The Electronic Privacy Information Center released the 2010 update to its "E-Deceptive Campaign Practices: Technology and Democracy 2.0" report, first published in 2008. The report reviews the potential for abuse of Internet-based technology in the election context, and makes recommendations on steps that should be taken by Election Administrators, voters, and those involved in Election Protection efforts. E-Deceptive campaigns are internet-based attempts to misdirect targeted voters regarding the voting process, and include false statements about poll place hours, election dates, voter identification rules, or voter eligibility requirements. For more information, see EPIC: Voting.
EPIC, joined by the Center for Digital Democracy, Consumer Action, the Council on American-Islamic Relations, and the Liberty Coalition launched the Privacy 2010 campaign at a press conference today on Capitol Hill. The organizations set out a Privacy Platform with recommended positions on 10 key privacy issues. Privacy 2010 also has a Facebook Cause page. As part of the Privacy 2010 campaign, EPIC said that it will release a Privacy Report Card for the Obama administration with grades on medical privacy, cyber security, consumer privacy, and civil liberties.
EPIC, joined by the
American Library Association,
Liberty Coalition,
Bill of
Rights Defense Committee, and the
Center for Media and Democracy, among
others, sent a
statement to the
Department of Homeland Security responding to the Administration's call for comments regarding its
National Strategy for Trusted Identities in Cyberspace Creating Options for Enhanced Online Security and Privacy (NSTIC) draft policy. The coalition's comments press the Administration for a clearer definition of the problems that the policy intends to solve. The coalition further advocates for the maintenance of a free and open Internet that protects the creative content of users, assures privacy, and creates accountability and oversight of government activity, especially as it relates to law enforcement and surveillance. For more, see EPIC's
Cybersecurity and Privacy.