Date: Sun, 21 May 95 12:14:51 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V6#047 Computer Privacy Digest Sun, 21 May 95 Volume 6 : Issue: 047 Today's Topics: Moderator: Leonard P. Levine Re: Anonymity on Computer Privacy Digest Re: Anonymity on Computer Privacy Digest Re: Anonymity on Computer Privacy Digest Re: Anonymity on Computer Privacy Digest Re: Anonymity on Computer Privacy Digest Re: Anonymity on Computer Privacy Digest Policy Statement of Computer Privacy Digest CIBC and Royal Bank to do MONDEX Pilot Re: Medical Records Privacy Sending VISA Card Details Across the Net Washington Goings On Nautilus, PLEASE.... FCC Press Release regarding CNID Privacy? What Privacy? Info on CPD [unchanged since 12/29/94] ---------------------------------------------------------------------- From: "Dr. Tom Blinn, 603-881-0646" Date: Fri, 19 May 95 09:55:38 -0400 Subject: Re: Anonymity on Computer Privacy Digest [moderator: I allow people who wish to remain anonymous to request such and post the material over my own sig. I, however, do not allow postings sent openly from anonymizers (sp?). Should I change this policy?] In my opinion, no. You are the moderator, and as such, responsible to some degree for the content. If you can't verify where something is coming from there is no reason why you should post it in a moderated newsletter (unless that was your choice). There are plenty of unmoderated forums where people can post anything they like. The value of the content is often quite low. Basically, I don't think the current policy is broken, and I see no reason to "fix" it. -- Dr. Thomas P. Blinn, UNIX Software Group, Digital Equipment Corporation 110 Spit Brook Road, MS ZKO3-2/U20 Nashua, New Hampshire 03062-2698 Technology Partnership Engineering Phone: (603) 881-0646 Internet: tpb@zk3.dec.com Digital's Easynet: alpha::tpb ------------------------------ From: "Peter G. Neumann" Date: Fri, 19 May 95 8:40:02 PDT Subject: Re: Anonymity on Computer Privacy Digest Leonard, Your policy I allow people who wish to remain anonymous to request such and post the material over my own sig. I, however, do not allow postings sent openly from anonymizers. seems quite appropriate to me. Employees of governments and corporations may be under serious restraints that prevent them from speaking out, and posting anonymously makes it possible for them to say things that otherwise might never be said. However, there remains the problem that E-mail can easily be spoofed, and thus something that appears to come from an unquestionably reliable source could actually be a hoax. That risk exists whether or not the correspondent wishes to be anonymous, but you might be more willing to run something that appears to come from someone who has over the years demonstrated consistent veracity and responsibility. The bottom line is that moderators should judge all postings on merit and not on presumed authorship; sensitive topics require much greater thought on the part of the moderator, and I appreciate your efforts in that direction. ------------------------------ From: Date: Fri, 19 May 1995 10:05:48 -0600 Subject: Re: Anonymity on Computer Privacy Digest Organization: Netcom Dr. Levine, [moderator: I allow people who wish to remain anonymous to request such and post the material over my own sig. I, however, do not allow postings sent openly from anonymizers (sp?). Should I change this policy?] Yes. There's too much room for human error. For example, earlier this year I requested that you post one of my articles anonymously, and you erred and included my sig and email address. -- Eric De Mund ------------------------------ From: rj.mills@pti-us.com (Dick Mills) Date: Fri, 19 May 1995 13:39:42 -0400 Subject: Re: Anonymity on Computer Privacy Digest you wrote: [moderator: I allow people who wish to remain anonymous to request such and post the material over my own sig. I, however, do not allow postings sent openly from anonymizers (sp?). Should I change this policy?] No, please don't change it. It is hard enough already to judge if some postings are real or hoaxes. Small protection that it is, having non- anonymous return addresses is better than the alternate. -- Dick Mills rj.mills@pti-us.com Power Technologies, Inc. phone +1(518)395-5154 P.O. Box 1058 fax +1(518)346-2777 Schenectady, NY 12301-1058 ------------------------------ From: WELKER@a1.vsdec.nl.nuwc.navy.mil Date: Fri, 19 May 1995 15:41:32 -0400 (EDT) Subject: Re: Anonymity on Computer Privacy Digest [moderator: I allow people who wish to remain anonymous to request such and post the material over my own sig. I, however, do not allow postings sent openly from anonymizers (sp?). Should I change this policy?] It's your mailing list -- do what you feel is appropriate. Since you're asking for opinions, I'm inclined to suggest that you formulate a disclaimer for anonymous postings to the effect that you cannot be held responsible for them, and post it over any anonymous post. I have no idea how people such as the Church of Scientology would react, however (no slight intended). ------------------------------ From: shields@tembel.org (Michael Shields) Date: Sat, 20 May 95 22:28 GMT Subject: Re: Anonymity on Computer Privacy Digest Organization: Tembel's Hedonic Commune [moderator: I allow people who wish to remain anonymous to request such and post the material over my own sig. I, however, do not allow postings sent openly from anonymizers (sp?). Should I change this policy?] Even if you don't, it would be good to make the header information clearer, noting that you *can* be published anonymously, but not submit anonymously. -- Shields. ------------------------------ From: "Dennis G. Rears" Date: 19 May 95 17:08:47 EDT Subject: Policy Statement of Computer Privacy Digest [moderator: Dennis Rears was the originator of CPD. His response, modified only to update addresses to their present forms is posted below. The policy he posted is still the policy of the digest. The full policy has not been posted here for years so this is a good time to repeat it.] I originally instituted this policy when I started the CPD. The actual statement was c. Anonymous submissions are generally not accepted. Under certain conditions an exception will be made at the Moderator's discretion. The thinking was that anonymous posting would only be allowed if it could negatively affect the author. Anonymity and privacy are closely related issues but not the same issue. Policy on Posting to the Computer Privacy Digest. Revision History: Revision 1.0 27 May 1992 Revision 1.1 24 April 1993 Revision 2.0 21 May 1995 Introduction: The Computer Privacy Digest is an electronic digest dedicated to the discussion of how technology affects privacy. The digest is burst into separate articles and fed into the USENET newsgroup comp.society.privacy. The newsgroup and digest are different forms of the same forum. Discussions should be centered around the following topics: o Technology - What devices are out there now and are on the drawing boards that will enhance or take away privacy from individuals and entities. o Ramifications - What are the ramifications are current and new technology. o Public Policy - What should public policy be in regulating, not regulating, and/or using the technology. Privacy includes the right of the individual/entitity to privacy against other individuals, entities, businesses, and the various forms of government. o Education - This kind of goes with ramification. One of the functions of this forum should be to educate people on how current technology affect their privacy. This can range from corporate data bases to credit card usage. 1. Submissions: a. All submissions should be emailed to comp-privacy@uwm.edu or posted to the comp.society.privacy newsgroup. Only submissions that are relevant to the charter of the forum will be published. Please keep text to under 76 characters per line. Personal attacks, excess flamage, or libelous postings will not be published. b. Submissions should not be sent to comp-privacy-request@uwm.edu. This address is for drop/add requests, administrative changes, and confidential requests to the moderator. Those submissions sent to that address will only be published if explicit permission is granted to publish by the poster. c. Anonymous submissions are generally no accepted. Under certain conditions an exception will be made at the Moderator's discretion. 2. Copyright Issues a. It is assumed that the copyright on material submitted to the CPD will remain with the author. In the case where the author is the submitter, it is assumed that the author explicitely grants (by the act of submitting the material) permission for the material to be published in the CPD, to be posted to the USENET group comp.society.privacy, and to any archiving of either medium. b. When the submitter is not the owner of the copyright, only those submissions which carry a notice from the submitter that the permission of the copyright holder has been obtained will be accepted. This does not apply to limited inclusions of copyrighted material that meet the fair use criteria. 3. Signal to Noise Ratio: It is my desire to keep a high signal to noise ratio. As a result a particular posting may not be published or a subject thread might be terminated when postings start to fail to shed new insight into the subject. I welcome submissions on new topics and encourage them. The quality of the digest is up the readers and posters. 4. Long Articles Articles between 10 - 50Kbytes will be split into chunks not longer than 20K and be placed in separate digests. Articles longer than 50K will be announced and be made available via FTP. For people without ftp access I will mail copies upon request. 5. Computer Privacy Digest Archives Back issues are most easily available via gopher or Mosaic using the command: 'gopher gopher.cs.uwm.edu' or 'Mosaic gopher://gopher.cs.uwm.edu' Standard commands apply. Back issues are also available via anonymous ftp: 'ftp ftp.cs.uwm.edu' ftp.cs.uwm.edu = (129.89.9.18). Come in and look around. With any of the above, move to the comp-privacy directory. In addition to a 'z-library' subdirectory there are subdirectories named 'volume1' through the current volume that you are free to examine and copy from. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Mosaic: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ From: WELKER@a1.vsdec.nl.nuwc.navy.mil Date: Fri, 19 May 1995 15:55:58 -0400 (EDT) Subject: CIBC and Royal Bank to do MONDEX Pilot The cards would have no PIN or other password and if they were lost or stolen the user would be out of pocket unless it was returned to the bank. A pity -- such a security feature could be a major selling point for this technology, since no one would steal your card if they couldn't use it themselves. The capability to report a card stolen by serial number and have it denied would also seem to be desirable. In the absence of such features, I presume the cards will have some limit on how much they can carry -- how much? Is this one likely to take off? The bank representative I spoke with seemed quite up front about the idea of it being a cost saving measure for the banks(an attempt to reduce the use of cash in ATMs) as a well as one that would let them charge new fees to the users and merchants. Fascinating, since ATMs already represent a cost savings to the bank over tellers, and they get to charge you for them anyway. With the proliferation of debit and credit card technology this seems like a specialty item. I've heard enough about ATM and credit card account disputes to wonder about how easy it would be to dispute this if the merchants deducted more from the card than they should. They can't deduct more than is on the card, and I suspect (above) that this is a pretty finite limit. Your statement about ATM/phone recharge implies that the value of the card is maintained at a central bank computer vice being encoded on the card -- making this really just an "anonymous debit card". If true, this would imply that charges could be disputed and "rolled back". What'd be really neat is if the government would issue something like this as an alternative form of currency! I'm not sure that users would rather pay for the privilege of using this kind of card, or than enough businesses would get on board to make it fly. If it is cheaper for the businesses than credit cards (approx. five percent commission), then any business which currently takes credit cards would seem to have an incentive to participate. Users who have been through the credit buying "trap" would also probably like it, too. ------------------------------ From: alap@ac.dal.ca ( =?iso-8859-1?Q?Andr=E9?= La Prairie) Date: Fri, 19 May 1995 14:55:04 -0300 Subject: Re: Medical Records Privacy Please contact me if you know of anyone who has experienced a violation of their privacy because their medical records were on a computer in their health plan, doctor's office, hospital, or Medical Information Bureau. You can reach me at cprma@aol.com or by calling 617-433-0114 The Coalition of Patient Rights of Massachusetts. I do not have a case of computer record invasion, as you requested, but Nova Scotia has had a recent case where the psychiatrist offered information on a one of his patients who had brought sexual assault charges against a law student. The outcome of this action has been a review of the law and rights of patients. Perhaps if you contact the Psychiatry Association here in Halifax they may be able to tell you if they have addressed your question. -- Andre ------------------------------ From: udap251@kcl.ac.uk Date: Fri, 19 May 1995 19:13:02 GMT Subject: Sending VISA Card Details Across the Net Organization: King's College London Recently I've seen several suppliers saying something like "as the internet is not a secure network, you may not wish to post your credit card details across the net" Is this caution necessary? After all, in order to use a credit card down the phone one has to give one's card details to a total stranger, and we all do that (don't we?) My understanding is that unless the supplier can produce your signature on an order or card foil, then it's him that's taking a chance on not being paid should the order turn out to be a spoof. The worst I can think of is that some insane hacker could intercept your card details and then order you something unwanted. But since there's nothing vaguely resembling any legal proof that you authorized the transaction, surely when you protest it's the supplier who'd lose out, not the cardholder. Anyone got further insights? -- Nigel Arnot NRA@MAXWELL.PH.KCL.AC.UK ------------------------------ From: "Prof. L. P. Levine" Date: Fri, 19 May 1995 16:04:17 -0500 (CDT) Subject: Washington Goings On Organization: University of Wisconsin-Milwaukee The Telecom Post just bounced against my electronic door and contains the following: The Telecom Post will be published weekly while the U.S. Congress reconfigures our telecommunication reality. It is posted to a number of lists and is also available from the CPSR listserv. To subscribe send to LISTSERV@CPSR.ORG with the message SUBSCRIBE TELECOM-POST YOUR NAME. [...] Privacy The much publicized Exon Amendment is still under the knife. Sen. Patrick Leahy (D-VT) has introduced S.714, the Child Protection, User Empowerment, and Free Expression in Interactive Media Study measure. The Department of Justice claims that the Exon approach will actually hamstring their attempts to enforce child pornography and obscenity laws. Leahy's bill, on the other hand, encourages the development of technologies to enable the screening of unwanted material. It blocks, not censors, content without drawing boundaries around the First Amendment. [...] -- Leonard P. Levine e-mail levine@cs.uwm.edu Professor, Computer Science Office 1-414-229-5170 University of Wisconsin-Milwaukee Fax 1-414-229-6958 Box 784, Milwaukee, WI 53201 PGP Public Key: finger llevine@blatz.cs.uwm.edu ------------------------------ From: Tsled@aol.com Date: Fri, 19 May 1995 22:00:49 -0400 Subject: Nautilus, PLEASE.... About a week and a half ago I read an article about a program called NAUTILUS. I am trying to find where it can be found, can you help me P-L-E-A-S-E !!! I thank you ahead of time for your help in this matter. -- Tsled@aol.com ------------------------------ From: "Prof. L. P. Levine" Date: Sat, 20 May 1995 07:56:03 -0500 (CDT) Subject: FCC Press Release regarding CNID Organization: University of Wisconsin-Milwaukee This is an excellent review of the current status of National CallerID. It was taken from PRIVACY Forum Digest Friday, 19 May 1995 Volume 04 : Issue 11 Moderated by Lauren Weinstein (lauren@vortex.com) Vortex Technology, Woodland Hills, CA, U.S.A. If you are interested in following this excellent board the material below would be of interest: Subscriptions are by an automatic "listserv" system; for subscription information, please send a message consisting of the word "help" (quotes not included) in the BODY of a message to: "privacy-request@vortex.com". Mailing list problems should be reported to "list-maint@vortex.com". From: lauren@vortex.com (Lauren Weinstein; PRIVACY Forum Moderator) Date: 11 May 95 19:36 PDT Subject: FCC Press Release regarding CNID Greetings. As you may recall from the previous digest, a new FCC order (the full text of which still doesn't seem to have appeared on their gopher) has enhanced privacy protection for callers relating to calling number ID systems, primarily through permitting the use of per-line ID blocking systems. It's particularly important that the Commission clearly addressed the important issue of ID unblocking (the new *82 code) and the issue of call-return. Below is the full text of the press release announcing this order. It is worth noting however, that litigation regarding this matter may continue. Some states are petitioning for reconsideration on the basis that the FCC didn't go far enough in providing protections to subscribers with non-published numbers (among other matters). Similarly, some major telcos are petitioning with the claim that the FCC went too far in the direction of privacy by allowing per-line ID blocking at all (not unexpected, since per-line ID blocking is a major blow to the desirability of CNID systems for marketing and other purposes). --Lauren-- ------------------------------- Report No. DC 95-71 ACTION IN DOCKET CASE May 4, 1995 FCC FINALIZES RULES FOR CALLER ID; ALLOWS PER LINE BLOCKING WHERE STATES PERMIT; PBX CALLER ID RULES PROPOSED (CC DOCKET 91-281) The Commission today voted to approve national Caller ID rules that will protect the privacy of the called and the calling party by mandating that carriers make available a free, simple and consistent, per call blocking and unblocking mechanism. Under the rules adopted today, callers dialing *67 before dialing a particular call will, for interstate calls, block calling party information for any interstate calls and those callers using a blocked line can unblock the line and release that information by dialing *82. The Order permits carriers to provide privacy on all calls dialed from a particular line, where state policies provide, and the customer selects, that option. Today's action came as the Commission reconsidered its original Caller ID nationwide Caller ID system is in the public interest. It found that passage of the calling party's number, or CPN, could benefit consumers by encouraging the introduction of new technologies and services to the public, enabling service providers and consumers to conduct transactions more efficiently. The rules adopted today will take effect December 1, 1995. Public pay phones and partylines will be required to be in compliance by January 1, 1997. The Commission also issued a rulemaking proposal concerning PBX and private payphone obligations under the Caller ID rules. In March 1994, the Commission adopted a Report and Order that concluded that a nationwide Caller ID system was in the public interest and stated that the potential benefits of a Caller ID system -- efficiency and productivity gains, infrastructure development and network utilization, and new service and employment opportunities -- would only be possible if CPN is passed among carrier networks. It noted two areas of concern however -- compensation issues related to passage of CPN for interstate calls and varying state requirements intended to protect the privacy rights of calling and called parties on interstate calls. In today's action the Commission affirmed its finding that common carriers, including Commercial Mobile Radio Service providers, with Signaling System 7 (SS7)call set up capability, must transport CPN without charge to interstate connecting carriers. The Commission clarified that carriers without SS7 call set upcapability do not have to upgrade their networks just to transport CPN to connecting carriers. The Commission noted that local exchange carriers are required to resell interstate access for Caller ID to other carriers wishing to compete for end-user business in this market. The Commission modified its previous decision that only per-call blocking would be allowed. Today's action permits per-line blocking for interstate calls instates where it is permitted for intrastate calls, provided the customer elects per line blocking. The Commission's original rules required a caller to dial *67 before each call in order to block the called party from knowing the caller's number. The Commission has now modified its rules to permit carriers to provide privacy on all calls dialed from a particular line, where state policies provide, and the customer selects, that option, provided carriers permit callers to unblock calls from that line by dialing *82. Where state policies do not require or permit at the customer's election per line blocking, carriers are bound by the federal privacy protection model to provide privacy only where *67 is dialed. The Commission noted that it continues to exempt calls to emergency lines from its rules; that is, a carrier's obligation to honor caller privacy requests to emergency numbers will be governed by state policies. As an additional privacy measure, the Commission requires that when a caller requests that the calling party number be concealed, a carrier may not reveal the name of the subscriber to that line and callers requesting that their number not be revealed should be able to block an automatic call return feature. The Commission continues to require that carriers with call set up capability that pass CPN or transmit Automatic Number Identification (ANI) educate customers regarding the passage and usage of this information. Finally, the Commission issued a Notice of Proposed Rulemaking proposing that Private Branch Exchange (PBX) systems and private payphones capable of delivering CPN to the public switched telephone network also be capable of delivering a privacy indicator when users dial *67 and be capable of unblocking the line by dialing *82. Action by the Commission May 4, 1995, by MO&O on Reconsideration, Second R&O and Third NPRM (FCC 95 - 187). Chairman Hundt, Commissioners Quello, Barrett, Ness and Chong. -FCC- News Media contact: Susan Lewis Sallet at (202) 418-1500. Common Carrier Bureau contacts: Marian Gordon at (202) 634-4215. ------------------------------ From: Peter Marshall Date: Fri, 19 May 1995 16:49:52 -0700 Subject: Privacy? What Privacy? Organization: Eskimo North (206) For-Ever The following is reposted, with permission of the author, from HIM-L, a mailing list for discussion of health information management issues. I felt that some people getting bent out of shape over some pretty minor points needed some shock treatment about where the real privacy issues lie. Note that the auto insurance talked about is compulsory in many places. -- Dick St.Peters, Gatekeeper, Pearly Gateway, Ballston Spa, NY stpeters@NetHeaven.com Owner/operator, NetHeaven 1-800-910-6671 PPP/SLIP for Albany, Schenectady, Troy, and (coming in June) Glens Falls. Visit the Internet Conference Calendar http://calendar.com/conferences ______________________________________________________________________ From: AGENTLE@aol.com Sender: him-l@fiona.umsmed.edu To: stpeters@netheaven.com Subject: Confidentiality/Pertinent Record Date: Thu, 18 May 95 13:19:58 -0500 Recently, there have been e-mail exchanges regarding release of pertinent medical records only, for processing of medical bills. Let me share with you some insights that I thought perhaps everyone was aware of, that might benefit HIM-L subscribers personally and professionally. Most people apparently are not aware that auto insurors, who are, by the way, some of the worst manipulators and exploiters of medical records, have, by contract, access to all, that is ALL, of their insureds' medical files. I suggest everyone who is an HIM-L subscriber pull out your auto insurance policies tonight, and read ALL of the fine print. What virtually every car insurance policy in this nation states, is: YOU (insured) agree to provide any and all medical records requested, in case of an auto accident). This does not mean all pertinent records, it means, everything they ask for. So if a reckless driver hits you, and injures you, and the insurors demand to see a list of the name and current mailing address of every doctor, hospital, psychologist, rehab, and clinic you ever attended since age two years old, and access to each and every chart and every page of their files, you have to do it. YOU are under contract to provide it, because you agreed to release everything the day you signed up for auto insurance! This, of course, means they can pull every skeleton out of your closet, use your personal problems, as a weapon against you, ridicule each and every word you ever uttered to a doctor, and every physical or personal problem documented, to attack you with. Since, if you allege an injury, your entire history becomes the issue. As I found last year, there is no such thing as a partial release. There is no such thing as 'I agree to provide all pertinent medical data'. they can sue you for failure to produce all your records, if they so choose, if you don't spill all the beans. You are under contract to allow them access to every word of your history. If they demand them, by God, you have to provide them. End of discussion. Very few people read the fine print in the auto insuror files, but I suggest you all do. You will be amazed. What folks also do not understand, until they get injured in a wreck is, every word you ever said to any doctor or clinic, anywhere, can and will be used against you to evade a claim. Auto insurors commonly reject injury claims, if they find any sort of prior personal or physical problem, in your entire history, forcing the insured to sue; then the fun starts. Their lawyers get to read your entire history out loud in court, each and every word of it, relishing the excitement of unveiling and mocking your personal life in public. Again, I suggest everyone in America, particularly medical information managers, read their car insurance policies, and think about having your personal comments to doctors read aloud somewhere, and used against you. It happens all the time. Maybe not to you. But it could. I was just telling a friend of mine her case was totally a fluke, and could never happen again, when I was hit by a reckless driver last year, and I went thru the same exact witch hunt. I have spent the last year writing Insurance Commissioners, lawyers, AMA, APA, medical ethicists, health care providers, medical records experts, judges, rehabs, all across this nation about this matter, all the way to Janet Reno, attorney general of the US, and everyone told me the same thing. By contract, insurors have a right to do what they do, and there is nothing the public can do to prevent them from accumulating, manipulating, and exploiting medical records in any way they see fit. I just thought you all might benefit from my friend's and my experience. People have a right to know how things work. -- Agentle@aol.com ------------------------------ From: "Prof. L. P. Levine" Date: Thu, 29 Dec 1994 10:50:22 -0600 (CST) Subject: Info on CPD [unchanged since 12/29/94] Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. This digest is a forum with information contributed via Internet eMail. Those who understand the technology also understand the ease of forgery in this very free medium. Statements, therefore, should be taken with a grain of salt and it should be clear that the actual contributor might not be the person whose email address is posted at the top. Any user who openly wishes to post anonymously should inform the moderator at the beginning of the posting. He will comply. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions to CPD should be submitted, with appropriate, substantive SUBJECT: line, otherwise they may be ignored. They must be relevant, sound, in good taste, objective, cogent, coherent, concise, and nonrepetitious. Diversity is welcome, but not personal attacks. Do not include entire previous messages in responses to them. Include your name & legitimate Internet FROM: address, especially from .UUCP and .BITNET folks. Anonymized mail is not accepted. All contributions considered as personal comments; usual disclaimers apply. All reuses of CPD material should respect stated copyright notices, and should cite the sources explicitly; as a courtesy; publications using CPD material should obtain permission from the contributors. Contributions generally are acknowledged within 24 hours of submission. If selected, they are printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the SUBJECT: line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit or append to the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Mosaic users will find it at gopher://gopher.cs.uwm.edu. Older archives are also held at ftp.pica.army.mil [129.139.160.133]. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Mosaic: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V6 #047 ****************************** .