|
<HTML> <head><TITLE>PRIVACY Forum Archive Document - (priv.09.10) </TITLE></head> <body bgcolor="#ffffff" text="#000000" link="#0000ff" vlink="#660099" alink="#ff0000"> <table border=0 cellpadding=0 cellspacing=0 width=100%> <tr> <td width=15%> <center> <table border=0 cellspacing=0 cellpadding=0 width=100%> <tr> <td> <table border=1 cellspacing=0 cellpadding=0> <tr> <td bgcolor="#ffffcc"> <center> <font face="Arial, Helvetica, sans-serif"> <a href="http://www.pfir.org"><b>PFIR</b></a> <b>Perspective</b> </font> </center> </td> </tr> <tr> <td bgcolor="#ccffff"> <img src="/ipissues1.jpg" border=0> <center> <font size=-1 face="Arial, Helvetica, sans-serif"> <b>"CRIME or FAIR USE?"</b> </font> </center> <table border=0 cellspacing=0 cellpadding=2 width=100%> <tr> <td bgcolor="#ffffff"> <table border=1 width=100%> <tr> <td> <table border=0 cellpadding=0 cellspacing=0 width=100%> <tr> <td> <a href="/pfir-p.ram"><img src="/spkr1.gif" border=0></a> </td> <td> <center> <font size=-1> <a href="/pfir-p.ram">Listen<br>RealAudio</a> </font> </center> </td> </tr> </table> </td> <td> <table border=0 cellpadding=1 cellspacing=0 width=100%> <tr> <td> <a href="/pfir-p.mp3"><img src="/spkr1.gif" border=0></a> </td> <td> <center> <font size=-1> <a href="/pfir-p.mp3">Listen<br>MP3</a> </font> </center> </td> </tr> </table> </td> </tr> </table> </td> </tr> </table> </td> </tr> </table> </td> </tr> </table> </center> </td> <td align=center> <table border=1 cellpadding=0 cellspacing=0> <tr> <td bgcolor="#ffffcc"> <table border=0 cellpadding=0 cellspacing=4> <tr> <td> <center> <font face="Arial, Helvetica, sans-serif"> "<a href="/reality">REALITY RESET</a>" </font> </td> <td> <table border=1 cellpadding=1 cellspacing=2 width=100%> <tr> <td bgcolor="#ffffff"> Today: <a href="/reality/2001-03-27">"Spraying the TV Screen"</a> </td> </tr> </table> </center> </td> </tr> </table> </td> </tr> </table> <p> <font size=+2><b>PRIVACY Forum Archive Document</b></font> <A href="/privacy"><h3>PRIVACY Forum Home Page</h3></A> <font size=-1 face="Arial, Helvetica, sans-serif"> <A href="http://www.pfir.org"><b>PFIR - "People For Internet Responsibility" Home Page</b></A> </font> <p> <font size=-1 face="Arial, Helvetica, sans-serif"> <A href="http://www.vortex.com"><b>Vortex Technology Home Page</b></A> </font> <p> <font size=-1 face="Arial, Helvetica, sans-serif"> <A href="/privmedia"><b>Radio, Television, and Press Contact Information</b></A> </font> <p> </td> </tr> </table> <hr> <PRE> PRIVACY Forum Digest Wednesday, 8 March 2000 Volume 09 : Issue 10 (<A HREF="http://www.vortex.com/privacy/priv.09.10">http://www.vortex.com/privacy/priv.09.10</A>) Moderated by Lauren Weinstein (<A HREF="mailto:lauren@vortex.com">lauren@vortex.com</A>) Vortex Technology, Woodland Hills, CA, U.S.A. <A HREF="http://www.vortex.com">http://www.vortex.com</A> ===== PRIVACY FORUM ===== ------------------------------------------------------------------- The PRIVACY Forum is supported in part by the ACM (Association for Computing Machinery) Committee on Computers and Public Policy, Cable & Wireless USA, Cisco Systems, Inc., and Telos Systems. - - - These organizations do not operate or control the PRIVACY Forum in any manner, and their support does not imply agreement on their part with nor responsibility for any materials posted on or related to the PRIVACY Forum. ------------------------------------------------------------------- CONTENTS DoubleClick Backs Down -- For the Moment... (Lauren Weinstein; PRIVACY Forum Moderator) Get Pregnant, Go to Prison! (Lauren Weinstein; PRIVACY Forum Moderator) UK DVLA releasing personal information (Andrew Wheatley) ACT Proposing Most Repressive DNA Law To Date (Roger Clarke) Fact Sheet on Strengthening Cyber Security (Monty Solomon) ACLU on proposed Fed. med-privacy rules (Peter Marshall) UK publishes "impossible" decryption law (Cyber Rights) Privacy2000 Conference: Information & Security in the Digital Age (Mike Zandpour) *** Please include a RELEVANT "Subject:" line on all submissions! *** *** Submissions without them may be ignored! *** ----------------------------------------------------------------------------- The Internet PRIVACY Forum is a moderated digest for the discussion and analysis of issues relating to the general topic of privacy (both personal and collective) in the "information age" of the 1990's and beyond. The moderator will choose submissions for inclusion based on their relevance and content. Submissions will not be routinely acknowledged. All submissions should be addressed to "<A HREF="mailto:privacy@vortex.com">privacy@vortex.com</A>" and must have RELEVANT "Subject:" lines; submissions without appropriate and relevant "Subject:" lines may be ignored. Excessive "signatures" on submissions are subject to editing. Subscriptions are via an automatic list server system; for subscription information, please send a message consisting of the word "help" (quotes not included) in the BODY of a message to: "<A HREF="mailto:privacy-request@vortex.com">privacy-request@vortex.com</A>". Mailing list problems should be reported to "<A HREF="mailto:list-maint@vortex.com">list-maint@vortex.com</A>". All messages included in this digest represent the views of their individual authors and all messages submitted must be appropriate to be distributable without limitations. The PRIVACY Forum archive, including all issues of the digest and all related materials, is available via anonymous FTP from site "ftp <A HREF="ftp://ftp.vortex.com/">ftp.vortex.com</A>", in the "/privacy" directory. Use the FTP login "ftp" or "anonymous", and enter your e-mail address as the password. The typical "README" and "INDEX" files are available to guide you through the files available for FTP access. PRIVACY Forum materials may also be obtained automatically via e-mail through the list server system. Please follow the instructions above for getting the list server "help" information, which includes details regarding the "index" and "get" list server commands, which are used to access the PRIVACY Forum archive. All PRIVACY Forum materials are available through the Internet Gopher system via a gopher server on site "<A HREF="http://gopher.vortex.com">gopher.vortex.com</A>/". Access to PRIVACY Forum materials is also available through the Internet World Wide Web (WWW) via the Vortex Technology WWW server at the URL: "<A HREF="http://www.vortex.com">http://www.vortex.com</A>"; full keyword searching of all PRIVACY Forum files is available via WWW access. ----------------------------------------------------------------------------- VOLUME 09, ISSUE 10 Quote for the day: "The karma in here is so thick, you need an aqualung to breathe!" -- "Beef" (Gerrit Graham) "Phantom of the Paradise" (Harbor Productions; 1974) ---------------------------------------------------------------------- Date: Wed, 8 Mar 2000 10:06 PST From: <A HREF="mailto:lauren@vortex.com">lauren@vortex.com</A> (Lauren Weinstein; PRIVACY Forum Moderator) Subject: DoubleClick Backs Down -- For the Moment... Greetings. As you may have heard, the storm of criticism regarding DoubleClick, Inc.'s plan (Abacus Alliance) to match up non-Web identity and purchasing data with Web movements, has had some effect. (See <A HREF="http://www.vortex.com/privacy/priv.09.06">http://www.vortex.com/privacy/priv.09.06</A> for a bit of background.) The barrage of investigations, lawsuit activity, and general bad PR (and perhaps the steep decline in its stock price) caused DoubleClick to announce that they were suspending plans regarding such data linkages, until government and industry develop privacy standards (whatever that means). This change of heart apparently does not affect DoubleClick's so-called "anonymous" cookie-based Web tracking (which I've strongly criticized here in the PRIVACY Forum in the past), nor their data matching from purely Web-based information sources. While some observers are categorizing the DoubleClick announcement as a major privacy victory, DoubleClick could change their mind at any time. In fact, their move could set back efforts to establish legal protections for consumers against abusive tracking and data matching from DoubleClick in the future, or from other firms at any time. One could naturally speculate that diverting the possibility of such legislation might well be a significant factor behind their temporarily altered plans. I am not impressed. --Lauren-- Lauren Weinstein <A HREF="mailto:lauren@pfir.org">lauren@pfir.org</A> or <A HREF="mailto:lauren@vortex.com">lauren@vortex.com</A> Co-Founder, PFIR: People For Internet Responsibility - <A HREF="http://www.pfir.org">http://www.pfir.org</A> Moderator, PRIVACY Forum - <A HREF="http://www.vortex.com">http://www.vortex.com</A> Member, ACM Committee on Computers and Public Policy ------------------------------ Date: Wed, 8 Mar 2000 10:45 PST From: <A HREF="mailto:lauren@vortex.com">lauren@vortex.com</A> (Lauren Weinstein; PRIVACY Forum Moderator) Subject: Get Pregnant, Go to Prison! Greetings. Nobody has ever said that judges can't be creative, but the recent trend towards the imposition of privacy-invasive, humiliating, or just plain bizarre sentences upon offenders seems to be accelerating. Since such punishments are typically not specifically on the books, they are usually implemented by means of a Faustian choice presented to the person being punished--either accept the "unusual" sentence or spend more time in jail. Coercive? Some might think so. In this light, the sentence handed down recently by a Montana judge is instructive for its privacy implications, though this aspect of the story has seen remarkably little attention. A woman was convicted of endangering her unborn child when testing after its birth found it to have amphetamines in its system. The woman, who had violated probation by not paying fines, not completing a chemical dependency program, and by testing positive for drugs herself, was then sentenced to ten years under the supervision of the Montana Department of Corrections (five years suspended, with some time to be spent in "boot camp") <B>and</B> ordered by the judge not to become pregnant for ten years. It is the latter part of the sentence that I find most interesting. If she "fails" a pregnancy test (to be given once every two months), she can be jailed. In other words, get pregnant and off to prison you go. Certainly anything <B>reasonable</B> that can be done to avoid babies being born with drug contamination/addiction is worth considering--it's a terrible kind of situation. But I have a serious problem with a judge deciding that she has the power to play God in what is fundamentally a very private matter. And if such a sentence is permissible in this case, what of all the other situations where someone, somewhere, might believe that a fetus or newborn would be put at risk by the mother's activities? Heavy smoker? Eats too much junk food and won't get prenatal care? Engages in very strenuous sporting activities? What of people convicted of child abuse who are still free to have additional children? Should any such persons be prevented from having more children? Where do we draw the line? Forced sterilization? Chastity belt sentences? I think it's obvious that this is a very risky area for the judiciary to be meddling with. All too often, "the end justifies the means" is accepted by society as a shortcut to goals that it deems desirable. The ethics of this approach, however, are frequently highly questionable. --Lauren-- Lauren Weinstein <A HREF="mailto:lauren@pfir.org">lauren@pfir.org</A> or <A HREF="mailto:lauren@vortex.com">lauren@vortex.com</A> Co-Founder, PFIR: People For Internet Responsibility - <A HREF="http://www.pfir.org">http://www.pfir.org</A> Moderator, PRIVACY Forum - <A HREF="http://www.vortex.com">http://www.vortex.com</A> Member, ACM Committee on Computers and Public Policy ------------------------------ Date: Mon, 21 Feb 2000 22:54:40 +0000 From: <A HREF="mailto:anw@tirana.freewire.co.uk">anw@tirana.freewire.co.uk</A> Subject: UK DVLA releasing personal information "Cowboy car wheel clampers are being given the names and addresses of motorists so they can serve official-looking 'fines' on them even though they might have parked legally..." "...DVLA [Driver Vehicle Licensing Agency] in Swansea has admitted supplying 300,000 details a year to outside sources upon request..." "...DVLA spokesman said each individual case was considered..." -- from <A HREF="http://cars.uk.yahoo.com/000221/65/a0hh6.html">http://cars.uk.yahoo.com/000221/65/a0hh6.html</A> ---- To put the above report into perspective, in the UK each vehicle has a "registered keeper" which is intended to be the person who uses the vehicle, not necessarily the owner. The DVLA, in Swansea; South Wales, stores details of the vehicle and also the keeper's name and address. Personally, the above report and similar reports cause me some concern, because of the potential for someone with malicious intentions to make a request under false pretences. I wrote to the DVLA requesting them to only release my records to the Police and government agencies, and received a reply stating that DVLA observes the Data Protection Act 1984 and considers each application on its merits. However, the reply also stated that they could not guarantee not to release my information but I could, if I wanted, use a Post Office box as the vehicles' address. This I intend to do. I find it regrettable that I am forced to take the initiative to maintain privacy of my personal data. Regards to all Andrew Wheatley ------------------------------ Date: Mon, 14 Feb 2000 17:48:21 +1100 From: Roger Clarke <<A HREF="mailto:Roger.Clarke@xamax.com.au">Roger.Clarke@xamax.com.au</A>> Subject: ACT Proposing Most Repressive DNA Law To Date [ This is referring to Australia -- PRIVACY Forum Moderator ] The ACT under Attorney-General Gary Humphries has been a fairly sensible player on matters such as net censorship (particularly in comparison with his NSW and Commonwealth counterparts!); and what's more the ACT broke the dam-wall with its medical data privacy legislation a couple of years ago. Unfortunately, it appears that Humphries has been carried away with the hype put forward by the law enforcement lobby, and is now in a bidding war with NSW's Jeff Shaw and the Commonwealth's Amanda Vanstone for world's most repressive DNA legislation. The Canberra Times of Sunday 13 February carried as its top-of-page-one item a report that the ACT Police (a service outsourced to the AFP) are to have the power to "obtain swabs from the mouths of all suspects of indictable offences as well as all sentenced offenders in custody". On page 2 there's an accompanying article by Deputy Editor Crispin Hull. It's much more thoughtful than most things that get published, although my impression is that it's still insufficiently critical of the AFP's proposal. (I couldn't find the items on the site, but Crispin has very helpfully provided the text for both articles, for limited distribution). This is a big issue, which needs the urgent attention of advocates. There are some very nasty provisions in the Commonwealth A/G's discussion paper of last year, e.g. heavy moral suasion on people in, say, the vicinity of a rape, to 'voluntarily' submit to body-fluid or body-tissue sampling, with the implied threat that they're a suspect if they refuse. We must also show these politicians (not to mention the social control machine behind them) to be either fatuous or devious for using terms like 'infallible' and 'exact' when referring to a process that is <B>fundamentally</B> probabilistic. ------------------------------ Date: Tue, 15 Feb 2000 20:02:38 -0500 From: Monty Solomon <<A HREF="mailto:monty@roscom.com">monty@roscom.com</A>> Subject: Fact Sheet on Strengthening Cyber Security THE WHITE HOUSE Office of the Press Secretary __<U>__________________________________________________________________</U>__ For Immediate Release February 15, 2000 Fact Sheet Strengthening Cyber Security through Public-Private Partnership Today the President and members of his Cabinet met with leaders of Internet and e-commerce companies, civil liberties organizations, and security experts to jointly announce actions strengthening Internet and computer network security. This meeting follows last month's release by the President of the National Plan for Information Systems Protection, which establishes the first-ever national strategy for protecting the nation's computer networks from deliberate attacks. During today's meeting, industry executives announced their intention to join others to create an Internet industry mechanism to share information on cyber attacks, vulnerabilities and security practices to better respond to cyber-attacks and deliberate intrusions into computer networks. Recently, other industries such as banking and finance, and major telecommunications carriers, have created industry partnerships for cyber-security. The President also announced immediate steps the government will take to strength security for our nation's computer systems: Accelerated Spending on Cyber Security - A $9 million budget supplemental for Fiscal Year 2000, jump-starting key initiatives for cyber-security contained in the President's FY2001 $2 billion budget request for cyber-security. The request will accelerate new programs to educate Americans for cyber-security careers, build a system for protecting Federal government computers, and create a new Institute for Information Infrastructure Protection. Research and Technology Development for Information Infrastructure Development - President Clinton supports federal government research and technology development for information infrastructure protection that the private sector does not have sufficient market incentives to generate on its own. The centerpiece of the federal government's efforts in this area will be the Institute for Information Infrastructure Protection (I3P), for which the President has requested $50 million in his Fiscal Year 2001 budget. The President has also requested a supplemental appropriation of $4 million for Fiscal Year 2000 to jumpstart the Institute's preparations. Science Advisor Neal Lane and NSC National Coordinator Dick Clarke will meet this Friday with members of the President's Committee of Advisors on Science and Technology and other computer security experts, research specialists, and industry leaders in an effort to help fill the gaps in the nation's research agenda for computer network security. Partnership for Critical Infrastructure Security - Secretary Daley will participate in the first meeting of the Partnership for Critical Infrastructure Security next week to maximize cooperation between government and private sector initiatives for cyber-security. Since the vast majority of the United States' critical infrastructures are owned and operated by private industry, the Partnership recognizes and acknowledges that the Federal government alone cannot protect these infrastructures or assure the delivery of services over them. The Partnership will explore ways in which industry and government can jointly address the risks to the nation's critical infrastructures. It will provide a forum in which the various infrastructure sectors can meet to address issues relating to cross-sector interdependencies, explore common approaches and experiences, and engage other key professional and business communities that have an interest in infrastructure assurance. By doing so, the Partnership hopes to raise awareness, promote understanding, and, when appropriate, serve as a catalyst for action. Private sector membership in the Partnership is open to infrastructure owners and operators; providers of infrastructure hardware, software, and services; risk management and investment professionals; and other members of the business community who are stakeholders in the critical infrastructures. Government representation will include state and local governments as well as Federal agencies and departments responsible for working with the critical infrastructure sectors and for providing functional support for the protection of those infrastructures. ### ------------------------------ Date: Mon, 21 Feb 2000 17:52:13 -0800 From: Peter Marshall <<A HREF="mailto:techdiff@ix.netcom.com">techdiff@ix.netcom.com</A>> Subject: ACLU on proposed Fed. med-privacy rules 02-21-2000 ACLU Newsfeed -- ACLU News Direct to YOU! ------------------------------------------------------------- Although Medical Privacy Regulations an Important First Step, ACLU Also Criticizes Loopholes Thursday, February 17, 2000 WASHINGTON -- The Clinton Administration's proposed medical privacy regulations include several loopholes that threaten the Administration's laudable premise that medical information is private and may not be disclosed to third parties without prior consent, the American Civil Liberties Union said today. "The Administration's proposed regulations are an important first step toward comprehensive federal privacy protections," said Ronald Weich, an ACLU Legislative Consultant. "But there are so many loopholes to the Administration's overall rule that medical records are private that the exceptions threaten to become the rule." While the proposed regulations do a good job of shielding medical information from disclosure for commercial reasons, the ACLU said that they provide a series of exceptions for government access to data, including for law enforcement agencies and public health agencies. "For many patients," the ACLU said, "the fear of government access to private medical information is as chilling as the fear of commercial access. In fact, many Americans regard the government as more of a threat to liberty than the private sector." The ACLU took particularly harsh aim at the Administration's plans to allow law enforcement agencies virtually unlimited access to medical records. This loophole is so large, the ACLU said, that it "permits computerized medical records to become a vast centralized police database." "Medical records of ordinary law-abiding Americans must not be treated like mug shots, fingerprints or other current databases compiled from convicted criminals," the ACLU said. The ACLU's other primary concerns with the regulations include the broad privacy exceptions for medical information collected by the government itself and what the ACLU called a significant omission to the Administration's proposal: there is no requirement that a doctor obtain a patient's authorization before using the patient's medical records for treatment, payment or health care operations. "The ACLU believes that patients own their medical records," the ACLU said. "It follows that those records cannot be used for any purpose without the patient's consent." The ACLU's formal comments came on the last day of the comments period. In addition to filing its own suggested changes, the ACLU said that more than 11,000 people had visited its special medical records web site, filing approximately 10,000 comments with the Administration. The ACLU's comments can be found at: <A HREF="http://www.aclu.org/congress/l021700a.html">http://www.aclu.org/congress/l021700a.html</A> ------------------------------ Date: Thu, 10 Feb 2000 08:38:05 -0500 (EST) From: Cyber Rights <<A HREF="mailto:cyber-rights@cpsr.org">cyber-rights@cpsr.org</A>> Subject: UK publishes "impossible" decryption law (Note from [Cyber Rights] moderator: I'm including today's press release first because it's relatively newsworthy, but it will be hard to understand without some background. I recommend the <A HREF="http://www.cyber-rights.org/crypto/">http://www.cyber-rights.org/crypto/</A> site or the second press release in this message.--Andy) FLASH - FOR IMMEDIATE USE FOUNDATION FOR INFORMATION POLICY RESEARCH (<A HREF="http://www.fipr.org/">www.fipr.org</A>) ========================================================= News Release Thurs 10th Feb 2000 ========================================================= Contact: Caspar Bowden Director of FIPR +44 (0)171 354 2333 <A HREF="mailto:cb@fipr.org">cb@fipr.org</A> UK PUBLISHES "IMPOSSIBLE" DECRYPTION LAW ======================================== Today Britain became the only country in the world to publish a law which could imprison users of encryption technology for forgetting or losing their keys. The Home Office's "REGULATION OF INVESTIGATORY POWERS" (RIP) bill has been introduced in Parliament: it regulates the use of informers, requires Internet Service Providers to maintain "reasonable interception capabilities", and contains powers to compel decryption under complex interlocking schemes of authorisation. Caspar Bowden, director of Internet policy think-tank FIPR said, "this law could make a criminal out of anyone who uses encryption to protect their privacy on the Internet." "The DTI jettisoned decryption powers from its e-Communications Bill last year because it did not believe that a law which presumes someone guilty unless they can prove themselves innocent was compatible with the Human Rights Act. The corpse of a law laid to rest by Stephen Byers has been stitched back up and jolted into life by Jack Straw" Decryption Powers: Comparison with Part.III of Draft E-Comms Bill (July 99) ------------------------------------------------------------------------ The Home Office have made limited changes that amount to window-dressing, but the essential human rights issue remains: (Clause 46): authorities must have "reasonable grounds to believe" the key is in possession of a person (previously it had to "appear" to authorities that person had a key). This replaces an subjective test with one requiring objective evidence, but leaves unaffected the presumption of guilt if reasonable grounds exist. (Clause 49): to prove non-compliance with notice to decrypt, the prosecution must prove person "has or has had" possession of the key. This satisfies the objection to the case where a person may never have had possession of the key ("encrypted e-mail out of the blue"), but leaves unchanged the essential reverse-burden-of-proof for someone who has forgotten or irreplaceably lost a key. It is logically impossible for the defence to show this reliably. HUMAN RIGHT CHALLENGE "INEVITABLE" ================================== As part of the consultation on the draft proposals last year FIPR and JUSTICE jointly obtained a Legal Opinion from leading human rights experts (<A HREF="http://www.fipr.org/ecomm99/pr.html">http://www.fipr.org/ecomm99/pr.html</A>) which found that requiring the defence to prove that they do not possess a key was a likely breach of the European Convention of Human Rights. Mr.Bowden commented, "following the recent liberalisation of US export laws, as tens of thousands of ordinary computer users start to use encryption, a test-case looks inevitable after the Human Rights Act comes into force in October." R.I.P. RESURRECTS KEY ESCROW BY INTIMIDATION ? ============================================== Bowden said: "after trying and failing to push through mandatory key-escrow, then voluntary key-escrow, it now looks like the government is resorting to key-escrow through intimidation." Notes for editors ================= 1. Detailed analysis of the bill will be available on the FIPR website (<A HREF="http://www.fipr.org/">www.fipr.org</A>) later today. 2. FIPR is an independent non-profit organisation that studies the interaction between information technology and society, with special reference to the Internet; we do not (directly or indirectly) represent the interests of any trade-group. Our goal is to identify technical developments with significant social impact, commission research into public policy alternatives, and promote public understanding and dialogue between technologists and policy-makers in the UK and Europe. The Board of Trustees and Advisory Council (<A HREF="http://www.fipr.org/trac.html">http://www.fipr.org/trac.html</A>) comprise some of the leading experts in the UK. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ <A HREF="http://www.fipr.org/ecomm99/pr.html">http://www.fipr.org/ecomm99/pr.html</A> Press Release 25 October 1999 ELECTRONIC COMMUNICATIONS BILL FAILS HUMAN RIGHTS AUDIT JUSTICE, the legal human rights organisation, and the Foundation for Information Policy Research today (Monday, 25 October) warn that those aspects of the Government?s draft Electronic Communications Bill which deal with police powers to unscramble encoded e-mail are likely to breach human rights standards under the European Convention on Human Rights. The Bill -- intended to encourage electronic commerce and on-line delivery of government services -- allows the police to serve written notice to demand either that a communication be decrypted or the private encryption key be handed. According to our Human Rights Audit of the draft Bill, which is based on an Opinion obtained from two leading lawyers, the Government has wrongly opted for the widest police powers enabling open-ended interception of encrypted material. The Opinion says that this " will have the inevitable consequence of compromising the affected individual's whole security and privacy apparatus " and thereby likely contravene Article 8 of the European Convention, on respect for private life. In a detailed audit of Part III of the Bill, the Opinion identifies several other potential human rights breaches: * The presumption of innocence is reversed: failure to comply with a decryption notice will be a criminal offence unless the individual concerned can prove that s/he does not have the key, or does not have access to it because, for instance, the password has been forgotten. This contravenes the right to a fair trial guaranteed under Article 6 of the European Convention. * The right to remain silent is likely to be breached: The police may require the addressee of a "decryption notice" to produce a private key when it "appears" that s/he has such a key; failure to produce it will be a criminal offence. Disclosure of the key may lead to the discovery of incriminating material. If used at trial, this is likely to infringe Article 6 of the European Convention, which includes a privilege against self-incrimination. * There are inadequate safeguards against abuse: There is no provision for independent judicial supervision of Part III as a whole, as required by Article 8 of the European Convention. Instead, the proposed Complaints Tribunal and Commissioner will only apply to those cases where the interception warrant has been approved by the Secretary of State under the 1985 Interception of Communications Act. Peter Noorlander, Legal Policy Officer at JUSTICE, said: "There are other, less intrusive ways of giving police access to encrypted material when a crime is suspected. To ensure compliance with human rights standards, the Government must re-think this part of the Bill." Caspar Bowden, Director of the Foundation for Information Policy Research, said: "The government is attempting to bolt decryption powers for the internet onto existing interception laws. This legal analysis demonstrates definitively why this approach is unsound and is incompatible with basic human rights." Note to Editors: 1. The Opinion is written by Professor Jack Beatson QC (formerly a Law Commissioner) and Tim Eicke, barrister, from Essex Court Chambers. A full copy of the Opinion is available on the internet, at <A HREF="http://www.fipr.org/ecomm99/ecommaud.html">http://www.fipr.org/ecomm99/ecommaud.html</A>, or from the JUSTICE office. 2. The draft Electronic Communications Bill is included in a DTI consultation document, Promoting Electronic Commerce. It is expected to be introduced in the next parliamentary session. 3. JUSTICE is conducting human rights audits of current legislation. Completed audits include the Immigration and Asylum Bill, Access to Justice Bill, Youth Justice and Criminal Evidence Bill, Draft Freedom of Information Bill and consultation papers on Anti-terrorism and the Mental Health Review. In 1998, it published a major report on covert policing, "Under Surveillance: Covert Policing and Human Rights Standards". 4. The Foundation for Information Policy Research is the UK's leading Internet policy think-tank, an independent non-profit organisation that studies the interaction between information technology and society from a broad perspective. FIPR monitors technical developments with significant social impact, commissions research into public policy alternatives, and promotes public understanding and dialogue between technologists and policy-makers in the UK and Europe. Further Information For further information, contact Lib Peck, JUSTICE, on 0171 762 6419, or Nicholas Bohm (FIPR legal officer) on 1279 871272. ~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~ CPSR Cyber Rights -- <A HREF="http://www.cpsr.org/cpsr/nii/cyber-rights/">http://www.cpsr.org/cpsr/nii/cyber-rights/</A> To unsubscribe, e-mail: <A HREF="mailto:cyber-rights-unsubscribe@cpsr.org">cyber-rights-unsubscribe@cpsr.org</A> To reach moderator, e-mail: <A HREF="mailto:cyber-rights-owner@cpsr.org">cyber-rights-owner@cpsr.org</A> For additional commands, e-mail: <A HREF="mailto:cyber-rights-help@cpsr.org">cyber-rights-help@cpsr.org</A> Materials may be reposted in their _entirety_ for non-commercial use. ~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~ ------------------------------ Date: Fri, 11 Feb 2000 14:01:30 -0500 From: Mike Zandpour <<A HREF="mailto:zandpour@osc.edu">zandpour@osc.edu</A>> Subject: Privacy2000 Conference: Information & Security in the Digital Age The Technology Policy Group at the Ohio Supercomputer Center will be hosting a conference on Privacy in November 2000. The conference is entitled Information & Security in the Digital Age. Privacy2000 is a follow-up to last year's groundbreaking Ohio Business Privacy Forum, the inaugural event in the TPG's Technology in Business Series. The 1999 conference had over 100 attendees, with keynote presentations given by Peter Swire, Chief Counselor of Privacy for the Office of Management and Budget for the United States; Professor George Trubow, Director, Center for Information Technology and Privacy Law, John Marshall Law School; and United States Congressman Michael G. Oxley, (4th District Ohio). Industry participants included representatives from Nationwide, NCR, Bank One, Sterling Commerce, BBB Online, Vorys, Sater, Seymour and Pease; Squire, Sanders & Dempsey; Thompson, Hine & Flory; in addition to nationally recognized academics. For more on the 1999 privacy conference go to <A HREF="http://www.osc.edu/techseries/">http://www.osc.edu/techseries/</A>. We are very excited about Privacy2000. Expected speakers include Professor Peter P. Swire, Chief Counselor of Privacy for the Office of Management and Budget for the United States; Jason Catlett, President Junkbusters; in addition, we are putting together a moderated roundtable to be televised on public television. Through interactive workshops and panels, we seek to inform business, industry, medical and legal personal,government, and the public on vital privacy issues and possible solutions. We expect this year's attendance to be between 250-300. Privacy2000 is designed to be a regional conference with national players and participation (note: among last year's attendees were the Director and Deputy Director of the I.R.S. Privacy Advocate for the United States. We consider Privacy2000 a prelude to taking our privacy conference national in 2001. Feel free to contact me for more information on Privacy2000, Mike Zandpour Technology Policy Group--Legal Researcher Ohio Supercomputer Center <A HREF="mailto:Zandpour@osc.edu">Zandpour@osc.edu</A> (614) 292-6477 ------------------------------ End of PRIVACY Forum Digest 09.10 ************************ </PRE> <hr> <center> <A href="/privacy"><h3>PRIVACY Forum Home Page</h3></A><p> <A href="http://www.vortex.com"><h4><i>Vortex Technology Home Page</i></h4></A><p> <A href="/privmedia"><h4>Radio, Television, and Press Contact Information</h4></A><p> </center> <p> <font size=-2>Copyright © 2001 Vortex Technology. All Rights Reserved.</font> </BODY> </HTML>