theprograms, in my judgment, ought to be eliminated and/or trimmed back."
Included in the list of programs that have been deemed "not performing"
are: Transportation Security Administration's Air Cargo SecurityPrograms, Baggage Screening Technology, Federal Air Marshal Service,Passenger Screening Technology programs, the Border Patrol, and theCoast Guard's Drug Interdiction program.

The Government Printing Office's Web page on the Fiscal Year 2007Budget:

http://www.gpoaccess.gov/usbudget/fy07/browse.html

Department of Homeland Security's Budget in Brief Fiscal Year 2007(pdf):

http://www.epic.org/redirect/dhs2007budget.html

Government Web site listing "not performing" federal programs:

http://www.whitehouse.gov/omb/expectmore/notperform.html

President Bush's Feb. 8, 2006 speech discussing 2007 budget:

http://www.whitehouse.gov/news/releases/2006/02/20060208-7.html




[6] News in Brief

Focus on Medical Privacy Threats IntensifiesConsumer activists and health professionals alike are increasing theirfocus upon the threats that a national electronic health records systemmight have to patient privacy. Consumer Reports and Health ManagementTechnology have both published articles outlining the dangers of anational network implemented without any privacy protections, includinghealth information being shared with marketers or with employers, whocould take adverse action against employees based upon medical records.
Errors in medical records would also be more spread faster and fartherin an online environment. Those concerned about a national network beingbuilt without any privacy safeguards should sign the online petition atPatientprivacyrights.org.

"I Want My Medical Privacy" Petition:

http://www.patientprivacyrights.org/petition

Patient Privacy Rights http://www.patientprivacyrights.org

Consumer Reports on Medical Privacy Threats:

http://www.epic.org/redirect/cr_nhin.html

Health Management Technology on the National Health Information Network:

http://www.healthmgttech.com/archives/0206/0206rhio_nation.htm

Centers for Disease Control Urged to Limit Passenger Data CollectionEPIC said in comments to the Centers for Disease Control and Preventionthat it should limit a proposed rule that would require airline andshipping industries to gather passenger information, maintain itelectronically for at least 60 days, and release it to the CDC within 12hours of a request. EPIC urged the CDC collect only necessary data andto set strict security standards to keep passenger data secure fromunauthorized access and misuse. The CDC also should require the clearand open disclosure that travelers can refuse to submit theirinformation without facing penalties, EPIC said.

EPIC's Comments to the CDC (Jan. 30, 2006) (pdf):

http://www.epic.org/privacy/medical/cdc_com013006.pdf

The Proposed CDC Rule:

http://www.cdc.gov/ncidod/dq/nprm/

EPIC's Medical Privacy page:

http://www.epic.org/privacy/medical/

Federal Appeals Court Upholds Travel ID RequirementA federal appeals court has dismissed a lawsuit about federal airportregulations requiring passengers to show identification before theyboard planes. John Gilmore, co-founder of the Electronic FrontierFoundation, sued the Bush administration, which claims that the IDrequirement is necessary for security but has not publicly identifiedany actual regulation requiring it. A unanimous three-judge panel saidthe policy did not violate due process because the law was not acriminal law, and passengers are fully informed about the policy. Thecourt also said that passengers have a "meaningful choice." A passenger"could have presented identification, submitted to a search, or left theairport," the court said.

Ninth Circuit Court of Appeals Opinion about Gilmore v. Gonzales (pdf):

http://www.epic.org/redirect/gilmore_decision.html

EPIC's National ID and REAL ID Act page:

http://www.epic.org/privacy/id_cards/

Key Privacy Concessions Gained in UK National ID PlansIn the United Kingdom, the House of Lords recently amended plans for anational ID card to include important privacy protections. According tothe amendments, the card would be voluntary, and not a requirement forUK residents. In addition, the government must conduct a study detailingthe cost of the scheme, and must provide adequate security for storeddata. While Home Office officials have agreed to conduct a study everysix months, they continue to oppose a voluntary ID. The legislation onthe national ID card returns to the House of Commons on February 13.

Privacy International on National ID Cards:

http://www.epic.org/redirect/pi_id_cards.html

EPIC's National ID and REAL ID Page http://www.epic.org/privacy/id_cards/

Lawmakers Criticize Tech Companies' Speech Crackdown in ChinaMembers of Congress recently accused four major US Internet companies,Microsoft, Yahoo, Cisco Systems, and Google, of helping the Chinesegovernment block certain online information to its citizens by providingit with surveillance and filtering tools. Yahoo has been furthercriticized for its role in helping Chinese authorities identifydissidents who posted information on the Web through Yahoo. Two suchidentified dissidents were arrested and sentenced to prison terms of 8and 10 years. Chinese authorities strictly enforce laws that limitInternet use and censor specific information such as references todissidents. The four companies are scheduled to testify at hearingsbefore the U.S. House of Representatives on February 15.

Hearing Notice:

http://wwwc.house.gov/international_relations/109/af021506.htm

House Subcommittee on Africa, Global Human Rights, and International Operations:

http://wwwc.house.gov/international_relations/afhear.htm

EPIC's Free Speech Page:

http://www.epic.org/free_speech/

Face and Fingerprints Swiped in Dutch Biometric Passport CrackA Dutch TV program recently revealed that the Dutch RFID-enabledbiometric passport was cracked in the summer of 2005 by smartcardsecurity specialist Riscure. Due to an poorly implemented encryption keyscheme, eavesdroppers could record the conversation between an RFIDreader and the passport and later decrypt the contents of theconversation. The passport holder's biometric data was decrypted on astandard PC in about 2 hours. Many other countries, including the UnitedStates, are moving ahead with plans to include RFID technology inpassports.

EPIC Resources on RFID:

http://www.epic.org/privacy/rfid

Register Story on the Passport Hack:

http://www.epic.org/redirect/dutch_hack.html

Acxiom Proposed Massive Internet-Scanning SystemDocuments obtained by EPIC from the Department of Justice under theFreedom of Information Act show that commercial data broker Acxiomproposed a system to automatically scan the Internet and identifywebsites "belonging to advocates of extremist views and actions..." Theplan proposed to extract personal information from websites and use it“to establish possible connections between extremist groups" and tocollect data for an "Identity Verification System to be used byairlines, rental car agencies, and other business and governmentagencies." Prior releases of FOIA documents showed that Acxiom wasconsidered as a source of data for the Total Information Awarenessprogram. The $1,000,000 proposal was submitted to the Justice Departmentthrough Representative Vic Snyder (D-AR) on behalf of Acxiom andUniversity of Arkansas's Department of Computer Science. It is unclearwhether the proposal was ever funded.

Acxiom FOIA Documents (pdf):

http://epic.org/privacy/choicepoint/acxiominternet.pdf

EPIC Commercial Data Broker Page:

http://www.epic.org/privacy/choicepoint/

Verichip RFID Implant ClonedProgrammer Jonathan Westhues has recently proved that the Verichipimplantable RFID chip can be easily copied. Anybody capable ofpurchasing off the shelf electronics equipment and reading thedescription below can now impersonate the bearer of the chip and gainaccess to their medical records, among other things. As Verichip hasmarketed their chip as a means of managing access control to buildingsand medical records, this represents a significant threat to theirbearer's privacy and security.

For more information about the Verichip, see EPIC's Verichip Page:

http://www.epic.org/privacy/rfid/verichip.html

Westhues' Page on How to Clone a Verichip:

http://cq.cx/verichip.pl




[7] EPIC Bookstore: Robert Sherrill's "First Amendment Felon"


EPIC Bookstore: Robert Sherrill's “First Amendment Felon”

First Amendment Felon: The Story of Frank Wilkinson, His 132,000-PageFBI File, and His Epic Fight for Civil Rights and Liberties, NationBooks, 2005.

http://www.powells.com/partner/24075/biblio/1-1560257792-0

The story of Frank Wilkinson, who passed away just last month, is onethat needs to be told, in order to remind us that fear and politicalopportunism are often the greatest threats to free speech. RobertSherrill's account of Wilkinson's various struggles with J. EdgarHoover's FBI and with the House Un-American Activities Committeeprovides just such a pertinent reminder. When called before HUAC in1958, Wilkinson refused to answer questions about his politicalaffiliations, citing not the Fifth Amendment, but the First. When helost his Supreme Court appeal in 1961, he was jailed for nine months forcontempt of Congress. Upon his release, he campaigned for the abolitionof HUAC, finally succeeding in 1975.

Sherrill's book provides wide-ranging and vivid context for its subject,covering Wilkinson's college years through his 1975 vindication, but theauthor's perspectives and allegiances are clear. This does not, however,diminish the facts of Wilkinson's defiance. Make no mistake
--
this is apolitical book, written with an eye on the parallels between theclimates of suspicion both then and now.

--
Sherwin Siy



EPIC Publications:

"Privacy & Human Rights 2004: An International Survey of Privacy Lawsand Developments" (EPIC 2004). Price: $50.
http://www.epic.org/bookstore/phr2004

This annual report by EPIC and Privacy International provides anoverview of key privacy topics and reviews the state of privacy in over60 countries around the world. The report outlines legal protections,new challenges, and important issues and events relating to privacy.
Privacy & Human Rights 2004 is the most comprehensive report on privacyand data protection ever published.



"FOIA 2004: Litigation Under the Federal Open Government Laws," HarryHammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004). Price:
$40.
http://www.epic.org/bookstore/foia2004

This is the standard reference work covering all aspects of the Freedomof Information Act, the Privacy Act, the Government in the Sunshine Act,and the Federal Advisory Committee Act. The 22nd edition fully updatesthe manual that lawyers, journalists and researchers have relied on formore than 25 years. For those who litigate open government cases (orneed to learn how to litigate them), this is an essential referencemanual.



"The Public Voice WSIS Sourcebook: Perspectives on the World Summit onthe Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook

This resource promotes a dialogue on the issues, the outcomes, and theprocess of the World Summit on the Information Society (WSIS). Thisreference guide provides the official UN documents, regional andissue-oriented perspectives, and recommendations and proposals forfuture action, as well as a useful list of resources and contacts forindividuals and organizations that wish to become more involved in theWSIS process.



"The Privacy Law Sourcebook 2004: United States Law, International Law,and Recent Developments," Marc Rotenberg, editor (EPIC 2005). Price:
$40.
http://www.epic.org/bookstore/pls2004/

The Privacy Law Sourcebook, which has been called the "Physician's DeskReference" of the privacy world, is the leading resource for students,attorneys, researchers, and journalists interested in pursuing privacylaw in the United States and around the world. It includes the fulltexts of major privacy laws and directives such as the Fair CreditReporting Act, the Privacy Act, and the OECD Privacy Guidelines, as wellas an up-to-date section on recent developments. New materials includethe APEC Privacy Framework, the Video Voyeurism Prevention Act, and theCAN-SPAM Act.



"Filters and Freedom 2.0: Free Speech Perspectives on Internet ContentControls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0

A collection of essays, studies, and critiques of Internet contentfiltering. These papers are instrumental in explaining why filteringthreatens free expression.



"The Consumer Law Sourcebook 2000: Electronic Commerce and the GlobalEconomy," Sarah Andrews, editor (EPIC 2000). Price: $40.
http://www.epic.org/cls

The Consumer Law Sourcebook provides a basic set of materials forconsumers, policy makers, practitioners and researchers who areinterested in the emerging field of electronic commerce. The focus ison framework legislation that articulates basic rights for consumers andthe basic responsibilities for businesses in the online economy.



"Cryptography and Liberty 2000: An International Survey of EncryptionPolicy," Wayne Madsen and David Banisar, authors (EPIC 2000). Price:
$20.
http://www.epic.org/bookstore/crypto00&/

EPIC's third survey of encryption policies around the world. Theresults indicate that the efforts to reduce export controls on strongencryption products have largely succeeded, although several governmentsare gaining new powers to combat the perceived threats of encryption tolaw enforcement.



EPIC publications and other books on privacy, open government, freeexpression, crypto and governance can be ordered at:

EPIC Bookstore http://www.epic.org/bookstore

"EPIC Bookshelf" at Powell's Bookshttp://www.powells.com/features/epic/epic.html



EPIC also publishes EPIC FOIA Notes, which provides brief summaries ofinteresting documents obtained from government agencies under theFreedom of Information Act.

Subscribe to EPIC FOIA Notes at:
https://mailman.epic.org/cgi-bin/control/foia_notes




[8] Upcoming Conferences and Events

Call for papers for the Workshop on Generating Collaborative Research inthe Ethical Design of Surveillance Infrastructures. The deadline forproposals is March 1, 2006. For more information:
http://communication.utexas.edu/ethicalsurveillance/

IAPP National Summit. International Association of PrivacyProfessionals. Washington, DC. March 8-10, 2006. For more information:
https://www.privacyassociation.org/registration

Call for papers for the 34th Research Conference on Communication,Information, and Internet Policy. Telecommunications Policy ResearchConference. Proposals should be based on current theoretical orempirical research relevant to communication and information policy, andmay be from any disciplinary perspective. Deadline is March 31, 2006.
For more information:
http://www.tprc.org/TPRC06/call06.htm

Beyond the Basics: Advanced Legal Topics in Open Source andCollaborative Development in the Global Marketplace. University ofWashington School of Law. March 21, 2006. Seattle, Washington. For moreinformation:
http://www.law.washington.edu/lct/Events/FOSS/

Making PKI Easy to Use. National Institutes of Health. April 4-6, 2006.
Gaithersburg, Maryland. For more information:
http://middleware.internet2.edu/pki06/

First International Conference on Availability, Reliability andSecurity. Vienna University of Technology. April 20-22, 2006. Vienna,Austria. For more information:
http://www.ifs.tuwien.ac.at/ares2006/

CHI 2006 Workshop on Privacy-Enhanced Personalization. UC IrvineInstitute for Software Research and the National Science Foundation.
April 22-23. Montreal, Quebec, Canada. For more information:
http://www.isr.uci.edu/pep06/

The First International Conference on Legal, Security and Privacy Issuesin IT (LSPI). CompLex. April 30-May 2, 2006. Hamburg, Germany. For moreinformation:
http://www.kierkegaard.co.uk/

Computers, Freedom, and Privacy Conference (CFP 2006). Association forComputing Machinery May 2-5, 2006. Washington, DC. For more information:
http://cfp2006.org/

34th Research Conference on Communication, Information, and InternetPolicy. Telecommunications Policy Research Conference. September29-October 1, 2006. Arlington, Virginia. For more information:
http://www.tprc.org/TPRC06/2006.htm

International Conference on Privacy, Security, and Trust (PST 2006).
University of Ontario Institute of Technology. October 20-November 1,
2006. Oshawa, Ontario, Canada. For more information:
http://www.businessandit.uoit.ca/pst2006/

BSR 2006 Annual Conference. Business for Social Responsibility. November7-10, 2006. New York, New York. For more information:
http://www.bsr.org/BSRConferences/index.cfm


Subscription Information

Subscribe/unsubscribe via web interface:

https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news

Back issues are available at:

http://www.epic.org/alert

The EPIC Alert displays best in a fixed-width font, such as Courier.


Privacy Policy

The EPIC Alert mailing list is used only to mail the EPIC Alert and tosend notices about EPIC activities. We do not sell, rent or share ourmailing list. We also intend to challenge any subpoena or other legalprocess seeking access to our mailing list. We do not enhance (link toother databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your e-mail addressfrom this list, please follow the above instructions under "subscriptioninformation."


About EPIC

The Electronic Privacy Information Center is a public interest researchcenter in Washington, DC. It was established in 1994 to focus publicattention on emerging privacy issues such as the Clipper Chip, theDigital Telephony proposal, national ID cards, medical record privacy,and the collection and sale of personal information. EPIC publishes theEPIC Alert, pursues Freedom of Information Act litigation, and conductspolicy research. For more information, see http://www.epic.org or writeEPIC, 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202483 1140 (tel), +1 202 483 1248 (fax).

If you'd like to support the work of the Electronic Privacy InformationCenter, contributions are welcome and fully tax-deductible. Checksshould be made out to "EPIC" and sent to 1718 Connecticut Ave., NW,Suite 200, Washington, DC 20009. Or you can contribute online at:

http://www.epic.org/donate

Your contributions will help support Freedom of Information Act andFirst Amendment litigation, strong and effective advocacy for the rightof privacy and efforts to oppose government regulation of encryption andexpanding wiretapping powers.

Thank you for your support.



.


WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.worldlii.org/int/journals/EPICAlert/2006/3.html