Erosion of Individual Privacy

Total Page:16

File Type:pdf, Size:1020Kb

Erosion of Individual Privacy Erosion of Individual Privacy “Without the ability to keep secrets, individuals lose the capacity to distinguish themselves from others, to maintain independent lives, to be complete and autonomous persons. This does not mean that a person actually has to keep secrets to be autonomous, just that she must possess the ability to do so. The ability to keep secrets implies the ability to disclose secrets selectively, and so the capacity for selective disclosure at one's own discretion is important to individual autonomy as well.” -Kim L. Scheppele, Legal Secrets 302 (1988) “Knowledge is Power” -Sir Francis Bacon “The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. [...] [T]he capacity to assert social and political control over the individual will vastly increase. It will soon be possible to assert almost continuous surveillance over every citizen and to maintain up-to-date, complete files, containing even most personal information about the health or personal behavior of the citizen in addition to more customary data. These files will be subject to instantaneous retrieval by the authorities.” -Zbigniew Brzezinski, protegé of David Rockefeller, cofounder of the Trilateral Commission, and NSA to Jimmy Carter, from his 1971 book Between Two Ages Individual privacy rights are an impediment to the oligarchy of power brokers. They increase the self-respect and mutual respect of those who would be ruled, and they decrease the thoroughness with which their compliance with the dictates of the oligarchy can be evaluated. In particular, individual privacy rights make it harder for the oligarchy to detect and snub in the crib cultural and technological innovations that threaten their hegemony. This archive of Guy Polis's Cryptography Manifesto details many of the techniques and strategies intelligence agencies (and other organizations) use in mining personal information, including a treatment of the infamous Echelon network. Something to consider: a representative of the National Security Agency visits the Altavista site in Palo Alto once a week to collect data on site traffic. In 1996, the CFO of the facility personally confessed this to me, when prodded. The other major search engines probably have similar arrangements. The Echelon articles are mostly in a dedicated subchapter on Echelon. That subchapter contains most of the coverage of the signals intelligence establishment. EFF's list of printers that rat out their owners from the New York Times, 2009-Jan-17, by Robert Pear: Privacy Issue Complicates Push to Link Medical Data WASHINGTON — President-elect Barack Obama's plan to link up doctors and hospitals with new information technology, as part of an ambitious job-creation program, is imperiled by a bitter, seemingly intractable dispute over how to protect the privacy of electronic medical records. Rahm Emanuel, the White House chief of staff-designate, said it was “essential” to protect personal health information. Lawmakers, caught in a crossfire of lobbying by the health care industry and consumer groups, have been unable to agree on privacy safeguards that would allow patients to control the use of their medical records. Congressional leaders plan to provide $20 billion for such technology in an economic stimulus bill whose cost could top $825 billion. In a speech outlining his economic recovery plan, Mr. Obama said, “We will make the immediate investments necessary to ensure that within five years all of America's medical records are computerized.” Digital medical records could prevent medical errors, save lives and create hundreds of thousands of jobs, Mr. Obama has said. So far, the only jobs created have been for a small army of lobbyists trying to secure money for health information technology. They say doctors, hospitals, drugstores and insurance companies would be much more efficient if they could exchange data instantaneously through electronic health information networks. Consumer groups and some members of Congress insist that the new spending must be accompanied by stronger privacy protections in an era when digital data can be sent around the world or posted on the Web with the click of a mouse. Lawmakers leading the campaign for such safeguards include Representatives Edward J. Markey of Massachusetts and Pete Stark of California, both Democrats; Senator Patrick J. Leahy, Democrat of Vermont; and Senator Olympia J. Snowe, Republican of Maine. Without strong safeguards, Mr. Markey said, the dream of electronic health information networks could turn into “a nightmare for consumers.” In the last few years, personal health information on hundreds of thousands of people has been compromised because of security lapses at hospitals, insurance companies and government agencies. These breaches occurred despite federal privacy rules issued under a 1996 law. Congress is trying to strengthen those privacy protections and make sure they apply to computer records. Lobbyists for insurers, drug benefit managers and others in the health industry are mobilizing a campaign to persuade Congress that overly stringent privacy protections would frustrate the potential benefits of digital records. One of the proposed safeguards would outlaw the sale of any personal health information in an electronic medical record, except with the patient's permission. Another would allow patients to impose additional controls on certain particularly sensitive information, like records of psychotherapy, abortions and tests for the virus that causes AIDS. Patients could demand that such information be segregated from the rest of their medical records. Under other proposals being seriously considered in Congress, health care providers and insurers would have to use encryption technology to protect personal health information stored in or sent by computers. Patients would have a right to an accounting of any disclosures of their electronic data. Health care providers and insurers would have to notify patients whenever such information was lost, stolen or used for an unauthorized purpose. And patients — or state officials acting on their behalf — could recover damages from an entity that improperly used or disclosed personal health information. Rahm Emanuel, who will be the White House chief of staff for Mr. Obama, advocated such safeguards when he was a House member from Illinois. “As we move forward on health information technology,” Mr. Emanuel said, “it is absolutely essential that an individual's most personal and vulnerable information is protected.” Advisers to Mr. Obama say he favors strong privacy protections but does not want the dispute to slow down the bill. Mary R. Grealy, president of the Health Care Leadership Council, which represents large health care corporations, said the proposed safeguards could be an impediment to the widespread adoption of health information technology and counteract any economic stimulus effect. In a letter to Congressional leaders, Karen M. Ignagni, president of America's Health Insurance Plans, a trade group for insurers, expressed “serious concern about privacy provisions being considered for inclusion in the economic stimulus bill.” She criticized, in particular, a proposal that would require health care providers to obtain the consent of patients before disclosing personal health information for treatment, payment or “health care operations.” Such a requirement, she said, could cripple efforts to manage chronic diseases like diabetes, which often require coordination of care among many specialists. At the moment, senior House Democrats are determined to include privacy safeguards in the economic recovery bill. But some insurance lobbyists said they hoped Congress would punt on the issue, leaving privacy standards to be developed by the Health and Human Services Department, where they believe they can make their case more effectively. Microsoft has joined many consumer groups in supporting stronger safeguards. The software giant has developed products that allow consumers and providers to store and share medical data in a secure format. “Health information technology will succeed only if privacy is protected,” said Frank C. Torres, director of consumer affairs at Microsoft. “For the president- elect to achieve his vision, he has to protect privacy.” Senator Sheldon Whitehouse, Democrat of Rhode Island, and Peter R. Orszag, director-designate of the White House Office of Management and Budget, said electronic medical records could be more secure than paper records. “If the files are electronic,” Mr. Whitehouse said, “computers can record every time someone has access to your medical information.” But, he said, the challenge is political as well as technical. “Until people are more confident about the security of electronic medical records,” Mr. Whitehouse said, “it's vitally important that we err on the side of privacy.” The data in medical records has great potential commercial value. Several companies, for example, buy and sell huge amounts of data on the prescribing habits of doctors, and the information has proved invaluable to pharmaceutical sales representatives. “Health I.T. without privacy is an excellent way for companies to establish a gold mine of information that can be used to increase profits, promote expensive drugs, cherry-pick patients who are cheaper to insure and market directly to consumers,” said Dr. Deborah C. Peel, coordinator of the Coalition for Patient Privacy, which includes
Recommended publications
  • Intel X86 Considered Harmful
    Intel x86 considered harmful Joanna Rutkowska October 2015 Intel x86 considered harmful Version: 1.0 1 Contents 1 Introduction5 Trusted, Trustworthy, Secure?......................6 2 The BIOS and boot security8 BIOS as the root of trust. For everything................8 Bad SMM vs. Tails...........................9 How can the BIOS become malicious?.................9 Write-Protecting the flash chip..................... 10 Measuring the firmware: TPM and Static Root of Trust........ 11 A forgotten element: an immutable CRTM............... 12 Intel Boot Guard............................. 13 Problems maintaining long chains of trust............... 14 UEFI Secure Boot?........................... 15 Intel TXT to the rescue!......................... 15 The broken promise of Intel TXT.................... 16 Rescuing TXT: SMM sandboxing with STM.............. 18 The broken promise of an STM?.................... 19 Intel SGX: a next generation TXT?................... 20 Summary of x86 boot (in)security.................... 21 2 Intel x86 considered harmful Contents 3 The peripherals 23 Networking devices & subsystem as attack vectors........... 23 Networking devices as leaking apparatus................ 24 Sandboxing the networking devices................... 24 Keeping networking devices outside of the TCB............ 25 Preventing networking from leaking out data.............. 25 The USB as an attack vector...................... 26 The graphics subsystem......................... 29 The disk controller and storage subsystem............... 30 The audio
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 9,053,173 B2 Mehanna Et Al
    US009053173B2 (12) United States Patent (10) Patent No.: US 9,053,173 B2 Mehanna et al. (45) Date of Patent: *Jun. 9, 2015 (54) INTELLIGENT RESULTS RELATED TO A 17/30864 (2013.01); G06F 17/30442 (2013.01); PORTION OF A SEARCH QUERY G06F 17/3053 (2013.01); G06F 17/30477 (2013.01); H04L 29/06027 (2013.01); G06F (71) Applicant: Facebook, Inc., Menlo Park, CA (US) 17/30483 (2013.01) (58) Field of Classification Search (72) Inventors: Lara Mehanna, Arlington, VA (US); None Shawkat Hasan, Dulles, VA (US); See application file for complete search history. Harmannus Vandermolen, Dulles, VA (US); Gerald Campbell, Ashburn, VA (56) References Cited (US) U.S. PATENT DOCUMENTS Assignee: (73) FACEBOOK, INC., Menlo Park, CA 4,650,927 A 3, 1987 James (US) 4,817, 129 A 3, 1989 Riskin 4,837,798 A 6, 1989 Cohen et al. (*) Notice: Subject to any disclaimer, the term of this 5,008,853. A 4/1991 Bly et al. patent is extended or adjusted under 35 U.S.C. 154(b) by 325 days. (Continued) This patent is Subject to a terminal dis FOREIGN PATENT DOCUMENTS claimer. CA 2547240 12/2009 CA 2506417 6, 2011 (21) Appl. No.: 13/751,777 (Continued) (22) Filed: Jan. 28, 2013 OTHER PUBLICATIONS (65) Prior Publication Data U.S. Appl. No. 1 1/023,652, Apr. 29, 2014, Office Action. US 2013/O13868O A1 May 30, 2013 (Continued) Related U.S. Application Data Primary Examiner - Jeffrey R Swearingen (63) Continuation of application No. 137734,738, filed on (74) Attorney, Agent, or Firm — Keller Jolley Preece Jan.
    [Show full text]
  • 1946-12-05.Pdf
    For CLASSIFIED ADVERTISING Call WAverly 3-2465 Deadline: Wednesday Afternoon ST.ABLISHED 19: HILLSIDE, N. THURSDAY, DECEMBER 5, 1946 Herlich Pledges Leonard President $20,000 More From Of Sun Tube Corp. Consideration Of S ± ? S p ,|WiU Receive Estimates On State For Schools Playground Plea Guide On Salaries- ■■■Careful consideration’’ will be Members of the Bbard of Edu­ given- to & petition for rlpyetopment cation Will confer tonight in the Cost Of Two Playing Fields Funds Received Under Of IS? Central. avenue playground senior high school wltH. represents- Pascoe Act W ill Help bN.9 "Presented. last j a-y- “fives of theTiliry^com m ittee of Step Preliminary To Union Council To night to the Township Committee, toe Hillside Teachers Association Meet Increased Costs Mayor George W. Herlich told the Apartment Plan Appears Action On Petition petitioners. on requested revisions of the salary Changes in state laws affeoting Hold Scout Honor schedule, For Playground Here ■JachW—appropriattons im derw hat Mayor Herlica sald-the Townahtp- No information has been released Township Engineer Henry Kich Oommittee must balance calls of I is known as . the Paseoe Act appar- concerning possible costs involved in Killed By Zoning Action Jr. was directed. last night by toe 7 ently Will be favorable. to Hillside various groups Interested. In cer­ the teachers’ proposed schedule, ef- Township Committee - to furnish - Court Here Friday tain toprov^ente^againstitheuel- -feoti-ve with- .toe next sehool.budget Decision of the..Township..-Com* zoning’ jboaid- -for its reoommenda- financially, a survey this week by mittee not to rezorie a poftioh of lion on a definite change - of zone estimates of the cost of preparing Times Indicated.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Downloading of Movies, Television Shows and Other Video Programming, Some of Which Charge a Nominal Or No Fee for Access
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE FISCAL YEAR ENDED DECEMBER 31, 2011 OR ☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE TRANSITION PERIOD FROM TO Commission file number 001-32871 COMCAST CORPORATION (Exact name of registrant as specified in its charter) PENNSYLVANIA 27-0000798 (State or other jurisdiction of (I.R.S. Employer Identification No.) incorporation or organization) One Comcast Center, Philadelphia, PA 19103-2838 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code: (215) 286-1700 SECURITIES REGISTERED PURSUANT TO SECTION 12(b) OF THE ACT: Title of Each Class Name of Each Exchange on which Registered Class A Common Stock, $0.01 par value NASDAQ Global Select Market Class A Special Common Stock, $0.01 par value NASDAQ Global Select Market 2.0% Exchangeable Subordinated Debentures due 2029 New York Stock Exchange 5.50% Notes due 2029 New York Stock Exchange 6.625% Notes due 2056 New York Stock Exchange 7.00% Notes due 2055 New York Stock Exchange 8.375% Guaranteed Notes due 2013 New York Stock Exchange 9.455% Guaranteed Notes due 2022 New York Stock Exchange SECURITIES REGISTERED PURSUANT TO SECTION 12(g) OF THE ACT: NONE Indicate by check mark if the Registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes ☒ No ☐ Indicate by check mark if the Registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act.
    [Show full text]
  • Comcast Corp
    COMCAST CORP FORM 10-K (Annual Report) Filed 02/23/10 for the Period Ending 12/31/09 CIK 0001166691 Symbol CMCSA SIC Code 4841 - Cable and Other Pay Television Services Industry Broadcasting & Cable TV Sector Services Fiscal Year 12/31 http://www.edgar-online.com © Copyright 2010, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. Table of Contents FORM 10-K UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE FISCAL YEAR ENDED DECEMBER 31, 2009 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE TRANSITION PERIOD FROM TO Commission file number 001-32871 COMCAST CORPORATION (Exact name of registrant as specified in its charter) PENNSYLVANIA 27 -0000798 (State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.) One Comcast Center, Philadelphia, PA 19103 -2838 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code: (215) 286-1700 SECURITIES REGISTERED PURSUANT TO SECTION 12(b) OF THE ACT: Title of Each Class Name of Each Exchange on which Registered Class A Common Stock, $0.01 par value NASDAQ Global Select Market Class A Special Common Stock, $0.01 par value NASDAQ Global Select Market 2.0% Exchangeable Subordinated Debentures due 2029 New York Stock Exchange 6.625% Notes due 2056 New York Stock Exchange 7.00% Notes due 2055 New York Stock Exchange 7.00% Notes due 2055, Series B New York Stock Exchange 8.375% Guaranteed Notes due 2013 New York Stock Exchange 9.455% Guaranteed Notes due 2022 New York Stock Exchange SECURITIES REGISTERED PURSUANT TO SECTION 12(g) OF THE ACT: NONE Indicate by check mark if the Registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]
  • | Hao Wakati Mwili Ut at Man United
    |HAO WAKATIMWILI US009852126B2 UT AT MAN UNITED (12 ) United States Patent (10 ) Patent No. : US 9 ,852 , 126 B2 Mehanna et al. ( 45 ) Date of Patent: * Dec. 26 , 2017 ( 54 ) HOST- BASED INTELLIGENT RESULTS (58 ) Field of Classification Search RELATED TO A CHARACTER STREAM None ( 71 ) Applicant: Facebook , Inc. , Menlo Park , CA (US ) See application file for complete search history . ( 72 ) Inventors : Lara Mehanna , New York , NY (US ) ; ( 56 ) References Cited Shawkat Hasan , Dulles , VA (US ) ; U . S . PATENT DOCUMENTS Harmannus Vandermolen , Sunnyvale , CA (US ) ; Gerald Campbell , Agoura 4 ,650 , 927 A 3 / 1987 James Hills , CA (US ) 4 , 817 , 129 A 3 / 1989 Riskin ( Continued ) ( 73 ) Assignee : FACEBOOK , INC . , Menlo Park , CA (US ) FOREIGN PATENT DOCUMENTS ( * ) Notice : Subject to any disclaimer , the term of this 2547240 12 /2009 patent is extended or adjusted under 35 CA 2506417 6 / 2011 U . S . C . 154 ( b ) by 229 days . (Continued ) This patent is subject to a terminal dis claimer . OTHER PUBLICATIONS Ramey , Chet et al . Bash Reference Manual . Reference Documen (21 ) Appl. No .: 14 /702 , 598 tation for Bash . Edition 2 . 2 for bash Version 2 .02 . Apr. 1 , 1998 . 120 pages . Retrieved from https : // www .blyx . com /public /docs / (22 ) Filed : May 1 , 2015 programacion /bashref .pdf on Mar . 23 , 2017 . * (65 ) Prior Publication Data (Continued ) US 2015/ 0347380 A1 Dec . 3 , 2015 Primary Examiner — Jeffrey R Swearingen Related U . S . Application Data (74 ) Attorney , Agent, or Firm — Keller Jolley Preece (63 ) Continuation of application No . 13 / 766 ,620 , filed on (57 ) ABSTRACT Feb . 13 , 2013 , now Pat . No . 9 ,075 , 868, which is a Information may be presented to a user by using a first (Continued ) application to receive a character stream of one or more noncompletion characters .
    [Show full text]
  • NSA) Surveillance Programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) Activities and Their Impact on EU Citizens' Fundamental Rights
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens' fundamental rights NOTE Abstract In light of the recent PRISM-related revelations, this briefing note analyzes the impact of US surveillance programmes on European citizens’ rights. The note explores the scope of surveillance that can be carried out under the US FISA Amendment Act 2008, and related practices of the US authorities which have very strong implications for EU data sovereignty and the protection of European citizens’ rights. PE xxx.xxx EN AUTHOR(S) Mr Caspar BOWDEN (Independent Privacy Researcher) Introduction by Prof. Didier BIGO (King’s College London / Director of the Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France). Copy-Editing: Dr. Amandine SCHERRER (Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France) Bibliographical assistance : Wendy Grossman RESPONSIBLE ADMINISTRATOR Mr Alessandro DAVOLI Policy Department Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR To contact the Policy Department or to subscribe to its monthly newsletter please write to: [email protected] Manuscript completed in MMMMM 200X. Brussels, © European Parliament, 200X. This document is available on the Internet at: http://www.europarl.europa.eu/studies DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament.
    [Show full text]
  • Confronting Confinement: a Report of the Commission on Safety and Abuse in America's Prisons
    Washington University Journal of Law & Policy Volume 22 Access to Justice: The Social Responsibility of Lawyers | Prison Reform: Commission on Safety and Abuse in America's Prisons January 2006 Confronting Confinement: A Report of The Commission on Safety and Abuse in America's Prisons John J. Gibbons Gibbons P.C. Nicholas deBelleville Katzenbach United States Attorney General Follow this and additional works at: https://openscholarship.wustl.edu/law_journal_law_policy Part of the Law Enforcement and Corrections Commons Recommended Citation John J. Gibbons and Nicholas deBelleville Katzenbach, Confronting Confinement: A Report of The Commission on Safety and Abuse in America's Prisons, 22 WASH. U. J. L. & POL’Y 385 (2006), https://openscholarship.wustl.edu/law_journal_law_policy/vol22/iss1/25 This Prison Reform - Essay is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Journal of Law & Policy by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. Confronting Confinement† A Report of The Commission on Safety and Abuse in America’s Prisons John J. Gibbons Nicholas de B. Katzenbach Commission Co-Chairs June 2006 Copyright © 2006, Vera Institute of Justice. The Commission’s report was supported in part by grants from the Charles River Fund, Ford Foundation, Fund for New Jersey, JEHT Foundation, Open Society Institute, Overbrook Foundation, and the Robert W. Wilson Charitable Trust. † This Article is a reprint of the Commission’s report; there are no changes to the text of the report, although photographs have been omitted and some formatting changes made.
    [Show full text]
  • Receipt of the 2010 Annual Report and Plant Survey from Comcast Cable Communications, Inc
    City of Alexandria, Virginia MEMORANDUM DATE: DECEMBER 8,2010 TO: THE HONORABLE MAYOR AND MEMBERS OF CITY COUNCIL FROM: JAMES K. HARTMAW, CITY MANAGEK V SUBJECT: 2010 ANNUAL REPORT AND PLANT SURVEY FROM COMCAST CABLE COMMUNICATIONS, INC. ISSUE: Receipt of the 2010 Annual Report and Plant Survey from Comcast Cable Communications, Inc. (Comcast). RECOMMENDATION: That Council receive the Comcast 201 0 Annual Report and Plant Survey (Attachment 1). DISCUSSION: Section 9-3-513(a) of the City Code requires the cable television franchisee to submit an annual written report to City Council. The report details the company's previous year's activities operating the Alexandria City cable television system. The 2010 report, which covers the fiscal year of July 1,2009 through June 30, 20 10 (the 16h year of the cable franchise), summarizes the company's activities with respect to programming and customer service, physical plant and system operations, and describes the company's financial condition for the calendar year ending December 3 1, 2009. The full report runs more than 400 pages. Due to its size, the entire report is not attached, but it may be reviewed in the City Clerk's Office. Several sections of the report are attached for your information: the executive summary, summary of local origination and community programming; and the auditor's reports. The following is a summary of the major accomplishments described in the Annual Report and the actions taken by the franchisee to comply with City and federal requirements. Council will recall that at its October 26 legislative meeting it adopted a resolution extending the Comcast franchise until March 3 1,2011 and temporarily waived as of December 1,2010, the requirement that Comcast provide 10 hours of originally produced programming that is for the use of, and of interest to, City residents.
    [Show full text]
  • Reloading Protection
    INFO 6 th INTERNATIONAL CONFERENCE T +32 2 629 20 93 • [email protected] 23 24 25 JANUARY 2013 l BRUSSELS BELGIUM COMPUTERS, PRIVACY DATES & DATA PROTECTION 23 24 25 January 2013 RELOADING LANGUAGE English DATA AUDIENCE PROTECTION Data protection authorities and offi cials, academics, civil liberties organisations, magistrates, barristers, legal consultants, lobbyists, representatives of ICT and security companies, etc. LOCATION www.nickvanhee.be © Les Halles de Schaerbeek (Grande Halle (6,237m2 - 750 seats), Petite Halle (380m2), and La Cave, Rue Royale-Sainte-Marie 22, 1030 Brussels side events De Markten: Oude Graanmarkt 5 Rue du Vieux Marché aux Grains, 1000 Brussels Bazar: Kapucijnenstraat 63 Rue des Capucins, 1000 Brussels WHAT’S GOING ON IN BRUSSELS AT THE MOMENT? www.agendamagazine.be www.brusselsmuseums.be www.visitbrussels.be www.europeanprivacyday.org WWW.CPDPCONFERENCES.ORG WWW.CPDPCONFERENCES.ORG CPDP2013_PROGRAMME_37.indd 48-49 21/01/13 21:07 CPDP CONFERENCE PARTNERS WHAT IS CPDP? Every year in Brussels, CPDP gathers policy makers, academics, computer scientists, consultants, practitioners and activists from all over the world to exchange ideas and discuss emerging issues in information technology, privacy, data protection and law. CPDP has been growing progressively since its inception in terms of speakers, participants and panels. Ambitions for CPDP 2013 are higher than ever, as it will stage more than 40 panels and workshops (with a stimulating mix of academics, practitioners, regulators and advocates), as well as multiple side events (such as open debates, PechaKucha talks and artistic interventions). CPDP will pay particular attention to high-level and innovative research, and four panels will be completely devoted to the presentations of outstanding junior and senior academics.
    [Show full text]
  • BEFORE the PUBLIC UTILITIES COMMISSION of the STATE of CALIFORNIA Investigation on the Commission's Own Motion Into the Opera
    BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA FILED 11-04-14 04:59 PM Investigation on the Commission’s Own Motion into the Operations, Practices, and Conduct of Comcast Phone of California, LLC (U-5698-C) and its Related Entities (Collectively “Comcast”) to Determine Investigation 13-10-003 Whether Comcast Violated the Laws, Rules, (Filed October 3, 2013) and Regulations of this State in the Unauthorized Disclosure and Publication of Comcast Subscribers’ Unlisted Names, Telephone Numbers, and Addresses. COMCAST PHONE OF CALIFORNIA, LLC (U 5698 C) AND RELATED ENTITIES POST-HEARING OPENING BRIEF [PUBLIC VERSION] Peter Karanjia Suzanne Toller Michael Sloan Jane Whang Davis Wright Tremaine LLP Garrett Parks 1919 Pennsylvania Avenue, N.W., Davis Wright Tremaine LLP Suite 800 505 Montgomery Street, Suite 800 Washington, D.C. 20006-3401 San Francisco, CA 94111-6533 Tel: (202) 973-4200 Tel. (415) 276-6500 Fax: (202) 973-4499 Fax. (415) 276-6599 Email: [email protected] Email: [email protected] [email protected] [email protected] [email protected] Attorneys for Comcast Dated: November 4, 2014 DWT 25273846v1 0107080-000229 TABLE OF CONTENTS EXECUTIVE SUMMARY ..........................................................................................................1 I. PARTIES, QUESTIONS PRESENTED, AND SUMMARY OF RECOMMENDATIONS ......................................................................................................3 A. The Comcast Entities Named in this Proceeding ...........................................................3
    [Show full text]