Feeds

Palin demands $15m to search her own emails

The cost of transparency

Next gen security for virtualised datacentres

US vice presidential candidate Sarah Palin isn't saying citizens interested in open government can't get access to her emails. She's just saying it will cost a little.

The office of the Alaska governor, which by state law is required to make such messages public, says it could cost more than $15m for anyone conducting an exhaustive search. Even then, Palin - who ran for governor on a platform of running a clean and transparent government - says requests won't be honored until November 17, two weeks after the presidential election is held.

It's fair to say that interest in Palin's email has spiked since Republican presidential nominee John McCain named her as his running mate. Not only has her office been swamped with requests for copies of state records, but her personal Yahoo email account was breached and some of its contents were posted to the Wikileaks site.

The leak offered evidence strongly suggesting that Palin conducted official state business using the very unofficial gov.palin@yahoo.com email address. Messages sent to it bore subject headings such as "Draft letter to Governor Schwarzenegger," "Court of Appeals Nominations" and "CONFIDENTIAL Ethics Matter." Critics say her use of the Yahoo account could violate Alaska open records laws that require official communications to be available to members of the public.

An Alaska state judge has ordered Palin to preserve the contents of the account.

The emails Palin's office has valued at $15m were sent by various state employees to her husband, Todd, who is not a state employee. State bean counters say it will cost $960.31 to search each employee's account. If email for all 16,000 employees are processed, the exact figure is $15,364,000.96. They figure it will take 13 hours per email account. That figure doesn't include the cost of the paper. The office will only make the email available in hard copy.

Palin may portray herself as a Washington outsider unversed in the sleights of hand politicians use to keep Joe Six-Pack from seeing what's really going on in government. But in Alaska, she knows how it's done. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Super Cali signs a kill-switch, campaigners say it's atrocious
Remote-death button bad news for crooks, protesters – and great news for hackers?
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.