Index: [thread] [date] [subject] [author]
  From: Asma Chandani <asc2106@columbia.edu>
  To  : <cpc@emoglen.law.columbia.edu>
  Date: Wed, 18 May 2005 14:30:24 -0400

FORMAT WOES. HERE'S PLAIN TEXT- PAPER 2

This is a multi-part message in MIME format.

------=_NextPart_000_0007_01C55BB6.20D4F550
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0008_01C55BB6.20D4F550"


------=_NextPart_001_0008_01C55BB6.20D4F550
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

=20
Digital Citizens =96 En Guard!
By Asma Chandani
=20
We are living in the era of an Information Revolution that our ancestors
and comrades have toiled to deliver. We are witness to phenomenal
progressions in science; we stand in awe of its promises and fall prey
to its ruses. Those of us with access to science avail ourselves of
additional methods of communication, and even the most patient among us
concedes the virtue of multifaceted and instantaneous correspondence.
Ours is an era in which communication and convenience operate in tandem,
one fostering the other and vice versa. Yet science has not yet added to
our composition- we retain our original senses, still bound to perceive
and react to our environment in only one of five ways.[1] Thus, the man
that accesses technologically advanced methods of communication is no
more inherently worthy of protection than the man of yesterday.=20
=20
The Internet =96 Private or Public?
=20
The Internet is a fulcrum of the Information Revolution. However, access
to digital communications is not universal, nor is there a vast movement
towards public provision of connectivity. Instead, the Internet is
accessed by free volition and blessed opportunity. To connect, we form
multiple contracts with private vendors of software, hardware, and
connectivity. We waive many of our prerogatives and agree to assume the
risk of our digital activities.[2] Are we to deem such contracts
unconscionable, or harmful to well-rooted public policies, manifestly
different from numerous other contracts that allocate risks and
responsibilities or waive statutory rights?[3]
=20
Privacy =96 Protecting Property or Identities?
=20
Since the times of our ancestors, everyone living in society was
expected to be known and traceable to their corporeal masses, and a
person of deceit or concealment never revered. American law protects
citizens from the non-consensual publicity of their political
expression, yet it has not found similar protections for the
non-consensual publicity of tangible movements along public highways and
streets.[4] A =93right to privacy=94 in the prior does not extend to the
former scenario, and for good reason. Far from being a quintessential
fundamental right like liberty, privacy is inherently solicitous of
contract. We may invite comrades into our homes and personal property,
the bedrock examples of places worthy of inviolate protection. Our
identities, unlike our properties, are inherently un-private. When we
enter public spaces, we cannot curtail the liberty of others to see us,
hear us, remember us, or capture our images on film.[5] Nor can we
expect anonymity when we mobilize any piece of mass in a public space,
including the digital bit-streams generated from within our homes.
Indeed, we might be quite disappointed if our bit-streams were
invisible, for then we would receive no connectivity!=20
=20
The Information Revolution has transformed the way man may use his
identity. Yet, one of the most telling tales of this period is the
=93shock=94 citizens experience when the transparency and publicity of =
their
voluntarily communicated information is realized, its sheer scope
impressed upon them. The impatient man utilizes science to create a
one-man press for his identity, preferences, and habits in order to reap
its conveniences: he will process loans and payments with ease, quickly
find amenable merchandise, and travel through the country with his
reputation in his pocket. These conveniences are not imposed on the
non-willing. We should not assume the digital information created as a
byproduct of scientific advances ought to have a constitutional leash
controlling its use. We would be prudent to first consider the
guaranteed freedoms of those who rightfully and legally obtain the
information of their fellow citizen=92s identity. It seems implausible =
to
will that employees of companies across our nation shall not copy,
paste, or share files as they wish. It would seem preposterous to will
that another man forget his past business dealings or decline to share
his experiences with his associates. Would the law be wise or foolish to
expect such things?
=20
Existing Remedies and the Absence of an Absolute Federal Right of
Privacy
=20
The law of torts provides a means for man to hold another accountable
for the third party effects resulting from his misconduct.[6] Injured
parties can also bring causes of action for breaches of contract, fraud,
or the violation of many state and federal statutes. Criminal law serves
as additional deterrent to serious identity thieves. Yet, scholars
persist, and contemplate the need for federal protections for digital
privacy. However, even in a state like California, where privacy is a
state constitutional right, protected against both public and private
action, courts are reluctant to defend the right of privacy as having an
independent stronghold in public policy, in cases where it has been
freely contracted away. The California Supreme Court=92s
=93void-if-contracted-for=94 doctrine refuses to acknowledge a =
person=92s
right to privacy if such person validly and legally consents to apparent
intrusions of their privacy.[7] The doctrine reflects America=92s firm
belief in free markets and liberty of contract. This example from one of
our nation=92s most liberal states suggests that the only intrusions =
into
privacy that courts should be concerned about are non-consensual
intrusions, or those intrusions that violate fundamental values of
American law. I have explained the inherent nature of privacy as
defeating the argument for absolute protection. Thus, existing remedies
in law need not be understated.
=20
Citizen Participants in the Information Revolution =96 Awareness and
Social Activism
           =20
To all digital citizens concerned about privacy, I suggest the
following:
*         To maintain the privacy of your residence, use alternative
addresses (e.g. P.O. Box) to facilitate important correspondence.
*         Use cash for transactions you wish others to =93forget=94 =
about.
Due to the present lack of digital cash, this entails making physical
purchases for such transactions.=20
*         Should you keep a diary, engage in research, or wish to
communicate by word or pen, utilize corporeal means for particularly
=93private=94 issues. In the event you utilize digital means, be aware =
that
such communications are akin to posting a billboard in public places.=20
*         Should you use a free online mail service, clean out your
e-mail storage space regularly. Providers are generously granting you a
license to use their privately owned storage capacities and reserve the
right to parse through content on their property. Should you wish for
greater privacy, find a provider that provides such exclusive storage or
host your own Internet server. Lobby for a re-configuration of the
domain-name system (DNS) so citizens can reasonably be entitled to host
personal servers,[8] eliminating the need to store personal digital
information on the property of others.=20
*         Your passwords, including social security numbers, are only as
safe as the entity requesting them. Bargain them away wisely, or deal
with parties respecting your privacy preferences.
*         To legal activists, consider lobbying to make the Internet
partially public, either through public provision of connectivity and
free spaces, or through eminent domain.=20
*         Consider lobbying for a federal statute commanding the courts,
=93Standards of reasonableness shall be assessed by reference to the
medium that gives rise to the cause of action.=94
*         Statutory laws already exist to make us aware of digital
transactions carried out in our names, and personal vigilance is the
ultimate defense to ward off ill-doers. The hassles inherent in such
vigilance are a necessary consequence of assumed risk.=20
*         Voice privacy concerns at every opportunity. Markets for
digital privacy will ensue.=20
=20
=20
=20
=20
=20
=20
=20
=20
[1] The five sense of man: smell, sight, sound, taste, and touch.
[2] I posit entering the Internet as akin to entering an amusement or
ski park, or sports game.
[3] A host of federal statutory claims have been held capable of
mandatory arbitration in lieu of litigation, see Mitsubishi Motors Corp
v. Soler Chrysler-Plymouth Inc., 473 U.S. 614 (1985); Gilmer v.
Interstate/ Johnson Lane Corp., 500 U.S. 20 (1991). Criminal defendants
have been held capable of waiving federal evidentiary rights, see United
States v. Mezzanatto, 513 U.S. 196 (1995).
[4] McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995); United
States v. Knotts, 460 U.S. 276 (1983).
[5] Hester v. United States, 265 U.S. 57 (1924). Closely related, see
Vega-Rodriguez v. Puerto Rico Tel. Co, 11 F.3d 174 (1st Cir. 1997).
[6] Common claims pertinent to the Information Revolution are wrongful
invasion of privacy, defamation, libel and negligence. See also
Restatement (Second) of Torts =A7652(A) for a typology of invasions of
privacy.
[7] Foley v. Interactive Data Corp., 47 Cal.3d 654 (1988).
[8] IPv4 --> IPv6
=20

------=_NextPart_001_0008_01C55BB6.20D4F550
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">


<meta name=3DProgId content=3DWord.Document>
<meta name=3DGenerator content=3D"Microsoft Word 10">
<meta name=3DOriginator content=3D"Microsoft Word 10">
<link rel=3DFile-List href=3D"cid:filelist.xml@01C55BB6.204E8740">
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"State"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"country-region" downloadurl=3D"http://www.5iantlavalamp.com/"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place" downloadurl=3D"http://www.5iantlavalamp.com/"/>
<!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:DoNotRelyOnCSS/>
 </o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:SpellingState>Clean</w:SpellingState>
  <w:GrammarState>Clean</w:GrammarState>
  <w:DocumentKind>DocumentEmail</w:DocumentKind>
  <w:EnvelopeVis/>
  <w:DrawingGridHorizontalSpacing>2.85 =
pt</w:DrawingGridHorizontalSpacing>
  =
<w:DisplayVerticalDrawingGridEvery>2</w:DisplayVerticalDrawingGridEvery>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
  </w:Compatibility>
  <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
 </w:WordDocument>
</xml><![endif]--><!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;
	mso-font-charset:2;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:0 268435456 0 0 -2147483648 0;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-parent:"";
	margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
p.MsoFooter, li.MsoFooter, div.MsoFooter
	{margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	tab-stops:center 3.0in right 6.0in;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;
	text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;
	text-underline:single;}
span.EmailStyle18
	{mso-style-type:personal;
	mso-style-noshow:yes;
	mso-ansi-font-size:10.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Arial;
	mso-ascii-font-family:Arial;
	mso-hansi-font-family:Arial;
	mso-bidi-font-family:Arial;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	mso-style-noshow:yes;
	mso-ansi-font-size:10.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Arial;
	mso-ascii-font-family:Arial;
	mso-hansi-font-family:Arial;
	mso-bidi-font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;
	mso-header-margin:.5in;
	mso-footer-margin:.5in;
	mso-even-footer:url("cid:header.htm\@01C55BB6.204E8740") ef1;
	mso-footer:url("cid:header.htm\@01C55BB6.204E8740") f1;
	mso-paper-source:0;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:519663051;
	mso-list-type:hybrid;
	mso-list-template-ids:-933877436 -420161590 67698691 67698693 67698689 =
67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:.6in;
	mso-level-number-position:left;
	margin-left:.6in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 10]>
<style>
 /* Style Definitions */=20
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman";}
</style>
<![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple =
style=3D'tab-interval:.5in'>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p> </o:p></span></font></p>

<p class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center;line-height:150%'><b
style=3D'mso-bidi-font-weight:normal'><u><font size=3D3 face=3D"Times =
New Roman"><span
style=3D'font-size:12.0pt;line-height:150%;text-transform:uppercase;font-=
weight:
bold;mso-bidi-font-weight:normal'>Digital Citizens – En =
Guard!</span></font></u><span
style=3D'text-transform:uppercase'><o:p></o:p></span></b></p>

<p class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center;line-height:150%'><font
size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'>By
Asma Chandani<b style=3D'mso-bidi-font-weight:normal'><u><span =
style=3D'text-transform:
uppercase;font-weight:bold;mso-bidi-font-weight:normal'><o:p></o:p></span=
></u></b></span></font></p>

<p class=3DMsoNormal style=3D'line-height:150%;tab-stops:center 3.35in =
right 6.7in'><font
size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'>We are
living in the era of an Information Revolution that our ancestors and =
comrades
have toiled to deliver. We are witness to phenomenal progressions in =
science;
we stand in awe of its promises and fall prey to its ruses. Those of us =
with
access to science avail ourselves of additional methods of =
communication, and
even the most patient among us concedes the virtue of multifaceted and
instantaneous correspondence. Ours is an era in which communication and =
convenience
operate in tandem, one fostering the other and vice versa. Yet science =
has not
yet <i style=3D'mso-bidi-font-style:normal'><span =
style=3D'font-style:italic;
mso-bidi-font-style:normal'>added</span></i> to our composition- we =
retain our
original senses, still bound to perceive and react to our environment in =
only
one of five ways.[1] Thus, the man that accesses technologically =
advanced
methods of communication is no more <i =
style=3D'mso-bidi-font-style:normal'><span
style=3D'font-style:italic;mso-bidi-font-style:normal'>inherently =
</span></i>worthy
of protection than the man of yesterday. <o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center;line-height:150%'><b
style=3D'mso-bidi-font-weight:normal'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;line-height:150%;font-weight:bold;mso-bidi-font=
-weight:
normal'>The Internet – Private or =
Public?<o:p></o:p></span></font></b></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'>The
Internet is a fulcrum of the Information Revolution. However, access to =
digital
communications is not universal, nor is there a vast movement towards =
public
provision of connectivity. Instead, the Internet is accessed by free =
volition
and blessed opportunity. To connect, we form multiple contracts with =
private
vendors of software, hardware, and connectivity. We waive many of our
prerogatives and agree to assume the risk of our digital activities.[2] =
Are we
to deem such contracts unconscionable, or harmful to well-rooted public
policies, manifestly different from numerous other contracts that =
allocate
risks and responsibilities or waive statutory =
rights?[3]<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center;line-height:150%'><b
style=3D'mso-bidi-font-weight:normal'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;line-height:150%;font-weight:bold;mso-bidi-font=
-weight:
normal'>Privacy – Protecting Property or =
Identities?<o:p></o:p></span></font></b></p>

<p class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center;line-height:150%'><b
style=3D'mso-bidi-font-weight:normal'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;line-height:150%;font-weight:bold;mso-bidi-font=
-weight:
normal'><o:p> </o:p></span></font></b></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'>Since
the times of our ancestors, everyone living in society was expected to =
be known
and traceable to their corporeal masses, and a person of deceit or =
concealment
never revered. American law protects citizens from the non-consensual =
publicity
of their political expression, yet it has not found similar protections =
for the
non-consensual publicity of tangible movements along public highways and =
streets.[4]
A “right to privacy” in the prior does not extend to the =
former
scenario, and for good reason. Far from being a quintessential =
fundamental
right like liberty, privacy is inherently solicitous of contract. We may =
invite
comrades into our homes and personal property, the bedrock examples of =
places
worthy of inviolate protection. Our identities, unlike our properties, =
are
inherently un-private. When we enter public spaces, we cannot curtail =
the
liberty of others to see us, hear us, remember us, or capture our images =
on
film.[5] Nor can we expect anonymity when we mobilize any piece of mass =
in a
public space, including the digital bit-streams generated from within =
our
homes. Indeed, we might be quite disappointed if our bit-streams <i
style=3D'mso-bidi-font-style:normal'><span =
style=3D'font-style:italic;mso-bidi-font-style:
normal'>were</span></i> invisible, for then we would receive no =
connectivity! <o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'>The
Information Revolution has transformed the way man may use his identity. =
Yet,
one of the most telling tales of this period is the “shock”
citizens experience when the transparency and publicity of their =
voluntarily
communicated information is realized, its sheer scope impressed upon =
them. The
impatient man utilizes science to create a one-man press for his =
identity,
preferences, and habits in order to reap its conveniences: he will =
process
loans and payments with ease, quickly find amenable merchandise, and =
travel
through the country with his reputation in his pocket. These =
conveniences are
not imposed on the non-willing. We should not assume the digital =
information
created as a byproduct of scientific advances ought to have a =
constitutional
leash controlling its use. We would be prudent to first consider the =
guaranteed
freedoms of those who rightfully and legally obtain the information of =
their
fellow citizen’s identity. It seems implausible to will that =
employees of
companies across our nation shall not copy, paste, or share files as =
they wish.
It would seem preposterous to will that another man forget his past =
business
dealings or decline to share his experiences with his associates. Would =
the law
be wise or foolish to expect such things?<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center;line-height:150%'><b
style=3D'mso-bidi-font-weight:normal'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;line-height:150%;font-weight:bold;mso-bidi-font=
-weight:
normal'>Existing Remedies and the Absence of an Absolute Federal Right =
of
Privacy<o:p></o:p></span></font></b></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'>The law
of torts provides a means for man to hold another accountable for the =
third
party effects resulting from his misconduct.[6] Injured parties can also =
bring
causes of action for breaches of contract, fraud, or the violation of =
many
state and federal statutes. Criminal law serves as additional deterrent =
to
serious identity thieves. Yet, scholars persist, and contemplate the =
need for
federal protections for digital privacy. However, even in a state like =
</span></font><st1:State><st1:place>California</st1:place></st1:State>,
where privacy<i style=3D'mso-bidi-font-style:normal'><span =
style=3D'font-style:
italic;mso-bidi-font-style:normal'> is</span></i> a state constitutional =
right,
protected against both public and private action, courts are reluctant =
to
defend the right of privacy as having an independent stronghold in =
public
policy, in cases where it has been freely contracted away. The =
California
Supreme Court’s “void-if-contracted-for” doctrine =
refuses to
acknowledge a person’s right to privacy if such person validly and
legally consents to apparent intrusions of their privacy.[7] The =
doctrine
reflects =
<st1:country-region><st1:place>America</st1:place></st1:country-region>&#=
8217;s
firm belief in free markets and liberty of contract. This example from =
one of
our nation’s most liberal states suggests that the only intrusions =
into
privacy that courts should be concerned about are non-consensual =
intrusions, or
those intrusions that violate fundamental values of American law. I have
explained the inherent nature of privacy as defeating the argument for =
absolute
protection. Thus, existing remedies in law need not be =
understated.<o:p></o:p></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><b
style=3D'mso-bidi-font-weight:normal'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;line-height:150%;font-weight:bold;mso-bidi-font=
-weight:
normal'><o:p> </o:p></span></font></b></p>

<p class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center;line-height:150%'><b
style=3D'mso-bidi-font-weight:normal'><font size=3D3 face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;line-height:150%;font-weight:bold;mso-bidi-font=
-weight:
normal'>Citizen Participants in the Information Revolution – =
Awareness
and Social Activism<o:p></o:p></span></font></b></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><span
style=3D'mso-tab-count:1'>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =
</span><o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'>To all
digital citizens concerned about privacy, I suggest the =
following:<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.6in;text-align:justify;text-indent:-.25in;
line-height:150%;mso-list:l0 level1 lfo2;tab-stops:list .6in'><![if =
!supportLists]><font
size=3D3 face=3DWingdings><span =
style=3D'font-size:12.0pt;line-height:150%;
font-family:Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-fam=
ily:
Wingdings'><span style=3D'mso-list:Ignore'>=A7<font size=3D1 =
face=3D"Times New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>        
</span></font></span></span></font><![endif]>To maintain the privacy of =
your residence,
use alternative addresses (e.g. P.O. Box) to facilitate important
correspondence.<o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'margin-left:.6in;text-align:justify;text-indent:-.25in;
line-height:150%;mso-list:l0 level1 lfo2;tab-stops:list .6in'><![if =
!supportLists]><font
size=3D3 face=3DWingdings><span =
style=3D'font-size:12.0pt;line-height:150%;
font-family:Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-fam=
ily:
Wingdings'><span style=3D'mso-list:Ignore'>=A7<font size=3D1 =
face=3D"Times New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>        
</span></font></span></span></font><![endif]>Use cash for transactions =
you wish
others to “forget” about. Due to the present lack of digital =
cash,
this entails making physical purchases for such transactions. =
<o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'margin-left:.6in;text-align:justify;text-indent:-.25in;
line-height:150%;mso-list:l0 level1 lfo2;tab-stops:list .6in'><![if =
!supportLists]><font
size=3D3 face=3DWingdings><span =
style=3D'font-size:12.0pt;line-height:150%;
font-family:Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-fam=
ily:
Wingdings'><span style=3D'mso-list:Ignore'>=A7<font size=3D1 =
face=3D"Times New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>        
</span></font></span></span></font><![endif]>Should you keep a diary, =
engage in
research, or wish to communicate by word or pen, utilize corporeal means =
for
particularly “private” issues. In the event you utilize =
digital
means, be aware that such communications are akin to posting a billboard =
in public
places. <o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'margin-left:.6in;text-align:justify;text-indent:-.25in;
line-height:150%;mso-list:l0 level1 lfo2;tab-stops:list .6in'><![if =
!supportLists]><font
size=3D3 face=3DWingdings><span =
style=3D'font-size:12.0pt;line-height:150%;
font-family:Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-fam=
ily:
Wingdings'><span style=3D'mso-list:Ignore'>=A7<font size=3D1 =
face=3D"Times New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>        
</span></font></span></span></font><![endif]>Should you use a free =
online mail
service, clean out your e-mail storage space regularly. Providers are
generously granting you a license to use their privately owned storage
capacities and reserve the right to parse through content on their =
property.
Should you wish for greater privacy, find a provider that provides such
exclusive storage or host your own Internet server. Lobby for a
re-configuration of the domain-name system (DNS) so citizens can =
reasonably be
entitled to host personal servers,[8] eliminating the need to store =
personal
digital information on the property of others. <o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'margin-left:.6in;text-align:justify;text-indent:-.25in;
line-height:150%;mso-list:l0 level1 lfo2;tab-stops:list .6in'><![if =
!supportLists]><font
size=3D3 face=3DWingdings><span =
style=3D'font-size:12.0pt;line-height:150%;
font-family:Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-fam=
ily:
Wingdings'><span style=3D'mso-list:Ignore'>=A7<font size=3D1 =
face=3D"Times New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>        
</span></font></span></span></font><![endif]>Your passwords, including =
social
security numbers, are only as safe as the entity requesting them. =
Bargain them
away wisely, or deal with parties respecting your privacy =
preferences.<o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'margin-left:.6in;text-align:justify;text-indent:-.25in;
line-height:150%;mso-list:l0 level1 lfo2;tab-stops:list .6in'><![if =
!supportLists]><font
size=3D3 face=3DWingdings><span =
style=3D'font-size:12.0pt;line-height:150%;
font-family:Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-fam=
ily:
Wingdings'><span style=3D'mso-list:Ignore'>=A7<font size=3D1 =
face=3D"Times New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>        
</span></font></span></span></font><![endif]>To legal activists, =
consider
lobbying to make the Internet partially public, either through public =
provision
of connectivity and free spaces, or through eminent domain. =
<o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'margin-left:.6in;text-align:justify;text-indent:-.25in;
line-height:150%;mso-list:l0 level1 lfo2;tab-stops:list .6in'><![if =
!supportLists]><font
size=3D3 face=3DWingdings><span =
style=3D'font-size:12.0pt;line-height:150%;
font-family:Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-fam=
ily:
Wingdings'><span style=3D'mso-list:Ignore'>=A7<font size=3D1 =
face=3D"Times New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>        
</span></font></span></span></font><![endif]>Consider lobbying for a =
federal
statute commanding the courts, “Standards of reasonableness shall =
be
assessed by reference to the medium that gives rise to the cause of
action.”<o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'margin-left:.6in;text-align:justify;text-indent:-.25in;
line-height:150%;mso-list:l0 level1 lfo2;tab-stops:list .6in'><![if =
!supportLists]><font
size=3D3 face=3DWingdings><span =
style=3D'font-size:12.0pt;line-height:150%;
font-family:Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-fam=
ily:
Wingdings'><span style=3D'mso-list:Ignore'>=A7<font size=3D1 =
face=3D"Times New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>        
</span></font></span></span></font><![endif]>Statutory laws already =
exist to
make us aware of digital transactions carried out in our names, and =
personal
vigilance is the ultimate defense to ward off ill-doers. The hassles =
inherent
in such vigilance are a necessary consequence of assumed risk. =
<o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'margin-left:.6in;text-align:justify;text-indent:-.25in;
line-height:150%;mso-list:l0 level1 lfo2;tab-stops:list .6in'><![if =
!supportLists]><font
size=3D3 face=3DWingdings><span =
style=3D'font-size:12.0pt;line-height:150%;
font-family:Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-fam=
ily:
Wingdings'><span style=3D'mso-list:Ignore'>=A7<font size=3D1 =
face=3D"Times New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>        
</span></font></span></span></font><![endif]>Voice privacy concerns at =
every
opportunity. Markets for digital privacy will ensue. <o:p></o:p></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><span
style=3D'mso-spacerun:yes'>=A0</span><o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;line-height:150%'><o:p> </o:p></span></fon=
t></p>

<div style=3D'border:none;border-top:solid windowtext =
1.0pt;mso-border-top-alt:
solid windowtext .5pt;padding:1.0pt 0in 0in 0in'>

<p class=3DMsoNormal =
style=3D'text-align:justify;line-height:150%;border:none;
mso-border-top-alt:solid windowtext =
.5pt;padding:0in;mso-padding-alt:1.0pt 0in 0in 0in'><font
size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt;line-height:150%'>[1]
The five sense of man: smell, sight, sound, taste, and =
touch.</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D2
face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt;line-height:150%'>[2] I
posit entering the Internet as akin to entering an amusement or ski =
park, or
sports game.<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D2
face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt;line-height:150%'>[3] A
host of federal statutory claims have been held capable of mandatory
arbitration in lieu of litigation, <i =
style=3D'mso-bidi-font-style:normal'><span
style=3D'font-style:italic;mso-bidi-font-style:normal'>see =
</span></i><u>Mitsubishi
Motors Corp v. Soler Chrysler-Plymouth Inc.</u><i =
style=3D'mso-bidi-font-style:
normal'><span =
style=3D'font-style:italic;mso-bidi-font-style:normal'>,</span></i>
473 U.S. 614 (1985); <u>Gilmer v. Interstate/ Johnson Lane Corp</u>., =
500 U.S.
20 (1991). Criminal defendants have been held capable of waiving federal
evidentiary rights, <i style=3D'mso-bidi-font-style:normal'><span
style=3D'font-style:italic;mso-bidi-font-style:normal'>see =
</span></i><u>United
States v. Mezzanatto</u>, 513 U.S. 196 =
(1995).<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D2
face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt;line-height:150%'>[4] <u>McIntyre
v. </u></span></font><st1:State><st1:place><u><font size=3D2><span
  =
style=3D'font-size:10.0pt;line-height:150%'>Ohio</span></font></u></st1:p=
lace></st1:State><u><font
size=3D2><span style=3D'font-size:10.0pt;line-height:150%'> Elections =
Commission</span></font></u><font
size=3D2><span style=3D'font-size:10.0pt;line-height:150%'>, 514 =
</span></font><st1:country-region><st1:place><font
  size=3D2><span =
style=3D'font-size:10.0pt;line-height:150%'>U.S.</span></font></st1:place=
></st1:country-region><font
size=3D2><span style=3D'font-size:10.0pt;line-height:150%'> 334 (1995); =
</span></font><st1:country-region><st1:place><u><font
  size=3D2><span style=3D'font-size:10.0pt;line-height:150%'>United =
States</span></font></u></st1:place></st1:country-region><u><font
size=3D2><span style=3D'font-size:10.0pt;line-height:150%'> v. =
Knotts</span></font></u><font
size=3D2><span style=3D'font-size:10.0pt;line-height:150%'>, 460 =
</span></font><st1:country-region><st1:place><font
  size=3D2><span =
style=3D'font-size:10.0pt;line-height:150%'>U.S.</span></font></st1:place=
></st1:country-region><font
size=3D2><span style=3D'font-size:10.0pt;line-height:150%'> 276 =
(1983).<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D2
face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt;line-height:150%'>[5] <u>Hester
v. </u></span></font><st1:country-region><st1:place><u><font =
size=3D2><span
  style=3D'font-size:10.0pt;line-height:150%'>United =
States</span></font></u></st1:place></st1:country-region><font
size=3D2><span style=3D'font-size:10.0pt;line-height:150%'>, 265 =
</span></font><st1:country-region><st1:place><font
  size=3D2><span =
style=3D'font-size:10.0pt;line-height:150%'>U.S.</span></font></st1:place=
></st1:country-region><font
size=3D2><span style=3D'font-size:10.0pt;line-height:150%'> 57 (1924). =
Closely
related<i style=3D'mso-bidi-font-style:normal'><span =
style=3D'font-style:italic;
mso-bidi-font-style:normal'>, see</span></i> <u>Vega-Rodriguez v. Puerto =
Rico
Tel. Co,</u><i style=3D'mso-bidi-font-style:normal'><span =
style=3D'font-style:italic;
mso-bidi-font-style:normal'> </span></i>11 F.3d 174 (1<sup>st</sup> Cir. =
1997).<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D2
face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt;line-height:150%'>[6] Common
claims pertinent to the Information Revolution are wrongful invasion of
privacy, defamation, libel and negligence. See also Restatement (Second) =
of
Torts =A7652(A) for a typology of invasions of =
privacy.<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D2
face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt;line-height:150%'>[7] <u>Foley
v. Interactive Data Corp</u>., 47 Cal.3d 654 =
(1988).<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-align:justify;line-height:150%'><font =
size=3D2
face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt;line-height:150%'>[8] IPv4
</span></font><font size=3D2 face=3DWingdings><span =
style=3D'font-size:10.0pt;
line-height:150%;font-family:Wingdings;mso-ascii-font-family:"Times New =
Roman";
mso-hansi-font-family:"Times New =
Roman";mso-char-type:symbol;mso-symbol-font-family:
Wingdings'><span =
style=3D'mso-char-type:symbol;mso-symbol-font-family:Wingdings'>=E0</span=
></span></font><font
size=3D2><span style=3D'font-size:10.0pt;line-height:150%'> =
IPv6<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>

</div>

</body>

</html>

------=_NextPart_001_0008_01C55BB6.20D4F550--

------=_NextPart_000_0007_01C55BB6.20D4F550
Content-Type: text/html;
	name="header.htm"
Content-Transfer-Encoding: quoted-printable
Content-ID: <header.htm@01C55BB5.FD7D4260>

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dwindows-1252">
<meta name=3DProgId content=3DWord.Document>
<meta name=3DGenerator content=3D"Microsoft Word 10">
<meta name=3DOriginator content=3D"Microsoft Word 10">
<link id=3DMain-File rel=3DMain-File =
href=3D"cid:.htm@01C55BB5.FD7D4260">
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"State"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PersonName"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"country-region" downloadurl=3D"http://www.5iantlavalamp.com/"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place" downloadurl=3D"http://www.5iantlavalamp.com/"/>
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div style=3D'mso-element:footer' id=3Def1>

<div =
style=3D'mso-element:frame;mso-element-wrap:around;mso-element-anchor-ver=
tical:
paragraph;mso-element-anchor-horizontal:margin;mso-element-left:right;
mso-element-top:.05pt;mso-height-rule:exactly'>

<table cellspacing=3D0 cellpadding=3D0 hspace=3D0 vspace=3D0 =
align=3Dright>
 <tr>
  <td valign=3Dtop align=3Dleft =
style=3D'padding-top:0in;padding-right:0in;
  padding-bottom:0in;padding-left:0in'>
  <p class=3DMsoFooter =
style=3D'mso-element:frame;mso-element-wrap:around;
  =
mso-element-anchor-vertical:paragraph;mso-element-anchor-horizontal:margi=
n;
  =
mso-element-left:right;mso-element-top:.05pt;mso-height-rule:exactly'><!-=
-[if supportFields]><span=20
  class=3DMsoPageNumber><font face=3D"Times New Roman"><span =
style=3D'mso-element:
  field-begin'></span>PAGE<span style=3D'mso-spacerun:yes'>=A0 =
</span></font></span><![endif]--><!--[if supportFields]><span=20
  class=3DMsoPageNumber><font face=3D"Times New Roman"><span =
style=3D'mso-element:
  field-end'></span></font></span><![endif]--><span =
class=3DMsoPageNumber><font
  face=3D"Times New Roman"><o:p></o:p></font></span></p>
  </td>
 </tr>
</table>

</div>

<p class=3DMsoFooter style=3D'margin-right:.25in'><font size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'><o:p> </o:p></span></font></p>

</div>

<div style=3D'mso-element:footer' id=3Df1>

<div =
style=3D'mso-element:frame;mso-element-wrap:around;mso-element-anchor-ver=
tical:
paragraph;mso-element-anchor-horizontal:margin;mso-element-left:right;
mso-element-top:.05pt;mso-height-rule:exactly'>

<table cellspacing=3D0 cellpadding=3D0 hspace=3D0 vspace=3D0 =
align=3Dright>
 <tr>
  <td valign=3Dtop align=3Dleft =
style=3D'padding-top:0in;padding-right:0in;
  padding-bottom:0in;padding-left:0in'>
  <p class=3DMsoFooter =
style=3D'mso-element:frame;mso-element-wrap:around;
  =
mso-element-anchor-vertical:paragraph;mso-element-anchor-horizontal:margi=
n;
  =
mso-element-left:right;mso-element-top:.05pt;mso-height-rule:exactly'><!-=
-[if supportFields]><span=20
  class=3DMsoPageNumber><font size=3D2 face=3D"Times New Roman"><span=20
  style=3D'font-size:10.0pt'><span =
style=3D'mso-element:field-begin'></span>PAGE<span=20
  style=3D'mso-spacerun:yes'>=A0 </span><span =
style=3D'mso-element:field-separator'></span></span></font></span><![endi=
f]--><span
  class=3DMsoPageNumber><font size=3D2 face=3D"Times New Roman"><span
  style=3D'font-size:10.0pt'><span =
style=3D'mso-no-proof:yes'>2</span></span></font></span><!--[if =
supportFields]><span=20
  class=3DMsoPageNumber><font size=3D2 face=3D"Times New Roman"><span=20
  style=3D'font-size:10.0pt'><span =
style=3D'mso-element:field-end'></span></span></font></span><![endif]--><=
span
  class=3DMsoPageNumber><font size=3D2 face=3D"Times New Roman"><span
  style=3D'font-size:10.0pt'><o:p></o:p></span></font></span></p>
  </td>
 </tr>
</table>

</div>

<p class=3DMsoFooter style=3D'margin-right:.25in'><font size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'><o:p> </o:p></span></font></p>

</div>

</body>

</html>

------=_NextPart_000_0007_01C55BB6.20D4F550
Content-Type: text/html;
	name="header.htm"
Content-Transfer-Encoding: quoted-printable
Content-ID: <header.htm@01C55BB6.204E8740>

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dwindows-1252">
<meta name=3DProgId content=3DWord.Document>
<meta name=3DGenerator content=3D"Microsoft Word 10">
<meta name=3DOriginator content=3D"Microsoft Word 10">
<link id=3DMain-File rel=3DMain-File =
href=3D"cid:.htm@01C55BB6.204E8740">
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"State"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"country-region" downloadurl=3D"http://www.5iantlavalamp.com/"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place" downloadurl=3D"http://www.5iantlavalamp.com/"/>
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div style=3D'mso-element:footer' id=3Def1>

<div =
style=3D'mso-element:frame;mso-element-wrap:around;mso-element-anchor-ver=
tical:
paragraph;mso-element-anchor-horizontal:margin;mso-element-left:right;
mso-element-top:.05pt;mso-height-rule:exactly'>

<table cellspacing=3D0 cellpadding=3D0 hspace=3D0 vspace=3D0 =
align=3Dright>
 <tr>
  <td valign=3Dtop align=3Dleft =
style=3D'padding-top:0in;padding-right:0in;
  padding-bottom:0in;padding-left:0in'>
  <div>
  <p class=3DMsoFooter =
style=3D'mso-element:frame;mso-element-wrap:around;
  =
mso-element-anchor-vertical:paragraph;mso-element-anchor-horizontal:margi=
n;
  =
mso-element-left:right;mso-element-top:.05pt;mso-height-rule:exactly'><!-=
-[if supportFields]><span=20
  class=3DMsoPageNumber><font face=3D"Times New Roman"><span =
style=3D'mso-element:
  field-begin'></span>PAGE<span style=3D'mso-spacerun:yes'>=A0 =
</span></font></span><![endif]--><!--[if supportFields]><span=20
  class=3DMsoPageNumber><font face=3D"Times New Roman"><span =
style=3D'mso-element:
  field-end'></span></font></span><![endif]--><span =
class=3DMsoPageNumber><font
  face=3D"Times New Roman"><o:p></o:p></font></span></p>
  </div>
  </td>
 </tr>
</table>

</div>

<p class=3DMsoFooter style=3D'margin-right:.25in'><font size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'><o:p> </o:p></span></font></p>

</div>

<div style=3D'mso-element:footer' id=3Df1>

<div =
style=3D'mso-element:frame;mso-element-wrap:around;mso-element-anchor-ver=
tical:
paragraph;mso-element-anchor-horizontal:margin;mso-element-left:right;
mso-element-top:.05pt;mso-height-rule:exactly'>

<table cellspacing=3D0 cellpadding=3D0 hspace=3D0 vspace=3D0 =
align=3Dright>
 <tr>
  <td valign=3Dtop align=3Dleft =
style=3D'padding-top:0in;padding-right:0in;
  padding-bottom:0in;padding-left:0in'>
  <div>
  <p class=3DMsoFooter =
style=3D'mso-element:frame;mso-element-wrap:around;
  =
mso-element-anchor-vertical:paragraph;mso-element-anchor-horizontal:margi=
n;
  =
mso-element-left:right;mso-element-top:.05pt;mso-height-rule:exactly'><!-=
-[if supportFields]><span=20
  class=3DMsoPageNumber><font size=3D2 face=3D"Times New Roman"><span=20
  style=3D'font-size:10.0pt'><span =
style=3D'mso-element:field-begin'></span>PAGE<span=20
  style=3D'mso-spacerun:yes'>=A0 </span><span =
style=3D'mso-element:field-separator'></span></span></font></span><![endi=
f]--><span
  class=3DMsoPageNumber><font size=3D2 face=3D"Times New Roman"><span
  style=3D'font-size:10.0pt'><span =
style=3D'mso-no-proof:yes'>2</span></span></font></span><!--[if =
supportFields]><span=20
  class=3DMsoPageNumber><font size=3D2 face=3D"Times New Roman"><span=20
  style=3D'font-size:10.0pt'><span =
style=3D'mso-element:field-end'></span></span></font></span><![endif]--><=
span
  class=3DMsoPageNumber><font size=3D2 face=3D"Times New Roman"><span
  style=3D'font-size:10.0pt'><o:p></o:p></span></font></span></p>
  </div>
  </td>
 </tr>
</table>

</div>

<p class=3DMsoFooter style=3D'margin-right:.25in'><font size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'><o:p> </o:p></span></font></p>

</div>

</body>

</html>

------=_NextPart_000_0007_01C55BB6.20D4F550--



-----------------------------------------------------------------
Computers, Privacy, and the Constitution mailing list



Index: [thread] [date] [subject] [author]