EPIC logo

  
========================================================================
                           E P I C  A l e r t
========================================================================
Volume 14.04                                           February 23, 2007
------------------------------------------------------------------------

                            Published by the
               Electronic Privacy Information Center (EPIC)
                            Washington, D.C.

             http://www.epic.org/alert/EPIC_Alert_14.04.html


========================================================================
Table of Contents
========================================================================
[1] EPIC Warns Maryland Senate of REAL ID's Security Risks
[2] Voting Reports: Accessibility, Identification and Voter Turnout
[3] EPIC Urges Privacy and Security Safeguards for Traveler Program
[4] New Privacy Bills Introduced
[5] EU Countries Begin Looking at Data Retention Proposals
[6] News in Brief
[7] EPIC Bookstore: "Identity Crisis"
[8] Upcoming Conferences and Events

========================================================================
[1] EPIC Warns Maryland Senate of REAL ID's Security Risks
========================================================================

At a public hearing of the Maryland Senate's Judicial Proceedings
Committee concerning a bill calling for repeal of the federal REAL ID
Act, EPIC testified about the privacy and security risks of the national
ID scheme. The REAL ID Act mandates federal requirements for state
driver's licenses and requires state DMVs to verify identification
documents, such as birth certificates.

Melissa Ngo, Director of EPIC's Identification and Surveillance Project,
explained that the privacy and security risks of REAL ID remain
unresolved. The federal legislation would create a national database
with the personal data of 245 million license and state ID cardholders,
yet there is no plan for adequate privacy and security safeguards, EPIC
said. EPIC said another significant security risk, besides that of
attacks by unauthorized users, is that of authorized users misusing or
abusing their power. For example, in a case in Maryland just last year,
three people - including a Maryland Motor Vehicle Administration
official - were indicted on charges of "conspiring to sell unlawfully
produced MVA-issued Maryland identification cards."

There is also the threat that REAL ID is ostensibly trying to protect
against: forged identification cards. "No matter how unforgeable we make
it, it will be forged. We can raise the price of forgery, but we can't
make it impossible. REAL IDs will be forged," security expert Bruce
Schneier has said. This means that people with evil intent will get
legitimate REAL ID cards in fake names, or even in the names of real
people whose identities have been stolen, he said.

EPIC also pointed to the adverse impact on victims of domestic violence.
The REAL ID Act requirement that state driver's licenses and
identification cards must list a person's actual address is a grave
threat Maryland's address confidentiality program. Including data
collection requirements without adequate privacy safeguards would put
Maryland's domestic violence victims at risk.

The Maryland bill under consideration would refuse to implement the REAL
ID Act, protest the actions of the Congress and the President in passing
and signing the legislation, request the repeal of REAL ID, and notify
the Maryland Congressional delegation, governor, president of Senate of
Maryland, and speaker of the House of Delegates of the resolution. EPIC
supported the bill, stating that "it is a sensible response by Maryland
to an ill-conceived federal law."

Maryland S.J. 5: REAL ID Act of 2005: Protest and Repeal:

     http://mlis.state.md.us/2007rs/billfile/SJ0005.htm

Bruce Schneier, Real-ID: Costs and Benefits:

     http://www.schneier.com/blog/archives/2007/01/realid_costs_an.html

EPIC's Testimony at Feb. 15, 2007, Hearing of the Maryland Senate
Judicial Proceedings Committee (pdf):

     http://www.epic.org/privacy/id_cards/ngo_test_021507.pdf

EPIC's page on Domestic Violence:

     http://www.epic.org/privacy/dv/

EPIC's page on National ID Cards and the REAL ID Act:

     http://www.epic.org/privacy/id_cards/

========================================================================
[2] Voting Reports: Accessibility, Identification and Voter Turnout
========================================================================

Election reform continues to see significant contributions from the
research and election integrity communities.  A recently released Demos
report on the accessibility of touch screen voting systems found that
there are doubts that direct recording electronic or touch screen voting
machines are providing access to voters with disabilities. The report
found that although touch screen voting systems were once considered
essential to private voting booth access for voters with disabilities,
they often do not work as promised.

The Help America Vote Act mandated accessible voting systems for the
disabled and for language minorities.  The law explicitly directed that
"at least one direct recording electronic voting system or other voting
system equipped for individuals with disabilities at each polling place"
be made available.  Further accessibility included non-visual
accessibility for the blind and visually impaired, in a manner that
provides the same opportunity for access and participation (including
privacy and independence).” The report findings raise questions about
whether this goal of equal voting rights for the disabled and language
minority voters have been satisfied.

In other voting related news, the New York Times disclosed that the
Election Assistance Commission had contracted a study on the impact of
voter ID requirements on voter participation.  Although the Commission
has not released the final report, disclosed research revealed that
Hispanic voters were 10% less likely to vote under those requirements
for signatures or greater identification. African Americans were 5.7%
less likely to vote under these conditions.

A paper published by one of the study's chief contributors, Dr. Tim
Vercellott, explores some of the issues outlined in the final report to
the Commission.  The paper, "Protecting the franchise, or restricting
it? The effects of voter identification requirements on turnout," found
that his research provided "evidence that as voter identification
requirements vary, voter turnout does as well."

Demos Accessibility Report:

     http://www.demos.org/page504.cfm

Help America Vote Act:

     http://www.fec.gov/hava/law_ext.txt

EPIC's page on Voting:

     http://www.epic.org/privacy/voting/

National Committee for Voting Integrity:

     http://votingintegrity.org/

========================================================================
[3] EPIC Urges Privacy and Security Safeguards for Traveler Program
========================================================================

In comments to the Department of Homeland Security, EPIC urged the
agency to fully apply Privacy Act requirements of notice, access, and
correction to the new traveler redress program and its underlying system
of watch lists. EPIC explained that full application of the Privacy Act
requirements to government record systems is the only way to ensure that
data is accurate and complete, which is especially important in the
context of watch lists, where mistakes and misidentifications are
costly.

The Traveler Redress Inquiry Program is described as "a central gateway
to address watch list misidentification issues, situations where
individuals believe they have faced screening problems at immigration
points of entry, or have been unfairly or incorrectly delayed, denied
boarding or identified for additional screening at our nation's
transportation hubs." However, because the program provides a central
system for submitting, directing and tracking, but not for resolving
complaints, it fails to address the significant problems in current
traveler redress procedures, EPIC said.

EPIC explained that the federal watch lists are full of errors. In
December 2005, the director of TSA's redress office revealed that more
than 30,000 people who are not terrorists have asked TSA to remove their
names from the lists since September 11, 2001. Last month, the head of
TSA said that the watch lists were being reviewed, and he expected to
cut the list of names in half.

The Department of Homeland Security proposes to exempt the program from
Privacy Act of 1974 requirements of access to, correction of, and
accuracy of personal information. Instead of the Privacy Act
obligations, the agency asks citizens to rely on its "internal quality
assurance procedures" to ensure their files are accurate and complete.
EPIC explained that these procedures aren't working, as evidenced by the
many "false positives" and the difficulty citizens have when attempting
to clear their names.

The reasons for exempting the program and the underlying watch list
systems from Privacy Act requirement are specious, EPIC said. The
deliberate obfuscation of information does not help the terrorists, but
instead frustrates the innocent citizens who apply for redress because
they are mistakenly matched to or mistakenly listed on the watch lists,
EPIC said.

In the Privacy Impact Assessment for the redress program, the Department
of Homeland Security discussed the accuracy of data collected from
individuals seeking redress. "Because the individual provides the
information about him or herself directly, the likelihood of erroneous
[Personally Identifiable Information] is greatly reduced." EPIC agreed,
and said the only way to ensure the accuracy, timeliness, relevance and
completeness of the data used is to allow individuals to access, review
and correct their records.

Department of Homeland Security Press Release about TRIP:

     http://www.dhs.gov/xnews/releases/pr_1169062569230.shtm

Department of Homeland Security Privacy Office Privacy Impact Assessment
of TRIP (Jan. 18, 2007) (pdf):

     http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_dhstrip.pdf

Department of Homeland Security Privacy Office Report on Watch Lists
(Apr. 27, 2006) (pdf):

     http://www.dhs.gov/xlibrary/assets/privacy/privacy_rpt_nofly.pdf

EPIC's Comments to the Department of Homeland Security about TRIP (pdf):

     http://www.epic.org/privacy/airtravel/profiling/trip_022007.pdf

EPIC's November 2006 Spotlight on Surveillance on TRIP:

     http://www.epic.org/privacy/surveillance/spotlight/1106/

EPIC's page on Passenger Profiling:

     http://www.epic.org/privacy/airtravel/profiling.html

========================================================================
[4] New Privacy Bills Introduced
========================================================================

Several consumer protection bills have been introduced.  The Protecting
Children in the 21st Century Act (S.49) prohibits the purchase or sale
of personal information of individuals who are known to be under the age
of 16 for the purposes of marketing to that individual.  H.R. 1015
requires automobile dealers to disclose to consumers the presence of
event data recorders, or `black boxes', on new automobiles, and requires
manufacturers to provide the consumer with the option to enable and
disable such devices on future automobiles. The Protecting Consumer
Phone Records Act (S.92) prohibits providers of commercial mobile
services from providing wireless phone numbers to directories without
notice and consent. H.R. 964 criminalizes unfair/deceptive practices
involving computers, including accessing or hijacking another's computer
to damage it or another.

Two bills in the House and one in the Senate aim to protect Social
Security numbers. H.R. 220 would prohibit the establishment in the
Federal Government of any uniform national identifying number, while
H.R. 948 and S. 238 would prohibit the display, purchase or sale of
Social Security numbers.

The Ensuring Implementation of the 9/11 Commission Report Act (S.328)
strengthens the Privacy and Civil Liberties Oversight Board. This
provision is comparable to Title VIII of H.R. 1, the bill passed by the
House in early January.

The Senate is considering the genetic privacy bill (S.358) that is
identical to a House bill on the same topic, and the House has
introduced a security breach notification bill, H.R. 836, that is
similar to a Senate bill introduced last month by Senator Leahy.

The Intelligence Authorization Act, S.372, has been reported on twice in
the Senate.  The bill increases intelligence information sharing between
federal agencies while limiting the application of the Privacy Act to
that information and exempting files of the Office of the Director of
National Intelligence from the search and review requirements of the
Freedom of Information Act.


With regard to travel privacy, H.R. 1061 would require Homeland Security
and one State to conduct a pilot program to determine if the driver's
license of such State may be enhanced so as to satisfy the requirements
of the `Western Hemisphere Travel Initiative') with respect to land and
sea travel, and S.330 would establish a biometric identification card
program so employers can verify immigrants' status.

Protecting Children in the 21st Century Act (S.49):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:s.00049:

To require automobile dealers to disclose to consumers the presence of
event data recorders, or "black boxes", on new automobiles, and to
require manufacturers to provide the consumer with the option to enable
and disable such devices on future automobiles (H.R. 1015):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:h.r.01015:

Protecting Consumer Phone Records Act (S. 92):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:s.00092:

Identity Theft Prevention Act of 2007 (H.R. 220):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:h.r.00220:

Social Security Number Protection Act of 2007 (H.R. 948):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:h.r.00948:

Social Security Number Misuse Prevention Act (S. 238):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:s.00238:

Ensuring Implementation of the 9/11 Commission Report Act (S. 328):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:s.00328:

Genetic Information Nondiscrimination Act of 2007 (S. 358):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:s.00358:

Cyber-Security Enhancement and Consumer Data Protection Act of 2007
(H.R. 836):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:h.r.00836:

Intelligence Authorization Act for Fiscal Year 2007 (S.372):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:s.00372:

To implement the Western Hemisphere Travel Initiative and other
registered traveler programs of the Department of Homeland Security
(H.R. 1061):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:h.r.01061:

Border Security and Immigration Reform Act of 2007 (S. 330):

     http://thomas.loc.gov/cgi-bin/bdquery/z?d110:s.00330:


========================================================================
[5] EU Countries Begin Looking at Data Retention Proposals
========================================================================

Several European countries are looking at different ways of implementing
data retention following a recent EU directive.  Internet providers,
wired and wireless carriers will have to maintain location and traffic
data for up to two years. Retained data will be used for investigating
terrorism and organized crime, rather than a more far-reaching proposal
of “preventing” crime.

Different countries have until August of 2007 to sort out how to locally
implement the directive. A German proposal would prohibit pseudonymous
Internet usage. A Dutch proposal would mandate retaining the exact
location of a cell phone user during their call. Meanwhile the United
Kingdom is proposing to follow a voluntary system where the government
funds the costs of data retention by participating telecommunications
carriers and ISPs.

In the United States, Rep. Lamar Smith has introduced a bill on Internet
exploitation of children that includes data retention requirements for
Internet Service Providers (H.R.837). Attorney General Gonzales has
called on ISPs to retain data for a “reasonable time,” in order to
facilitate law enforcement prosecutions, but no requirement has yet been
implemented.  Currently, US ISPs retain user data voluntarily and to
different extents. They are only legally required to retain data when
specifically ordered to by courts.

EU Directive on Data Retention (Directive 2006/24/EC) (pdf):

     http://www.epic.org/privacy/pdf/EUDirective2006.pdf

Internet Stopping Adults Facilitating the Exploitation of Today's Youth
Act (SAFETY) of 2007 (H.R. 837):

     http://thomas.loc.gov/cgi-bin/query/z?c110:H.R.837:

EPIC's Page on International Data Retention:

     http://www.epic.org/privacy/intl/data_retention.html

Privacy International's page on EU Data Retention:

     http://www.epic.org/redirect/PI022307.html

========================================================================
[6] News in Brief
========================================================================

Federal Judge Restricts New York Police Surveillance of Protests

A federal judge limited New York Police Department's ability to tape
record lawful political protests. According to the decision,
surveillance of protests is limited to when unlawful activity may occur
and after an application has been made to a police intelligence
commissioner. NYPD surveillance operates under a settlement agreement
reached in 1985 in a case originally filed in 1971. The ruling clarified
a 2003 interpretation of that agreement. The judge did not say that the
NYPD violated the First Amendment, rather that it had violated that
settlement agreement. Further violations of the clarified interpretation
of the agreement could be met with contempt charges.

EPIC's page on Video Surveillance:

     http://www.epic.org/privacy/surveillance/

Handschu v. Special Services Division, 71 Civ. 2203 (CSH) (S.D.N.Y.
2007) (pdf):

     http://www.epic.org/privacy/pdf/NYCRuling.pdf

Phoenix Airport Begins 'Backscatter X-Ray' Field Tests on Travelers

Beginning this Friday, Sky Harbor International Airport in Phoenix,
Ariz., will be field testing a new "backscatter X-ray" system intended
to screen passengers before boarding airplanes. This method of screening
passengers would reveal not only prohibited items but also medical
details such as prosthetic devices and old injuries. The $100,000
refrigerator-size machines use "backscatter" technology, which bounces
low-radiation X-rays off of a passenger to produce photo-quality images
of metal, plastic and organic materials underneath clothes. The machines
were to debut in December, but was postponed while the Transportation
Security Administration attempted to answer the privacy concerns. Now,
the agency says machine operators see an image that "obscures" a
person's private areas; however, the machines still capture
photo-quality images so detailed as to show genitalia. The fact that the
machines have the capacity to record and store these detailed,
unobscured images raises questions about secondary uses of the data.

EPIC's June 2005 Spotlight on Surveillance About Backscatter X-Ray
Machines:

     http://www.epic.org/privacy/surveillance/spotlight/0605/

EPIC's Backscatter X-Ray Screening Technology Page:

     http://www.epic.org/privacy/airtravel/backscatter/

Symposium on Attorney General's Report on Criminal History Background
Checks

SEARCH, the National Consortium for Justice and Information Statistics
held a symposium on the Attorney General's Report on Criminal History
Background Checks. Among the reports recommendations are that FBI
criminal records be available to employers and private agencies
conducting background checks and that privacy safeguards such as rights
to appeal and informed consent be built into these background checks.
EPIC's comments to the report preparers stressed that limits should be
placed on the time that the information is available, and the
individuals should have the rights to correct their records, whether in
private or government hands. It is expected that Congress will hold
hearings on this report in the coming months.

SEARCH homepage:

     http://www.search.org/

Report on Criminal History Background Checks (pdf):

     http://www.usdoj.gov/olp/ag_bgchecks_report.pdf

EPIC's Comments on Criminal History Beckground Checks:

     http://www.epic.org/privacy/epicprccrimhistorycomments.pdf

Ponemon 2007 Privacy Trust Study of the United States Government

The Ponemon Institute has released its 2007 Privacy Trust Study of the
United States Government, to understand the level of confidence
Americans have in government agencies that routinely collect and use the
public's personal information. The overall trend suggested a decline in
public trust since the think tank first studied the issue in 2004.
Interestingly, survey showed diminishing public trust for the National
Security Agency and particularly the Department of Veterans Affairs. The
National Security Agency's domestic surveillance program, which operated
without any legal authority, contributed to a significant loss of
support for the agency, and the Department of Veterans of Affairs, an
agency that many Americans would otherwise support, recently lost the
records of almost 27 million military personnel.

Ponemon 2007 Privacy Trust Study (pdf):
     
     http://www.epic.org/privacy/pdf/2007ponemon.pdf

UPI-Zogby Poll on Health Privacy Concern

Over 50 percent of U.S. respondents in a UPI-Zogby International poll
expressed privacy concerns regarding their medical records and
information. African-Americans were the most likely to express concern
as 34.5 percent of those participants gave an answer of “highly
concerned.” Some 30.9 percent of Hispanics in the poll also said they
were "highly concerned" with the privacy of their medical records.

EPIC's page on Medical Records Privacy:

     http://www.epic.org/privacy/medical

Patient Privacy Rights:

     http://www.patientprivacyrights.org

Privacy and Human Rights 2006 Call for Contributions

The Privacy and Human Rights report provides an overview of key privacy
topics and reviews the state of privacy in over 70 countries around the
world. The report outlines legal protections, new challenges, and
important issues and events relating to privacy. Privacy and Human
Rights 2005 is the most comprehensive report on privacy and data
protection ever published.

Editors of Privacy and Human Rights are interested in expanding their
list of contributors. They are specifically interested in news and
information from academics, experts and government officials from around
the world regarding recent laws, initiatives, threats to privacy, NGO
activities and other significant developments. Contributions can be
submitted, using the template below, to Allison Knight at
knight@epic.org.

Privacy and Human Rights Contribution Template:

     http://www.epic.org/templates/PHRTemplate.dot

Privacy and Human Rights 2005:

     http://www.powells.com/biblio/1893044254?&PID=24075

Privacy and Human Rights online at Privacy International:

     http://www.privacyinternational.org


========================================================================
[7] EPIC Bookstore: "Identity Crisis"
========================================================================

"Identity Crisis: How Identification is Overused and Misunderstood" by
Jim Harper (Cato Institute 2006).

     http://www.epic.org/redirect/Cato022307.html

This book offers a snapshot of the identification landscape, where we
have been, where we are, and where we might choose to go. Harper's book
provides a great outline of the issues surrounding identification as
well as a glossary of terms and definitions to get a novice up to speed.
He breaks down identification categories into three areas: something you
are (color of hair, height, weight), something you know (mother's maiden
name, SSN, birth date), and something you have (access card, attire, or
other token). Each chapter begins with an amusing or interesting piece
of history or instance where identity and identification was relevant. 
The underlying theme of the book is the value of identity and the
advantages of identification in situations where it is beneficial to the
person.

Harper makes some important observations about risk assessment analysis
to determine the likelihood and the consequences of system failures.
Having predetermined the level of risk that a system can withstand and
the probability of success helps to develop balance in identification
systems that encourages secure systems that are still useful in a
practical commercial sense.

Harper distinguishes between government and private sector
identification systems and notes that in government bad systems tend to
be rewarded, while identification systems used by commercial entities
have incentives to weed out bad systems of identification. Harper
concludes that promoting the ability of the marketplace to reward good
systems of identification, and penalize bad systems of identification
may be the best road to follow. However, the book offers only mild
treatment of the willingness of the private sector to open its identity
systems to government agencies upon request. The book is well written
and a great read with lots of insightful and humorous observations about
identification and identification systems such as how they came into
being and how they are used in large and small ways in our daily life.
We are now in the digital information age and being aware of these
important considerations about identity and identification systems is
everyone's concern.

-- Lillie Coney


================================

EPIC Publications:

"Information Privacy Law: Cases and Materials, Second Edition" Daniel J.
Solove, Marc Rotenberg, and Paul Schwartz. (Aspen 2005). Price: $98.
http://www.epic.org/redirect/aspen_ipl_casebook.html

This clear, comprehensive introduction to the field of information
privacy law allows instructors to enliven their teaching of fundamental
concepts by addressing both enduring and emerging controversies. The
Second Edition addresses numerous rapidly developing areas of privacy
law, including: identity theft, government data mining and electronic
surveillance law, the Foreign Intelligence Surveillance Act,
intelligence sharing, RFID tags, GPS, spyware, web bugs, and more.
Information Privacy Law, Second Edition, builds a cohesive foundation
for an exciting course in this rapidly evolving area of law.

================================

"Privacy & Human Rights 2005: An International Survey of Privacy Laws
and Developments" (EPIC 2006). Price: $60.
http://www.epic.org/bookstore/phr2005/phr2005.html

This annual report by EPIC and Privacy International provides an
overview of key privacy topics and reviews the state of privacy in over
70 countries around the world. The report outlines legal protections,
new challenges, and important issues and events relating to privacy.
Privacy & Human Rights 2005 is the most comprehensive report on privacy
and data protection ever published.

================================

"FOIA 2004: Litigation Under the Federal Open Government Laws," Harry
Hammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004). Price:
$40.
http://www.epic.org/bookstore/foia2004

This is the standard reference work covering all aspects of the Freedom
of Information Act, the Privacy Act, the Government in the Sunshine Act,
and the Federal Advisory Committee Act.  The 22nd edition fully updates
the manual that lawyers, journalists and researchers have relied on for
more than 25 years.  For those who litigate open government cases (or
need to learn how to litigate them), this is an essential reference
manual.

================================

"The Public Voice WSIS Sourcebook: Perspectives on the World Summit on
the Information Society" (EPIC 2004). Price: $40.
http://www.epic.org/bookstore/pvsourcebook

This resource promotes a dialogue on the issues, the outcomes, and the
process of the World Summit on the Information Society (WSIS).  This
reference guide provides the official UN documents, regional and
issue-oriented perspectives, and recommendations and proposals for
future action, as well as a useful list of resources and contacts for
individuals and organizations that wish to become more involved in the
WSIS process.

================================

"The Privacy Law Sourcebook 2004: United States Law, International Law,
and Recent Developments," Marc Rotenberg, editor (EPIC 2005). Price:
$40.
http://www.epic.org/bookstore/pls2004/

The Privacy Law Sourcebook, which has been called the "Physician's Desk
Reference" of the privacy world, is the leading resource for students,
attorneys, researchers, and journalists interested in pursuing privacy
law in the United States and around the world. It includes the full
texts of major privacy laws and directives such as the Fair Credit
Reporting Act, the Privacy Act, and the OECD Privacy Guidelines, as well
as an up-to-date section on recent developments. New materials include
the APEC Privacy Framework, the Video Voyeurism Prevention Act, and the
CAN-SPAM Act.

================================

"Filters and Freedom 2.0: Free Speech Perspectives on Internet Content
Controls" (EPIC 2001). Price: $20.
http://www.epic.org/bookstore/filters2.0

A collection of essays, studies, and critiques of Internet content
filtering.  These papers are instrumental in explaining why filtering
threatens free expression.

================================

EPIC publications and other books on privacy, open government, free
expression, crypto and governance can be ordered at:

EPIC Bookstore http://www.epic.org/bookstore

"EPIC Bookshelf" at Powell's Books
http://www.powells.com/features/epic/epic.html

================================

EPIC also publishes EPIC FOIA Notes, which provides brief summaries of
interesting documents obtained from government agencies under the
Freedom of Information Act.

Subscribe to EPIC FOIA Notes at:
https://mailman.epic.org/cgi-bin/control/foia_notes


========================================================================
[8] Upcoming Conferences and Events
========================================================================

Privacy Coalition Meeting. February 23, 2007. Washington DC. For more
information contact Lillie Coney at: coney@epic.org

Internet Privacy Symposium: Research Findings from the OPC Contributions
Program. Privacy Commissioner of Canada and Law and Technology Group,
University of Ottawa. February 23, 2007. Ottawa, Ontario. For more
information:
http://www.commonlaw.uottawa.ca/tech/

Working Group Discussion on Federal Government Outsourcing of
Intelligence Gathering and Law Enforcement Duties. EPIC and Liberty
Coalition. February 28, 2007. Washington DC.  For more information
contact Melissa Ngo at: ngo@epic.org

RFID and Ubiquitous Computing. Trans Atlantic Consumer Dialogue. March
12, 2007. Brussels, Belgium. For more information:
http://www.tacd.org/

4th Annual Electronic Health Records Conference. Insight Information. 
March 13, 2007. Vancouver, Canada. For more information:
http://www.privcom.gc.ca/events/index_e.asp

Consumer Authentication: How Do You Know It Is Really Me? American Bar
Association, Section of Business Law. March 16, 2007. Washington, DC.

National FOI Day Conference. March 16, 2007. Washington DC. For more
information: http://www.firstamendmentcenter.org

5th Conference on Privacy and Public Access to Court Records. Center for
Legal and Court Technology and Administrative Office of the United
States Courts. March 22-23, 2007. Williamsburg, Virginia. For more
information:
http://www.courtaccess.org/

The Policy Challenges of Electronic Privacy.  European Parliamentary
Technology Assessment organization.  March 28, 2007.  Brussels, Belgium.
For more information contact viwta@vlaamsparlement.be

CFP2007: Computers, Freedom, and Privacy Conference. Association for
Computing Machinery. May 2007. Montreal, Canada. For more information:
http://www.cfp2007.org

Privacy Compliance Conference. The Canadian Institute.  May 30-31, 2007.
Toronto, Canada.  For more information:
http://www.privcom.gc.ca/events/index_e.asp

29th International Conference of Data Protection and Privacy
Commissioners. September 25-28, 2007.  Montreal, Canada. For more
information:
http://www.privacyconference2007.gc.ca/Terra_Incognita_home_E.html

======================================================================
Subscription Information
======================================================================

Subscribe/unsubscribe via web interface:

https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news

Back issues are available at:

http://www.epic.org/alert

The EPIC Alert displays best in a fixed-width font, such as Courier.

========================================================================
Privacy Policy
========================================================================

The EPIC Alert mailing list is used only to mail the EPIC Alert and to
send notices about EPIC activities.  We do not sell, rent or share our
mailing list.  We also intend to challenge any subpoena or other legal
process seeking access to our mailing list.  We do not enhance (link to
other databases) our mailing list or require your actual name.

In the event you wish to subscribe or unsubscribe your e-mail address
from this list, please follow the above instructions under "subscription
information."

========================================================================
About EPIC
========================================================================

The Electronic Privacy Information Center is a public interest research
center in Washington, DC.  It was established in 1994 to focus public
attention on emerging privacy issues such as the Clipper Chip, the
Digital Telephony proposal, national ID cards, medical record privacy,
and the collection and sale of personal information. EPIC publishes the
EPIC Alert, pursues Freedom of Information Act litigation, and conducts
policy research.  For more information, see http://www.epic.org or write
EPIC, 1718 Connecticut Ave., NW, Suite 200, Washington, DC 20009. +1 202
483 1140 (tel), +1 202 483 1248 (fax).

If you'd like to support the work of the Electronic Privacy Information
Center, contributions are welcome and fully tax-deductible.  Checks
should be made out to "EPIC" and sent to 1718 Connecticut Ave., NW,
Suite 200, Washington, DC 20009.  Or you can contribute online at:

http://www.epic.org/donate

Your contributions will help support Freedom of Information Act and
First Amendment litigation, strong and effective advocacy for the right
of privacy and efforts to oppose government regulation of encryption and
expanding wiretapping powers.

Thank you for your support.

------------------------- END EPIC Alert 14.04 -------------------------

.