<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0"><channel><description>It’s time for the world’s governments to address the practices and laws regulating government surveillance of individuals and access to their information.</description><title>Reform Government Surveillance</title><generator>Tumblr (3.0; @reformgs)</generator><link>https://reformgs.tumblr.com/</link><item><title>Press Release: Reform Government Surveillance Announces New Core Principle on the Importance of Strong Encryption - Reform Government Surveillance</title><description>&lt;a href="https://www.reformgovernmentsurveillance.com/reform-government-surveillance-on-the-importance-of-strong-encryption/"&gt;Press Release: Reform Government Surveillance Announces New Core Principle on the Importance of Strong Encryption - Reform Government Surveillance&lt;/a&gt;</description><link>https://reformgs.tumblr.com/post/173280047442</link><guid>https://reformgs.tumblr.com/post/173280047442</guid><pubDate>Tue, 24 Apr 2018 23:17:35 -0400</pubDate></item><item><title>Statement on the FISA Amendments Reauthorization Act of 2017, H.R. 4478</title><description>&lt;p&gt;The Reform Government Surveillance coalition
has significant concerns with the FISA Amendments Reauthorization Act of 2017,
H.R. 4478, as currently drafted.  Unless changes are made to the bill,
Reform Government Surveillance opposes this legislation. &lt;/p&gt;&lt;p&gt;Reform Government Surveillance continues to
advocate for common sense legislation to reform Section 702 of the Foreign
Intelligence Surveillance Act.  While we recognize that Section 702
provides the intelligence community with valuable national security tools, we
also believe that any reauthorization of this authority should include reforms
that further protect the privacy of all our users, increase accountability, and
promote government transparency.  &lt;/p&gt;&lt;p&gt;Unfortunately, the bill does not meaningfully
restrict the FBI from warrantlessly searching the content of Americans’
communications incidentally collected under Section 702.  Instead, the
bill provides that the FBI “may” seek an order from the FISA court before
accessing the contents of Americans’ communications – but the bill does not &lt;i&gt;require&lt;/i&gt; such an order.  When
combined with the broad exceptions in the legislation regarding the use of such
information in criminal cases, these provisions provide little, if any,
additional privacy protections.&lt;/p&gt;&lt;p&gt;The bill also fails to permanently codify an
end to “abouts” collection by the government.  After the FISA Court raised
serious privacy concerns about the NSA’s collection of communications that were
“about” – rather than “to” or “from” – a communicant, the NSA halted this
program.  Given the NSA’s acknowledgment that it is not able to conduct
“abouts” collection in a way that adequately protects the privacy rights of all
our users, Congress should make it clear in the law that the NSA cannot engage
in such collection.&lt;/p&gt;&lt;p&gt;We are also concerned that the bill suggests
that the government can target “a facility, place, premises, or property” for
Section 702 surveillance.  Such targeting would be broader than what is
currently authorized by the statute, and is contrary to prior statements by
government officials regarding the use of Section 702 “abouts”
collection.  In March 2014, for example, the General Counsel of the NSA stated
to the Privacy and Civil Liberties Oversight Board that such collection was
“selector-based, i.e. based on … things like phone numbers of emails.” 
The government should not be using Section 702 to target entire facilities,
places, premises, or properties – and this bill should not include language
that could be used to justify such targeting.&lt;/p&gt;&lt;p&gt;Finally, expanding the definition of “foreign
power” and “agent of a foreign power” to include individuals and entities
engaged in “international malicious cyber activities” is potentially overbroad
and unnecessary.  Importantly, changing the definition in Section 101
would affect not just Section 702, but also the scope of all the other
surveillance authorities contained in FISA.  Such an important change could
significantly broaden the scope of government surveillance, and should be made
only after extensive consultation with the appropriate stakeholders in industry
and civil society.  We urge the House Intelligence Committee to remove
this provision so that such consultation can take place.&lt;/p&gt;&lt;p&gt;We look forward to working constructively
with the House Intelligence Committee and others as Congress considers
reauthorization of Section 702.&lt;/p&gt;&lt;p&gt;November 30, 2017&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/168063351247</link><guid>https://reformgs.tumblr.com/post/168063351247</guid><pubDate>Thu, 30 Nov 2017 21:00:12 -0500</pubDate></item><item><title>Reform Government Surveillance Statement on the Introduction of the USA Liberty Act, H.R. 3989</title><description>&lt;p&gt;Reform
Government Surveillance commends Chairman Goodlatte, Ranking Member Conyers,
and other leaders of the House Judiciary Committee for introducing the
bipartisan USA Liberty Act, H.R. 3989.  The USA Liberty Act includes
significant improvements to U.S. surveillance law, particularly Section 702 of
the Foreign Intelligence Surveillance Act, while preserving the ability of the
intelligence community to protect national security.  &lt;/p&gt;&lt;p&gt;We applaud
the efforts of Chairman Goodlatte and Ranking Member Conyers to craft common
sense legislation that increases privacy protections, accountability, and
transparency.  We will also continue to support additional reforms that
further strengthen and improve the bill, and we look forward to working
constructively with Chairman Goodlatte, Ranking Member Conyers, and other
members of Congress toward that end.&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/166337239927</link><guid>https://reformgs.tumblr.com/post/166337239927</guid><pubDate>Thu, 12 Oct 2017 18:16:10 -0400</pubDate></item><item><title>Reform Government Surveillance Letter to House and Senate Leadership: Lawful Access Priorities for 2017</title><description>&lt;p&gt;Dear Leader McConnell, Speaker Ryan, Minority Leader
Schumer and Minority Leader Pelosi:&lt;/p&gt;&lt;p&gt;The Reform Government Surveillance coalition (RGS) writes
to share with you our priorities for this Congress with regard to reforming
laws that govern when law enforcement and the intelligence community may access
user data.  As you shape Congress’
agenda, we look forward to working with you on important legislation that has
an impact on the information of billions of our customers around the
globe.  &lt;/p&gt;&lt;p&gt;Our customers, both individual and corporate, no matter
where they are located, expect us to protect the privacy and security of their
data.  At the same time, law enforcement
officials should have the resources that they need to better protect our
communities.  As a result, we have
adopted the following principles that we believe must define government
surveillance laws in the U.S. and throughout the world:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Limiting Governments’
Authority to Collect Users’ Information - &lt;/b&gt;Governments should codify
sensible limitations on their ability to compel service providers to disclose
user data that balance their need for the data in limited circumstances, users’
reasonable privacy interests, and the impact on trust in the Internet. In
addition, governments should limit surveillance to specific, known uses for
lawful purposes, and should not undertake bulk data collection of Internet
communications.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Oversight and
Accountability - &lt;/b&gt;Intelligence agencies seeking to collect or
compel the production of information should do so under a clear legal framework
in which executive powers are subject to strong checks and balances. Reviewing
courts should be independent and include an adversarial process, and
governments should allow important rulings of law to be made public in a timely
manner so that the courts are accountable to an informed citizenry.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Transparency About
Government Demands - &lt;/b&gt;Transparency is essential to a debate over
governments’ surveillance powers and the scope of programs that are administered
under those powers. Governments should allow companies to publish the number
and nature of government demands for user information. In addition, governments
should also promptly and publicly disclose this data.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Respecting the Free Flow of
Information - &lt;/b&gt;The ability of data to flow or be accessed
across borders is essential to a robust 21st century global economy.
Governments should permit the transfer of data and should not inhibit access by
companies or individuals to lawfully available information that is stored
outside of the country. Governments should not require service providers to
locate infrastructure within a country’s borders or to operate locally.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Avoiding Conflicts Among
Governments - &lt;/b&gt;In order to avoid conflicting laws, there
should be a robust, principled, and transparent framework to govern lawful
requests for data across jurisdictions, such as improved Mutual Legal
Assistance Treaty — or “MLAT” — processes. Where the laws of one jurisdiction
conflict with the laws of another, it is incumbent upon governments to work together
to resolve the conflict.&lt;/p&gt;&lt;p&gt;Adopting policies that adhere to these principles is
important for fostering our shared commitment to the privacy and security of
our customers and their data, and for preserving the health of the Internet
economy. Accordingly, the following legislative proposals are on RGS’ agenda
for this Congress:&lt;/p&gt;&lt;p&gt;(1)  &lt;b&gt;Passage of the Email Privacy Act:&lt;/b&gt;  As we have in the past, RGS companies
strongly support passage of the Email Privacy Act.  The Electronic Communications Privacy Act
(ECPA), which it would amend, was passed when email was virtually unheard of
(and used almost exclusively by businesses) and “mobile” content on cell phones
and tablets did not exist. We applaud the passage of the unanimously supported
Email Privacy Act by the House of Representatives, and we look forward to
continuing to work on reforming ECPA, including with respect to ECPA’s current
regime for secrecy orders. When secrecy around a
government warrant is needed, orders that require email providers to keep these
types of legal demands secret should be the exception and not the rule.&lt;/p&gt;&lt;p&gt;(2)  &lt;b&gt;A rights-protecting regime for when law enforcement asks
for data across borders:&lt;/b&gt; Governments all over the world are adopting the position
that they can request a suspect’s data regardless of the conflicts of law or
international norms and treaties. This new reality is weakening trust in
technology among business and consumers and is incentivizing foreign
governments to consider data localization laws and other policies that would
fragment the Internet and impede the flow of data and commerce across borders.
At the same time, law enforcement needs mechanisms to lawfully obtain data for
investigations and to protect their citizens. The MLAT process remains an
important tool for this and should be modernized, but a complementary process
is needed to respond to the increased number of requests for cross-border
requests for digital information. &lt;/p&gt;&lt;p&gt;Last year, the Department
of Justice sent to the House and Senate Judiciary Committees language that
would enable law enforcement in another country to issue legal process for
content data held by U.S. companies.  A
country could only issue legal process directly to U.S. companies if it enters
into an agreement with the United States that requires the requests that are
issued by a foreign country to meet strong standards of transparency,
oversight, and due process.  RGS supports
legislation like this as long as it protects human rights and privacy rights
(set forth in more detail &lt;a href="http://reformgs.tumblr.com/post/147464333157/rgs-statement-on-us-uk-data-protection-discussions"&gt;here&lt;/a&gt;),
and looks forward to working with policymakers and stakeholders on the
introduction and passage of a bill that would meet these criteria.&lt;/p&gt;&lt;p&gt;(3)  &lt;b&gt;Addressing the global nature of data under ECPA&lt;/b&gt;:  Last year, the United States Court of Appeal
for the Second Circuit held that ECPA is not extraterritorial in its reach; in
other words, a warrant issued under ECPA cannot be used to obtain data from a
US company where that data is not stored in the US.  (Since then, a court in the Eastern District
of Pennsylvania has held that ECPA warrants can be used to compel the
production of user data stored abroad.) In order to protect the privacy of
customers both in the US and worldwide, and to ensure that law enforcement can
get the information that it needs pursuant to a lawful order, the International
Communications Privacy Act was introduced last year by Senators Hatch, Coons,
and Heller in the Senate and Representatives Marino and DelBene in the House.
RGS supports the passage of ICPA and welcomes discussion about any other
approaches to this issue that are workable from a technological perspective,
protective of consumers’ privacy and due process rights, and able to meet the
needs of law enforcement.&lt;/p&gt;&lt;p&gt;(4)  &lt;b&gt;Reforming the expiring powers of Section 702 of the FISA
Amendments Act of 2008&lt;/b&gt;:  Section 702 of
the FISA Amendments Act expires at the end of 2017.  RGS would like to work with you, law
enforcement, the intelligence community, civil liberties and privacy groups,
and any other stakeholder to help improve oversight of and transparency of this
authority.&lt;/p&gt;&lt;p&gt;Section 702 provides the
legal underpinnings and judicial supervision for intelligence-gathering
programs used by our intelligence community. 
As Congress moves towards reauthorizing these powers, we would support
changes to Section 702 that enhance transparency, provide greater programmatic
oversight, and strengthen protection of sensitive personal data. Among the reforms
that we would like to work with you on are narrowing the type of information
that can be collected under Section 702; requiring judicial oversight for
searching the contents of 702 material for the communications of a US person
(given that US persons are not the target of 702); allowing companies to
disclose the number of requests they receive by legal authority; further
declassification of FISA Court orders; and providing greater transparency around how the communications
of US persons that are incidentally collected under Section 702 are searched
and used, including how often it is “queried” using identifiers that are tied
to US persons.&lt;/p&gt;&lt;p&gt;We look forward to working
with you to help ensure that an appropriate balance is struck between the
government’s need for critical information and people’s privacy and due process
rights.  &lt;/p&gt;&lt;p&gt;Thank you very much, as
always, for your hard work on these issues that are of central importance to
our government and our economy.  &lt;/p&gt;&lt;p&gt;Signed,
&lt;/p&gt;&lt;p&gt;Reform
Government Surveillance&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt;cc: &lt;/p&gt;&lt;p&gt;The Honorable Bob Goodlatte, Chairman, House Judiciary Committee&lt;/p&gt;&lt;p&gt;The Honorable John Conyers, Ranking
Member, House Judiciary Committee&lt;/p&gt;&lt;p&gt;The Honorable Devin Nunes, Chairman,
House Intelligence Committee        &lt;/p&gt;&lt;p&gt;The Honorable Adam Schiff, Ranking
Member, House Intelligence Committee &lt;/p&gt;&lt;p&gt; The Honorable Chuck Grassley,
Chairman, Senate Judiciary Committee &lt;/p&gt;&lt;p&gt;The Honorable Dianne Feinstein, Ranking Member, Senate Judiciary
Committee &lt;/p&gt;&lt;p&gt; The Honorable Richard Burr, Chairman, Senate Intelligence Committee &lt;/p&gt;&lt;p&gt; The Honorable Mark Warner, Vice Chairman, Senate Intelligence Committee &lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/157838097962</link><guid>https://reformgs.tumblr.com/post/157838097962</guid><pubDate>Tue, 28 Feb 2017 18:11:19 -0500</pubDate></item><item><title>RGS Statement on The Email Privacy Act Reform Government Surveillance applauds Reps. Yoder,...</title><description>&lt;p&gt;&lt;b&gt;RGS Statement on The Email Privacy Act &lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt;Reform Government Surveillance applauds Reps. Yoder, Polis,
Goodlatte, Conyers, and all of the original cosponsors for reintroducing the
Email Privacy Act.  The Email Privacy Act is crucial to modernizing our
outdated laws – written when cell phones and email were rarely used – and
making sure that all of our content has the protection of the Fourth
Amendment.  The bill passed the House unanimously last year, and pushing
the bill to final passage will be one of our top priorities this Congress.&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/155767406787</link><guid>https://reformgs.tumblr.com/post/155767406787</guid><pubDate>Thu, 12 Jan 2017 11:34:38 -0500</pubDate></item><item><title>RGS Statement on
US-UK Data Protection Discussions</title><description>&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 0px 0px 15px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;Governments must avoid conflicts of laws to ensure people&amp;rsquo;s data is protected and avoid a race to the bottom for everyone&amp;rsquo;s rights; we are encouraged by discussions between the US and UK. A strengthened legal framework must value privacy and human rights while ensuring law enforcement can do its important work. We look forward to continuing discussions with all stakeholders on such a framework.&lt;/p&gt;&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 15px 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;&lt;br style="outline: 0px; box-sizing: border-box; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent;"/&gt;&lt;/p&gt;&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 15px 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;&lt;b style="margin: 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; line-height: inherit; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; font-weight: 700; vertical-align: baseline; box-sizing: border-box; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent;"&gt;RGS Principles&lt;/b&gt; &lt;/p&gt;&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 15px 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;Governments have increasingly adopted the position that they can get people’s data regardless of the law in affected countries or international norms and treaties. This new reality is weakening trust in technology among business and consumers, and undermining national privacy laws enacted by democratic governments. At the same time, law enforcement agencies around the world need mechanisms to lawfully obtain data for investigations and to protect their citizens. The Mutual Legal Assistance Treaty (MLAT) process remains an important tool for this and should be modernized, but a complementary modern process is needed to respond to the increased demand for cross-border requests for digital information that allows new innovations to flourish, enables governments to protect their citizens, and provides a coherent legal framework that ensures human rights and individual privacy are protected. &lt;/p&gt;&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 15px 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;In developing a complementary process that address this issue, the following principles are important: &lt;/p&gt;&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 15px 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;&lt;b style="margin: 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; line-height: inherit; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; font-weight: 700; vertical-align: baseline; box-sizing: border-box; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent;"&gt;1.&lt;/b&gt;&lt;/p&gt;&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 15px 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;&lt;b style="margin: 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; line-height: inherit; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; font-weight: 700; vertical-align: baseline; box-sizing: border-box; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent;"&gt;A strong and principled process. &lt;/b&gt;Providers in one jurisdiction should be allowed to respond directly to a request for content from a government where it does business provided there are agreements in place between governments that ensure privacy rights and legal processes are protected. The requests should be limited to cases where the information is sought in connection with an investigation of a serious crime, and the process should not be used for bulk collection, general intelligence gathering, or where the need is not proportionate to the request.&lt;/p&gt;&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 15px 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;&lt;b style="margin: 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; line-height: inherit; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; font-weight: 700; vertical-align: baseline; box-sizing: border-box; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent;"&gt;2.&lt;/b&gt;&lt;/p&gt;&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 15px 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;&lt;b style="margin: 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; line-height: inherit; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; font-weight: 700; vertical-align: baseline; box-sizing: border-box; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent;"&gt;Strong human rights standards. &lt;/b&gt;Countries should only get the benefit of this new process when their laws and practices meet international standards on human rights and privacy. These standards include providing basic fair trial rights, prohibiting torture, and ensuring that surveillance laws afford adequate privacy protections to individuals whose data they are seeking. Whether a country’s laws and practices meet those standards must be determined through an objective, transparent, and credible process. And, the request should be authorized by an independent and impartial process on a showing that there is a strong factual basis demonstrating the need for the information, and that the request is narrowly tailored. &lt;/p&gt;&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 15px 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;&lt;b style="margin: 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; line-height: inherit; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; font-weight: 700; vertical-align: baseline; box-sizing: border-box; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent;"&gt;3.&lt;/b&gt;&lt;/p&gt;&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 15px 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;&lt;b style="margin: 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; line-height: inherit; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; font-weight: 700; vertical-align: baseline; box-sizing: border-box; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent;"&gt;Strong transparency and accountability requirements.&lt;/b&gt;  The framework should promote accountability through transparency. There should be periodic reviews to ensure that countries are using the process and the information they obtain appropriately. Similarly, there should be an independent oversight mechanism to regularly ensure that they meet the basic requirements. This can, of course, be reinforced through public information about the requests submitted to providers under the agreement. Requesting countries should publish annual reports regarding the number, type, and temporal scope of the data requests they issue under this framework. Providers also should be allowed to publish the same information on the requests they receive. &lt;/p&gt;&lt;p style='font: 14px/21px "Helvetica Neue", HelveticaNeue, Helvetica, Arial, sans-serif; margin: 15px 0px 0px; padding: 0px; outline: 0px; border: 0px currentColor; border-image: none; text-align: left; color: rgb(68, 68, 68); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; vertical-align: baseline; white-space: normal; box-sizing: border-box; widows: 1; font-size-adjust: none; font-stretch: inherit; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; -webkit-text-stroke-width: 0px;'&gt;The need for such a framework has been discussed by a range of stakeholders. For example, the &lt;a style="background-position: 0px 1.15em; margin: 0px; padding: 0px 0px 0.15em; outline: 0px; border: 0px currentColor; border-image: none; color: rgb(68, 68, 68); line-height: inherit; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; font-weight: inherit; text-decoration: none; vertical-align: baseline; cursor: pointer; box-sizing: border-box; font-stretch: inherit; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-repeat: repeat-x; background-size: 1em 2px; -webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent;" href="https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2furldefense.proofpoint.com%2fv2%2furl%3fu%3dhttps-3A__na01.safelinks.protection.outlook.com_-3Furl-3Dhttps-253a-252f-252furldefense.proofpoint.com-252fv2-252furl-253fu-253dhttps-2D3A-5F-5Fwww.lawfareblog.com-5Fcross-2D2Dborder-2D2Ddata-2D2Drequests-2D2Dproposed-2D2Dframework-2526d-253dCwMF-5Fg-2526c-253d5VD0RTtNlTh3ycd41b3MUw-2526r-253ds7UeAkGFe2DfcIgGc3aLI9Ua5IxqQiNTL63-2D0LGTlsg-2526m-253dXK5kQ0jWRv89e2tcxtG1vf9sPEpDVDPpRZtPLThSTxA-2526s-253d1arCE7TKKklkZYYYMHTDv6skdfEoEtZFaoW-2DNAswgA4-2526e-253d-26data-3D01-257c01-257cnathaniel.jones-2540microsoft.com-257cdb5b683ecc21422dbe6408d3aa9cc105-257c72f988bf86f141af91ab2d7cd011db47-257c1-26sdata-3DCLXANr6WhqcGmZLXnOHvBuN5tzZAxstIhzI-252b-252bIpgVqI-253d%26d%3dCwMF_g%26c%3d5VD0RTtNlTh3ycd41b3MUw%26r%3ds7UeAkGFe2DfcIgGc3aLI9Ua5IxqQiNTL63-0LGTlsg%26m%3dVEUPCJT_LxzTNjIxGeL5yvX_W4d4kipDHZHRWkvy_Ls%26s%3dOXkoJCu-ocAmluZeEsyFnbU7QWzLC1s4ZR8RGAcmwps%26e%3d&amp;amp;data=01%7c01%7cNathaniel.Jones%40microsoft.com%7c881cc4f54396466d4b3108d3ab433053%7c72f988bf86f141af91ab2d7cd011db47%7c1&amp;amp;sdata=rBSgtrjj1RLGviwCpVXFtmcxRYwIfjFLnCoX%2bCxlq98%3d"&gt;proposal&lt;/a&gt; by law professors Jennifer Daskal and Andrew Woods contemplates a mechanism to govern cross-border requests. We look forward to working on implementing these principles with stakeholders around the world.&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/147464333157</link><guid>https://reformgs.tumblr.com/post/147464333157</guid><pubDate>Fri, 15 Jul 2016 18:07:34 -0400</pubDate></item><item><title>Letter to Chairman Burr and Vice-Chairman Feinstein Regarding Encryption</title><description>&lt;p&gt;April
19, 2016&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt;The
Honorable Richard Burr&lt;br/&gt;Chairman&lt;br/&gt;Select
Committee on Intelligence&lt;br/&gt;United
States Senate&lt;br/&gt;Washington,
DC 20515&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt; The
Honorable Dianne Feinstein&lt;br/&gt;Vice-Chairman&lt;br/&gt;Select
Committee on Intelligence&lt;br/&gt;United
States Senate&lt;br/&gt;Washington,
DC 20515&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt;Dear
Chairman Burr and Vice-Chairman Feinstein:&lt;/p&gt;&lt;p&gt;We write
to express our deep concerns about well-intentioned but ultimately unworkable
policies around encryption that would weaken the very defenses we need to
protect us from people who want to cause economic and physical harm.  We believe it is critical to the safety of the nation’s,
and the world’s, information technology infrastructure for us all to avoid
actions that will create government-mandated security vulnerabilities in our encryption
systems.&lt;/p&gt;&lt;p&gt;As member
companies whose innovations help to drive the success and growth of the digital
economy, we understand the need to protect our users’ physical safety and the
safety of their most private information.  
To serve both these interests, we adhere to two basic principles.    First, we respond expeditiously to legal
process and emergency requests for data from government agencies. Second, we
design our systems and devices to include a variety of network- and
device-based features, including but not limited to strong encryption.  We do these things to protect users’ digital
security in the face of threats from both criminals and governments.&lt;/p&gt;&lt;p&gt;Any
mandatory decryption requirement, such as that included in the discussion draft
of the bill that you authored, will to lead to unintended consequences.  The effect of such a requirement will force
companies to prioritize government access over other considerations, including
digital security.  As a result, when
designing products or services, technology companies could be forced to make
decisions that would create opportunities for exploitation by bad actors seeking to harm
our customers and whom we all want to stop. 
The bill would force those providing digital communication and storage to ensure that
digital data can be obtained in “intelligible” form by the government, pursuant
to a court order.  This mandate would mean that when a company or user has decided
to use some encryption technologies, those technologies will have to be built
to allow some third party to potentially have access.  This access could, in turn, be exploited by bad
actors.&lt;/p&gt;&lt;p&gt;It
is also important to remember that such a technological mandate fails to
account for the global nature of today’s technology. For example, no
accessibility requirement can be limited to U.S. law enforcement; once it is
required by the U.S., other governments will surely follow. In addition, the U.S. has no monopoly on these security
measures.  A law passed by Congress
trying to restrict the use of data security measures will not prevent their
use.  It will only serve to push users to non-U.S. companies, in turn
undermining the global competitiveness of the technology industry in the U.S.
and resulting in more and more data being stored in other countries. &lt;/p&gt;&lt;p&gt;We
support making sure that law enforcement has the legal authorities, resources,
and training it needs to solve crime, prevent terrorism, and protect the public.  However, those things must be carefully balanced to
preserve our customers’ security and digital information.  We are ready and willing to engage in
dialogue about how to strike that balance, but remain concerned about efforts
to prioritize one type of security over all others in a way that leads to
unintended, negative consequences for the safety of our networks and our
customers &lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt;Signed,&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;Reform Government Surveillance&lt;/p&gt;&lt;p&gt;Computer &amp;amp; Communications Industry Association&lt;/p&gt;&lt;p&gt;Internet Infrastructure Coalition (I2C)&lt;/p&gt;&lt;p&gt;Entertainment Software Association&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/143084034822</link><guid>https://reformgs.tumblr.com/post/143084034822</guid><pubDate>Tue, 19 Apr 2016 19:32:49 -0400</pubDate></item><item><title>Encryption, the Internet and Devices: A Primer for Policy Makers</title><description>&lt;p&gt;&lt;b&gt;


















I. Defining Encryption and
other Key Terms&lt;/b&gt; &lt;/p&gt;&lt;p&gt;&lt;b&gt;Encryption &lt;/b&gt;is the
conversion of readable data into a form that can only be understood be read by
those who know how to decode it.   It can consist of a code that is
as simple as scrambling letters in a routinized way or as complicated as sets
of symbols and numbers that are dictated by algorithms.  Examples of encryption
go back to ancient Egypt, and carry forward through WWII (the German “Enigma”
machines, for example) to the present day. Encryption in the electronic
communication context is “decoded” only by those who have electronic “keys” to
decode the communications.

&lt;/p&gt;&lt;p&gt;A &lt;b&gt;Server&lt;/b&gt;
is a computer program or a storage unit that provides different types of
functions for people’s contents.  We commonly think of a server as a
computer that physically stores electronic data.  Servers can store data
for individuals, for small businesses, or, in the case of the cloud, for
millions of people who use email services such as Gmail, Yahoo!, or Microsoft
email.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Metadata&lt;/b&gt; is data
about data and would include things like to/from information in an email and
date and time of a communication.  &lt;/p&gt;&lt;p&gt;An &lt;b&gt;algorithm&lt;/b&gt;,
in the context of encryption, is a general set of mathematical rules for
transforming regular text, or “plaintext,” into encrypted content.&lt;/p&gt;&lt;p&gt;A &lt;b&gt;key&lt;/b&gt;
is a specific set of instructions used to apply the algorithm to a data or
information.  The strength of the key defines the strength of the
encryption.&lt;/p&gt;&lt;p&gt;An &lt;b&gt;app is &lt;/b&gt;specific
software that allows you to perform certain tasks.  They are available
both for desktops and mobile devices.  Examples of popular apps include
Facebook and LinkedIn, as well as messaging apps like those that come already
on smartphones.  &lt;/p&gt;&lt;p&gt;&lt;b&gt;A device,&lt;/b&gt; as discussed
below, can be both a mobile device (such as a phone or a tablet) and a desktop
computer or laptop.&lt;/p&gt;&lt;p&gt;&lt;b&gt;

II. Different
Types of Encryption/How Encryption Works

&lt;/b&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;&lt;b&gt;&lt;i&gt;Encryption is
not new.  It has been available for personal computing on certain
operating systems (including those produced by Apple and Microsoft) for many
years, and before that, was generally available for both written and oral
communication when such communication is over a wire.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;b&gt;End-to-end
encryption&lt;/b&gt; works by having each party to a communication create a pair
of keys, one of which they keep completely private, and one of which, called
the “public key,” is shared. Messages between two people using an encrypted app
or other can only be unlocked by the recipient’s unique private key. In
practical terms, this means that the content of those transmissions can only be
unlocked with access to the private key, which is protected on the
communication device. Such data would include device-to-device messaging and
app-to-app messaging. The Internet Service Provider (ISP), in general, cannot
unlock that data.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Device
encryption&lt;/b&gt;&lt;b&gt; &lt;/b&gt;refers to the encryption of data on one’s own
mobile device. It works by incorporating an encryption key into the security
password on each person’s device (note that device encryption is available both
for mobile and desktop devices). Device and end-to-end encryption work
similarly, but technologically, they are separate functions. If you are
utilizing device encryption on your smartphone, for example, either by default
or by opting into it, this means that even the data that is sitting on your
phone is fully encrypted while it is sitting there. That would include
encryption of financial information, health information, or other sensitive information
that a person stores locally on her phone and that isn’t backed up to a cloud
or shared, as well as certain messages on messaging apps and device-to-device
messages. It could also include emails that haven’t been sync’d with an email
provider (such as Gmail or Yahoo!) and haven’t been backed up to a cloud.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Service-provider
encryption&lt;/b&gt;&lt;b&gt; &lt;/b&gt;occurs when a provider, such as a cloud storage
provider, encrypts the data for the user.  In this scenario, the provider
holds the encryption key and the relevant and legal policy question is when
that provider can be obliged to turn over that key to a third party.&lt;/p&gt;&lt;p&gt;&lt;b&gt;

III. The
Value of Encryption 

&lt;/b&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;&lt;b&gt;&lt;i&gt;Encryption protects
individual’s data and preserves the free flow of information.  Encrypted
products and services are widely available across the globe. Recently, &lt;/i&gt;&lt;i&gt;&lt;a href="https://www.schneier.com/blog/archives/2016/02/worldwide_encry.html"&gt;experts&lt;/a&gt; &lt;/i&gt;&lt;i&gt;identified 865 hardware or
software products incorporating encryption from 55 different countries. This
includes 546 encryption products from outside the US, representing two-thirds
of the total number of encryption products.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;b&gt;Encryption Reduces Cybercrime&lt;/b&gt;&lt;/p&gt;&lt;p&gt;-         
Cybercrime &lt;a href="https://www.washingtonpost.com/world/national-security/report-cybercrime-and-espionage-costs-445-billion-annually/2014/06/08/8995291c-ecce-11e3-9f5c-9075d5508f0a_story.html"&gt;costs the US
$100 billion annually&lt;/a&gt;, and the global economy $445 billion each
year.  Encryption is one of the primary recommended tactics for reducing
cybercrime.  This is why its use has been recommended by the &lt;a href="https://www.fbi.gov/sandiego/press-releases/2012/smartphone-users-should-be-aware-of-malware-targeting-mobile-devices-and-the-safety-measures-to-help-avoid-compromise"&gt;FBI&lt;/a&gt;, as well as &lt;a href="http://www.kaspersky.com/downloads/pdf/stopcybercrime_guide.pdf"&gt;network security experts&lt;/a&gt;. &lt;/p&gt;&lt;p&gt;&lt;b&gt;Encryption Protects Users’ Sensitive Personal
Data&lt;/b&gt;&lt;/p&gt;&lt;p&gt;-         
Encryption helps keep consumer&amp;rsquo;s financial,
health, educational, and other sensitive data safe from those who would use it
to do harm. &lt;a href="http://www.businesswire.com/news/home/20150804007054/en/Global-Card-Fraud-Losses-Reach-16.31-Billion"&gt;Credit and debit card fraud alone&lt;/a&gt; cost over
$16 billion in 2014 and will exceed $35 billion in 2020.  Encryption also
helps to protect people&amp;rsquo;s data in the event of a data breach.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Encryption Protects and Fosters Free Expression&lt;/b&gt;&lt;/p&gt;&lt;p&gt;-         
Encryption protects free expression around the
world, especially in regimes where governments seek to punish people who speak
out against violent leaders and repressive laws.&lt;/p&gt;&lt;p&gt;-         
Reducing the efficacy of encryption in the U.S.
will force users to keep their data on foreign platforms &lt;/p&gt;&lt;p&gt;&lt;b&gt;IV.
Encryption and Law Enforcement Access to Data&lt;/b&gt;&lt;/p&gt;&lt;p&gt;

-         
Encryption does not necessarily prevent law enforcement
from pursuing investigations.  Even if data is encrypted on a device, it
may be available through other means.  For instance, it may be available
through valid legal process if it was backed up to the cloud or a cloud-type
environment (such as a private company’s exchange servers, in the case of an
employee’s emails). For these services, Internet companies or the owner of the
server hold a key to unlocking this data, if it is encrypted at all. This is so
that customers can, for example, restore their data if they lose it from their
device.  In the case of third-party apps, there is often a corresponding
service that third-party apps provide, and data may be requested from them.&lt;/p&gt;&lt;p&gt;-         
In addition, end-to-end encryption generally does
not encrypt metadata, which continues to be available to law enforcement and
the intelligence community when the metadata holders are presented with valid
legal process.&lt;/p&gt;&lt;p&gt;-         
Several commentators have recently observed that while encryption
may make certain discrete pools of information difficult for law enforcement to
access, in other areas, law enforcement has more access to data than ever
before.  Such data includes but is far from limited to social media, the
camera and microphone technology provided by hundreds of objects as they become
part of the Internet of things, and fitness and other wearables.  Many new
“wired” objects will have Internet Protocol (IP) addresses that would be
accessible to law enforcement with valid legal process.&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/142465155717</link><guid>https://reformgs.tumblr.com/post/142465155717</guid><pubDate>Fri, 18 Mar 2016 00:00:00 -0400</pubDate></item><item><title>Reform Government Surveillance statement on the
filing of amicus briefs in support of Apple</title><description>&lt;p style="margin: 0in 0in 10pt;"&gt;&lt;font color="#000000"&gt;Reform Government Surveillance companies are
supporting Apple in the current litigation. As technology companies, we want to
keep people safe, we want to stop crime, and accordingly, we cooperate with law
enforcement in ways that are consistent with the law.  But we do not
believe that the law allows the government to demand that a company create new
software that supplies a backdoor to a secure technology.&lt;/font&gt;&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/140411522597</link><guid>https://reformgs.tumblr.com/post/140411522597</guid><pubDate>Thu, 03 Mar 2016 17:45:06 -0500</pubDate></item><item><title>Statement from the Reform Government Surveillance
coalition on legislation to create the National Commission on Security and
Technology Challenges</title><description>&lt;p style="margin: 0in 0in 10pt;"&gt;&lt;font color="#000000"&gt;Reform Government Surveillance members believe
that the National Commission on Security and Technology Challenges is an
important option to consider in the debate about law enforcement access to
encrypted content.  Given that there are no ‘backdoors’ into encrypted
systems or devices that would also maintain the security of what’s on those
systems and devices, we hope that a commission can engage in a thoughtful
dialogue that respects the security of users and their information, while ensuring
that law enforcement has tools to fight crime and terrorism.  We hope that
same thoughtful dialogue will occur as the Commission looks at other issues
related to law enforcement access to data in light of new technologies and
their global reach.&lt;/font&gt;&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/140274516632</link><guid>https://reformgs.tumblr.com/post/140274516632</guid><pubDate>Tue, 01 Mar 2016 10:02:17 -0500</pubDate></item><item><title>Reform Government Surveillance Statement Regarding
Encryption and Security</title><description>&lt;p style="margin: 0in 0in 10pt;"&gt;&lt;font color="#000000"&gt;Reform Government Surveillance companies believe
it is extremely important to deter terrorists and criminals and to help law
enforcement by processing legal orders for information in order to keep us all
safe.  But technology companies should not be required to build in
backdoors to the technologies that keep their users’ information
secure. RGS companies remain committed to providing law enforcement with
the help it needs while protecting the security of their customers and their
customers’ information. &lt;/font&gt;&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/139513553507</link><guid>https://reformgs.tumblr.com/post/139513553507</guid><pubDate>Wed, 17 Feb 2016 20:01:57 -0500</pubDate></item><item><title>Reform Government Surveillance Applauds Judicial
Redress Act Passage in the Senate</title><description>&lt;p style="margin: 0in 0in 10pt;"&gt;&lt;font color="#000000"&gt;Reform Government Surveillance applauds Senate
passage of the Judicial Redress Act, and urges the House to pass the amended
bill as quickly as possible.  The Judicial Redress Act offers basic
privacy protections for the data of citizens of countries that afford the same
protections to US citizens.  Its final passage will insure that U.S. and
European law enforcement can finalize an agreement that will keep our citizens
safe &lt;u&gt;and&lt;/u&gt;&lt;/font&gt;&lt;font color="#000000"&gt; protect their privacy.    &lt;/font&gt;&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/139047495447</link><guid>https://reformgs.tumblr.com/post/139047495447</guid><pubDate>Wed, 10 Feb 2016 07:27:14 -0500</pubDate></item><item><title>Reform Government Surveillance Applauds the
Senate Judiciary Committee on the Judicial Redress Act, Urges Swift Action in
the Full Senate</title><description>&lt;p style="margin: 0in 0in 10pt;"&gt;&lt;font color="#000000"&gt;We applaud the Senate Judiciary Committee for
moving forward with the Judicial Redress Act this morning.  This
legislation was passed by the House of Representatives last October by
unanimous consent, and it is vital to protecting law enforcement’s ability to
share data with our European partners.  We are encouraged that members of
the committee have worked on the bill in a bipartisan manner, and we urge the
full Senate move the bill forward quickly.&lt;/font&gt;&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/138233977817</link><guid>https://reformgs.tumblr.com/post/138233977817</guid><pubDate>Thu, 28 Jan 2016 15:48:26 -0500</pubDate></item><item><title>Reform Government Surveillance Urges Congress to Act Quickly on the Judicial Redress Act</title><description>&lt;p&gt;The Reform Government
Surveillance coalition strongly supports the Judicial Redress Act (H.R.1428)
and encourages all House members to support this much-needed piece of
legislation when it is considered on Tuesday and strongly urges the U.S. Senate
to take it up immediately upon passage.  The European Court of Justice’s
decision to invalidate the U.S.-E.U. Safe Harbor agreement makes passage of the
Judicial Redress Act even more imperative to preserving the flow of data
between European countries and the United States.  The Coalition has
consistently noted that, in general, the Act is an important next step in
surveillance reform after passage of the USA Freedom Act.  By extending
the rights of the Privacy Act –which allows individuals to access, review, and
request correction of information that a government agency may collect– to our
E.U. allies, we will enable governments to cooperate fully in cross-border law
enforcement and counter-terrorism investigations.  We will also allow the
U.S. to continue to rebuild trust in how consumers view technology companies
when they cooperate with legitimate law enforcement requirements—an important
point in light of the recent ECJ decision, and a building block in further talks
between the U.S. and E.U. on transatlantic data flow.  The RGS coalition
urges Congress to enact the Judicial Redress Act this year and applauds House
Judiciary Committee Chairman Bob Goodlatte, Crime Subcommittee Chairman Jim
Sensenbrenner, Judiciary Committee Ranking Member John Conyers and other bill
supporters for their leadership on this important issue.  We look forward
to working with Senate cosponsors Senator Christopher S. Murphy and Senator
Orrin G. Hatch towards final passage in the Senate. 



��&lt;br/&gt;&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/131508813432</link><guid>https://reformgs.tumblr.com/post/131508813432</guid><pubDate>Mon, 19 Oct 2015 16:31:33 -0400</pubDate></item><item><title>RGS voices support for the Judicial Redress Act</title><description>&lt;p&gt;The Reform Government Surveillance coalition strongly
supports the Judicial Redress Act (H.R.1428) and urges the House Judiciary
Committee to approve the legislation for consideration by the full House of
Representatives.  Enactment of the USA Freedom Act in May was an essential
step in reforming our surveillance and privacy laws, and the Judicial Redress
Act is a logical and necessary next step in ensuring that citizens of our most
important allies receive the same protections under the Privacy Act as we
provide to American citizens whose information is in the government’s
possession.  Extension of these core benefits of the Privacy Act will
allow governments to cooperate fully in cross-border law enforcement and
counter-terrorism investigations and will also allow the U.S. to continue to
rebuild trust in how consumers view technology companies when they cooperate
with legitimate law enforcement requirements.  The RGS coalition urges
Congress to enact the Judicial Redress Act this year and applauds House
Judiciary Committee Chairman Bob Goodlatte, Crime Subcommittee Chairman Jim
Sensenbrenner, Judiciary Committee Ranking Member John Conyers and other bill
supporters for their leadership on this important issue.&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/129282059177</link><guid>https://reformgs.tumblr.com/post/129282059177</guid><pubDate>Thu, 17 Sep 2015 10:04:46 -0400</pubDate></item><item><title>Statement of Reform Government Surveillance on Senate Passage of the USA Freedom Act</title><description>&lt;p&gt;We commend the Senate for passing the USA Freedom Act, a bill that makes significant progress in reforming U.S. government surveillance programs and practices. The action today shows the United States&amp;rsquo; leadership in ensuring transparency and accountability of government actions that impact the privacy and trust of Internet users.&lt;br/&gt;&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/120551952812</link><guid>https://reformgs.tumblr.com/post/120551952812</guid><pubDate>Tue, 02 Jun 2015 16:30:02 -0400</pubDate></item><item><title>RGS Statement on the Senate’s vote to proceed on the USA Freedom Act</title><description>&lt;p&gt;We commend the Senate for overwhelmingly voting 77-17 to
proceed on the USA Freedom Act.  The
expiration of certain authorities tonight should not stop consideration of the
bill, especially as the legislation contains significant reforms beyond the
expiring provisions.  Congress should act
to pass USA Freedom this week.  As the
Senate considers amendments to the bill, we urge it to avoid adding any
provisions that weaken the prohibition of bulk collection of Internet metadata,
mandate data retention, or otherwise introduce new concepts or definitions that
weaken consumers’ trust in the Internet.&lt;/p&gt;</description><link>https://reformgs.tumblr.com/post/120408194502</link><guid>https://reformgs.tumblr.com/post/120408194502</guid><pubDate>Sun, 31 May 2015 22:53:24 -0400</pubDate></item><item><title>Statement of Reform Government Surveillance on the Senate's Sunday Vote</title><description>&lt;p&gt;Reform Government Surveillance urges the Senate to pass the USA Freedom Act when it returns Sunday afternoon.  The bill, which overwhelmingly passed the House, is the best option for protecting national security and preserving civil liberties.  The Senate should avoid adding any provisions that weaken the prohibition of bulk collection of Internet metadata, mandate data retention, or otherwise introduce new concepts or definitions that weaken consumers’ trust in the Internet.

&lt;br/&gt;&lt;/p&gt;&lt;figure class="tmblr-full" data-orig-height="105" data-orig-width="589"&gt;&lt;img src="https://78.media.tumblr.com/71e4d8c493548965a8d0c16540db5e41/tumblr_inline_np46v4akqm1sikyyo_540.png" data-orig-height="105" data-orig-width="589"/&gt;&lt;/figure&gt;</description><link>https://reformgs.tumblr.com/post/120186414172</link><guid>https://reformgs.tumblr.com/post/120186414172</guid><pubDate>Fri, 29 May 2015 10:00:04 -0400</pubDate></item><item><title>Statement of Reform Government Surveillance on Senate vote on USA Freedom Act</title><description>&lt;p&gt;Even though 57 Senators joined with 338 Members of the
House from both parties to vote for surveillance reform that could have
protected national security, strengthened civil liberties and bolstered trust
in the Internet, the Senate disappointedly voted last night to not proceed on
consideration of the USA Freedom Act.&lt;br/&gt;&lt;/p&gt;&lt;p&gt;As the Senate plots a path forward on the issue, we urge
it to consider that there remains bipartisan consensus – and significant
sentiment from constituents across the United States - that it is time to
address the practices and laws regulating government surveillance of
individuals and access to their information. It is essential that any proposals
in this area be narrowly tailored, contain essential transparency requirements,
and prohibit bulk collection of Internet metadata.&lt;/p&gt;&lt;p&gt;The Senate’s failure to act only makes it more critical
that Congress address surveillance reform in the future. We will continue to
work with Congress, the Administration, the intelligence community, and civil
society to ensure that meaningful reforms that protect national security and
individual rights are achieved.&lt;/p&gt;&lt;figure class="tmblr-full" data-orig-height="105" data-orig-width="589"&gt;&lt;img src="https://78.media.tumblr.com/71e4d8c493548965a8d0c16540db5e41/tumblr_inline_not68hwkys1sikyyo_540.png" data-orig-height="105" data-orig-width="589"/&gt;&lt;/figure&gt;</description><link>https://reformgs.tumblr.com/post/119683959577</link><guid>https://reformgs.tumblr.com/post/119683959577</guid><pubDate>Sat, 23 May 2015 11:12:33 -0400</pubDate></item><item><title>RGS Open Letter to the Senate on the USA Freedom Act</title><description>&lt;p&gt;May 19, 2015&lt;/p&gt;&lt;p&gt;Dear Members of the Senate,&lt;/p&gt;&lt;p&gt;Later this week the Senate has an opportunity to
pass meaningful and balanced surveillance reform by considering the bipartisan
USA Freedom Act. The bill overwhelmingly
passed the House with 338 votes.  Members
from across the political spectrum supported it.  Delaying action on reform by extending
expiring authorities for two months or any extended period of time would be a
missed opportunity.&lt;/p&gt;&lt;p&gt;The USA Freedom Act prevents the bulk collection
of Internet metadata under various authorities. The bill allows for
transparency about government demands for user information from technology
companies and assures that the appropriate oversight and accountability
mechanisms are in place.&lt;/p&gt;&lt;p&gt;Our companies came together two years ago to push
for essential reforms that are necessary to protect national security,
strengthen civil liberties, reaffirm user trust in the Internet, and promote
innovation. The Senate can begin delivering on those reforms by passing the USA
Freedom Act.&lt;/p&gt;&lt;p&gt;Sincerely,&lt;/p&gt;&lt;p&gt;Reform Government Surveillance&lt;/p&gt;&lt;p&gt;(AOL, Apple, Dropbox, Evernote, Facebook, Google,
LinkedIn, Microsoft, Twitter, and Yahoo)&lt;/p&gt;&lt;figure class="tmblr-full" data-orig-height="105" data-orig-width="589"&gt;&lt;img src="https://78.media.tumblr.com/71e4d8c493548965a8d0c16540db5e41/tumblr_inline_nom38fm2E21sikyyo_540.png" data-orig-height="105" data-orig-width="589"/&gt;&lt;/figure&gt;</description><link>https://reformgs.tumblr.com/post/119383179557</link><guid>https://reformgs.tumblr.com/post/119383179557</guid><pubDate>Tue, 19 May 2015 16:10:21 -0400</pubDate></item></channel></rss>
