Date: Sat, 19 Nov 94 06:41:59 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V5#064 Computer Privacy Digest Sat, 19 Nov 94 Volume 5 : Issue: 064 Today's Topics: Moderator: Leonard P. Levine Re: Intrusive Supermarket Card Re: Intrusive Supermarket Card Re: Intrusive Supermarket Card Re: Intrusive Supermarket Card Re: Intrusive Supermarket Card Re: Mother's Maiden Name Book of the Month Club Re: E-mail headers Datamation Writes on the Wiretap Act Proof of Birth Virtual Ethnicity Re: Corporate Electronic Communications Policy SSN and Mobile Phone Service Re: Must I Always Carry I.D? Re: Must I Always Carry I.D? Help for a Student Prvcy, Healthcre Rfrm & Infrmtion Infrastrctre Cnfrnce Info on CPD, Contributions, Subscriptions, FTP, etc. ---------------------------------------------------------------------- From: genghis@ilces.ag.uiuc.edu (Scott Coleman) Date: 16 Nov 94 16:54:23 GMT Subject: Re: Intrusive Supermarket Card Organization: University of Illinois at Urbana Steve Berczuk writes: regarding check cashing cards: as a side note: >>for people who haven't figured out that if you pay with your Visa card you get a month's free float<< Heh heh - and you're also providing the store with a way to track your buying habits which is every bit as good as a "valued customer" or check cashing card. is one of the reasons I don't understand the idea behind the Express Check cards that banks are issuing: it looks like you are making a master card payment but your bank account gets debited when the merchant submits the credit slip rather than the bank issuing you a bill. Can anyone explain what these cards offer above what a credit card does, besides opening you up to problems is you lose the card (if you lose a credit card, no money has left your bank account....) You don't have to be credit-worthy to get a debit card. The advantages to those who have screwed up their credit ratings are obvious. -- Scott Coleman, President ASRE (American Society of Reverse Engineers) asre@uiuc.edu Life is temporally limited - drive velocitously!! ------------------------------ From: "L. Jean Camp" Date: 16 Nov 1994 15:34:01 -0500 Subject: Re: Intrusive Supermarket Card Organization: Doctoral student, Engineering and Public Policy, Carnegie Mellon, Pittsburgh, PA Steve Berczuk wrote: as a side note: >>for people who haven't figured out that if you pay with your Visa card you get a month's free float<< is one of the reasons I don't understand the idea behind the Express Check cards that banks are issuing: it looks like you are making a master card payment but your bank account gets debited when the merchant submits the credit slip rather than the bank issuing you a bill. Yes you get 30 days float from your VISA. So why not use it to buy everything and just write one check a month? Do you do that? No? So why doesn't everyone else? Well, these cards are convenient. They prevents double spending. They are easier to use than checks. You can basically pay cash for items like auto rentals when you have budgeted for them. You can use your ATM card at institutions that do not offer POS systems. It is much cheaper in terms of transaction processing for the bank. Can anyone explain what these cards offer above what a credit card does, besides opening you up to problems is you lose the card (if you lose a credit card, no money has left your bank account....) Actually the Electronic Funds Transfer Act (EFTA) limits your loss in either case. To $50 per card I believe. So having one card for both VISA -like payments & ATM transactions lessens your exposure. You might want to read EFTA before offering more conclusions. Alan Miller \\ millera@mcs.com I think the debit cards are primarily used if you have a bad credit history, or for kids who don't have a credit history. Since your (apparent) line of credit is just what you have in the bank, the bank doesn't need to worry about defaults. No. Secured credit cards are used to establish a credit history. Secured credit cards are not debit cards. The securing account is not debited but defines your credit limit. Debit cards in the form of ATM/VISA bank cards may not serve the purpose of improving your credit -- since it is not an extension of credit, even conditional credit, but merely an electronic debiting service. See the difference? ohnl@iecc.com (John R Levine) Nothing. You have to go through the same credit application as you would for a real credit card, but you get no float and less protection against bogus charges. This varies between banks. At one bank where I do business, the ATM card is automatically in the form of a debit-VISA. There is no more credit checking than with an ATM card. At another, they do not offer ATM VISA cards. However, in the region server by the latter ban POS terminals are much more widely available. Again, the EFTA is clearly intended to cover both credit cards & debit card. The best answers I've gotten when I ask people why they use these things are vague comments about imposing better financial discipline or something. It depends on whether you think these cards are substitutes for ATM cards or credit cards. Before you were worried about electronic privacy did you use your VISA for every puchase? Why not? Some vague reason about financial discipline? Other people feel the same way. -- Jean ------------------------------ From: tkaplanr@lehman.com (Roger Kaplan (Tokyo)) Date: 17 Nov 94 09:08:27 JST Subject: Re: Intrusive Supermarket Card card payment but your bank account gets debited when the merchant submits the credit slip rather than the bank issuing you a bill. Can anyone explain what these cards offer above what a credit card does, besides opening you up to problems is you lose the card (if you lose a credit card, no money has left your bank account....) The establishment does not have to accept the credit card issuing the "check" in order to use the "check"; it has the properties of a bank check. In England, there is a debit scheme called Switch, which is a debit service linked to your bank account/ATM card. The difference between Switch and similar schemes in the US is that Switch is accepted almost anywhere, not just gas stations and supermarkets. Furthermore, businesses who normally wouldn't accept credit cards because of the charge those cards impose, will accept Switch since it costs nothing to them. What's even more interesting is an experiment in the UK (reported in Wired) to allow anonymous money. SmartCards (which are nigh-impossible to forge) are "charged" with money at banks (like ATM's, I guess), and can be used at vendors. The advantage is, of course, that there's no audit trail. Which means that your expenditures don't go on your credit record. As for the US debit cards (like Visa Switch), the only perceivable difference is that the money gets deducted fromm your account immediately and automatically rather than at the end of the month, with your involvement. "More convenient" for consumers, more money for the banks. Everyone's happy, right? ------------------------------ From: msieving@amiserv.xnet.com (Mark Sieving) Date: 17 Nov 1994 00:38:55 GMT Subject: Re: Intrusive Supermarket Card Organization: XNet - A Full Service Internet Provider - (708) 983-6064 Spiros Triantafyllopoulos (c23st@kocrsv01.delcoelect.com) wrote: How hard is it to give them 'white innocent lie' answers to the questions? Kids like Ice Cream? NO :-) Kids like Celery? YES :-) :-) What will happen then is that you'll get junk mail about stuff that you have absolutely no interest in. It seems to make more sense to either answer truthfully (that way you'll at least get good junk mail) or don't answer at all. -- Mark Sieving msieving@xnet.com OR m.sieving1@genie.geis.com ------------------------------ From: c23st@kocrsv01.delcoelect.com (Spiros Triantafyllopoulos) Date: 18 Nov 1994 15:26:59 GMT Subject: Re: Intrusive Supermarket Card Organization: Delco Electronics Corp. Steve Berczuk wrote: regarding check cashing cards: The thing that disturbes me a bit about the SSNs being permissible for check cashing cards is that Massachusetts law requiring Social Security Numbers on *checks* is illegal (unless the SSN is your drivers lic number - which it does not have to be) I think courtesy cards get around this by allowing you to write checks above the amount of your bill (which is in effect extending credit), so asking for an SSN for a check cashing card IS legal. The local Marsh chain of supermarkets (same folks who had the long questionnaire earlier) require your SSN on their cashing card as well. Pfff. I stopped shopping there. Vote with your feet. is one of the reasons I don't understand the idea behind the Express Check cards that banks are issuing: it looks like you are making a master card payment but your bank account gets debited when the merchant submits the credit slip rather than the bank issuing you a bill. Can anyone explain what these cards offer above what a credit card does, besides opening you up to problems is you lose the card (if you lose a credit card, no money has left your bank account....) The local Meijer's store where I shop now offers many different ways of accepting payment; they have their own debit card thingie which takes money off your checking account (but I think, I'm pretty sure) requires a PIN code. They also accept ATM cards (selected) and again, you enter your ATM PIN code in a keypad, no further ID. Also check with a cashing card (if you don't want to have the electronic feature it's fine, they won't activate it), or check with driver licence. I use the payment using ATM card and ATM PIN method much of the time. The transaction goes thru instantly so I never have any doubt as to when the check has cleared. It shows as an ATM withdrawal, and it's cheaper and far faster than writing checks. -- Spiros Triantafyllopoulos Kokomo, IN 46904 (317) 451-0815 Software Development Tools, AD/SI c23st@kocrsv01.delcoelect.com Delco Electronics/GM Hughes Electronics "Reading, 'Rithmetic, and Readnews" ------------------------------ From: Panopticon@oubliette.COM Date: 16 Nov 94 20:10:36 CST Subject: Re: Mother's Maiden Name My mother's maiden name is my middle name, Nelson. Ironically, I've had bankers tell me I couldn't use my mother's maiden name. But, more along the lines of the original discussion, the maiden name is a prerequisite to doing a thorough asset investigation. I often am able to confirm that a bank account belongs to a subject by calling the bank with the social security number and the maiden name. In fact, I had the social security number wrong once, and the teller corrected it for me! But let me say, that this act in itself is NOT illegal. I have never inquired during confirmation as to the contents of the account. And, technically I have never impersonated the person under investigation, as they do not explicitly ask you if you are that person. They usually say the name, and you say yes, confirming the correct correlation. Later, with another call, the level of the account can be confirmed by inquiring as to the cashability of a check of X amount again and again. The nicest thing about this is that if the subject has close business ties to the bank, these methods provide the least risk of someone at the bank bringing the inquiries to the subjects attention. However, illegal or not, there is clearly an invasion of privacy occuring when I utilize these techniques, and although I feel that I am an advocate of privacy, I cannot help applying a double standard when it comes to finding the assets of a man who left two or three children and a wife without support. After all, our government, local and national, has not yet really shown significant enforcement of child support laws. I know that many of you will mention that we must preserve the privacy of every man in that we may secure privacy for all, and on the face of it I agree with this. But isn't it time we made an exception in the case of child support? Given that the assets of the man belong, legally in part, to his children. ------------------------------ From: "Virginia Matzek" Date: 16 Nov 1994 15:58:56 PACIFIC Subject: Book of the Month Club Organization: California Alumni Assoc. As a new subscriber to this digest I'm not sure if this subject has been covered before, but I thought I'd warn you with my own personal privacy horror story. Book-of-the-Month Club in Pennsylvania recently sent me an unsolicited mailing asking me to join at a reduced rate. I try to avoid getting on mailing lists, but the deal was good and I intended to unsubscribe as soon as the initial deal was over. I sent in an order for about $20 worth of books and paid by check. Imagine my surprise when I got the following letter (condensed): " "Dear Ms. Matzek, "I very much want to enroll you in Book-of-the-Month Club as soon as possible....However, we're able to offer these valuable benefits only by being selective about whom we enroll. As a result, our Credit Department occasionally requests additional information from applicants before we send their enrollment selections. A convenient answer form is contained on the back of this letter. Please fill it out and mail it back to us within 30 days...Your enrollment package will be sent to you as soon as your application is approved. I know that you're eager to get your enrollment selections. So why not answer the questions now while you have the letter in your hand? "Thank you...etc." On the back of the letter were spaces for me to list my occupation, my employer's address, my bank's name and address, my bank account and investment account numbers, my credit card names and numbers, my signature, and my telephone number. Needless to say, I was outraged and wrote them back a nasty letter. I also called their service department and got a kindly low-level employee who processed my order (and canceled me from future mailings) on the spot. I also filed a report with the Pennsylvania Better Business Bureau, but have heard nothing back from them. Now I regret having given the BOTMC my business at all, but I figure they probably lose money on the initial offer and make money on the rest, so I'm not too put out. ------------------------------ From: stuckey@mrcnext.cso.uiuc.edu (Anthony J. Stuckey) Date: 17 Nov 1994 15:37:42 GMT Subject: Re: E-mail headers Organization: University of Illinois at Urbana wbe@psr.com (Winston Edmond) writes: (2) Some mail programs will add a BCC: line to the message if YOU are a blind Cc recipient, to let you know why the message was delivered to you. This is the behavior that I find most intuitive. I have noticed that some mailers turn a BCC list into what looks much more like an expanded TO list, and this has confused myself and correspondents in the past. It's not a nice situation to suddenly be dropped into an obviously healthy conversation, with the headers suggesting as best they can that you knew about this all along. (3) All this is irrelevant. By just Cc'ing myself, I can forward the copy I get back to anyone I want, without using blind Cc, and none of the original recipients will have any indication that I've done so. Blind Cc just makes this easier. -WBE Exactly. CC'ing yourself and forwarding that mail behind someone's back is just lame. It's valid, but it's lame. -- Anthony J. Stuckey stuckey@mrcnext.cso.uiuc.edu "And if you frisbee-throw a universe where does it go?" -- Steve Blunt. GCS/S -d+@ p c(++) l u+ e+(-) m+(*) s+++/-- !n h(*) f+ g+ w+ t+@ r y? KiboNumber == 1 ------------------------------ From: doug@cc.ysu.edu (Doug Sewell) Date: 17 Nov 1994 11:03:41 -0500 Subject: Datamation Writes on the Wiretap Act Organization: Youngstown State University The November 15, 1994 issue of Datamation, in Press Watch on p.99, has this article (there is no by-line). _But Officer, I Didn't Send Bogus E-Mail!_ Despite a last minute push by privacy geeks like the American Civil Liberties Union to block its passage, Congress has approved President Clinton's new data-wiretapping legislation. That's because the FBI made it the agency's single legislative priority for the year, says the October 9 issue of _The New York Times._ The Times added that FBI director Louis J. Freeh successfully argued that the agency couldn't fight crimes like terrorism, espionage, or international drug dealing without being able to tap into emerging telecom technologies. The bill forces phone companies to modify their networks by putting special easy-eavesdropping software into switching stations. The bill also authorizes payment of half a billion dollars to phone companies to pick up the costs of modifying their equipment. This shows what "professional DP people" think of both privacy and "us geeks". -- Doug Sewell (doug@cc.ysu.edu) (http://cc.ysu.edu/doug) It's reported that Canter & Siegel search for and archive all articles that contain their names or "Green Card". This .sig is to help them. ------------------------------ From: Eric Poulsen Date: 17 Nov 1994 22:08:51 -1000 (HST) Subject: Proof of Birth Here's a potential problem I stumbled upon: A few years ago, I was going to do some travelling, so I set about obtaining a passport. I was told that I need a "record of birth" (different from a birth certificate), and they gave me an address to write to my state of birth (AK) to obtain this document. Well, I wrote to them, and simply told them my name and address (my name isn't very common, so I figured it was unlikely to be two people born in AK -- also being low population state -- with the same name.) A few weeks later, I recieved a "record of birth" for someone 9 years older than I. Turns out that he had the same first & last name as myself, but a different middle name, & date/place of birth (naturally.) So I sent it back, and was MUCH more specific in my request, and they sent me the proper one (and didn't even charge me again!) Then it occured to me ... I could probably obtain this sort of document for *ANYONE* as long as I knew their place of birth. I could have easily obtained a passport with the other fellow's name, etc, etc ..., but with MY picture on it. As long as I picked someone who was near the same age, race, eye, & hair color (not that farfetched), I could "assume" someone else's identity! This can be very scary, considering that passports are generally accepted as a VERY secure means of ID, and quite usable as an ID instead of drivers license, etc. ------------------------------ From: zurawsk@uni-muenster.de (Nils Zurawski) Date: 18 Nov 1994 15:15:27 +0100 Subject: Virtual Ethnicity Organization: Westfaelische Wilhelms-Universitaet Muenster, Germany I am looking for articles, books, WWW sitesetc, information so to speak that deal with the cultural impact, ethnicity, cultural identity on the Internet or any other net. Virtual communities or societies and the relation to the concepts of ethnicity and maybe their changes. - Does different cultural background have different effects of how a person uses the net and how one behaves in a virtual society/community? - Is the Internet able to accelerate the come-into-being of a "world society"? - The NAFTA, EU and other constructions to overcome economical, and /or socio-cultural differences do actually not much on these subjects, esspecially the last one. What does the Internet do in this respect? I appreciate any help, be it literature or personal opinion or hints. Tell it to other people you know and maybe can help. I am lpanning to write a Ph.D. in sociology on that subject. -- Nils Zurawski zurawsk@uni-muenster.de ------------------------------ From: rj.mills@pti-us.com (Dick Mills) Date: 18 Nov 1994 09:28:25 -0500 Subject: Re: Corporate Electronic Communications Policy Bernie Cosell [bernie@fantasyfarm.com Computer-Privacy-Digest:V5,062,12] apparently does not share my paranoia about the proposed policy. In the original posting I didn't cite my actual fears so as not to contaminate the comments. I'll state them now. The policy states: [Company] reserves the right to review all electronic records and communications, although it not the intent to do so except for legitimate business reasons. This implies that the company may tap phones, and bug rooms, even though it is not their intention to do so. I fear this will cause unnecessary fear and suspicion among employees. Suppose an employee sent a letter to his employer stating, "I reserve the right to criticize company management publicly in the press, although it is not my intention to do so." What is the gain to offset the suspicion caused by such a letter? The policy states: The message originator's department manager and corporate officers are the only individuals authorized to review... Bernie Cosell comments: I wouldn't even have been inclined to put in all the disclaimers --- I'd have ended the paragraph after the first sentence. Without the disclaimers all employees, as agents of the company, would be authorized to review any communications of anyone else in the company. Limitations of authorization must be explicitly stated. The policy states: Improper use of [company] electronic communications may result in disciplinary action up to and including discharge from employment. Email, more so than nearly any other kind of communication, is subject to forgery. There have been lots of discussion in computer-privacy about the vulnerabilities. It would be too easy for another employees, or even an outsider to sabotage someone's employment by sending forged email. Conversely, if the company did dismiss someone for abuse of email, he could sue and challenge them to prove that he did indeed create the messages; and win. Also, non-electronic forms of communication become conspicuous by their absence from the policy. ------------------------------ From: cristy@eplrx7.es.duPont.com (Cristy) Date: 18 Nov 1994 13:28:03 -0500 Subject: SSN and Mobile Phone Service Organization: DuPont Central Research and Development I'm doing my best to reverse the trend towards a defacto national ID, the Social Security Number. I just tried to sign-up for mobile telephone service with Cellular One and they flat-out refused unless I provided my SSN. However, Bell Mobile agreed to provide service without one. I will follow up with a letter to Cellular One to make them aware of the lost business. -- cristy@dupont.com ------------------------------ From: Paul Robinson Date: 18 Nov 1994 20:02:28 -0500 (EST) Subject: Re: Must I Always Carry I.D? Organization: Tansin A. Darcos & Company, Silver Spring, MD USA All the states that I've checked have a "non driver's ID". It looks like a driver's license, it's issued by the same people, but it doesn't let you drive a car. In California, you could, starting about eight years ago, get both. Back in the 1970s, when I got my license from California, getting a license automatically cancelled your ID card, which incidentally used the same number, which was a letter followed by 7 digits. The first digit tells the year of the decade you got the card; the letter would tell which decade. Later on, they would allow someone to get an ID card AND a license, I guess so you could carry the ID when you just needed to cash a check, but weren't driving. They also eliminated the minimum age you could get an ID card from 16 to zero. (The LA Times showed a woman with her 3-month old baby and its id card, showing a picture of the baby. Would have been interesting to get the baby to pose if California used side profile to show someone is under 21!) Unfortunately, some non-drivers that I know have had problems buying things by check, because the drelbs at the store are told to get "a driver's license and a major credit card" as ID. If they don't follow the rules exactly, they can get fired. "Driver's license" means a driver's license and nothing else. I use the old rule, when the 'droid won't accept what should be valid, you scream for the manager. The ID card has the same validation as the license, e.g. the easily defeatable "show us your birth certificate" requirement. It should be treated the same as a license. I used to have the same problem for the exact *opposite* reason; I had a drivers' license but didn't have the income to get a credit card (secured cards were many years in the future) and sometimes needed to get a check cashed. It was on a made-for-TV movie that I saw a woman say she got a U.S. Passport so that if she ever cashed a check, and they wanted ID, she could just "whip out her Passport". PING! I saw a little lightbulb come on. I applied for a passport and recieved it a few weeks later, and decided to try it. I went into a store that required a drivers license and credit card and when asked for ID, presented my passport. It was like presenting an American Express Gold Card! They never even *asked* for my drivers license! Places that had shunned my checks before now welcomed me with open arms. Because Passports are so rarely used, they often got the manager out of his kiosk anyway to check. Now I'm in the reverse situation; I now have a gold Visa and a gold American Express Card, but I no longer have a checking account. So many places take credit cards, I decided to stop paying $75 a year for the privelege of storing my money in a bank, instead I just pay the few bills I have that don't take plastic with money orders, and pay my credit cards directly. (It also allows me to time my purchases that I get 45 days without having to pay for the item, whether or not the store offers credit, and both credit cards provide damage waivers if an item purchased when using them is damaged or stolen; Perpetual Bank had that privelege on its checking accounts, but Perpetual went into receivership, and now no checking account I've found offers damage/theft insurance.) --- Paul Robinson - Paul@TDR.COM Reports on Security Problems: To Subscribe write PROBLEMS-REQUEST@TDR.COM Voted "Largest Polluter of the (IETF) list" by Randy Bush ------------------------------ From: jswylie@delphi.com Date: 18 Nov 94 20:47:44 -0500 Subject: Re: Must I Always Carry I.D? Organization: Delphi (info@delphi.com email, 800-695-4005 voice) Steve Smith writes: In a lighter vein, one time I was picking up my car after having it repaired at the local dealer. They required ID before they would release a car. One of the forms of "acceptable ID" that they would accept is a state non-driver's ID .... That isn't as crazy as it sounds. I know of at least one person too old to drive, and one blind person who own cars and have others drive them around. You don't have to be a driver to own a car. -- John S. Wylie - Internet: jswylie@delphi.com ------------------------------ From: Heather Taylor Lorrains Date: 17 Nov 1994 12:04:22 -0700 (PDT) Subject: Help for a Student I am doing a research paper reguarding privacy invasion via the internet such as acces to personal information or records and how or if you are protected by any laws. What about finding out about banking accounts? Can just any one get access to see how much money you have or if you even have an account? If so is there a way of blocking such information from being released. Please send any information to htaylor@clark.edu Thank-you Oh so much, Heather Taylor ------------------------------ From: vberdaye@magnus.acs.ohio-state.edu (Vicente Berdayes) Date: 17 Nov 1994 18:55:26 GMT Subject: Prvcy, Healthcre Rfrm & Infrmtion Infrastrctre Cnfrnce Organization: The Ohio State University PRIVACY, THE INFORMATION INFRASTRUCTURE AND HEALTHCARE REFORM A One Day Symposium presented by The Center for Advanced Study in Telecommunications & The National Regulatory Research Institute at The Ohio State University Co-sponsored by Department of Communication, The Ohio State University Hospitals & The Ohio Supercomputer Center at The Ohio State University Friday, January 27, 1995 The Ohio State University's Ohio Union 1739 N High Street, Columbus, Ohio 43210 The National Information Infrastructure and healthcare reform, two policy initiatives high on the contemporary agenda, have significant but generally overlooked implications for privacy. This symposium will assemble a group of experts from the US and Canada to explore these implications with participants drawn from the private and public sectors of central Ohio. The National Information Infrastructure may be understood as a highly interconnected set of telecommunication networks with greater capabilities for information collection and transfer than available currently. As this infrastructure develops, more and more people will encounter it through their everyday interaction,at work, while making purchases, while being entertained, and in their daily communications. The ongoing shift to an electronic environment has already resulted in the collection of greater amounts of information about the population. The information infrastructure will likely produce more opportunities for monitoring social interactions. One such application is in the area of health information. The current administration~s healthcare reform efforts seek to control rapidly rising healthcare costs. Most large scale cost-control efforts in this area involve the use of computers and telecommunications networks. Centralization and cross-checking of health-related information, broadening of the array of health related information that is collected, and the use of demographic profiles are examples of cost-control methods made available by emerging telecommunications and computer capabilities. These developments are potentially privacy threatening. However, as with the information infrastructure, privacy reduction is not inevitable. New technologies such as public-key cryptography and smart cards built into the design of the healthcare infrastructure can yield cost control benefits and privacy enhancement. Accordingly, decisions made at this point concerning the shape of the information infrastructure and its built-in privacy guarantees will have important ramifications on the collection and use of personal information. The one day symposium will provide a general overview of privacy issues; in-depth and multi-perspective presentations on infrastructure and health information issues, including current policy developments; development of scenarios and proposals; and will allow for audience interaction with the assembled experts. REGISTER NOW! Conference fee is $100.00 including meals and materials Direct registration fee and inquiries to: CAST/OSU 3016 Derby Hall/154 N. Oval Mall Columbus, OH 43210-1339 PH: 614/292-8444 FAX: 614/292-2055 General Inquiries should be directed to: Vicente Berdayes Conference Coordinator 614/292-0080 E-Mail: vberdaye@magnus.acs.ohio-state.edu Register now by printing the following form and mailing it along with the registration fee of $100 to: CAST, 3016 Derby Hall, 154 N. Oval Mall, Columbus, OH 43210-1339. Phone 614-292-8444. FAX 292-2055. For further information, parking, directions, lodging, or bus schedules, contact the CAST office. Name: Affiliation: Address: Phone: E-Mail: ------------------------------ From: "Prof. L. P. Levine" Date: 26 Sep 1994 12:45:51 -0500 (CDT) Subject: Info on CPD, Contributions, Subscriptions, FTP, etc. Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions generally are acknowledged within 24 hours of submission. An article is printed if it is relevant to the charter of the digest. If selected, it is printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the subject line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit or append to the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Mosaic users will find it at gopher://gopher.cs.uwm.edu. Older archives are also held at ftp.pica.army.mil [129.139.160.133]. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Mosaic: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V5 #064 ****************************** .