Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
P. 1
What the Government Does with Americans' Data

What the Government Does with Americans' Data

Ratings: (0)|Views: 22,066 |Likes:
This report undertakes an in-depth analysis of the federal government’s policies and practices for the use, retention, and sharing of non-criminal information across multiple types of data and recommends policies to modernize our outdated privacy policies.
This report undertakes an in-depth analysis of the federal government’s policies and practices for the use, retention, and sharing of non-criminal information across multiple types of data and recommends policies to modernize our outdated privacy policies.

More info:

Published by: The Brennan Center for Justice on Oct 07, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/31/2013

pdf

text

original

 
BRENNANCENTER FOR JUSTICE
 WHAT THE GOVERNMENTDOES WITH AMERICANS’ DAT
Rachel Levinson-Waldman
Brennan Center for Justice
at New York University School of Law 
 
 about the brennan center for justice
Te Brennan Center or Justice at NYU School o Law is a nonpartisan law and policy institute thatseeks to improve our systems o democracy and justice. We work to hold our political institutions andlaws accountable to the twin American ideals o democracy and equal justice or all. Te Center’s work ranges rom voting rights to campaign nance reorm, rom racial justice in criminal law to Constitutionalprotection in the ght against terrorism. A singular institution — part think tank, part public interestlaw rm, part advocacy group, part communications hub — the Brennan Center seeks meaningul,measurable change in the systems by which our nation is governed.
 about the brennan center’sliberty and national security program
Te Brennan Center’s Liberty and National Security Program works to advance efective national security policies that respect Constitutional values and the rule o law, using innovative policy recommendations,litigation, and public advocacy. Te program ocuses on government transparency and accountability;domestic counterterrorism policies and their efects on privacy and First Amendment reedoms; detaineepolicy, including the detention, interrogation, and trial o terrorist suspects; and the need to saeguard oursystem o checks and balances.
 
 about the author 
Rachel Levinson-Waldman
  C   B C’ Lb  N S P,                . S        , ,   .H   b   b   H P,
Bloomberg View, National Law  Journal, New Republic,

Wired.
F 2006  2011, M. L-W   A C   S C  A A  U P. I  ,    AAUP’ -   b   b        ,       F A. S            ,    q      . F 2003  2006,M. L-W     A   H  C E S   CR D   D  J,     F H A. P  j  D  J, M. L-W    Hb M. M MK  U.S. C  A   N C. M. L-W   2002    U  C L S       BA  R  W C.
 acknowledgements 
T B C   T A P, C.S. F, D AP, T Hb B F, O S F,   S & R Cb, P F ,       Lb & N S P.T     b      x   b  , :E B, M “S” B, C Cb, C C, M DR, L D, M G, J H, J J, J L, J L, R M, GMC, K MC, G Nj, J P, M R, J S, DSb, P S, J V,  M W. O       b q b b.T  b   B C’ Lb  N S P  b  ,  - L G  F P, M P,  A . T     J K    ,  F A.O. S, J.   ,  M W       B C. S      J C  S P. B C ,   JqC, G L,  R S,    . F,    B C’ C ,  S H, Kb Lb,  DR R,   , ,  .  A       ,  ,  ’ .

Activity (5)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->