Feeds

Palin demands $15m to search her own emails

The cost of transparency

Choosing a cloud hosting partner with confidence

US vice presidential candidate Sarah Palin isn't saying citizens interested in open government can't get access to her emails. She's just saying it will cost a little.

The office of the Alaska governor, which by state law is required to make such messages public, says it could cost more than $15m for anyone conducting an exhaustive search. Even then, Palin - who ran for governor on a platform of running a clean and transparent government - says requests won't be honored until November 17, two weeks after the presidential election is held.

It's fair to say that interest in Palin's email has spiked since Republican presidential nominee John McCain named her as his running mate. Not only has her office been swamped with requests for copies of state records, but her personal Yahoo email account was breached and some of its contents were posted to the Wikileaks site.

The leak offered evidence strongly suggesting that Palin conducted official state business using the very unofficial gov.palin@yahoo.com email address. Messages sent to it bore subject headings such as "Draft letter to Governor Schwarzenegger," "Court of Appeals Nominations" and "CONFIDENTIAL Ethics Matter." Critics say her use of the Yahoo account could violate Alaska open records laws that require official communications to be available to members of the public.

An Alaska state judge has ordered Palin to preserve the contents of the account.

The emails Palin's office has valued at $15m were sent by various state employees to her husband, Todd, who is not a state employee. State bean counters say it will cost $960.31 to search each employee's account. If email for all 16,000 employees are processed, the exact figure is $15,364,000.96. They figure it will take 13 hours per email account. That figure doesn't include the cost of the paper. The office will only make the email available in hard copy.

Palin may portray herself as a Washington outsider unversed in the sleights of hand politicians use to keep Joe Six-Pack from seeing what's really going on in government. But in Alaska, she knows how it's done. ®

Security for virtualized datacentres

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.