This Thesis Has Been Submitted in Fulfilment of the Requirements for a Postgraduate Degree (E.G

Total Page:16

File Type:pdf, Size:1020Kb

This Thesis Has Been Submitted in Fulfilment of the Requirements for a Postgraduate Degree (E.G This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions of use: This work is protected by copyright and other intellectual property rights, which are retained by the thesis author, unless otherwise stated. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. Internet Blocking Law and Governance in the United Kingdom: An Examination of the Cleanfeed System TJ McIntyre Image © CC BY-NC-SA Tagxedo.com Doctor of Philosophy University of Edinburgh 2013 Abstract This thesis examines the legal and governance issues presented by internet blocking (“filtering”) systems through the use of the United Kingdom’s Cleanfeed system as a national case study. The Cleanfeed system – which aims to block access to child abuse images – has been influential both domestically and internationally but has been the subject of relatively little sustained scrutiny in the literature. Using a mixed doctrinal and empirical methodology this work discusses the evolution of Cleanfeed and considers the way in which government pressure has led to a private body without any express legislative basis (the Internet Watch Foundation) being given the power to control what UK internet users can view. The thesis argues that the Cleanfeed system sits at the intersection of three distinct trends – the use of architectural regulation, regulation through intermediaries and self- regulation – which individually and collectively present significant risks for freedom of expression and good governance online. It goes on to identify and examine the fundamental rights norms and governance standards which should apply to internet blocking and tests the system against them, arguing in particular that Cleanfeed fails to meet the requirements developed by the European Court of Human Rights under Articles 6 and 10 ECHR. It considers the extent to which Cleanfeed might be made amenable to these principles through the use of judicial review or actions under the Human Rights Act 1998 and concludes that the diffuse structure of the system and the limited availability of horizontal effect against private bodies will leave significant aspects beyond the effective reach of the courts. This work also assesses claims that the Cleanfeed system is a proof of concept which should be extended so as to block other material considered objectionable (such as websites which “glorify terrorism”). It argues that the peculiar features of the system mean that it represents a best case scenario and does not support blocking of other types of content which are significantly more problematic. The thesis concludes by considering proposals for reform of the Cleanfeed system and the extent to which greater public law oversight might undermine the desirable features associated with self- regulation. Declaration This thesis is my own work and has not been submitted for any other degree or professional qualification. Some portions – particularly chapter 2, section 6 – are drawn from material published as ‘Blocking Child Pornography on the Internet: European Union Developments’ International Review of Law, Computers & Technology 24, no. 3 (2010): 209 and ‘Child Abuse Images and Cleanfeeds: Assessing Internet Blocking Systems’, in Research Handbook on Governance of the Internet, ed. Ian Brown (Cheltenham: Edward Elgar, 2013). Chapters 4 and 5 develop arguments previously outlined in TJ McIntyre and Colin Scott, ‘Internet Filtering: Rhetoric, Legitimacy, Accountability and Responsibility’, in Regulating Technologies, ed. Roger Brownsword and Karen Yeung (Oxford: Hart Publishing, 2008). The law is stated as of 10 December 2013. Acknowledgements I owe a particular debt of gratitude to my colleague Prof. Colin Scott for sparking my interest in the topic and for his assistance with the funding and research leave which made it possible. My supervisors, Prof. Charlotte Waelde, Dr. Abbe Brown and Navraj Singh Ghaleigh, were unstinting in their advice and encouragement and I have benefitted greatly from their guidance. Special thanks are owed to my parents and in particular to my father who gave me an interest in computers and technology. Most of all, I must thank my wife Clodagh and my son Marcus for their forbearance throughout. Table of contents TABLE OF CONTENTS ............................................................................................................................... I TABLE OF FIGURES ................................................................................................................................ VI CHAPTER 1 – INTRODUCTION ................................................................................................................. 1 1. BACKGROUND ..................................................................................................................................... 1 2. AIMS AND ORIGINAL CONTRIBUTION ........................................................................................................ 3 3. WHY CHOOSE CLEANFEED AS A CASE STUDY?............................................................................................. 6 (i) Why the national level? .............................................................................................................. 6 (ii) Why child abuse images? ........................................................................................................... 7 4. STRUCTURE ......................................................................................................................................... 8 CHAPTER 2 – LEGAL FRAMEWORK ....................................................................................................... 11 1. INTRODUCTION .................................................................................................................................. 11 2. JURISDICTION .................................................................................................................................... 12 3. CRIMINALISATION OF CHILD ABUSE IMAGES ............................................................................................. 13 (i) Communications offences ........................................................................................................ 13 (ii) Obscenity .................................................................................................................................. 15 (a) Continued relevance ........................................................................................................................... 15 (b) Offences .............................................................................................................................................. 16 (c) Application to electronic files and the internet ................................................................................... 16 (d) Defining “obscenity” ........................................................................................................................... 19 (e) Defences .............................................................................................................................................. 20 (iii) Indecent photographs, pseudo-photographs and tracings of children .................................... 21 (a) Background ......................................................................................................................................... 21 (b) Indecency ............................................................................................................................................ 22 (c) Photographs, pseudo-photographs and tracings ................................................................................ 23 (d) Possession ........................................................................................................................................... 25 (e) Making indecent photographs, etc. of children .................................................................................. 26 (f) Other offences..................................................................................................................................... 29 (iv) Non photographic images of children ...................................................................................... 31 (a) Background ......................................................................................................................................... 31 (b) Elements of the offence ...................................................................................................................... 32 4. ISP EXEMPTIONS FROM LIABILITY .......................................................................................................... 33 (i) 1996-2002: Threats of prosecution followed by de facto immunity ........................................ 33 (ii) 2002 onwards: The effect of the E-Commerce Directive .......................................................... 34 (a) Hosting immunity ...............................................................................................................................
Recommended publications
  • Ben Adamson 7242107 Phd Thesis Final Submission Sep 2017
    IP in the Corridors of Power A study of lobbying, its impact on the development of intellectual property law, and the implications for the meaning of democracy A thesis submitted to the University of Manchester for the degree of Doctor of Philosophy in the Faculty of Humanities 2017 Ben Adamson School of Law Contents Title Page 1 Contents 2 Table of Abbreviations 7 Abstract 8 Declaration 9 Copyright Statement 10 Acknowledgements 11 Chapter 1: Introduction 13 1. What is Lobbying? 15 2. Setting the Scene 16 3. Core Themes 20 3.1 A Model of Democracy 20 3.2 The Importance of Stakeholder Input 21 3.3 Equality of Access and Influence 22 4. A Matter of Method 23 4.1 Quality vs. Quantity 24 4.2 Why Case Studies? 25 4.3 Gathering Data 27 4.4 Style and Substance 28 4.5 Objectivity and Subjectivity – The Balance of Fairness 29 4.6 Questions by Design 30 4.7 Confidentiality & Anonymity 31 5. Thesis Outline 32 Chapter 2: Conceptions of Governance and Democracy: A 34 Contemporary Model of Democracy 2 1. Governance 34 1.1 Definitions of Governance 39 1.2 Complexity and Multiple Actors 45 1.3 Relationships Between Actors & Policy Networks 49 1.4 Policy Networks in the EU Context 58 1.5 Conclusions on Governance 60 2. Democracy 62 2.1 Classical Models of Democracy 63 2.2 Organisations as Citizens? 69 2.3 Pluralism 75 2.4 A Minimal Role for the State? 82 2.5 Participation By All? 84 2.6 Towards A Working Model? 88 2.7 Wealth and Equality 89 2.8 Wealth, Equality and Lobbying 97 2.9 MPs: Delegates or Trustees? 101 2.10 All Party Groups 102 2.11 Who to Lobby? 102 2.12 Opening Up Access 104 2.13 The Media 105 2.14 Digital Media and Participation 107 2.15 Concluding Remarks 110 3.
    [Show full text]
  • “Site Blocking” to Reduce Online Copyright Infringement
    “Site Blocking” to reduce online copyright infringement A review of sections 17 and 18 of the Digital Economy Act The Department for Culture, Media and Sport has redacted some parts of this document where it refers to techniques that could be used to circumvent website blocks. There is a low risk of this information being useful to people wanting to bypass or undermine the Internet Watch Foundation‟s blocks on child sexual abuse images. The text in these sections has been blocked out. Advice Date: 27 May 2011 1 Contents Section Page 1. Executive summary 3 2. Introduction 9 3. Understanding how the internet operates 17 4. Blocking sites 26 5. Effectiveness of Section 17 & 18 46 6. Conclusion 50 Annex Page 1 Technical Glossary 52 2 Whois domain privacy service output 54 Section 1 1. Executive summary The Secretary of State has asked Ofcom to consider a number of questions related to the blocking of sites to reduce online copyright infringement. The Secretary of State for Culture, Media and Sport has asked Ofcom to report on certain technical matters relating to sections 17 and 18 of the Digital Economy Act 2010 (DEA). Sections 17 and 18 provide the Secretary of State with the power to grant the Courts the ability to require service providers, including internet service providers (ISPs) and other intermediaries, to prohibit access to sites on the internet that are found to be infringing copyright. Specifically, we have been asked to consider the following questions: Is it possible for internet service providers to block site access? Do
    [Show full text]
  • Cyber Piracy: Can File Sharing Be Regulated Without Impeding the Digital Revolution?
    CYBER PIRACY: CAN FILE SHARING BE REGULATED WITHOUT IMPEDING THE DIGITAL REVOLUTION? Thesis submitted for the degree of Doctor of Philosophy at the University of Leicester Michael Robert Filby School of Law University of Leicester May 2012 Cyber Piracy: Can File Sharing be Regulated without Impeding the Digital Revolution? Abstract This thesis explores regulatory mechanisms of managing the phenomenon of file sharing in the online environment without impeding key aspects of digital innovation, utilising a modified version of Lessig’s modalities of regulation to demonstrate significant asymmetries in various regulatory approaches. After laying the foundational legal context, the boundaries of future reform are identified as being limited by extra-jurisdictional considerations, and the regulatory direction of legal strategies to which these are related are linked with reliance on design-based regulation. The analysis of the plasticity of this regulatory form reveals fundamental vulnerabilities to the synthesis of hierarchical and architectural constraint, that illustrate the challenges faced by the regulator to date by countervailing forces. Examination of market-based influences suggests that the theoretical justification for the legal regulatory approach is not consistent with academic or policy research analysis, but the extant effect could impede openness and generational waves of innovation. A two-pronged investigation of entertainment industry-based market models indicates that the impact of file sharing could be mitigated through adaptation of the traditional model, or that informational decommodification could be harnessed through a suggested alternative model that embraces the flow of free copies. The latter model demonstrates how the interrelationships between extant network effects and sub-model externalities can be stimulated to maximise capture of revenue without recourse to disruption.
    [Show full text]
  • Digital Economy Bill [HL]
    Digital Economy Bill [HL] EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Department for Business, Innovation and Skills and the Department for Culture, Media and Sport, are published separately as HL Bill 1—EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Lord Mandelson has made the following statement under section 19(1)(a) of the Human Rights Act 1998: In my view the provisions of the Digital Economy Bill [HL] are compatible with the Convention rights. HL Bill 1 54/5 Digital Economy Bill [HL] CONTENTS General duties of OFCOM 1 General duties of OFCOM 2 OFCOM reports on infrastructure, internet domain names etc 3 OFCOM reports on media content Online infringement of copyright 4 Obligation to notify subscribers of reported infringements 5 Obligation to provide infringement lists to copyright owners 6 Approval of code about the initial obligations 7 Initial obligations code by OFCOM in the absence of an approved code 8 Contents of initial obligations code 9 Progress reports 10 Obligations to limit internet access: assessment and preparation 11 Obligations to limit internet access 12 Code by OFCOM about obligations to limit internet access 13 Contents of code about obligations to limit internet access 14 Enforcement of obligations 15 Sharing of costs 16 Interpretation and consequential provision 17 Power to amend copyright provisions Powers in relation to internet domain registries 18 Powers in relation to internet domain registries 19 Appointment of manager of internet domain registry 20 Application to court to alter constitution
    [Show full text]
  • Digital Economy Act 2010: Copyright
    Digital Economy Act 2010: copyright Standard Note: SN/HA/5515 Last updated: 28 June 2013 Author: Philip Ward Section Home Affairs The Digital Economy Act 2010 received Royal Assent at the very end of the last Parliament. Sections 3 to 18 of the Act cover online infringement of copyright. Several provisions have proved controversial and have not yet been implemented. Section 17 grants the Secretary of State a power to bring in regulations for the blocking of infringing websites. The present Government has indicated that it does not intend to use this power. Copyright owners have brought successful court actions against infringing websites under existing laws. The Government is proceeding with implementation of an “initial obligations code” (allowed for under section 11 of the Act). Under the proposed system, an internet service provider would send a warning letter to a customer detected downloading copyright material for free from the internet. If the infringing activity continued, two follow-up letters would be sent. Once the third letter was dispatched, the customer’s download history could be released to the owners of the copyrighted material, enabling legal action to be initiated against the infringer. However, the copyright owner would first have to gain a court order to determine the identity of the filesharer, as the download history provided would be anonymised. Customers thus accused would be able to file an appeal for £20, which would be refunded if the appeal were successful. The proposed notification system has survived the challenge of a judicial review instigated by BT and TalkTalk. Ofcom has conducted public consultations on the draft code and on the allocation of costs for administering the regime.
    [Show full text]
  • Better Protecting BBC Financial Independence an Exploratory Report for the BBC Trust
    Better protecting BBC financial independence An exploratory report for the BBC Trust Martin Moore King’s College London January 2016 The Policy Institute at King’s About the Policy Institute at King’s The Policy Institute at King’s College London acts as a hub, linking insightful research with rapid, relevant policy analysis to stimulate debate, inform and shape future policy agendas. Building on King’s central London location at the heart of the global policy conversation, our vision is to enable the translation of academic research into policy and practice by facilitating engagement between academic, business and policy communities around current and future policy needs. We combine the academic excellence of King’s with connectedness of a think tank and the professionalism of a consultancy. Moore, M., Better protecting BBC financial independence: an exploratory report for the BBC Trust, Centre for the Study of Media, Communication and Power, the Policy Institute at King’s College London, January 2016. About the author Martin Moore Dr Martin Moore is a Senior Research Fellow and Director of the Centre for the Study of Media, Communication and Power at the Policy Institute at King’s College London. He has twenty years experience working across the UK media, in the commercial sector, the third sector and in academia. 1 Preface This report was commissioned by the BBC Trust in order to explore ways to better protect the BBC’s financial independence beyond Charter Renewal. The ideas presented in the report are derived from ten interviews with expert sources conducted for the study in October and November 2015, supplemented by relevant publicly available information.
    [Show full text]
  • Online Infringement of Copyright and the Digital Economy Act 2010: Draft Initial Obligations Code Communications Consumer Panel Consultation Response
    Online Infringement of Copyright and the Digital Economy Act 2010: Draft Initial Obligations Code Communications Consumer Panel Consultation Response 1. Introduction The Communications Consumer Panel (the Panel) is an independent panel of experts established under the Communications Act 2003. Its role is to influence Ofcom, Government, the EU and service and equipment providers, so that the communications interests of consumers and citizens are protected and promoted. The Panel pays particular attention to the needs of older people and people with disabilities, to the needs of people in rural areas and people on low incomes, and to the needs of small businesses, which face many of the same problems as individual consumers. The Panel is made up of part-time members with a balance of expertise in consumer issues in the communications sector. There are members representing the interests of consumers in Scotland, Wales, Northern Ireland and England. Panel Members are appointed by Ofcom, subject to approval by the relevant Secretaries of State. They are appointed in accordance with Nolan principles and are eligible for re-appointment. The Panel is assisted by a small advisory team. 2. Background The Panel noted during its discussions about the Digital Britain Final report in 2009 that debates around online copyright infringement appeared to be dominated by the interests of copyright holders (rights holders) and internet service providers (ISPs). Communications Consumer Panel Consultation Response: Online Infringement of Copyright and the Digital Economy Act 2010: Draft Initial Obligations Code The Panel emphasised the need for consumer bodies to be properly involved in the debate when it responded to the last Government’s June 2009 consultation on legislation to address illegal peer-to-peer file-sharing.
    [Show full text]
  • COPYRIGHT and BUSINESS MODELS in the EARLY EIGHTEENTH CENTURY Isabellaalexanderf
    ALL CHANGE FOR THE DIGITAL ECONOMY: COPYRIGHT AND BUSINESS MODELS IN THE EARLY EIGHTEENTH CENTURY IsabellaAlexanderf TABLE OF CONTENTS I. INTRODUCTION: ANALOGUE AND DIGITAL WORLDS........ 1351 II. THE ECONOMY AND THE BOOK TRADE IN THE EIGHTEENTH CENTURY............................ 1354 III. THE PASSAGE OF THE STATUTE OF ANNE AND CHANGES IN ECONOMIC CONTROL OF THE BOOK TRADE .............. .............................. 1356 IV. PARTIAL TAKING AND THE STATUTE OF ANNE.................... 1362 V. THE FIRST CASES ............................. ...... 1368 VI. CONCLUSION ..............................................1377 I. INTRODUCTION: ANALOGUE AND DIGITAL WORLDS In 1998, the United States Congress labelled the current era the "digital millennium" when it passed a copyright act of that title.' Eleven years later, the United Kingdom echoed that language when the Department for Culture, Media and Sport published the Digital Britain Report in June 2009.2 The Report examines the country's communications infrastructure, public sector broadcasting, broadband access and take-up. It also addresses the effect of digitization on the "creative content industries," wherein lies its specific relevance to the law of copyright. In light of the Report, the © 2010 Isabella Alexander. t Newton Trust Lecturer in Law, University of Cambridge, Beachcroft LLP Fellow in Law and Director of Studies in Law, Robinson College, Cambridge. All errors are of course my own, but I am grateful to H. Tom:s G6mez-Arostegui for advice and assistance in researching the eighteenth century material, as well as helpful comments on the draft. 1. Digital Millennium Copyright Act, Pub. L. No. 105-304, 112 Stat. 2860 (1998). 2. DEP'T FOR CULTURE, MEDIA & SPORT & DEP'T FOR Bus. INNOVATION & SKILLS, DIGITAL BRITAIN FINAL REPORT, Cm 7650 (2009) [hereinafter DIGITAL BRITAIN FINAL REPORT], available at http://www.culture.gov.uk/images/publications/digitalbritain-final report-jun09.pdf.
    [Show full text]
  • COMMERCIAL Install the Customer Data
    Issue 70, May 2010 marketing advice and support to its franchisee and by failing to COMMERCIAL install the customer data. MGB Printing and Design Ltd v Kall Kwik UK Ltd This case adds nothing new to the law on negligence. [2010] EWHC 624 (QB) However, it highlights that a franchisor may owe its franchisee MGB Printing and Design (MGB) entered negotiations to a duty of care that exists separately from its contractual purchase an existing printing franchise with the franchisor, Kall obligations under the franchise agreement. In such a situation, Kwik UK Ltd (Kall Kwik). It became clear that the current exclusion and limitation of liability clauses in respect of pre- franchisee’s premises required refitting. Kall Kwik advised contractual statements and discussions, designed to prevent that this would cost between £10,000 and £20,000; £15,000 claims in misrepresentation, will not be of use. Care must thus was therefore included in the relevant cash flow document. be taken by franchisors when advising any potential franchisee, Kall Kwik also advised MGB that historical client data stored before entering into agreements. by the existing franchisee would be installed on MGB’s computers before the business launch. MGB made clear that it Handelsgesellschaft Heinrich Heine GmbH v would not purchase the franchise without this and Kall Kwik Verbraucherzentrale Nordrhein-Westfalen eV 15 C- confirmed that the installation would happen. 511/08 April 2010 (Unreported) Heine, a German mail-order company, had standard terms and The parties duly entered into a franchise agreement. MGB also conditions of sale that the consumer would pay a standard flat- entered into a sale and purchase agreement with the current rate of EUR4.95 for delivery costs and that this would not be franchisee.
    [Show full text]
  • Basic Police Procedures ••••••• Oooooo a Manual for Georgia Peace Officers
    If you have issues viewing or accessing this file contact us at NCJRS.gov. BASIC POLICE PROCEDURES ••••••• OOOOOO A MANUAL FOR GEORGIA PEACE OFFICERS )IE UNIVERSITY OF GEORGIA INSTITUTE OF GOVERNMENT GEORGIA CENTER FOR CONTINUING EDUCATION ATHENS, GEORGIA - 30601 Basic Police Procedures A Manual for Georgia Peace Officers by John 0. Truitt Law Enforcement Television Training Coordinator University of Georgia Institute of Government and Georgia Center for Continuing Education 1968 Financed by The Office of Law Enforcement Assistance United States Department of Justice TABLE OF CONTENTS Program Number Title Page 1 Stopping the Traffic Violator 1 1. Problems before stopping 1 2. Methods for stopping the violator's vehicle 3. Providing Information to the Dispatcher 2 4. Parking the Patrol Vehicle 2 5. Methods for approaching the violator 3 6. Rules to Remember 4 2 Issuing the Traffic Citation 5 1. Preparing the traffic citation 5 2. Presenting the citation to the violator 5 3. The two-man unit and stopping the traffic violator 6 4. Completion of the Officer-Violator Contact 6 5. Stopping the Violator at night 5 6. Rules to Remember 6 3 Patrol Driving 7 1. Patrol vehicle and equipment 7 2. Emergency Calls 7 3. Mechanical problems of emergency driving 9 4. Span of vision 10 4 Routine Patrol 11 1. Be inquisitive 11 2. Your patrol route 11 3. Observing people 11 4. Knowledge of your zone area 11 5. Leaving the patrol vehicle for foot patrol 11 6. Special problem areas within your zone 12 7. Patroling as a deterrant 12 8. Rules to Remember 12 5 The Radio Complaint Call 13 1.
    [Show full text]
  • United Kingdom
    FREEDOM ON THE NET 2014 United Kingdom 2013 2014 Population: 64.1 million Internet Freedom Status Free Free Internet Penetration 2013: 90 percent Social Media/ICT Apps Blocked: No Obstacles to Access (0-25) 2 2 Political/Social Content Blocked: No Limits on Content (0-35) 6 6 Bloggers/ICT Users Arrested: No Violations of User Rights (0-40) 15 16 TOTAL* (0-100) 23 24 Press Freedom 2014 Status: Free * 0=most free, 100=least free Key Developments: May 2013 – May 2014 • Filtering mechanisms, particularly child-protection filters enabled on all household and mobile connections by default, inadvertently blocked legitimate online content (see Limits on Content). • The Defamation Act, which came into effect on 1 January 2014, introduced greater legal protections for intermediaries and reduced the scope for “libel tourism,” while proposed amendments to the Contempt of Court Act may introduce similar protections for intermediaries in relation to contempt of court (see Limits on Content and Violations of User Rights). • New guidelines published by the Director of Public Prosecutions in June 2013 sought to limit offenses for which social media users may face criminal charges. Users faced civil penalties for libel cases, while at least two individuals were imprisoned for violent threats made on Facebook and Twitter (see Violations of User Rights). • In April 2014, the European Court of Justice determined that EU rules on the mass retention of user data by ISPs violated fundamental privacy and data protection rights. UK privacy groups criticized parliament for rushing through “emergency” legislation to maintain the practice in July, while failing to hold a public debate on the wider issue of surveillance (see Violations of User Rights).
    [Show full text]
  • 2020 Census National Redistricting Data Summary File 2020 Census of Population and Housing
    2020 Census National Redistricting Data Summary File 2020 Census of Population and Housing Technical Documentation Issued February 2021 SFNRD/20-02 Additional For additional information concerning the Census Redistricting Data Information Program and the Public Law 94-171 Redistricting Data, contact the Census Redistricting and Voting Rights Data Office, U.S. Census Bureau, Washington, DC, 20233 or phone 1-301-763-4039. For additional information concerning data disc software issues, contact the COTS Integration Branch, Applications Development and Services Division, Census Bureau, Washington, DC, 20233 or phone 1-301-763-8004. For additional information concerning data downloads, contact the Dissemination Outreach Branch of the Census Bureau at <[email protected]> or the Call Center at 1-800-823-8282. 2020 Census National Redistricting Data Summary File Issued February 2021 2020 Census of Population and Housing SFNRD/20-01 U.S. Department of Commerce Wynn Coggins, Acting Agency Head U.S. CENSUS BUREAU Dr. Ron Jarmin, Acting Director Suggested Citation FILE: 2020 Census National Redistricting Data Summary File Prepared by the U.S. Census Bureau, 2021 TECHNICAL DOCUMENTATION: 2020 Census National Redistricting Data (Public Law 94-171) Technical Documentation Prepared by the U.S. Census Bureau, 2021 U.S. CENSUS BUREAU Dr. Ron Jarmin, Acting Director Dr. Ron Jarmin, Deputy Director and Chief Operating Officer Albert E. Fontenot, Jr., Associate Director for Decennial Census Programs Deborah M. Stempowski, Assistant Director for Decennial Census Programs Operations and Schedule Management Michael T. Thieme, Assistant Director for Decennial Census Programs Systems and Contracts Jennifer W. Reichert, Chief, Decennial Census Management Division Chapter 1.
    [Show full text]