51. Chinese Internet users and Internet companies alike have been aware all along that they risked arrest if they used to Internet to spread sensitive information. 52. Clinton administration officials said they only followed a waiver practice started by Bush and insisted that no sensitive information has been transferred. 53. Clinton, like all presidents who have supervised the sprawling intelligence bureaucracy that arose during the Cold War, has expressed concern about unauthorized leaks of sensitive information. 54. Concern about privacy of sensitive information over the Internet has stalled development of commercial businesses on the network. 55. Clinton said he accepted the argument that leaks of sensitive information at times jeopardize intelligence sources and methods, and put the lives of spies and informants at risk. 56. Constantine described a corruption so widespread that even sensitive information shared with elite anti-drug units reached traffickers. 57. Continued public access to sensitive official information is vital to Polish goals such as developing a healthy stock market and joining the European Community. 58. Cylink and RSA hold separate patents for products that are used to encode sensitive information sent through computer networks. 59. Critics argue the exemption is too broad and will cover more than sensitive information. 60. Encryption, the process of scrambling or coding files, is used for sending and protecting e-mail or sensitive financial information. |
|