blank
Animated Button



Main Menu
  • Home
  • News Resources
  • Action Archive
  • Suggest News
  • Syndicate this site (XML)
  • About Us
  • Privacy Policy

  • Donate to EPIC

    EPIC Bookstore

    Litigation Under the Federal Open Government Laws 2008


    EPIC Bookstore

    Privacy Resources
  • International
  • Consumer
  • Children
  • Government - FTC
  • Government - EU
  • Government -OECD
  • Research
  • Publications
  • EPIC Online Guide
  • Tools
  • Search Web

  • Search Legislation

  • EPIC Publications

    Privacy & Human Rights



    Litigation Under the Federal Open Government Laws



    Privacy Law Sourcebook



    Privacy, Information, and Technology



    Information Privacy Law



    The Public Voice WSIS Sourcebook

    Look Out: Washington Ready to Roll Out National Worker ID Card

    The idea of a national ID card keeps coming back-- first is was REAL ID, now its a Social Security Card with a biometric component. The biggest contributor to identity theft in the United States is the abuse of Social Security Numbers for everything related to credit, employment, and education. This time language around this new proposal for national ID sounds like it is about illegal immigration, but the impact will be on anyone who is working or would like to work regardless of your legal status. Some of the same issues related to REAL ID may arise along with some new ones. Collection of certain biometrics like fingerprints that have secondary government uses should raise civil liberties as well as privacy flags. In addition, the numbers of persons required to use this single document will outstrip any identification system ever created in this country. There will be problems with accuracy, reliability, transparency, and oversight. Workers will not care about this document when it works, but what they do need to know before enrolling is what will happen when the system fails. For example, failures by the Social Security Administration to collect and record data accurately, failures by technology used by employers to read the biometrics of employees, or failures in verification of biometric information when checked with government records are only a few of ways things could go wrong and leave people unemployable for a reason other than whether they are or are not U.S. citizens. What will happen when people misplace Social Security Cards and need replacements? What happens if identity thieves break the security of the document? Will there by INS raids where every employee needs to show their papers or get taken away? Could employers confiscate cards and hold their workforce hostage?

    The right way to mend immigration, Charles E. Schumer and Lindsey O Graham, Washington Post, Columns, March 19, 2010

    EPIC on March 18, 2010 5:56 PM
    .

    Facebook's Beacon Privacy Violation Makes it 9M Richer

    Facebook offered to settle all lawsuits that resulted from its failed Beacon application, which violated users' privacy. The Beacon application without user prior agreement reported online purchases to social contacts of users, which broke federal privacy laws and resulted in several lawsuits by unhappy customers. Facebook offered to settle one case in a bold move to dismiss all other cases around the country for 9M. About 6 million would be left after attorney fees to fund a foundation. The members of the 3 person foundation board were named in the settlement agreement. The board was established with 2 people, which included a Facebook executive. They had to agree on the naming of a third person who would help decide how to spend the 6M set aside for online privacy research.

    Clever: Facebook Funds A Privacy Watchdog Group, Nicholas Carlson, Business Insider, Silicon Alley Insider, March 18, 2010

    EPIC on March 18, 2010 5:36 PM
    .

    Internet Users Find it Easy to Talk to Strangers

    Something that you learned as a child is soon forgotten by adults living and working online. "Don't talk to strangers!" The same users if approached on the street and asked for their name, birth date, and social security number would not react well to the request. However, when online many users give up this information without thinking twice about who they are sharing the information with and how it might to used. Alessandro Acquisti an academic researcher at Carnegie Mellon University discovered how easy it is to guess social security numbers using identifying information provided by users of social networking services.

    How Privacy Vanishes Online
    By STEVE LOHR, New York Times, March 16, 2010

    EPIC on March 18, 2010 5:26 PM
    .

    GAO: Whole Body Scanners Raise Questions About Effectiveness

    U.S. could spend $3 billion to place whole body scanners in airports around the world. A U.S. Government Accountability Office (GAO) report states that the Transportation Security Administration (TSA) says each whole body image machine would cost $170,000 and requires 3 people to operate. The cost of covering 60 percent of all security checkpoints at the busiest commercial airports is about $300 million with an addition 3,550 TSA personnel. Privacy groups have raised questions about passenger privacy and challenged the agency's assertions regarding safeguards against abuse or misuse of nude images of passengers. The GAO report also raised questions regarding the effectiveness of whole body imaging technology in detecting low density materials such as powder or gel explosives as well as items that may be designed to allude detection. Former Administration Department of Homeland Security senior officials have gone to work of companies selling the whole body scanners to TSA.

    Scanners may not have detected alleged explosive in Detroit jet case, GAO reports, By Spencer S. Hsu, Washington Post, March 18, 2010

    EPIC on March 17, 2010 10:23 AM
    .

    FCC Releases Broadband Plan

    The Federal Communications Commission released its plan for broadband deployment within the United States. Broadband is all about high-speed two-way Internet connectivity.The US lags behind many European nations, Japan, and South Korea in national broadband deployment. The FCC document advocates increased competition, support universal availability, and an update in government laws/regulations to support expansion of broadband use. The report cites everything from e-health records, to the development of the Smart Grid as being relevant to the topic of national broadband deployment. Faster broadband transmission rates are correlated to time spent online for work and leisure. There are stubborn gaps in broadband deployment to rural and inner city areas that may respond to an organized national effort. The US solved problems with access to basic services such as railroads, highways, electricity, and telephones through federal programs like the transcontinental railroad, rural electrification program, national highway system, and national telephone service efforts.

    FCC National Broadband Plan, Federal Communications Commission, March 16, 2010

    EPIC on March 16, 2010 3:44 PM
    .

    Fusion Centers Looking for Applications for Data Mining Capacity

    The Department of Homeland Security Department has funded 72 state and local Fusion Centers, which establish data mining relationships with public and private data warehouses. Local and state law-enforcement agencies that operate Fusion Centers depend on funding from Federal government agencies to open centers, train staff, and develop intelligence expertise. It has long been understood that local and state law-enforcement did not want to limit the work of Fusion Centers solely to terrorism related investigations. The relationships between state/local Fusion Centers and Federal government agencies is not transparent.

    , State fusion centers look to expand beyond counterterrorism efforts, Patrick Marshall, Government Computer News, March 12, 2010

    EPIC on March 16, 2010 3:05 PM
    .

    MA Supreme Court Rules that a Shelter is a Home

    A room in a shelter where a juvenile and his mother lived was unlawfully searched by police after the door was unlocked by the Shelter Director. The High Court ruled that the room's occupants had a reasonable expectation of privacy and that police needed the okay of one of the room's occupants before entering. Persons seeking shelter need not have diminished rights, which could have consequences in the event of emergency shelter situations such as those provided by domestic violence or disaster assistance programs.

    SJC says that shelter dwellers have right to privacy Police search is ruled illegal, By Martin Finucane, Boston Globe Staff, March 12, 2010

    EPIC on March 15, 2010 1:37 PM
    .

    Privacy.org is a joint project of
    The Electronic Privacy Information Center and Privacy International.
    © 1998-2010 EPIC and PI
    This web site was made with Movable Type.

    Comments or suggestions? Email the webmaster.
    Technorati Profile
    Powered by
    Movable Type 4.25

    EPIC Logo

    Take Action
    PI Day Logo

    ____________________

    Stop Digital Strip Searches
    Stop Digital Strip Searches!
    EPIC's Spotlight on Surveillance


    Recent Stories
    March 18, 2010 5:56 PM
    Look Out: Washington Ready to Roll Out National Worker ID Card

    March 18, 2010 5:36 PM
    Facebook's Beacon Privacy Violation Makes it 9M Richer

    March 18, 2010 5:26 PM
    Internet Users Find it Easy to Talk to Strangers

    March 17, 2010 10:23 AM
    GAO: Whole Body Scanners Raise Questions About Effectiveness

    March 16, 2010 3:44 PM
    FCC Releases Broadband Plan

    March 16, 2010 3:05 PM
    Fusion Centers Looking for Applications for Data Mining Capacity

    March 15, 2010 1:37 PM
    MA Supreme Court Rules that a Shelter is a Home

    March 12, 2010 2:27 PM
    UN Expert: Body Scanners Breach of Individual Rights

    March 12, 2010 2:10 PM
    Facebook Looking to Share Location Data

    March 12, 2010 1:58 PM
    Privacy Group Advise California PUC on Smart Grid Privacy


    Archive
    March 2010
    February 2010
    January 2010
    December 2009
    November 2009
    October 2009
    September 2009
    August 2009
    July 2009
    June 2009
    May 2009
    April 2009
    March 2009
    February 2009
    January 2009
    December 2008
    November 2008
    October 2008
    September 2008
    August 2008
    July 2008
    June 2008
    May 2008
    April 2008
    March 2008
    February 2008
    January 2008
    December 2007
    November 2007
    October 2007
    September 2007
    August 2007
    July 2007
    June 2007
    May 2007
    April 2007
    March 2007
    February 2007
    January 2007
    December 2006
    November 2006
    October 2006
    September 2006
    August 2006
    July 2006
    June 2006
    May 2006
    April 2006
    March 2006
    February 2006
    January 2006
    December 2005
    November 2005
    October 2005
    September 2005
    August 2005
    July 2005
    June 2005
    May 2005
    April 2005
    March 2005
    February 2005
    January 2005
    December 2004
    November 2004
    October 2004
    September 2004
    August 2004
    July 2004
    June 2004
    May 2004
    April 2004
    March 2004
    February 2004
    January 2004
    December 2003
    November 2003
    October 2003
    September 2003
    August 2003
    April 2003
    March 2003
    February 2003
    January 2003
    October 2002
    September 2002
    August 2002
    July 2002
    June 2002
    May 2002
    April 2002
    March 2002
    February 2002
    January 2002
    December 2001
    November 2001
    October 2001
    September 2001
    August 2001
    July 2001
    June 2001
    May 2001
    April 2001
    March 2001
    February 2001
    January 2001
    December 2000
    November 2000
    October 2000
    September 2000
    August 2000
    July 2000
    June 2000
    May 2000
    April 2000
    February 2000
    January 2000
    December 1999
    November 1999
    October 1999
    September 1999
    August 1999
    July 1999
    June 1999
    May 1999
    April 1999
    March 1999
    February 1999
    January 1999
    December 1998
    November 1998
    October 1998
    September 1998
    August 1998
    July 1998
    June 1998
    January 1998