Date: Fri, 17 Mar 95 17:45:01 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V6#027 Computer Privacy Digest Fri, 17 Mar 95 Volume 6 : Issue: 027 Today's Topics: Moderator: Leonard P. Levine Re: Net Rape Re: SSN Question Re: SSN Question Re: SSN Question Re: SSN Question Private Medical Records Available Online in Mass. Can My Neighbor Peruse My Medical Records? Re: Proving your Citizenship Re: Proving your Citizenship Privacy Subscription Lists E-Mail Privacy Cases Company Policies on Internal E-Mail Re: Cordless Phones Re: Privacy Research How to Remove Your Name from Junk Mail Lists Need Information on Microchip Implants AT&T Encryption Alert #2: Fifth Conference on Computers, Freedom and Privacy Info on CPD [unchanged since 12/29/94] ---------------------------------------------------------------------- From: markg@shadow.net (Mark G.) Date: 11 Mar 1995 18:57:54 -0500 Subject: Re: Net Rape Organization: Shadow Information Services, Inc. Arthur Anderson (aca3@netaxs.com) wrote: For the most part, the InterNet has been a realm of free and friendly information exchange. Lately, however, things have been changing quite a bit. With all the hype regarding the information superhighway (AKA Infobahn), more and more opportunists are feeding upon the trusting nature of optimistic Net users. Writings and ideas are being stolen, and there's little that can be done about it without sacrificing the ideals of free communication. Just don't put on the net stuff that isn't already copyrighted. Problem solved. -- | The pen is mightier than the sword. 8*<%%%%%%%%%%%%|+>-================================----------- | But, the sword sure hurts a hell of a lot more. ------------------------------ From: cm5585@scitsc.wlv.ac.uk (J.Tench) Date: 12 Mar 1995 15:32:14 -0000 Subject: Re: SSN Question Organization: University of Wolverhampton, U.K. Is the USA Social Security Number, something akin to our (UK) National Insurance Number, if yes (or no really) what body of peoples ask to see it. If no, then what is it exactly. -- ~)~. ~)~ _ _ |_ || || ||\ || || || \\ // (_/ / /') / (' / ) (_ | ) || || ||\\|| || || )X( Wolverhampton Polyversity ||__| || || \|| \\_// // \\ E_MAIL cm5585@scitsc.wlv.ac.uk UNIX++ ------------------------------ From: gmcgath@condes.MV.COM (Gary McGath) Date: 12 Mar 1995 12:44:58 GMT Subject: Re: SSN Question Organization: Conceptual Design wmccarth@t4fsa-gw.den.mmc.com (Wil McCarthy) wrote: This requirement stems from the fact that publishers have to withold taxes from payments to an author if they pay him more than $600 in a year, and as of 1994 I believe they have to file a 1099-MISC on you for "information purposes" if they pay you anything at all. IRS has no repect for your privacy. That doesn't answer my question, though, of what the law requires them to do if they don't get an SSN. This is also of concern to me from the other end; I'm in a 501(c)(3) organization that has published a songbook and pays paltry royalties to contributors. It may be that we'll have to file a bunch of nuisance 1099's (though I seem to recall that payments less than $20 still don't have to be reported); and if any of the contributors don't provide SSN's, we might have to pay them under the table if the IRS in fact orders the voiding of contracts. But so far no one's cited a reg to that effect. But the way the government has crippled small organizations is another story, for another newsgroup. -- Gary McGath gmcgath@condes.mv.com PGP Fingerprint: 3E B3 62 C8 F8 9E E9 3A 67 E7 71 99 71 BD FA 29 ------------------------------ From: Barry Gold Date: 13 Mar 1995 23:44:22 GMT Subject: Re: SSN Question Organization: AT&T GIS (San Diego, CA) Gary McGath wrote: Recently a magazine sent me a set of writer's guidelines, which contained the following remarkable (to me, anyway) claim: "Please understand that, by law, we can not send payment for an article until we have your personal information including your social security number." Does anyone know if this is true? [snip] It's probably because the IRS wants to get a form 1099-R from the magazine, so they can track your income. It's part of the general tendency of the govt to use taxation as an excuse to intrude into more and more of our lives. Similarly with child support, the "war on drugs" and other supposedly beneficial purposes. Actually, I suspect they also couldn't *use* your article without the appropriate paperwork, just as an employer wouldn't be able to hire you without your SSN to they can file W-2s with the IRS. Once they print your article, I suspect they're contractually obligated, although you might have to take them to court to collect. -- Barry.Gold@SanDiego.NCR.COM ------------------------------ From: rthomas007@aol.com (RThomas007) Date: 16 Mar 1995 00:50:41 -0500 Subject: Re: SSN Question Organization: America Online, Inc. (1-800-827-6364) Gary McGath wrote: Recently a magazine sent me a set of writer's guidelines, which contained the following remarkable (to me, anyway) claim: "Please understand that, by law, we can not send payment for an article until we have your personal information including your social security number." Does anyone know if this is true? [snip] I believe it's true. As a business, I'm required to obtain either a federal tax ID or SSN number when making payment to vendors and such. ------------------------------ From: pmcvay@interramp.com Date: 12 Mar 95 09:51:58 PDT Subject: Private Medical Records Available Online in Mass. Organization: PSI Public Usenet Link This was excerpted from a copyrighted article in the Boston GLOBE, Tuesday, March 7 1995: "Mental Health professionals at Harvard Community Health Plan routinely put detailed psyciatric notes into patients' computerized medical records, making supposedly confidential information available to hundreds of physicians and staff members who work for the health maintenance organization. "The information includes not only mental health diagnoses -- depression or alcoholism, for instance -- but also the notes of individual psychiatric sessions, during which patients may disclose private and potentially embarrassing information...other HMOs plan to follow suit." The article is long, with several references to abuse of the system. For example, employees in a training class routinely called up the medical records of Paul Tsongas and Michael Dukakis, both prominent national political figures. The article does not state if the practice is done in other states. There have been followup articles since then about a flood of protests and demands that HCHP change its policy. I am bringing this to your attention for obvious reasons, and am posting it to many forums. ------------------------------ From: Harry Kingsmill Date: 17 Mar 95 08:43:45 EST Subject: Can My Neighbor Peruse My Medical Records? I've read with great interest the debates over Radio Shack, the IRS, U.S. crypto restrictions, and safeguarding of SS numbers. I was lead to the book "Privacy for Sale" through this newsgroup. My awareness of the privacy issue has gone from normal interest to deep concern. I hope my question doesn't come off as being too domestic for inclusion here. We have a neighbor who we have done our absolute best to avoid because she tends to be very snoopy and free with personal information that she has gathered on the other neighbors. As a result of our avoiding her, she has naturally taken a keen dislike for my wife and I. During the past year, this person has taken a part time job in the admissions department of our community hospital. Since then, other neighbors tell us that she has all of the "dirt" on anyone she knows who checks in to the hospital for any reason. She was apparently very proud of herself to report that the nephew of one of the neighbors had to spend time in the psychiatric ward after attempting suicide. I'm sure there's much that she's reported on that I don't know about (thankfully). My questions are: 1) With my insurance info on file at that hospital, how safe are my family's medical records from this woman? 2) How can she be stopped from wreaking further damage to the community? We can refuse to cooperate with Radio Shack, but we must, out of necessity, cut open a veritable artery of information for doctors and hospitals. There's alway been concern regarding commercial and bureaucratic misuse/abuse of that information, but a nosy and mean spirited person can do as much - if not more - damage. Thanks for being here. ======================================================================= Harry Kingsmill Lockheed Martin Corp. Moorestown, NJ - LockMart - One stop shopping for all of your national defense needs! ======================================================================== ------------------------------ From: stanley@skyking.OCE.ORST.EDU (John Stanley) Date: 12 Mar 1995 21:11:56 GMT Subject: Re: Proving your Citizenship Organization: Coastal Imaging Lab, Oregon State University Kareem Hinedi wrote: Dominic-Luc Webb (dominic@enk.ks.se) wrote: The problem here is the number of Americans, especially younger ones who, like me had a .... Please explain how you cannot prove you are a US citizen ? There are millions of Americans who cannot prove US citizenship. They were born in Canada, Mexico, Chile, Brazil ... In fact, any {North|South} American country that wasn't the USA. ------------------------------ From: robert.heuman@rose.com (robert heuman) Date: 13 Mar 1995 03:33:39 GMT Subject: Re: Proving your Citizenship Organization: Rose Media Inc, Toronto, Ontario. dominic@enk.ks.se (Dominic-Luc Webb) wrote: The problem here is the number of Americans, especially younger ones who, like me had a terrible time trying to prove legitimate citizenship, who must wait many years to get a job because of the requirement to prove citizenship. Is the same thing going to happen with this. There are a lot of Americans who simply cannot prove citizenship. And what of Americans who live outside the US? Where do they go for these new SS cards? Who notifies them? -- My opinions are my own! They are NOT those of my [sons, employer....] ====================================================================== R.S. (Bob) Heuman | Willowdale, Ontario, Canada RoseReader 2.52 P001886 Entered at [ROSE] RoseMail 2.60 : RoseNet<=>Usenet Gateway : Rose Media 416-733-2285 ------------------------------ From: Ronald Dietz <74315.1546@CompuServe.COM> Date: 14 Mar 1995 04:10:28 GMT Subject: Privacy Subscription Lists Organization: via CompuServe Information Service I have been using the Internet for Email purposes at work for years, but I am fairly new to usnet newsgroups. I have a privacy related question. Who or where or how, as the case may be, is the suscriber list to the various newsgroups maintained? Is there a keeper of the list(s)? Is it private or not? Are ones activities or participation in a news group monitored/recorded by anyone? -- Ron 74315,1546@compuserve.com [moderator: This list is held at UWM by the moderator in a well protected private space. It is never posted and never shared. My understanding from other moderators is that the security varies from list to list. Other privacy oriented groups have attitudes very similar to those used here. l. p. levine] ------------------------------ From: LArnoldi@aol.com Date: 14 Mar 1995 11:27:40 -0500 Subject: E-Mail Privacy Cases Does anyone have current information on Flanagan v. Epson America and Bourke v. Nissan Motors? Both are cased filed in California regarding employer's monitoring their employee's e-mail. Any ideas on how I can get information on other cases similar to this? Thanks in advance. -- Linda ------------------------------ From: mo_white@ix.netcom.com (Maureen White) Date: 16 Mar 1995 15:30:51 GMT Subject: Company Policies on Internal E-Mail Organization: Netcom I am trying to obtain information on the various policies issued by companies regarding internal electronic mail. We recently installed LOTUS Notes and are using the electronic mail facility as a standard. Specifically... Should all internal electronic mail be encrypted? Does the encryption create server overhead which may impair service levels? Is internal electronic mail private or does a company have the right to monitor and censor contents? (Any reference to successful lawsuits?) Any company policies/code of ethics regarding 'politically correct' use of electronic mail? Thanks for any help. ------------------------------ From: Andrew Grosso Date: 11 Mar 1995 18:33:38 -0500 Subject: Re: Cordless Phones It is legal to use encryption on any converstation, and it is legal to use encryption on a cordless phone. The problem which I see, as a former prosecutor, is in the enforcement of the recent changes to the law which make it a crime to intercept a non-encrypted conversation transmitted between the handset and transmission unit. It is pholosophically desireable to have privacy at this stage; it is technologically unfeasible and it for that reason impractical to enforce by law. My opinion in 1986 (when this amendment was first proposed and rejected) was that anyone who used a cordless phone had made a conscious decision to trade privacy for convenience, and thus waived any legal protection he or she might expect as to the privacy of his or her conversation. This differs from the "Clipper" controversy, which would (as a practical matter) require everyone to use a single encryption algorithm whenever one wants to encrypt a conversation. Conveniently, the algorithm is ones whose keys are held by the government. This is an extraordinarily sad proposal. Between Clipper, and Digital Telephony (now law), and FinCEN, and other proposals, we are slowly but definitely constructing a universal surveil- lance platform. I am sorry, but no matter how worthy the goals of law enforcement and national security, they are not worth turning this great nation, and the world along with it, into the living embodiment of 1984. When are we going to heed the wake up calls? ------------------------------ From: Jeff Smith Date: 17 Mar 95 11:45:21 CST Subject: Re: Privacy Research I am doing a research paper on information systems and technology in the workplace, focusing on the ethical use of systems and technology. I want to gather responses to a few questions: 1. Should information systems monitor employees? 2. Do employees have a right to privacy in their use of business technology and systems? 1. No--they should monitor results, and work in process The real issue is, should managers monitor employees. IT doesn't monitor anything--it is merely a tool. Do the firm's managers monitor employees' work or not? This is a management policy issue. Generally, the best work is done by empowered employees who own the process. Managers should focus on external issues to their area of responsibility. If they can't trust the employees to do their jobs, then they need new employees. 2. No. The employees do not own the phone system, email, or any of the business's resources. The business may allow some personal use of these items as a professional courtesy, but that is entirely at the business's discretion. Certainly any email or voice mail communication that uses company equipment is subject to inspection. -- Jeff Smith ------------------------------ From: rjgilli@clipper.ssb.com (Robert Gillis) Date: 13 Mar 1995 20:08:56 GMT Subject: How to Remove Your Name from Junk Mail Lists Organization: State Street Hello Everyone, I received a ton of junk mail -- some interesting, some not, and some very offensive. I understand all the ways that my name gets on the mailing lists -- my question is how do I get my name removed from these lists? -- Bobby [moderator: we now have such information in our z-library directory. CPD maintains this as a part of a library of back issues on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Mosaic users will find it at gopher://gopher.cs.uwm.edu.] ------------------------------ From: obie602@aol.com (Obie 602) Date: 14 Mar 1995 18:09:54 -0500 Subject: Need Information on Microchip Implants Organization: America Online, Inc. (1-800-827-6364) I do not really know who to ask about this, but I have heard rumors about the use of microchip transmitters in animals to track their where abouts. I am told that there a product called KIDSCAN that has been developed to be placed into children to prevent kiddnapping and so on. Have you heard anything about this and can you suggest where I might go for more information? ------------------------------ From: jwarren@well.sf.ca.us (Jim Warren) Date: 15 Mar 1995 22:03:48 +0800 Subject: AT&T Encryption taken from a friend, who spotted this in Electronic Design, March 6, 1995, pages 39-40. The product is called the VM06868, and is made by VLSI Technologies for AT&T. It uses Diffie-Hellman key exchange to exchange a 1024 bit key, then generates a DES key for each session. Intended application is cable TV decoder boxes, but it's not limited to that. Contacts are AT&T Secure Communications Development 508-691-3052, attn Mike Powers VLSI Technologies 602-752-6418, attn Neil Shea Wave Systems Corp 212-755-3282 So maybe we can get hardwired privacy from the teevee scramblers that govt fears we will get from software. -- jim ------------------------------ From: ceh@leland.Stanford.EDU (Carey Heckman) Date: 13 Mar 1995 00:35:07 -0800 Subject: Alert #2: Fifth Conference on Computers, Freedom and Privacy Organization: Stanford University, CA 94305, USA * WHO'S CFP? * SPEAKER SPOTLIGHT * BIRDS OF A FEATHER SESSIONS * A MACHINE ROOM * TUTORIALS * REGISTRATION DEADLINE: MARCH 14 * CONNECTING TO CFP'95 * WHO'S CFP? Do you belong at the Fifth Conference on Computers, Freedom and Privacy (CFP'95) which takes place March 28-31, 1995 in Burlingame, California? You do if you are concerned about the definition of rights, and the processes by which they are being defined, now that computer and telecommunications technologies have become part of mainstream living, conversation, and politics. CFP'95 participants will include people from the fields of computer science, business, public policy, government, law enforcement, research, information, health, law, civil liberties, library science, education, social science, and many others. Among the early registrants: The president of an East Coast software developer, a Canadian government official, a former general counsel of IBM, a computer science professor from MIT, a high school history teacher, an attorney from Italy, a partner from a major Silicon Valley law firm, an anthropologist, the CEO of a British software company, and an exchange student from Russia. CFP'95 offers a much-needed neutral ground, a demilitarized zone, where people from widely different backgrounds and positions can learn from each other. Like past Computers, Freedom and Privacy conferences, CFP'95 will be a place where information industry executives talk to concerned end users, law enforcement officials talk to civil rights advocates, information systems managers talk to legal and security experts. and more. This interaction, and the mutual understanding it promotes, will shape the future. SPEAKER SPOTLIGHT Gain new insights from the different perspectives offered by the CFP'95 speakers, as well as the participants. A business viewpoint will come from keynote speaker John Morgridge, chairman of Cisco Systems. Social implications will be assessed by Roger Wilkins a Pulitzer Prize-winning commentator for National Public Radio and Professor of History and American Culture at George Mason University. New ways of thinking about property rights in the computer and computer communications world will be offered by Margaret Jane Radin, a Stanford Law School professor and expert on property law and political philosophy. Computers, freedom, and privacy in the big emerging markets of Eastern Europe and the former Soviet Union will be analyzed by Esther Dyson, a recognized expert on that region's computer industry and co-chair of the National Information Infrastructure Advisory Council's Information Privacy and Intellectual Property Subcommittee. Reflecting a similar diversity is the list of speakers in the main program added since the publication of the conference brochure. These additional speakers include: * Scott Charney (Chief, Computer Crime Unit, Department of Justice): * Mark Traphagen (Software Publishers Association) * Francis Preston (President and CEO, Broadcast Music, Incorporated (BMI)) * Terry Southwick (Attorney-Advisor, US Patent and Trademark Office) * Gary Sikorski (former U.S. Congressman; West Publishing representative) * Stephen Walker (Trusted Information Systems) * Barbara Clements (National Elementary and Secondary Education Data and Information Systems Project) * Kenneth Rosenblatt (Assistant District Attorney, Santa Clara County) * Tim May (Independent Investor and Consultant, Cypherpunks co-founder) * Michael Stern (VP Business Affairs and General Counsel, General Magic) * David Chaum (DigiCash bv) * Don Ingraham (Deputy District Attorney, Alameda County) * Yale Braunstein (U.C. Berkeley School of Library and Information Science) * Janlori Goldman (Deputy Director, Center for Democracy and Technology) BIRDS OF A FEATHER SESSIONS CFP'95 during the day will bring together people with different interests. The CFP'95 Birds of a Feather (BoF) sessions in the evenings will let participants explore their shared interests in greater detail. Currently slated BoFs will cover: * Cryptography Policy. Share your opinions with members of the National Academy of Sciences/National Research Council commission studying cryptography policy at Congress's request. The study began in October, 1994, and seeks broad input from CFP'95 attendees. * FCC and FTC Rules. Pending ISDN and caller ID regulation at the FCC, and proposed Federal Trade Commission rules for commercial transactions using telephones and modems will be the topics of this BoF, led by a Washington, D.C. communications attorney. * Law and Ethics. George Trubow, Director of the Center of Informatics Law and Professor of Law at the John Marshall Law School, is leading a BoF to generate reactions to Law and Ethics on the Nets (LEON), a project the Center is cosponsoring with the American Bar Association's Science/Technology Section. * Cyber Roots. Gary Marx of the University of Colorado will lead a general discussion on sociological and anthropological approaches to computers, freedom and privacy. * Governance and Sanctions. Ross Stapleton-Gray, formerly of the CIA and now director of TeleDiplomacy, Inc. will lead a "town meeting" BoF to determine what, if anything, can be done by the community as a form of creative and effective protest/response to anti-social behavior on the nets. * Electronic Cash. Privacy for electronic payments will be discussed in detail in a BoF let by the ACM's Myles Losch and a consultant to the MONDEX Electronic Purse Consortium. * Copyright and Media. This BoF will explore the balance between free speech, privacy, and copyright protection in the media. TUTORIALS The conference sessions and CFP'95 focus on the controversies. The tutorials held on March 28, the day before the formal conference opens, will help you get the most from CFP'95 by giving you the general background needed to discuss the issues of the day. Get the inside scoop on the new power players in Washington and how you can best play with them from Marc Rotenberg and David Banisar of the Electronic Privacy Information Center. Learn "Everything You Need To Know to Argue About Cryptography" from Matt Blaze, the AT&T researcher who discovered a fatal flaw in the Clipper chip. Understand "The Law of Fundamental Rights for Non- Lawyers" with the skillful guidance of Mike Godwin, EFF Staff Counsel. Confused by copyrights, patents, and trademarks? Lance Rose, an attorney and author of "Netlaw," will give you the grand tour of "Intellectual Property for the Information Age." Other tutorials will explore National ID card initiatives and digital activism. A game room that allows participants to explore concepts of anonymity, digital personas, and security threats will be hosted by Russell Brand, Senior Computer Scientist at Reasoning Systems, and friends. AT LAST, A MACHINE ROOM! For the first time in CFP history, an onsite Internet Room will be available to CFP'95 attendees throughout the conference to make it easier for everyone to voice and exchange their views and to keep in better touch with the rest of the world. The room will have five workstations, four configured with telnet capability and one with a web browser to view our conference pages. The equipment, net connection, and technical services are being provided by the generous efforts of: * Sunset Data & Distribution, which is providing a loan of Sun workstations. * John Mayes and Assoc. of Palo Alto, which is configuring the machines and providing technical services * TLGnet, a San Francisco-based Internet service provider, which is donating the connection and technical expertise. REGISTRATION DEADLINE: MARCH 14 Act now! Save 15% by registering for CFP'95 before Wednesday, March 15. You can do this by mail, phone, fax, or electronic mail. See the contact information below for how to get registration information. CONNECTING TO CFP'95 Registration and other information about CFP'95 is readily available from many sources: By WWW: URL=http://www-techlaw.stanford.edu/CFP95.html By Gopher: www-techlaw.stanford.edu By FTP: www-techlaw.stanford.edu By Email: Info.CFP95@forsythe.stanford.edu By Fax: (415) 548-0840 By Telephone: (415) 548-9673 ------------------------------ From: "Prof. L. P. Levine" Date: 29 Dec 1994 10:50:22 -0600 (CST) Subject: Info on CPD [unchanged since 12/29/94] Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. This digest is a forum with information contributed via Internet eMail. Those who understand the technology also understand the ease of forgery in this very free medium. Statements, therefore, should be taken with a grain of salt and it should be clear that the actual contributor might not be the person whose email address is posted at the top. Any user who openly wishes to post anonymously should inform the moderator at the beginning of the posting. He will comply. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions to CPD should be submitted, with appropriate, substantive SUBJECT: line, otherwise they may be ignored. They must be relevant, sound, in good taste, objective, cogent, coherent, concise, and nonrepetitious. Diversity is welcome, but not personal attacks. Do not include entire previous messages in responses to them. Include your name & legitimate Internet FROM: address, especially from .UUCP and .BITNET folks. Anonymized mail is not accepted. All contributions considered as personal comments; usual disclaimers apply. All reuses of CPD material should respect stated copyright notices, and should cite the sources explicitly; as a courtesy; publications using CPD material should obtain permission from the contributors. Contributions generally are acknowledged within 24 hours of submission. If selected, they are printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the SUBJECT: line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit or append to the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Mosaic users will find it at gopher://gopher.cs.uwm.edu. Older archives are also held at ftp.pica.army.mil [129.139.160.133]. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Mosaic: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V6 #027 ****************************** .