Date: Fri, 19 Jun 92 16:09:46 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@PICA.ARMY.MIL Subject: Computer Privacy Digest V1#052 Computer Privacy Digest Fri, 19 Jun 92 Volume 1 : Issue: 052 Today's Topics: Moderator: Dennis G. Rears Feds require it, was Re: Drivers Licenses w/photos and SSNs Columnist quotes private email CFP'93 Call for Particiption SURVEY: Is Big Brother Watching You? The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@pica.army.mil and administrative requests to comp-privacy-request@pica.army.mil. Back issues are available via anonymous ftp on ftp.pica.army.mil [129.139.160.200]. ---------------------------------------------------------------------- From: Wm Randolph Franklin Subject: Feds require it, was Re: Drivers Licenses w/photos and SSNs Date: Thu, 18 Jun 1992 20:48:04 GMT The current Loompomanic catalog flyer has an article stating that the federal government is requiring states to convert to using SSNs. So we're getting a federal ID by the back door. BTW, NYS was the last state to include photos on driver licenses; it was in the last 10 years. DMV now has a centralized database running IBM's VTAM, I think, with over 4GB of data. 32 bits of addressing are insufficient. License issuance was centralized to prevent local offices from "forgetting" to record licenses they'd issued. There is still bribery going on, of course. A few years ago a large used-car dealer in, I think, Rochester, was nailed for paying bribes to expidite transferring titles for his cars. His unsuccessful defense was that he was only paying them to do their jobs, but faster. -- Prof. Wm. Randolph Franklin, wrf@ecse.rpi.edu, (518) 276-6077; Fax: -6261 ECSE Dept., 6026 JEC, Rensselaer Polytechnic Inst, Troy NY, 12180 USA ======= LOST MAIL: Mail sent to me between F5-29-92 and M6-1-92 might ======== ======= have been lost in a disk crash. Please resend it. Sorry. ======== ------------------------------ From: Wm Randolph Franklin Subject: Columnist quotes private email Date: Thu, 18 Jun 1992 21:00:16 GMT Jeffrey Hart, a conservative columnist extensively quoted the private email of several Dartmouth administrators concerning their successful effort to get a local business to withdraw advertising from the Dartmouth Review, a conservative student newspaper, unaffiliated with Dartmouth. He didn't say how he got the messages. Maybe the administrators released it. Maybe a Review staffer cracked the system. Hart's son is, I think, one of the Review's founders. Stealing private email would be on a par, morally, with some other staffer actions, such as harassing a faculty member who refused to talk to them, until he completely blew up. This newsgroup has pretty-well established that even sysadmins shouldn't read private email. What about columnists? Of course, reporters always read anything they can get their hands on. There was a question a few years back of whether a reporter had the right to read material on your desk if you left him in your office. The reporters' consensus was yes. (This isn't new. Shortly before the American Revolution, Benj. Franklin got into hot water for reading private mail on a (soon-to-be-former) friend's desk in England and publishing what he saw. It concerned how England should treat the colonies.) -- Prof. Wm. Randolph Franklin, wrf@ecse.rpi.edu, (518) 276-6077; Fax: -6261 ECSE Dept., 6026 JEC, Rensselaer Polytechnic Inst, Troy NY, 12180 USA ======= LOST MAIL: Mail sent to me between F5-29-92 and M6-1-92 might ======== ======= have been lost in a disk crash. Please resend it. Sorry. ======== ------------------------------ Date: Thu, 18 Jun 92 15:25:32 -0700 From: Bruce R Koball Subject: CFP'93 Call for Particiption Call for Participation CFP'93 The Third Conference on Computers, Freedom and Privacy Sponsored by ACM SIGCOMM, SIGCAS & SIGSAC 9 - 12 March 1993 San Francisco Airport Marriott Hotel, Burlingame, CA INVITATION This is an invitation to submit session and topic proposals for inclusion in the program of the Third Conference on Computers, Freedom and Privacy. Proposals may be for individual talks, panel discussions, debates or other presentations in appropriate formats. Proposed topics should be within the general scope of the conference, as outlined below. SCOPE The advance of computer and telecommunications technologies holds great promise for individuals and society. From convenience for consumers and efficiency in commerce to improved public health and safety and increased participation in democratic institutions, these technologies can fundamentally transform our lives. At the same time these technologies pose threats to the ideals of a free and open society. Personal privacy is increasingly at risk from invasion by high-tech surveillance and eavesdropping. The myriad databases containing personal information maintained in the public and private sectors expose private life to constant scrutiny. Technological advances also enable new forms of illegal activity, posing new problems for legal and law enforcement officials and challenging the very definitions of crime and civil liberties. But technologies used to combat these crimes can threaten the traditional barriers between the individual and the state. Even such fundamental notions as speech, assembly and property are being transformed by these technologies, throwing into question the basic Constitutional protections that have guarded them. Similarly, information knows no borders; as the scope of economies becomes global and as networked communities transcend international boundaries, ways must be found to reconcile competing political, social and economic interests in the digital domain. The Third Conference on Computers, Freedom and Privacy will assemble experts, advocates and interested people from a broad spectrum of disciplines and backgrounds in a balanced public forum to address the impact of computer and telecommunications technologies on freedom and privacy in society. Participants will include people from the fields of computer science, law, business, research, information, library science, health, public policy, government, law enforcement, public advocacy and many others. Topics covered in previous CFP conferences include: Personal Information and Privacy International Perspectives and Impacts Law Enforcement and Civil Liberties Ethics, Morality and Criminality Electronic Speech, Press and Assembly Who Logs On (Computer & Telecom Networks) Free Speech and the Public Telephone Network Access to Government Information Computer-based Surveillance of Individuals Computers in the Workplace Who Holds the Keys? (Cryptography) Who's in Your Genes? (Genetic Information) Ethics and Education Public Policy for the 21st Century These topics are given as examples and are not meant to exclude other possible topics on the general subject of Computers, Freedom and Privacy. PROPOSAL SUBMISSION All proposals should be accompanied by a position statement of at least one page, describing the proposed presentation, its theme and format. Proposals for panel discussions, debates and other multi-person presentations should include a list of proposed participants and session chair. Proposals should be sent to: CFP'93 Proposals 2210 Sixth Street Berkeley, CA 94710 or by email to: cfp93@well.sf.ca.us with the word "Proposal" in the subject line. Proposals should be submitted as soon as possible to allow thorough consideration for inclusion in the formal program. The deadline for submissions is 15 August 1992. STUDENT PAPER COMPETITION Full time students are invited to enter the student paper competition. Winners will receive a scholarship to attend the conference and present their papers. Papers should not exceed 2500 words and should address the impact of computer and telecommunications technologies on freedom and privacy in society. All papers should be submitted to Professor Dorothy Denning by 15 October 1992. Authors may submit their papers either by sending them as straight text via email to: denning@cs.georgetown.edu or by sending 6 printed copies to: Professor Dorothy Denning Georgetown University Dept. of Computer Science 225 Reiss Science Bldg. Washington DC 20057 Submitters should include the name of their institution, degree program, and a signed statement affirming that they are a full- time student at their institution and that the paper is an original, unpublished work of their own. INFORMATION For more information on the CFP'93 program and advance registration, as it becomes available, write to: CFP'93 Information 2210 Sixth Street Berkeley, CA 94710 or send email to: cfp93@well.sf.ca.us with the word "Information" in the subject line. THE ORGANIZERS General Chair ------------- Bruce R. Koball CFP'93 2210 Sixth Street Berkeley, CA 94710 510-845-1350 (voice) 510-845-3946 (fax) bkoball@well.sf.ca.us Steering Committee ------------------ John Baker Mitch Ratcliffe Equifax MacWeek Magazine Mary J. Culnan David D. Redell Georgetown University DEC Systems Research Center Dorothy Denning Georgetown University Marc Rotenberg Computer Professionals Les Earnest for Social Responsibility GeoGroup, Inc. C. James Schmidt Mike Godwin San Jose State University Electronic Frontier Foundation Barbara Simons Mark Graham IBM Pandora Systems Lee Tien Lance J. Hoffman Attorney George Washington University George Trubow Donald G. Ingraham John Marshall Law School Office of the District Attorney, Alameda County, CA Willis Ware Rand Corp. Simona Nass Student - Cardozo Law School Jim Warren MicroTimes Peter G. Neumann & Autodesk, Inc. SRI International Affiliations are listed for identification only. Please distribute and post this notice! [Moderator's Note: Sounds like a good conference. If possible I will attend. Maybe we can a BOF on some of our readers there? _Dennis ] ------------------------------ Subject: SURVEY: Is Big Brother Watching You? Reply-To: lorrayne@smiley.mitre.org Date: Fri, 19 Jun 92 11:18:44 -0400 From: lorrayne@smiley.mitre.org For your information, this has been posted on some newsgroups a few months ago. This survey has also been distributed to various conferences over the past few months. All results will be in the form of statistical information and keywords. All participants will remain anonymous. Thanks for submitting this survey. Lorrayne Schaefer [Moderator's Note: Responses do not come to the digest. _Dennis ] SURVEY: MONITORING IN THE WORKPLACE The purpose of this survey is to collect data for a presentation that I will give at this year's National Computer Security Conference in October. I would like to thank you for taking the time to fill out this survey. If you have any questions, you can call me at 703-883-5301 or send me email at lorrayne@smiley.mitre.org. Please send your completed survey to: Lorrayne Schaefer The MITRE Corporation M/S Z213 7525 Colshire Drive McLean, VA 22102 lorrayne@smiley.mitre.org 1. What is your title? 2. What type of work does your organization do? 3. Does your organization currently monitor computer activity? (Yes/No) a. If yes, what type of monitoring does your company do (e.g., electronic mail, bulletin boards, telephone, system activity, network activity)? b. Why does your company choose to monitor these things and how is it done? 4. If you are considering (or are currently) using a monitoring tool, what exactly would you monitor? How would you protect this information? 5. Are you for or against monitoring? Why/why not? Think in terms of whether it is ethical or unethical ("ethical" meaning that it is right and "unethical" meaning it is wrong) for an employer to monitor an employee's computer usage. In your response, consider that the employee is allowed by the company to use the computer and the company currently monitors computer activity. 6. If your company monitors employees, is it clearly defined in your company policy? 7. In your opinion, does the employee have rights in terms of being monitored? 8. In your opinion, does the company have rights to protect its assets by using a form of monitoring tool? 9. If you are being monitored, do you take offense? Managers: How do you handle situations in which the employee takes offense at being monitored? 10. What measures does your company use to prevent misuse of monitoring in the workplace? 11. If an employee is caught abusing the monitoring tool, what would happen to that individual? If your company is not using any form of monitoring, what do you think should happen to an individual who abused the tool? 12. Is it unethical to monitor electronic mail to determine if the employee is not abusing this company resource (e.g., suppose the employee sends personal notes via a network to others that are not work related)? Why or why not? ------------------------------ End of Computer Privacy Digest V1 #052 ******************************