Al Gore's Address on 'Electronic Bill of Rights' Omits Encryption
|Copy of "Electronic Bill of Right" Section
of Gore Speech, 5/14/98.
Vice President Gore's Press Release, 5/14/98.
Memorandum from Clinton to Heads of Executive Depts., 5/14/98.
Vice President Gore, speaking to graduating students at New York University stated that:
"New technology must not reopen the oldest threats to our basic rights, liberty, and privacy. But government should not simply block or regulate all that electronic progress. If we are to move full speed ahead into the Information Age, government must do more to protect your rights - in a way that empowers you more, not less. We need an electronic bill of rights for this electronic age."
Gore articulated a basic principle:
"You should have the right to choose whether your personal information is disclosed; you should have the right to know how, when, and how much of that information is being used; and you should have the right to see it yourself, to know if it's accurate."
V.P. Al Gore
Gore cited two types of privacy violations: unauthorized use of medical records, and the sale of credit card purchase information to marketers. Gore also used this New York speech to list three components his "electronic bill of rights"
On Tuesday, May 12, Senators Leahy (D-VT), Ashcroft (R-MO), and Burns (R-MT) introduced a bipartisan compromise "E-PRIVACY" bill covering encryption and privacy. Neither Gore nor Clinton mentioned this E-PRIVACY bill on Thursday. The White House and FBI have successfully blocked passage of all encryption rights legislation to date.
More Related Pages & Websites
|Document: HTML Copy of
Story: Compromise Encryption Bill Introduced in Senate, 5/14/98.
Website: Sen. Leahy's E-PRIVACY Page.
President Clinton's Memorandum to the heads of all executive departments pertained primarily to the handling of individuals' records by federal government agencies. Clinton wrote that:
"It shall be the policy of the executive branch that agencies shall ... assure that their use of new information technologies sustain, and do not erode, the protections provided in all statutes relating to agency use, collection, and disclosure of personal information."