Date: Sun, 23 Jul 95 09:04:05 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V7#006 Computer Privacy Digest Sun, 23 Jul 95 Volume 7 : Issue: 006 Today's Topics: Moderator: Leonard P. Levine BC Telephone Co. Publishes Another Unlisted Home address CPSR links Toyr-R-Us Phone Number Request Re: Social Security Number Abuse by Employer No Second Chance Digital Detective Reveals His Methods? Re: Windows 95 Registration Wizard The Dark Side in Washington State [long] Info on CPD [unchanged since 12/29/94] ---------------------------------------------------------------------- From: bo774@freenet.carleton.ca (Kelly Bert Manning) Date: 20 Jul 1995 05:43:28 GMT Subject: BC Telephone Co. Publishes Another Unlisted Home address Organization: The National Capital FreeNet, Ottawa, Ontario, Canada Vancouver TV stations aired a story of a woman forced to move to a transistion house today after BC Tel published her home address. She had called BC Tel 4 times before the new directory came out to confirm that the address would not be published. BC Tel claimed to need to have the home address "for billing" and had promised to just list a PO box number. This seems to be a chronic sort of screw up at BC Tel. A while back a womens's shelter had to close down after BC Tel negligently published the address. Abusive former partners started showing up immediately. Nobody at BC Tel has explained how they could repeat an error that created such widespread bad press the last time around. BC Tel has done a very poor job of informing customers of their free option to just list the name and number, with no address, as a cheap alternative to having a non-published number. This also applies to their $1 a pop dial up directory service, which supplies exactly the information that would appear in the next directory, and presumably in the CD-ROM published by Dominion Directory. BC Tel's initial response after the angry woman contacted them was to offer a $20 gift certificate. After being contacted by news reporters BC Tel spokeswoman Michelle Gagon seemed to be offering to help with relocation expenses. ------------------------------ From: cpsr-global@Sunnyside.COM Date: 20 Jul 1995 01:15:20 -0700 Subject: CPSR links Taken from CPSR-GLOBAL Digest 201 From: marsha-w@uiuc.edu (Marsha Woodbury) Date: 19 Jul 1995 09:39:19 -0600 Subject: CPSR links To the CPSR Newsletter editors: You may wish to note in the next edition of the CPSR Newsletter re. information and privacy that the Office of the Information and Privacy Commissioner of British Columbia has a new World-Wide Web (WWW) page. Please see my signature block below for our WWW address. Our home page contains a copy of the British Columbia Freedom of Information and Protection of Privacy Act, plus hyper-text links to the Information and Privacy Commissioner's orders, and related documents. If you have any questions about our home page or the Office of the Information and Privacy Commissioner of B.C., please call me at 604-387-0312. Thank you. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ R. Kyle Friesen Portfolio Officer Office of the Information and Privacy Commissioner of British Columbia 4th floor, 1675 Douglas Street Victoria, British Columbia Canada V8V 1X4 tel. (604) 387-0312 / fax. (604) 387-1696 Internet: kfriesen@galaxy.gov.bc.ca World-Wide Web site: http://www.cafe.net/gvc/foi +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ------------------------------ From: WELKER@a1.vsdec.nl.nuwc.navy.mil Date: 21 Jul 1995 09:02:00 -0400 (EDT) Subject: Toyr-R-Us Phone Number Request Anybody out there shared the experience of having Toys-R-Us ask for your phone number before ringing up the sale, regardless of whether cash/check/charge? They say it's for market survey purposes. The clerk was quite surprised at the tone of voice in my refusal. You know, instead of just refusing to reveal our personal information whenever someone asks, since they value it so highly, why don't we ask for payment instead? This would provide an incentive for us to give them accurate info instead of lying (which we could do whenever no reward was offered -- and give them "accurate disinformation" so it'd be hard for them to tell it was bogus...) ------------------------------ From: wmcclatc@internext.com (Bill McClatchie) Date: 21 Jul 1995 10:12:37 -0400 Subject: Re: Social Security Number Abuse by Employer sarig@teleport.com (Scott Arighi) noted: Although not a legal point, I found that my bank would allow *anyone* with my checking account no. and my SS. no. to find out my bank balance -- which I view as a rather private matter. Now use a password on the account in addition to the numbers. In your case, it sounds like any merchant (or friend or not so friend :-)) receiving a check from you could call your employer, get your SS no. and find out your bank balance. This is kind of redundant since most people have their SSN's on the check already. ------------------------------ From: anonymous Date: 21 Jul 1995 13:20:21 -0500 Subject: No Second Chance [moderator: I have posted this with the user's name removed and his address replaced by mine.] Being a recovering alcoholic I was saddned to learn that I have been *branded* by the insurance industry for having elected to enter a drug rehab a few years ago. It seems their records show I have a pre-existing condition and therefore am a high-risk.This makes it most difficult to obtain insurance; and worse, any employer whom may provide insurance will be made aware of my past drinking and God knows what else.(they have detailed records of my 35 day hospital stay, I saw it) I could refuse the insurance and get my own ($$$$), which probobly won't happen.Or perhaps luck out and have a sympathetic boss. I've been transferred out of state so maybe each state is different, I hope. Sorry to ramble but I feel this is a privacy issue.If I should have posted to alt.drinking or something, sorry for that too. Rgds/Den ------------------------------ From: bo774@freenet.carleton.ca (Kelly Bert Manning) Date: 21 Jul 1995 19:25:46 GMT Subject: Digital Detective Reveals His Methods? Organization: The National Capital FreeNet, Ottawa, Ontario, Canada TELECOM Digest Editor (telecom@eecs.nwu.edu) writes: Readers will recall the comments here back in June about the 800 number which connected with the sex service. I have a followup on that and a request for assistance from readers in the New York City area. Integratel refused to remove any of the charges, and instead said I could write the client direct to ask for an adjustment. They refused to give me any phone number to reach the scumbags direct. Well, that's okay, I was able to track down a few things. Is this the same person who posted the Digital Detective thread many months ago? The former moderator of C.S.P identifed the originator of some such thread as the Telecom Digest Moderator, and added a comment suggesting that his intent was to raise awareness by being provactive. I've snipped text not directly related to privacy. While it is encouraging that his powers of information gathering don't seem quite up to the level of button pressing ease implied in the Digital Detective post, he obviously does know how to find out about people or companies and spells out how he would like someone in NY to do such searching for him. ------------------------------ From: Corey Leopold Date: 21 Jul 1995 20:20:38 GMT Subject: Re: Windows 95 Registration Wizard Organization: UT Health Science Center at San Antonio cpsr-global@Sunnyside.COM wrote: Note: Microsoft is coming under fire for releasing its new Windows software that "reads" the hard drive of the computer it is installed on. Windows '95 then sends the data from the PC back to the main Microsoft office. Here is Microsoft's version of what it is doing This is probably true of the Registration Wizard. The problem seems to be when logging into the Microsoft Network. -- Corey ------------------------------ From: "Neil A. Trilling" Date: 16 Jul 1995 21:52:50 -0500 (CDT) Subject: The Dark Side in Washington State [long] Long, but might be of interest to you. Some major privacy issues here. Neil A. Trilling Univ. of Wisconsin-Milwaukee P.O. Box 413 Milw. WI 53201 Center for Community Computing "Community is Our Middle Name" Internet: neil@csd.uwm.edu Telephone 414-229-4041 Interbit: neil%csd.uwm.edu@INTERBIT forwarded materials: From: Gordon Cook Date: 15 Jul 1995 01:10:39 -0400 To: Multiple recipients of list COMMUNET Subject: Nat. Info. Infrastructure: The Dark Side in Washington State National Information Infrastructure: The Dark Side in Washington State Big Brother Goes On Line - Web of Databases Woven Without Public Knowledge Could Determine Our Communications Future Introduction and Summary This report is the result of two weeks of interviews in Washington State in late May and early June. It shows a very dark picture of our coming technology "dystopia." The COOK Report finds that the state of Washington leads the rest of the nation in developing the building blocks of a statewide information infrastructure. What is being "leveraged" there is the Clinton -- Gore push for National Information Infrastructure (NII). NII is touted in commercials by AT&T and others as being kind of warm and friendly communications utopia. But the essence of NII is often in the eye of the beholder. In fact, there is no widely accepted definition of or goals for NII. Instead, it is one of those terms with a definition specific to whomever is talking about it at any given moment. In the state of Washington what is being constructed is not a service for video on demand; nor is it home shopping. It is a statewide web of state agency networks and inter linked databases. While other states have some NII related projects, we are not aware of any that have the number and scope of those in Washington. People with whom we talked generally agreed that the citizens of Washington are facing a situation where their privacy is fast disappearing and where the rights to information that they own and should effectively control are being sold out from under them. In the opinion of many to whom we talked, the situation is volatile and may become more so. Even George Lindamood, the outgoing Director of the Department of Information Services, acknowledged that when the citizens of the state understand the totality of what had happened to them, they will be angry. In order to bring a "competitive environment" to the citizens of the state, Washington State agencies are moving forward to implement new information technology programs. But this information technology is the new hucksterism of the second half of the '90s. With the Clinton Administration pushing it in the first half of the decade, officials from the various departments of state government are lined up at the federal table to make sure they get the technology grants that will make their agencies stand out at home. They are very likely perfectly well-intentioned civil servants - in a hurry to build now and ask questions later. Policy issues, the big picture, privacy and confidentiality concerns are given lip service, but usually put off as being to difficult to deal with now. As these are put off, the web of interconnected communications systems and databases grows and wraps more firmly in place around Washington State residents. There may be about a year to make meaningful changes before the average citizen is irretrievably caught in the emerging state data web. The only hope that we see is for citizen groups to coalesce, get educated and agree on the objectives for and definition of a state commission on citizen information rights -- one that has legal power to slow down the technocratic juggernaught -- until adequate legal safeguards to protect privacy can be put in place. The citizen's lobby must then sell these objectives to the legislature. If they don't succeed, Washington State may be neither comfortable nor a good place in which to live. It will be a combination of "Brave New World," "Blade Runner" and a digital Singapore transplanted to the Pacific northwest by a seemingly well-intentioned alliance between corporate and political technocratic elites. One agency that is part of this Washington State web has a database of at-risk four-year-olds that can be linked with databases of violent juveniles, drug use incidence, trade and economic activity. All this information can be mapped matched with census tract and other economic data through a Geographic Information System (GIS). A GIS Database allows many different kinds of information to be overlaid on maps of differing scales according to physical location. GIS was described to us by the Assistant Director of Administrative Services of Community, Trade and Economic Development (CTED), a relatively new state agency, as "the glue that holds all the other disparate information together". The CTED system is under construction. Someone has obviously decided there is a public purpose to be served in creating a database of at-risk four-year- olds and another of violent offenders. Missing from the Washington State scene is any widespread public understanding either that these and other data bases exist. Also absent is any reasonable means of challenge by the public to state agency use of them. For example, what if CTED were to decide that when a business had narrowed its choice to four potential locations, the final step towards maximum competitiveness for that business would be to show it the population density of at-risk four-year-olds and violent offenders in each of the sites? The business would surely choose to locate in an area with as few undesirables as possible. The potential of information technology to be used in building economic ghettos in Washington State is not generally known let alone an item on the public policy agenda. This report describes the all ensnaring data web that is being woven in Washington State. Since many of the programs being field tested in Washington are federally backed, what happens there is likely to spread to other states unless we understand what is happening and insist that it be stopped. The spinning of the data web begins in kindergarten -- or even earlier -- when parents are asked to supply their children's Social Security Numbers as identifiers. Goals 2000 and other school restructuring efforts have led to increased data collection about individual students. Educators want to know everything about today's students, even whether they arrive at school "ready to learn." With the help of national business groups and the well- intentioned but perhaps naive support of the Annenberg Foundation, Total Quality Management is the current Band-Aid being applied to a education system that policy makers with the study A Nation at Risk, in the early 1980s declared effectively "broken." Total Quality Management demands that all "relevant" data be gleaned and applied to the process at hand whether it involves manufacturing, or shaping our children's future. To this end, the educational bureaucrats within the US Department of Education have established a National Center for Education Statistics. The Center has come up with standards for state student record databases and over 500 questions for states and local school districts to choose from in constructing their own systems. Depending on how faithfully the states follow the federal model, what could easily become the student's life long dossier may start with questions like the date of the last dental exam and the condition of soft tissue inside the student's mouth! Indeed the federal student data handbooks contains fields for the phone number of the students email provider, whether the student is a registered voter and information about the student's post high school employment. If the student moves between states, a national system called SPEEDE/ExPRESS is being put into place to transfer his or her electronic record from one jurisdiction to another. If federal planners have their way, electronic tracking will continue throughout high school and from there into the student's employment. The product of this nationalized and homogenized school record system -- the graduate -- may ultimately submit electronic portfolios, including teacher evaluations, to area employers via WORKLINK, a national program developed by Educational Testing Service. Under the guise of making school more relevant to the world of work, employers with desirable jobs will be able to glean electronically, from among thousands of area graduates, the few with the cleanest records. Those who don't make the electronic cut may walk their paper records to the nearest McDonalds. The New Information Environment: Data Bases and Public- Private Partnerships As most politicians continue to stoke citizen anger against state and national government, citizen and legislative tax revolt initiatives have left government with inadequate revenues to do its job. As a result, an alliance of politicians and some corporations has formed to promote public -private partnerships. According to its critics, that alliance is simply profiting from the disenchantment the politicians have created . In 1993 the Washington State Legislature proposed such a partnership to improve the state's highways. Construction firms on a national level were invited to bid on highway improvements to be paid for by tolls -- euphemistically known as user fees. In part encouraged by a federal project calling for "smart highways" nationwide, the proposals include toll tokens tied to individual citizens and their vehicles. Electronic sensors will decrease the value of each token and, in so doing, provide "information of commercial value" to entities like auto insurance companies, the driver's employer and any others willing to purchase the citizen's private data. This purchasing of citizen's data is promoted as a new revenue source for government. Promoters say it will keep government from having to raise taxes. In 1993 the state legislature passed a law (which in the session just ended was largely gutted) guaranteeing health insurance to all Washington citizens. In yet another public-private partnership, the state undertook to create a statewide database to share patient treatment referrals and medical records among appropriate agencies and health care providers. Missing from the legislation were adequate protection of patient privacy and the right to correct medical records. Parts of the law were repealed this year, but plans for a statewide medical database continue. The Department of Information Services is the state agency that provides telecommunications and computing infrastructure for the remainder of state government. Under George Lindamood, who arrived as Director in February 1993 and departed June 1 1995, it branched out into its own money making activities. These included a statewide compressed video network, Internet training for other state agencies and a would-be statewide information kiosk program. The kiosks represented a public-private partnership between the state, IBM and North Communications. The heaviest use of them was by job seekers who could access new job openings posted through the State Division of Employment Security. The Department of Information Services (DIS) would like to see all state agencies using the kiosks to transact as much as possible of their day-to-day business with citizens. However, it is a pilot program. At the time of our visit there were only eleven kiosks in operation. The program got negative press reviews when it found that users of the employment database were asked to enter their social security numbers. Critics maintain DIS had no legal justification for requiring the numbers and did not comply with notification requirements in the federal Privacy Act when requesting them. The Politics of Divisiveness Politics in Washington State has taken a hard turn to the right. One example has been ESSB5466, an "anti-pornography bill," that did not become law this spring only because of the courageous veto of Governor Lowry. According to Al Huff, the Director of WEDnet, the Washington State K-12 network linked to the Internet, the bill would have effectively banned the Internet from Washington K-12 schools. Why? Because it would have made the system operators of digital networks liable for any "pornographic" material found on their systems. After the Governor's veto, the House agreed to eliminate depiction of breast feeding from the obscenity statute while the Senate came back with an exemption for the Internet. The House refused to accept the senate exemption of the Internet and the bill died at the end of the legislative session. This conclusion led one observer to conclude that such an extreme right-wing agenda was not to protect children from pornography but to censor the Internet. Since our return we have been told that the issue will surface again in the legislature next year. We have found no reason to believe that the web of connected databases will be used only by the state agencies and their immediate private partners. After all, these partners have come aboard expressly to market the end product to others. Policy makers had better ponder what wide spread use of the databases could lead to. Who will benefit from what they have done? The people or the power brokers? For what is at stake is not just a question of privacy but one of being able to use the information to manipulate people and events. Consider not only what full access to the database information could mean to large corporations, but also what it could do for any kind of extremist. Consider whether the current direction leads inevitably to the further empowerment of the already powerful? Does it give them superior information and knowledge? Taking information that should be private and making it publicly accessible cannot be condoned - no matter whether it be school records, health data or smart highway reports on our travels. It is also undeniable that aggregated information collected from the public by its government at local, state, and national levels belongs to the public. The public should always have access to that data at reasonable expense which may normally be defined as the incremental cost of distribution. If the general public is denied such access, the question emerges as to whether those in power should ever be allowed to engage in any form of State sanctioned economic discrimination, let alone a targeted program aimed directly against those citizens who not only unwittingly provided the raw data being used, but also ironically funded the discriminatory agencies. We have here a convergence of technology trends that can either empower individuals to affect positively their own lives and neighborhoods, or can disenfranchise them and leave them at the mercy of the powerful should they be able to monopolize the data used for decision making. It is this very volatile mix of the middle class - afraid and on the way down - that causes us to examine information infrastructure issues in Washington State against the backdrop of broader economic and social issues. Some members of Washington State government claim to be dealing with the policy issues. However, this study finds that the state's Public Information Access Policy (PIAP) task force has failed to educate the state's citizens about these issues. It is imperative that other's step in to the vacuum left by the task force. Backed by an informed media, citizen groups must come together, possibly under a state umbrella organization, such as a Washington State Electronic Frontier Foundation. Such an organization must undertake a serious public education campaign about the privacy and social control implications of the Washington State plans, both those already activated and those proposed. The organization must be carefully crafted to keep citizens in control of the entire process. It should design an information policy commission to exist perhaps under the aegis of the judiciary. They and not the technocratic managers of state agencies would carry out reviews of state agency programs and intentions. The commission would need a process for hearings and prompt studies to be completed. It must have its own funding. Legislation to implement the commission should be promptly drafted and made a top priority for action in the next legislative session. ================================================ Side Bar of Washington Report - p.2 Alvin Toffler: Virtual reality points to a boundless capacity for deception. Not simply by governments or corporations, but by hostile individuals acting on each other. We can do this today, but we are increasing the sophistication of deception faster than the technology of verification. The consequence of that is the end of truth. The dark side of the information technology explosion is that it will breed a population that believes nothing and, perhaps, even more dangerous, a population ready to believe only one "truth," fanatically and willing to kill for it. [May 1995] Washington State Citizen: The gold mine [from the databases] lies in the realm of being able to control the progression of society and completely maximize at every moment the flow of a person's existence as a consumer. It would be nice to hear Al Gore turn around and say - "the information super highway. It is not that. It is a massive control and social engineering mechanism. This is all it ever will be. There will be no privacy left if we continue with things the way they are currently being done." [May 1995] ================================================ Editor's note: More of this 90,000 word 100 page study will appear in future issues of the COOK Report. The publication date is July 15. The price is $285.00 or $750 for a corporate site license. The study contains interviews and our analysis woven out them. What you have just read is the Introduction and Summary. An executive summary is included as Appendix 6. This summary will not appear in the COOK Report. ================================================= Interviews: Len McComb, Director Department of Revenue, Washington State, George Lindamood, Director Department of Information Services, Washington State, Al Huff, Director, Washington Schools Information Processing Cooperative, Kate Heimbach, Assistant Director, Administrative Services, Community Trade and Economic Development Agency, Washington State, Robert Aye, Deputy Regional Administrator, Washington State Department of Transportation, Matthew Lampe, Deputy Director, Department of Administrative Services, City of Seattle, Kathryn Thomas, Assistant Director for Telecommunications, Utilities and Transportation Commission, Washington State, Mary Moore, Director of Library Planning and Development Division, Washington State Library, Sam Hunt, Special Assistant to the Director, Division of Information Services, Washington State and Co Chair of the Public Information Access Policy (PIAP) Task Force, Bob Jacobson, former policy analyst for the California State Legislature and former public member of PIAP, Vincent Pollina, Computer Systems Specialist, Washington Utilities Transportation Commission, Steve McCallister, Information Services Manager, Snohomish County Planned Parenthood, Currie Morrison, Computer Coordinator, Seattle School District, Walter Taucher, President Corporate Computers, Janeane Dubuar, policy expert education privacy and member Computer Professionals for Social Responsibility, Jeffrey Michka, community activist, Sysop Washington Community InforSource BBS, and Board member Coalition of Washington Communities, Our thanks also to Peter Marshall, Dale Morrison, Jane Nelson, Leslie N. Jacobson, Simson L. Garfinkel and others for help or permission to use material that they authored. ======================================================= Contents Introduction and Summary p. 1 The New Information Environment - databases and Public Private Partnerships p. 2 The Politics of Divisiveness p. 3 Part 1: Education Infrastructure Components Privacy Invasion Begins in Kindergarten - p. 4 HB 1209: Washington State Pilots the National Education Agenda p. 4 An Endemic Action: Avoid Dealing With the Policy and Privacy p. 5 Electronic and Paper Records Demand Different Treatment p. 6 Electronic Student Records in Washington State The Urge to Merge p. 8 Overcoming the Confidentiality Barrier, p. 10 Our Children on the Total Quality Management Assembly Line, p. 12 The Origins of WSIPC in the Context of a Technology Bureaucracy,p. 12 WSIPC: Time Sharing for Educational Records Evolves into State Wide Education Telecommunications Power p. 14 Washington Educational Network, p. 16 Educational Reform Impact on WSIPC and WEDnet? p. 16 Student Portfolios and Privacy, p. 17 Where Is Our Public Policy on These Issues? p. 18 WSIPC's Future Direction in the Context of These Data Gathering Efforts, p. 19 If WSIPC Makes No Policy Who Does? p. 20 Getting Washington's Largest School District on Line, p. 20 Obtaining the Right Internet Connectivity, p. 22 Part 2: The State Agency Components Strange Bed Fellows: Merging Community Development and Trade & Economic Development Agencies, p. 23 CTED and the Washington Development Network, p. 24 Business, Local Government, Families: a Three Legged Stool of Social Control, p. 25 A Community Activist Critique of CTED, p. 28 Whom Does CTED Serve? p. 29 A Digital Singapore? p. 29 Department of Information Services as Would Be State Information Tsar? p. 33 Policy Aspects of D.I.S. Operation p. 34 Washington Interactive Television, p. 35 Information Kiosks, p. 36 Internet Training p. 37 Long Term Policy Implications of D.I.S. Actions, p. 38 There Is Indeed a Potential Tinder Box, p. 39 But What Is the Gold Mine? Reflections on the Department of Information Services, p. 39 Technology for Technology's Sake, p. 40 Department of Revenue: Government Through Public -Private Partneships, p. 41 WSDOT: Smart Highways as a Public Private Partnership , p. 42 Congestion Pricing in Puget Sound Metropolitan Area, p. 43 Fare collection Devices and Operation, p. 43 Smart Highways as a National Program:Instruments of Liberation or Social Control? p. 45 Links Between ITS America and Washington State, p. 45 The Harvard Kennedy School of Government Jumps on the Highway Bandwagon, p. 45 State Wide Medical Database in Return for Provider's Cooperation for State Wide Health Insurance , p. 46 A Centralized Medical Records Repository for the Insurance Industry, p. 47 Initial Operational, Reasons For, and Future Direction of the Data System, p. 48 Part 3: Private - Public Technology Jockeying: US West, Microsoft, & Seattle The City of Seattle Information Highway, p. 52 A View of the Seattle Highway, US West and Other Issues from within WUTC, p. 54 US West's Position in Washington State, p. 55 The Public Interest Role of WUTC, p. 56 Microsoft's Place in the Equation, p. 57 MSN and Competitiveness of Internet Services, p. 58 Becoming a Microsoft Solution Provider and Microsoft's Virtual Government, p. 58 Part 4: The Policy Picture PIAP: The Background Bob Jacobson: Policy Analyst and Entrepreneur, p. 59 The Beginnings of the PIAP Task Force, p. 60 Information policy Poverty in Washington State, p. 61 Our Lives Are Riddled, p. 61 Sam Hunt's View of PIAP, p. 61 Senator Sutherland's Role, p. 61 Privacy Policy: Who's Responsible? p. 62 The Role of the State Library in PIAP, p. 62 A Citizen's Complaint to PIAP, p. 64 Do We Serve the Public Interest by Avoiding the Contentious Issues? p. 65 Part 5: The Center Is Not Holding Why We Must Rush Forward, p. 67 Policy and the Need to Compete, p. 67 The Technology Catalyst in its Political and Economic Context, p. 68 Relationship Between Break Away Counties and the Takings Initiative, p. 68 Takings as a Reaction to the Growth Management Act, p. 69 The Pornography Issue, p. 71 Part 6: If We Are Not to Build a Blade Runner Society, What Should We Do? The Information Policy Problem: A Possible Remedy?, p. 72 Technology Policy Is Not Made in a Vacuum p. 73 Does Technology Control Us? p. 74 But Whom Shall Be Thrown From the Life Boat? p. 74 Toffler's Idyllic Vision Is Wrong p. 75 Appendices Appendix 1 Views of Indiana Student Records Adminsitrator on Privacy Issues, p. 76 Appendix 2 Intelligent Transportation Systems and the National Information Infrastructure, p. 78 Appendix 3 The Road Watches You: 'Smart' Highway Systems May Know Too Much, p. 80 Appendix 4 Acces vs Privacy in Computerized Court Records, p. 80 Appendix 5 Ethics Charges Against Dean Sutherland Dropped after Four Month Investigation, p. 83 Appendix 6 Executive Summary, p. 87 Sidebars Educational Stratification by Means of Computers p. 8 Information Mapping by Means of GIS Systems p. 30 Cyber Police on the Beat in Singapore p. 32 Target Solution 2000 Health database May Put Totality of State's Information about Citizens into One System p. 49 Lowry's Veto of US West Bill Riles Sutherland p. 55 Mary Moore on Public Library Infrastructure p. 62 Figures Figure 1: Education Reform p. 7 Figure 2: Education Reform Organization Chart p. 9 Figure 3: WEDnet Geographic Map and Block Diagram p. 15 Figure 4: Washington Development Network - Conceptual Diagram p. 29 Figure 5: HSIS Target Solution 2000 Data Collection and Storage Approach p. 50 Also includes 25 photographs. ******************************************************************** Gordon Cook, Editor & Publisher Subscript.: Individ-ascii $85 The COOK Report on Internet -> NREN Non Profit. $150 431 Greenway Ave, Ewing, NJ 08618 Small Corp & Gov't $200 (609) 882-2572 Corporate $350 Internet: cook@cookreport.com Corporate. Site Lic $650 http://www.netaxs.com/~cook <- Subscription Info & COOK Report Index ******************************************************************** ------------------------------ From: "Prof. L. P. Levine" Date: 29 Dec 1994 10:50:22 -0600 (CST) Subject: Info on CPD [unchanged since 12/29/94] Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. This digest is a forum with information contributed via Internet eMail. Those who understand the technology also understand the ease of forgery in this very free medium. Statements, therefore, should be taken with a grain of salt and it should be clear that the actual contributor might not be the person whose email address is posted at the top. Any user who openly wishes to post anonymously should inform the moderator at the beginning of the posting. He will comply. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions to CPD should be submitted, with appropriate, substantive SUBJECT: line, otherwise they may be ignored. They must be relevant, sound, in good taste, objective, cogent, coherent, concise, and nonrepetitious. Diversity is welcome, but not personal attacks. Do not include entire previous messages in responses to them. Include your name & legitimate Internet FROM: address, especially from .UUCP and .BITNET folks. Anonymized mail is not accepted. All contributions considered as personal comments; usual disclaimers apply. All reuses of CPD material should respect stated copyright notices, and should cite the sources explicitly; as a courtesy; publications using CPD material should obtain permission from the contributors. Contributions generally are acknowledged within 24 hours of submission. If selected, they are printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the SUBJECT: line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit or append to the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Mosaic users will find it at gopher://gopher.cs.uwm.edu. Older archives are also held at ftp.pica.army.mil [129.139.160.133]. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Mosaic: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V7 #006 ****************************** .