Date: Tue, 20 Dec 94 11:57:05 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V5#075 Computer Privacy Digest Tue, 20 Dec 94 Volume 5 : Issue: 075 Today's Topics: Moderator: Leonard P. Levine Re: 3 Hits and you're Out? (SSN use) Government vs. Citizen Re: What to say to Junk Callers? Re: Americans say: Brand Us! Moderation of Computer Privacy Digest PRIVACY Forum Status [not CPD] Conference ETHICOMP95 Info on CPD, (unchanged since 11/28/94) ---------------------------------------------------------------------- From: Robert Ellis Smith <0005101719@mcimail.com> Date: 16 Dec 94 13:20 EST Subject: Re: 3 Hits and you're Out? (SSN use) On Dec. 5, 1994, Geoffrey Knauth asked whether the mere fact that someone inquires into your credit-bureau file may have negative consequences for you. The answer is yes. Credit grantors regard an inquiry from a company into your credit file without any evidence in your credit file that the company subsequently granted you credit as evidence that the company rejected you. To many credit grantors, three inquiries in a short period of time without any granting of credit indicates that your credit applications have been r ejected three times. That's enough for other companies to reject you. Most credit grantors - retail stores, banks, credit-card issuers, etc. - mindlessly follow the credit scorecard issued by Fair-Isaacs Co. According to the scorecard (which was published in Privacy Journal July 1994), two or three inquiries into your fil e result in plus five points on the scorecard; but four inquiries result in MINUS five points and five or six inquiries result in MINUS 16 points. You figure. About the only thing worse on their scorecard is getting two or more major derogatory credit r eferences. Robert Ellis Smith, Publisher Privacy Journal 401/274-7861 0005101719@mcimail.com ------------------------------ From: Scott.Nuchow@f120.n109.z1.fidonet.org (Scott Nuchow) Date: 18 Dec 94 04:08:56 -0500 Subject: Government vs. Citizen Organization: Fidonet: TIDMADT 703-765-0822 I was browsing through some forty odd messages dealing with DMV, caller ID, proposed federal legislation, etc. Perhaps it is because I am a neophyte at this, or maybe I am just plain cynical. But, my experience is that no matter what laws are passed, personal information will always become public, especially if it is the government that wants it. This problem is growing, especially as records and documents are fed into computers. Computers makes dissemination of of information easier and that spells problems, especially when hard copy, paper records are wrongfully obtained. I am an attorney and, when I represent defendants, I frequently ask or demand that the government turn over documents. Usually, nothing happens and the judges go along with the excuse that either such records do not exist or that the records are secret based on some type of privilege. I tried to obtain the psychiatric records of a complaining witness to prove the witness was schizophrenic. This would have been exculpatory and showed that the witness may not have witnessed anything other than that which was constructed through illness. I was not able to obtain the records because this was a civil case and the government does not have to turn over exculpatory information in non-criminal cases despite ethical rules stating that the government must act in the interests of justice. I took a plea. However, six months later, the government obtained the same records from St. Elizabeth's Hospital. The release of this information was quite illegal since the witness never gave permission. You expect to have privacy over computer lines? Hell will freeze over first. -- Fidonet: Scott Nuchow 1:109/120 Internet: Scott.Nuchow@f120.n109.z1.fidonet.org ------------------------------ From: jeffn@meaddata.com (Jeff Nye) Date: 19 Dec 1994 16:24:57 GMT Subject: Re: What to say to Junk Callers? Organization: Mead Data Central, Dayton OH Found what I needed at the Privacy Rights Clearinghouse, http://www.manymedia.com/prc/ . Here's an excerpt from their http://www.manymedia.com/prc/telemarket.html : o "Do not call" lists. The Federal Communications Commission requires telemarketers to take you off their list if you ask them to do so as enacted in the Telephone Consumer Protection Act (47 USC section 227). They must maintain "do not call" lists of all residences who do not want to be contacted. If you are called again after you have asked to be removed from a telemarketer's list, you can lodge a complaint with the Federal Communications Commission and/or file suit in small claims court. Nonprofit and tax-exempt organizations are not required to keep "do not call" lists. (For more details about "do not call" procedures, see 47 CFR Part 64.1200.) ------------------------------ From: pmacghee@motown.ge.com (Peter F. MacGhee, x 2266) Date: 19 Dec 1994 19:00:33 GMT Subject: Re: Americans say: Brand Us! Organization: Martin Marietta Corp, Moorestown NJ From vin@shore.net (Vin McLellan) CONSUMERS SUPPORT NATIONAL IDENTIFICATION SYSTEMS; EQUIFAX RELEASES 1994 CONSUMER PRIVACY SURVEY REPORT Sixty percent of consumers support establishment of a new national identification system to curb illegal aliens 60%??? Wow! Nobody asked me. Did anybody ask You? Do you want to be "Branded?" Not me, thanks! -- "Pete MacGhee Jr. pmacghee@motown.ge.com >> Extraordinary bright, witty comment goes here <<" ------------------------------ From: Ted Lemon Date: 19 Dec 1994 11:01:23 -0800 Subject: Moderation of Computer Privacy Digest The moderator stated: I am convinced that Mr Weckesser (or whoever is posting in his name) is just submitting these messages to taunt the unwary. He has not posted arguments that support his one-liners but just jabs with them. As moderator, not censor, I will post his material and hope that he will defend his points. Since he posts from compuserve I cannot 'finger' his account to verify his presence. I have always assumed that the moderator's job was to increase the signal-to-noise ratio of a mailing list or newsgroup by (a) filtering out flames, (b) combining duplications and (c) killing threads that are being beaten to death. While Mr. Weckesser is not being loud and obnoxious, his postings are essentially content-free, and thus would appear to qualify for exclusion under (a). There's always a risk that a moderator will, for personal reasons, take it upon him- or herself to edit out messages that should have been included. To mitigate this risk, I think that the raw feed for a mailing list should be available to interested parties. However, another risk is that a moderator will, in the interests of fairness, allow stuff through that really should have been edited out. I think you are to be complimented for your desire to be fair, but I hope the general reaction of this group is, like mine, that Chuck's postings should be edited out until such time as he starts saying something both interesting *and* informative. Either way, thanks for moderating - I know it's a lot of work. -- Ted Lemon Wells Fargo Bank, Information Protection Division mellon@ipd.wellsfargo.com +1 415 477 5045 [moderator: I received several valid criticism for posting Mr Weckesser's remarks and I take them to heart. I will modify my moderation to agree with the remarks above.] ------------------------------ From: "Prof. L. P. Levine" Date: 20 Dec 1994 09:31:32 -0600 Subject: PRIVACY Forum Status [not CPD] [This discusses the Privacy Forum Digest, not this, the Computer Privacy Digest. Lauren needs help and deserves it if you can get him the access he describes here. L. Levine, moderator CPD] PRIVACY Forum Status and Problems --------------------------------- 12/16/94 This message contains important information regarding the status of the PRIVACY Forum. I'm happy to continue the gratis offering of the growing amount of time and resources it takes to keep the PRIVACY Forum going, so long as I am able, since I consider it to be an important and worthwhile undertaking. However, I'm very sorry to report that external circumstances may force the termination of *all* PRIVACY Forum services (digest, ftp, gopher, WWW, etc.) in the *extremely* near future, due to the probable loss of the current network connection and lack of sufficient funds to obtain a replacement connection. I've been attempting to find a way to replace the necessary PPP or SLIP connection via locally accessible points here in the Los Angeles area, so far without success. If the situation does not change very shortly, I will post a message with the details. In the meantime, if you wish more information about this situation or have suggestions regarding available connection points or entities who might be interested in helping to sponsor the continued work of the Forum, please contact me directly by email. Thank you for your continuing support of the PRIVACY Forum. Lauren Weinstein PRIVACY Forum Moderator lauren@vortex.com ------------------------------ From: Simon Rogerson Date: 19 Dec 1994 11:37:29 +0000 (GMT) Subject: Conference ETHICOMP95 An international conference on the ethical issues of using Information Technology 28th, 29th and 30th March 1995 Queen's Building, De Montfort University Leicester UK Co-directors Simon Rogerson, Department of Information Systems,=20 De Montfort University Terrell Ward Bynum, Director Research Center on Computing and Society,=20 Southern Connecticut State University ------------------------------------------------------------------ The programme of events for ETHICOMP95 provides an excellent forum for stimulating debate on fundamental issues relating to the development and use of Information Technology and Information Systems. There will be an opportunity to consider approaches based on the different cultures and countries of both conference presenters and conference delegates. The three-day conference consists of three parallel themes. Each theme will comprise a series of papers and workshops. There will be three broad themes within the conference programme ETHICAL DEVELOPMENT ------------------- This is concerned with the use of development methodologies and the consideration of ethical dilemmas, user education and professionalism. ETHICAL TECHNOLOGY ------------------ This is concerned with the advances in technologies and the likely ethical issues they raise as they are applied to business and societal problems. ETHICAL APPLICATION ------------------- This is concerned with developing ethical strategies which allow technology to be exploited in an ethically acceptable way. CONFERENCE ATTRACTIONS INCLUDE ------------------------------ * Keynote presentations will be given by Professor William Maner, Bowling Green University, US Professor Maner has been a leading authority on Computer Ethics in US for over 25 years. He has produced many books and papers on the subject and has been prominent in establishing the subject as a mandatory element of Computer Science education accredited by ACM and IEEE. Mrs Elizabeth France, Data Protection Registrar, UK Before taking becoming Data Protection Registrar, Mrs France was head of the Home Office's Information and Pay Services Division. A member of the Committee for the Co-ordination of Computerisation in the Criminal Justice System and of the CCTA's Computers Committee Mrs France has extensive experience of national computing policy making. Professor Jacques Berleur, Namur, Belgium Professor Berleur was chairman of the IFIP task group which has produced the strategic report entitled "IFIP Framework for Ethics" and recently endorsed by IFIP. This work establishes an approach to addressing Computer ethics from a global perspective. * Presentation of refereed papers * Interactive workshops * Information stalls and interactive demonstrations * Bookstall with books and journals on Computer Ethics * Conference dinner at the prestigious location of Bosworth Hall KEY BENEFITS ------------ * An update of the current and future ethical dilemmas facing IS/IT * An opportunity to exchange ideas on ethical practices with colleagues from different work environments and cultures * Guidance on how to develop and implement more acceptable systems * Research-oriented and practically-oriented sessions providing a unique opportunity for knowledge dissemination WHO SHOULD ATTEND ----------------- Educators, researchers and practitioners in the field of IS/IT Decision makers in industry and commerce responsible for the application of IS/IT ACCOMMODATION ------------- Belmont House Hotel Telephone (+44) 533 544773 Fax (+44) 533 470804 Bed and breakfast daily rate double: 7=9C4 ponds, single: =9C63.5 pounds (state DMU rate) The Grand Hotel Telephone (+44) 533 555599 Fax (+44) 533 544736 Bed and breakfast daily rate double: 76 pounds, single: 58 pounds (state DMU rate) Stoneycroft Hotel Telephone (+44) 533 707605 Fax (+44) 533 706067 Bed and breakfast daily rate double: from =9C33 pounds, single: from 24 pounds It is recommended that accommodation is booked well in advance. Details are correct at time of going to press. FEES AND REGISTRATION --------------------- The conference fee of $375 (=9C250) includes conference proceedings, refreshments, lunches and the conference dinner. All conference fees must be paid in sterling by cheque or money order in advance. Registration paid in full on or before 15th February 1995 will receive a $25 discount. The fee will then be $350 (=9C235) Fees are inclusive of VAT To register please provide the following information and include a cheque or money order for the appropriate amount made payable to De Montfort Expertise. These should be sent to Sue Colledge ETHICOMP95 External Relations De Montfort University The Gateway Leicester LEI 9BH UK Tel: (+44) 533 577354 Fax: (+44) 533 577533 ----------------------------------------------------------------------- ETHICOMP95 28th, 29th and 30th March 1995 ---------- ------------------------------ BOOKING FORM ------------ Title First Name Surname Position Organisation Address Telephone Fax E-mail=20 Accommodation should be booked direct with the hotels. Joining Instructions will be issued approximately two weeks before the date of the conference. Cancelled bookings may incur a cancellation fee. If written notification of cancellation reaches us later than 10 days before the conference commences we reserve the right to charge the full fee. --------------------------------------------------------------------- ------------------------------ From: "Prof. L. P. Levine" Date: 28 Nov 1994 08:46:14 -0600 (CST) Subject: Info on CPD, (unchanged since 11/28/94) Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. This digest is a forum with information contributed via Internet eMail. Those who understand the technology also understand the ease of forgery in this very free medium. Statements, therefore, should be taken with a grain of salt and it should be clear that the actual contributor might not be the person whose email address is posted at the top. Any user who openly wishes to post anonymously should inform the moderator at the beginning of the posting. He will comply. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions generally are acknowledged within 24 hours of submission. An article is printed if it is relevant to the charter of the digest and is not redundant or insulting. If selected, it is printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the subject line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit or append to the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Mosaic users will find it at gopher://gopher.cs.uwm.edu. Older archives are also held at ftp.pica.army.mil [129.139.160.133]. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Mosaic: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V5 #075 ****************************** .