EPIC Alert 14.11 (31 May 2007)



================================E P I C A l e r t===================================
Volume 14.11 May 31, 2007 
------------------------------------------------------------------------


Published by the 
Electronic Privacy Information Center (EPIC) 
Washington, D.C. 

http://www.epic.org/alert/EPIC_Alert_14.11.html 

========================================================================

Table of Contents 
========================================================================

(1) Filing Reveals Google Subject to "Second Request" 
(2) European Privacy Agency Opens Investigation Into Google 
(3) Congress to Hold Hearing on Employment Verification System 
(4) EPIC Urges Release of NSA Surveillance Program Documents 
(5) Last Public Meeting on Draft 2007 E-Voting Standards 
(6) News in Brief 
(7) EPIC Bookstore: "Understanding Surveillance Technologies" 
(8) Upcoming Conferences and Events 

========================================================================

(1) Filing Reveals Google Subject to "Second Request" 
========================================================================


A recent filing with the Security and Exchange Commission indicates
that the Federal Trade Commission has "issued a request for
additional information and documentary materials regarding the
proposed acquisition" of DoubleClick. Last week, the Federal Trade
Commission opened a preliminary antitrust investigation into Google's
planned $3.1 billion acquisition of the online advertising company. 

It was decided last week that the FTC, and not the Department of
Justice, would conduct the investigation; the two agencies share the
duty of antitrust enforcement, though the FTC has extensive expertise
in consumer privacy matters. The FTC's "second request" for
information suggests that the proposed acquisition raises more
serious antitrust issues. According to FTC Chair Majoras's statement
on the merger review process, "the majority of investigations in
which the FTC issued a second request resulted in a merger challenge,
consent order, or modification to the transaction, suggesting that
the FTC generally issues second requests only when there is a strong
possibility that some aspect of the investigation would violate the
antitrust laws." 

Last month, EPIC, the Center for Digital Democracy and the United
States Public Interest Research Group, filed a request for the FTC to
investigate the privacy implications of the proposed merger. In the
complaint, the groups noted that Google collects the search histories
of its users, while DoubleClick tracks what Web sites people visit.
The groups urged the FTC to assess the ability of Google to record,
analyze, track, and profile the activities of Internet users with
data that is both personally identifiable and data that is not
personally identifiable. The groups recommended that the merger not
be approved unless adequate privacy safeguards are established. 

In an antitrust investigation, regulators must define the relevant
market, and weigh the likely impact on competition. Privacy issues
are relevant to the Google/DoubleClick antitrust investigation
because of the unique circumstance presented in the world of online
advertising: 
the success of targeted marketing and the use of individuals'
personal data are inextricably linked. 

Securities Exchange Commission filing: 

http://www.epic.org/redirect/sec0507.html 

FTC Merger Reform Announcement (Feb. 2006) (pdf): 

http://www.ftc.gov/os/2006/02/mergerreviewprocess.pdf 

EPIC's Complaint to the FTC (pdf): 

http://www.epic.org/privacy/ftc/google/epic_complaint.pdf 

EPIC's FTC Google Complaint page: 

http://www.epic.org/privacy/ftc/google/ 

Letter from the NY State Consumer Protection Board (pdf): 

http://www.epic.org/privacy/ftc/google/CPB.pdf 

========================================================================

(2) European Privacy Agency Opens Investigation Into Google
========================================================================


The European Union's Article 29 Data Protection Working Party has
launched an investigation into Google's privacy practices. In a
letter to Google, chair of the Article 29 Working Party, Peter Schaar
asked whether the company has "fulfilled all the necessary
requirements" to abide by EU privacy rules. 

Mr. Schaar explained, "As you are aware, server logs are information
that can be linked to an identified or identifiable natural person
and can, therefore, be considered personal data in the meaning of
Data Protection Directive 95/46/EC. For that reason, their collection
and storage must respect data protection rules." EU Directive
95/46/EC states that individuals' personal information can only be
collected for "specified, explicit and legitimate purposes."
Information that is collected can only be kept in identifiable form
for as long as is "necessary for the purposes for which the data were
collected or for which they are further processed." 

Earlier this year, Google announced that it was changing its privacy
policy, and would maintain user-specific information from Web
searches for a period of 18 to 24 months. Google previously stored
this information for as long as it was useful. After the 18- to
24-month period, the company claims that it will obscure the data,
making it more difficult to identify individuals. This change "does
not seem to meet the requirements of the European legal data
protection framework," Mr. 
Schaar wrote. The Working Party requested a detailed explanation from
Google as to 1) "why this long storage period was chosen" for the
server logs, 2) "the purposes for which server logs need to be kept,"
and 3) "Google's legal justification for the storage of server logs
in general." Also, the Working Group questioned whether the 30-year
lifetime of the "Google cookie," which tracks users, "goes beyond
what seems to be 'strictly necessary' for the provision of the
service." 

Mr. Schaar pointed to the "Resolution on Privacy Protection and
Search Engines," which urged data minimization and addressed several
issues with regard to server logs and the detailed profiling of
users. "The Article 29 Working Party fully supports this Resolution
and would appreciate the detailed views of Google on the steps which
it has taken to fully implement its recommendations." The Working
Party will discuss the investigation into Google's privacy practices
at its meeting in June and requested that the company respond before
then. 

In 2001, a coalition of consumer organizations in Europe and North
America wrote to policymakers regarding the privacy implication of
the America Online and Time Warner merger. The groups urged officials
to " 
condition approval of the proposed merger on the adoption of
enforceable Fair Information Practices that would guarantee consumer
privacy safeguards at least equal to those that would be provided
under the EU Data Directive." The groups also recommended that EU and
US officials "consider the impact of mergers on privacy, as one
factor in the review to determine if a merger is in the public
interest" and establish "legal mechanisms to address privacy concerns
of mergers, such as mechanisms to place conditions on mergers that
would protect consumer privacy." 

Article 29 Data Protection Working Party page: 

http://www.epic.org/redirect/a29party.html 

Statement of TransAtlantic Consumer Dialogue Regarding Merger of
America Online and Time Warner and Privacy Protection (Feb. 2000)
(pdf): 

http://www.tacd.org/db_files/files/files-93-filetag.pdf 

========================================================================

(3) Congress to Hold Hearing on Employment Verification System
========================================================================


On June 7, the Subcommittee on Social Security of the Committee on
Ways and Means will hold a hearing on current and proposed employment
eligibility verification systems and the role of the Social Security
Administration in authenticating employment eligibility. Subcommittee
Chairman Michael R. McNulty (D-NY) said, ""If employment eligibility
verification is to be a key enforcement tool for immigration policy,
we must ensure the system is effective, efficient and feasible. We
need a better understanding of the possible consequences and impact
on the Social Security Administration if they are to undertake this
expanded responsibility without compromising their core mission of
administering Social Security." 

EPIC's current "Spotlight on Surveillance" scrutinizes the national
employment verification system now under consideration in Congress.
The national database is proposed to prevent undocumented immigrants
from obtaining employment in the United States, but it could instead
prevent millions of Americans from obtaining lawful employment. The
federal program will also be expensive. The Government Accountability
Office has estimated that a nationwide expansion of the Basic Pilot
program would cost $11.7 billion. 

Basic Pilot, a joint project of Customs and Immigration Services and
the Social Security Administration, is a voluntary employment
eligibility verification system created in 1997. In the Basic Pilot
program, an employer voluntarily fills out an online form with the
new employee's name, date of birth and Social Security Number within
three days of the employee's hire date. This information is checked
against Social Security Administration databases to verify identity
and, if the employee is a non-citizen, her data is then checked
against the Department of Homeland Security databases to verify
employment eligibility. 

Congress is considering two bills that would create a nationwide,
mandatory employment eligibility verification system. An examination
of the two bills finds that the proposed changes would make the
already-flawed identification systems worse for both U.S. citizens
and documented immigrants. As of December, Basic Pilot consisted of
12,000 employers, about 0.2 percent of the seven million employers
nationwide. 
In Fiscal Year 2005, less than one million verifications were run
through Basic Pilot. Under H.R. 1645 and S. AMDT 1150, all of the
nation's seven million employers would be mandated to use another
version Basic Pilot system, creating a national employment
eligibility verification system ("EEVS") of 143.6 million authorized
workers. 

Several government analyses of Basic Pilot have detailed significant
flaws in the system and have recommended against expanding the
employment verification system nationwide. EEVS would use the same
databases to check the employment eligibility of workers, though the
Government Accountability Office and the Social Security
Administration's Inspector General have found the databases used in
Basic Pilot are filled with inaccurate data, which can lead to
authorized workers being deemed ineligible for employment. The
Inspector General estimated that the Social Security Administration's
Numerical Identification File ("NUMIDENT") had about 17.8 million
records with discrepancies with name, date of birth or death, or
citizenship status; about 13 million of these inaccurate records
belong to U.S. citizens. 
Sometimes the errors are corrected and the employee is not adversely
affected, but government analyses of Basic Pilot have shown that
employees can be negatively affected. If an initial check under Basic
Pilot returns a "further action" notice, then employers have reduced
the pay or responsibilities of workers or even terminated employment,
even though such action is illegal. Employers may only terminate
employment if there is a final determination of a worker's employment
ineligibility. Government analyses have found that workers are
sometimes not told of the "further action" notice, so they do not
know why they have been adversely affected and the employees cannot
take steps to correct the records. 

Both H.R. 1645 and S.AMDT. 1150 expand data sharing and collection,
consolidating the power to access and control this information in the
Department of Homeland Security. New exemptions are created,
requiring the Social Security Administration, Internal Revenue
Service, and Department of State to disclose confidential and
sensitive personal data to the Department of Homeland Security. This
data includes employee data, birth and death records, driver's
license and state identification files, visa and passport records and
taxpayer information. EEVS also presumes that workers will use
biometric Social Security cards and REAL ID cards - neither of which
exist. 

EPIC Executive Director Marc Rotenberg is expected to testify at the
hearing next week. 

EPIC Spotlight on Surveillance on EEVS: 

http://www.epic.org/privacy/surveillance/spotlight/0507 

Committee Press Release on June 7 Hearing: 

http://waysandmeans.house.gov/hearings.asp?formmode=view&id=6090 

Submit Public Comment for the June 7 Hearing: 

http://waysandmeans.house.gov/submissions.aspx 

Office of Inspector General, Social Security Administration: 
Congressional Response Report: Accuracy of the Social Security
Administration's Numident File, A-08-06-26100 (Dec. 18, 2006) (pdf): 

http://www.ssa.gov/oig/ADOBEPDF/A-08-06-26100.pdf 

H.R. 1645 (pdf): 

http://www.epic.org/privacy/surveillance/spotlight/0507/hr1645.pdf 

S.AMDT. 1150 (pdf): 

http://www.epic.org/privacy/surveillance/spotlight/0507/samdt1150.pdf


Previous EPIC Congressional Testimony About Social Security: 

http://www.epic.org/privacy/ssn/mar_16test.pdf 

========================================================================

(4) EPIC Urges Release of NSA Surveillance Program Documents
========================================================================


EPIC, the American Civil Liberties Union, and the National Security
Archive filed a supplemental memorandum that urged a federal district
court to require the Justice Department to disclose documents about
the NSA Domestic Surveillance program. The motion follows the
testimony of former Deputy Attorney General James Comey before the
Senate Judiciary Committee that indicated that top officials at the
Department of Justice believed that the program was illegal. EPIC
first sought documents regarding the legal basis for the program just
hours after the warrantless surveillance program was first reported
in the New York Times in December 2005. 

The New York Times reported that President George W. Bush had issued
an order in 2002 allowing the National Security Agency unprecedented
authority to conduct domestic surveillance. The government's
authority to conduct surveillance is found in two statutes: Title
III, also called the "Wiretap Statute," outlines the strict
guidelines regulating ordinary domestic law enforcement surveillance,
and the Foreign Intelligence Surveillance Act (FISA) establishes a
separate legal regime for foreign intelligence surveillance
information in furtherance of U.S. 
counterintelligence. Congress specifically stated that FISA and Title
III "shall be the exclusive means by which electronic surveillance
... 
and the interception of domestic wire, oral, and electronic
communications may be conducted." 

In a letter sent to Attorney General Alberto Gonzales, Senators
Patrick Leahy and Arlen Specter are seeking the legal justifications
for the President's warrantless domestic spying program. Senate
Judiciary Committee Chairman Leahy and Ranking Member Specter wrote
that the Attorney General has "rebuffed all requests for documents
and your answers to our questions have been wholly inadequate and, at
times, misleading." The senators said that the testimony of former
Deputy Attorney General James Comey, which indicated that the White
House went forward with the warrantless spying even though top
officials at the Department of Justice believed the program was
illegal, "raises very serious questions about your personal behavior
and commitment to the rule of law." 

In addition to questions about the legality of the NSA program and
the consequences of a possible determination that public officials
violated the FISA, EPIC has also urged Congress to consider the
importance of establishing reporting requirements for the NSA that
are comparable to other federal agencies that conduct surveillance in
the United States. 

Letter from Sen. Patrick Leahy and Sen. Arlen Specter to Attorney
General Alberto Gonzales: 

http://leahy.senate.gov/press/200705/052207a.html 

EPIC's Spotlight on Surveillance "Legality of NSA's Secret
Eavesdropping Program Is Suspect and Cost is Unknown": 

http://www.epic.org/privacy/surveillance/spotlight/0106/default.html 

EPIC's page on FISA: 

http://www.epic.org/privacy/terrorism/fisa/ 

EPIC's page on EPIC v. DOJ: 

http://epic.org/privacy/nsa/foia/default.html 

========================================================================

(5) Last Public Meeting on Draft 2007 E-Voting Standards
========================================================================


The Technical Guidelines Development Committee, the standards
development committee of the federal government's Election Assistance
Commission, met last week to review and approve their revised draft
of recommendations on future voluntary voting system guidelines. This
was the ninth meeting of the Committee, which is working with the
assistance of the National Institute of Standards and Technology to
develop voting guidelines for 2007. 

The Election Assistance Commission was established by the Help
America Vote Act of 2002, and provides guidance to states on the
conduct of federal elections and the adoption of new voting systems.
The standards adopted by the Commission are mandatory for those
states that take federal funding for the replacement of their voting
systems. The Help America Vote Act establishes the standards
development process that governs the adoption of new voting systems
intended for use in federal public elections. This process begins
with recommendations from the Technical Guidelines Development
Committee being sent to the Election Assistance Commission. The
recommendations approved last week will be submitted by early July to
the Election Assistance Commission, who will then publish the
document in the Federal Register and open a public comment period. 

This will mark the second standards document completed in the Help
America Vote Act process in two years. The first federal Voluntary
Voting System Guidelines document was completed and published in the
Federal Register in April 2005. Prior to the Act's process
requirements, there were two voting standards documents (one in 1990
and the other in 2002) produced by the National Association of State
Election Directors. 

In other voting news, Senator Feinstein, the new chair of the Senate
Rules Committee, has introduced a bill (S.1487) to help ensure the
accuracy of vote counts in federal elections and institute reforms in
the administration of elections. The legislation is intended to be
the Senate companion bill to House Resolution 811. The key provision
in both bills is the establishment of a voter verified paper record
by 2010 for all direct recording electronic voting systems. Senator
Feinstein's version of the legislation would ban the purchase of any
new direct recording electronic voting systems that do not provide an
accessible, durable permanent voter-verified paper ballot; and
prohibit election officials from serving in an official capacity with
federal political campaigns. 

S.1487: A bill to amend the Help America Vote Act of 2002 to require
an individual, durable, voter-verified paper record under title III
of such Act, and for other purposes: 

http://thomas.loc.gov/cgi-bin/bdquery/z?d110:s.01487: 

House Resolution 811 (pdf): 

http://votingintegrity.org/pdf/hr811-rpt.pdf 

National Association of State Election Directors 

http://www.nased.org/ 

Help America Vote Act Law: 

http://www.fec.gov/hava/law_ext.txt 

Technical Guidelines Development Committee page: 

http://vote.nist.gov/TGDC.htm 

Election Assistance Commission page: 

http://www.eac.gov 

EPIC's page on voting: 

http://www.epic.org/privacy/voting/ 

National Committee for Voting Integrity: 

http://www.votingintegrity.org/ 

========================================================================

(6) News in Brief 
========================================================================


Social Security Agency Revisions to Privacy and Disclosure Rules 

The Social Security Administration (SSA) has revised its privacy and
disclosure rules for the first time since 1980. The revisions, which
came into effect on May 29, 2007, describe the existing
responsibilities and functions of the Privacy Officer, establish a
new senior agency official for privacy as required by the Office of
Management and Budget, and explain the SSA's new Privacy Impact
Assessment process in accordance with the E-Government Act of 2002.
Further, the revisions state that the SSA cannot process electronic
requests via the Internet if the requester's identity cannot be
confirmed. Another revision gives individuals more direct access to
their medical records. 

Federal Register - Social Security Administration Proposed Rules
(Sept. 
13, 2006): 

http://www.access.gpo.gov/su_docs/fedreg/a060913c.html 

EPIC's page on Social Security Numbers 

http://www.epic.org/privacy/ssn/ 

GAO Report: FBI Needs to Address Weaknesses in Critical Network 

A recent Government Accountability Office report found weaknesses in
the FBI's information security controls for one of its critical
networks. 
The FBI did not consistently prevent unauthorized insider access and
ensure system integrity; identify and authenticate users to prevent
unauthorized access; apply strong encryption techniques to protect
sensitive data on its networks; log, audit, or monitor
security-related events; protect the physical security of its
network; or patch key servers and workstations in a timely manner.
The GAO concluded, "these weaknesses place sensitive information
transmitted on the network at risk of unauthorized disclosure or
modification, and could result in a disruption of service, increasing
the bureau's vulnerability to insider threats." 

Although the FBI has an agency-wide information security program, it
has not been fully implemented. Outdated risk assessment, incomplete
security plans, incomplete specialized security training,
insufficient testing, untimely remediation of weaknesses, and
inadequate service continuity planning all contribute to weaknesses
in the critical network system. The GAO made several recommendations
in a separate, classified report, to correct specific weaknesses in
the security of the FBI's networks. 

GAO Report: Information Security (pdf) 

http://www.gao.gov/new.items/d07368.pdf 

GAO Report: Privacy Office - Progress Made but Challenges Remain 

The US Government Accountability Office (GAO) issued a report on the
Department of Homeland Security's Privacy Office this week. The GAO
found that the DHS Privacy Office has made significant progress by
establishing a compliance framework for conducting Privacy Impact
Assessments, which are required by the E-Government Act of 2002. The
GAO also commended the DHS Privacy Office for integrating privacy
considerations into the DHS decision-making process, by establishing
an advisory committee, holding public workshops, and participating in
policy development. However, the GAO found that limited progress has
been made in updating public notices required by the Privacy Act for
systems of records that were in existence prior to the creation of
DHS. 
The report recommends appointing privacy officers in key DHS
components, implementing a process for reviewing Privacy Act notices,
and establishing a schedule for timely issuance of Privacy Office
reports. 

GAO Report: DHS Privacy Office (pdf): 

http://www.gao.gov/new.items/d07522.pdf 

EPIC's Report Recommending on Sui Generis Privacy Agenciesd (pdf): 

http://epic.org/epic/ssrn-id933690.pdf 

Facebook Allows Third Party Access to Social Networking Database 

Social Networking service Facebook.com introduced a new feature last
week that allows third party websites to access user data. Using an
Application Programming Interface, third party websites can offer
services to Facebook users based on personal information in the
Facebook database. Facebook users can configure their privacy
settings to stop their information from leaving Facebook, but
Facebook has configured the Application Programming Interface so that
users are opted-in by default. 

EPIC Page on Social Networking and Privacy: 

http://www.epic.org/privacy/socialnet/ 

"Facebook API Unilaterally Opts Users Into New Services": 

http://blog.wired.com/27bstroke6/2007/05/facebook_api_un.html 

CRS Reports on Intelligence, Passenger Screening 

Two new Congressional Research Service reports are available.
"Detection of Explosives on Airline Passengers" discusses the
recommendations of the 9/11 Commission and the current state of
explosive screening. Policy issues covered include cost,
certification and feasibility, erroneous detection, potential for
intentional disruption and research and development. Another report
summarizes ongoing Congressional concerns in Intelligence, entitled
"Intelligence Issues for Congress." The report lists relevant
legislation in the 110th and 109th Congresses, and identifies current
issues before the 110th, such as the terrorist surveillance program
and allegations of prisoner abuse and the CIA. 

Detection of Explosives on Airline Passengers (pdf): 

http://www.fas.org/sgp/crs/homesec/RS21920.pdf 

Intelligence Issues for Congress (pdf): 

http://www.fas.org/sgp/crs/intel/RL33539.pdf 

EPIC's 9/11 Commission page: 

http://www.epic.org/privacy/terrorism/911comm.html 

EPIC's Air Travel Privacy page: 

http://www.epic.org/privacy/airtravel/ 

========================================================================

(7) EPIC Bookstore: "Understanding Surveillance Technologies" 
========================================================================


Understanding Surveillance Technologies: Spy Devices, Privacy,
History & Applications, Second Edition by J. K. Petersen (Auerbach
Publications, 
2007) 

http://www.powells.com/partner/24075/biblio/9780849383199 

Petersen provides a comprehensive overview of surveillance and
information gathering devices, broken down into four major sections:
acoustic, electromagnetic, chemical & biological, and miscellaneous
surveillance. Each section then is further broken down into
particular chapters: "acoustic," for example includes aural listening
devices as well as sonar technology. "Electromagnetic" includes not
just radio, but also radar, infrared, ultra-violet, and, of course,
visual. The range of devices and technologies covered is daunting --
the book covers over 1000 pages. 

The first chapter is an introduction to and an overview of
surveillance technologies. From then on the chapters are modular -
applying the same structure to the topic discussed. A chapter on a
technology will include an introduction to science in the area; the
kinds of surveillance that are done, the context it is used in, the
origins and evolution, descriptions and functions; applications;
problems and limitations; restrictions and regulations; privacy
implications of use; and list of resources. 

The traditional fields of surveillance are thoroughly covered. The
audio surveillance chapter takes up 100 pages and is also
supplemented by the 50 page radio surveillance chapter of the
electromagnetic section. The history of wiretap technologies and law
is covered. The legal developments have a United States centric
angle. The implications discuss past abuses as well as the increasing
presence of wiretaps. 

For a non-traditional example, the chapter on animal surveillance
covers the use of animals as detectors, as research subjects, as
assistants -- like seeing eye dogs, and as treatment indicators --
profiling individuals by their treatment of animals. The limitations
section addresses the specific issues that animals face, such as
narcotics sniffing false positives, and the difficulty of relocation
and maintenance. The implications address the individual temperament
of the animals and arguments concerning animal rights. Further
resources are pointed to in the form of organizations working for
animal rights, for law enforcement animals, assistance animals. 

The book serves best as a professional or student reference. It
should be consulted before one begins a new venture analyzing an area
of surveillance. It quickly allows the reader to gain a basic
knowledge in the scientific workings of a technology, its history,
legal regime, main privacy implications and resources. 

-- Guilherme Roschke 

================================ 

EPIC Publications: 

"Information Privacy Law: Cases and Materials, Second Edition" Daniel
J. 
Solove, Marc Rotenberg, and Paul Schwartz. (Aspen 2005). Price: $98. 
http://www.epic.org/redirect/aspen_ipl_casebook.html 

This clear, comprehensive introduction to the field of information
privacy law allows instructors to enliven their teaching of
fundamental concepts by addressing both enduring and emerging
controversies. The Second Edition addresses numerous rapidly
developing areas of privacy law, including: identity theft,
government data mining and electronic surveillance law, the Foreign
Intelligence Surveillance Act, intelligence sharing, RFID tags, GPS,
spyware, web bugs, and more. 
Information Privacy Law, Second Edition, builds a cohesive foundation
for an exciting course in this rapidly evolving area of law. 

================================ 

"Privacy & Human Rights 2005: An International Survey of Privacy Laws
and Developments" (EPIC 2006). Price: $60. 
http://www.epic.org/bookstore/phr2005/phr2005.html 

This annual report by EPIC and Privacy International provides an
overview of key privacy topics and reviews the state of privacy in
over 70 countries around the world. The report outlines legal
protections, new challenges, and important issues and events relating
to privacy. 
Privacy & Human Rights 2005 is the most comprehensive report on
privacy and data protection ever published. 

================================ 

"FOIA 2004: Litigation Under the Federal Open Government Laws," Harry
Hammitt, David Sobel and Tiffany Stedman, editors (EPIC 2004). Price:

$40. 
http://www.epic.org/bookstore/foia2004 

This is the standard reference work covering all aspects of the
Freedom of Information Act, the Privacy Act, the Government in the
Sunshine Act, and the Federal Advisory Committee Act. The 22nd
edition fully updates the manual that lawyers, journalists and
researchers have relied on for more than 25 years. For those who
litigate open government cases (or need to learn how to litigate
them), this is an essential reference manual. 

================================ 

"The Public Voice WSIS Sourcebook: Perspectives on the World Summit
on the Information Society" (EPIC 2004). Price: $40. 
http://www.epic.org/bookstore/pvsourcebook 

This resource promotes a dialogue on the issues, the outcomes, and
the process of the World Summit on the Information Society (WSIS).
This reference guide provides the official UN documents, regional and
issue-oriented perspectives, and recommendations and proposals for
future action, as well as a useful list of resources and contacts for
individuals and organizations that wish to become more involved in
the WSIS process. 

================================ 

"The Privacy Law Sourcebook 2004: United States Law, International
Law, and Recent Developments," Marc Rotenberg, editor (EPIC 2005).
Price: 
$40. 
http://www.epic.org/bookstore/pls2004/ 

The Privacy Law Sourcebook, which has been called the "Physician's
Desk Reference" of the privacy world, is the leading resource for
students, attorneys, researchers, and journalists interested in
pursuing privacy law in the United States and around the world. It
includes the full texts of major privacy laws and directives such as
the Fair Credit Reporting Act, the Privacy Act, and the OECD Privacy
Guidelines, as well as an up-to-date section on recent developments.
New materials include the APEC Privacy Framework, the Video Voyeurism
Prevention Act, and the CAN-SPAM Act. 

================================ 

"Filters and Freedom 2.0: Free Speech Perspectives on Internet
Content Controls" (EPIC 2001). Price: $20. 
http://www.epic.org/bookstore/filters2.0 

A collection of essays, studies, and critiques of Internet content
filtering. These papers are instrumental in explaining why filtering
threatens free expression. 

================================ 

EPIC publications and other books on privacy, open government, free
expression, crypto and governance can be ordered at: 

EPIC Bookstore http://www.epic.org/bookstore 

"EPIC Bookshelf" at Powell's Books 
http://www.powells.com/features/epic/epic.html 

================================ 

EPIC also publishes EPIC FOIA Notes, which provides brief summaries
of interesting documents obtained from government agencies under the
Freedom of Information Act. 

Subscribe to EPIC FOIA Notes at: 
https://mailman.epic.org/cgi-bin/control/foia_notes 

========================================================================

(8) Upcoming Conferences and Events 
========================================================================


2007 ALA Annual Conference. Washington Convention Center. June 23-26,
2007. Washington, DC. For more information: 
http://www.ala.org/ala/eventsandconferencesb/annual/2007a/home.htm 

National Institute on Computing and the Law: From Steps to Strides
into the New Age. June 25-26, 2007. San Francisco, CA. For more
information: 
<http://www.abanet.org/cle/programs/n07ctl1.html>http://www.abanet.org/

cle/programs/n07ctl1.html 

Federal Trade Commission: Spam Summit - The Next Generation of
Threats and Solutions. July 11-12, 2007. Washington DC. For more
information: 
http://www.ftc.gov/bcp/workshops/spamsummit/index.shtml 

Civil Society Privacy Conference: Privacy Rights in a World Under
Surveillance. September 25, 2007. Montreal, Canada. For more
information: 
http://www.thepublicvoice.org/events/montreal07/default.html 

29th International Conference of Data Protection and Privacy
Commissioners. September 25-28, 2007. Montreal, Canada. For more
information: 
http://www.privacyconference2007.gc.ca/Terra_Incognita_home_E.html 

OECD and Industry Canada: Shaping Policies for Creativity, Confidence
and Convergence in the Digital World. October 3, 2007. Ottawa,
Canada. 
For more information: 
http://www.oecd.org/futureinternet/participativeweb 

University of Ottawa Faculty of Law: The Revealed "I". October 25-27,
2007. Ottawa, Canada. For more information: 
http://www.idtrail.org/content/section/11/95/ 

Future of the Internet Economy - OECD Ministerial Meeting. June
14-18, 2008. Seoul, Korea. For more information: 
http://www.oecd.org/document/19/0,2340,en_2649_37441_38051667_1_1_1_37441,00.html


======================================================================

Subscription Information 
======================================================================


Subscribe/unsubscribe via web interface: 

https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_news 

Back issues are available at: 

http://www.epic.org/alert 

The EPIC Alert displays best in a fixed-width font, such as Courier. 

========================================================================

Privacy Policy 
========================================================================


The EPIC Alert mailing list is used only to mail the EPIC Alert and
to send notices about EPIC activities. We do not sell, rent or share
our mailing list. We also intend to challenge any subpoena or other
legal process seeking access to our mailing list. We do not enhance
(link to other databases) our mailing list or require your actual
name. 

In the event you wish to subscribe or unsubscribe your e-mail address
from this list, please follow the above instructions under
"subscription information." 

========================================================================

About EPIC 
========================================================================


The Electronic Privacy Information Center is a public interest
research center in Washington, DC. It was established in 1994 to
focus public attention on emerging privacy issues such as the Clipper
Chip, the Digital Telephony proposal, national ID cards, medical
record privacy, and the collection and sale of personal information.
EPIC publishes the EPIC Alert, pursues Freedom of Information Act
litigation, and conducts policy research. For more information, see
http://www.epic.org or write EPIC, 1718 Connecticut Ave., NW, Suite
200, Washington, DC 20009. +1 202 
483 1140 (tel), +1 202 483 1248 (fax). 

If you'd like to support the work of the Electronic Privacy
Information Center, contributions are welcome and fully
tax-deductible. Checks should be made out to "EPIC" and sent to 1718
Connecticut Ave., NW, Suite 200, Washington, DC 20009. Or you can
contribute online at: 

http://www.epic.org/donate 

Your contributions will help support Freedom of Information Act and
First Amendment litigation, strong and effective advocacy for the
right of privacy and efforts to oppose government regulation of
encryption and expanding wiretapping powers. 

Thank you for your support. 

-------------------- END EPIC Alert 14.11 ------------------------- 







================== HURIDOCS-Tech listserv =====================
Send mail intended for the list to <           >.
Archives of the list can be found at:
http://www.hrea.org/lists/huridocs-tech/markup/maillist.php


[Reply to this message] [Start a new topic] [Date Index] [Thread Index] [Author Index] [Subject Index] [List Home Page] [HREA Home Page]