Date: Thu, 09 Nov 95 13:30:23 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V7#040 Computer Privacy Digest Thu, 09 Nov 95 Volume 7 : Issue: 040 Today's Topics: Moderator: Leonard P. Levine Re: Can you Sue if Credit is Denied for Lack of SSN? Re: Copyright Notice Re: GovAccess.183.snoops Re: GovAccess.183.snoops Re: Phone Number Privacy Re: Arrest Records and Employment Re: Copying Driver's Licenses Re: Act Now to Stop the Religious Right from Shutting Down the Net Re: Health Privacy Legislation ACLU Cyber-Liberties and Privacy Re: Uncolicited email Advertising Newspaper's Opinion Universities Censor Student Internet Use Info on CPD [unchanged since 08/18/95] ---------------------------------------------------------------------- From: jcr@mcs.com (John C. Rivard) Date: 07 Nov 1995 14:46:42 -0600 Subject: Re: Can you Sue if Credit is Denied for Lack of SSN? Organization: very little JF_Brown@pnl.gov (Jeff Brown) wrote: I once had this problem. I talked it over with the Credit Manager. It came down to this: if they could verify my creditworthiness without the number, they would grant credit, otherwise not. They were able to by using my name and address, and so did grant credit. Not to be a fly in the ointment, but when they pulled your TRW with your name and address, your SSN appeared big and bold at the top of the screen. The question is, did they then add it to your bank records? -- John C. Rivard  Opinions expressed yadda yadda--you know the drill ------------------------------ From: jcr@mcs.com (John C. Rivard) Date: 07 Nov 1995 15:26:12 -0600 Subject: Re: Copyright Notice Organization: very little les@Steam.Stanford.EDU (Les Earnest) wrote: My understanding of the copyright law is different -- that the copyright belongs to the person who first puts "copyrightable" material in a permanent form, such as a paper copy or a magnetic recording. Simply posting an article on Usenet does not meet this standard. I'm sorry, but your understanding is not correct. You are confusing authorship with the fact that copyright law requires a physical work. There is a fundamental distinction in copyright law that you cannot copyright an IDEA, but you can copyright the ESPRESSION of that idea. That is why it is a stated in US copyright law that the copyright is "automatically" created when an author first records the work in a "fixed, readable" form. The law specifically states that this form can be machine readable (a phonograph record or a computer disk, for example). (I should also note that this was a change in the previous copyright law, which was centered around publishing the work, not fixing it.) The fact that, in the case of UseNet, the magnetic computer disk that "fixes" the work of the author may not actually belong to the author, does NOT mean the disk's owner gets to sieze the copyright--copyright law states that the copyright generally belongs to the author (an exception is work for hire, which is irrelevant here). If I type up a screenplay at Kinko's, and the first time it is saved or laser-printed is on Kinko's disk/printer, can Kinko's claim that they own the copyright? Certainly not! Copyright is for creative works. An example from another situation is human speech -- you can't copyright spoken words, but you can copyright either a printed version of a speech or a recording of it. (However, I'm not a lawyer, so don't act without consulting one.) I wouldn't trying to claim copyright of a recording of someone else's speech without their permission. They may have written it down first, or at least jotted down an outline, and may be able to sue you for copyright infringement. First, the copyright for this material will belong to the first entity that makes a recording of it, which will probably not be the author. Again, this is just plain wrong--the author created the work, fixed it in the act of posting to Usenet. Even if you debate whether usenet meets the "fixed record" requirement of the law, there is certainly no provision in copyright law that states that the copyright reverts to someone other than the author simply because they make a recording or copy of the author's copyrightable material! In addition, I'm sure many people save copies of their postings to disk or print them. I do. Second, there is no agreement about what the "normal Usenet distribution mechanisms" are, so if you take seriously the idea that Usenet material is copyrighted and you also note that the copyright holder (whoever that is) has not given explicit permission to copy, then we are all in violation of the law and have been for years. I think it could be argued (and I am not a lawyer, either) that posting to Usenet gives implicit permission to copy the material. This would be akin to placing an original love poem in a personal ad in the newspaper: you don't have to provide an explicit copyright notice there. I have also heard it argued that the Usenet functions like one huge copy machine, and the act of posting is like pushing the "Make copies" button. While I like that image, I think the newspaper analogy is more accurate I hope that the Congress and courts will address this issue and clarify our rights and obligations some time soon. As things stand, I believe, the status of copyright in electronic media is rather ambiguous. I disagree--copyright law is pretty flexible, and of course it is open to interpretation by the courts. Although some of the issues of intellectual property in digital media are very intriguing, I think that there are ways to apply the current law without disrupting the system too much. -- John C. Rivard  Opinions expressed yadda yadda--you know the drill ------------------------------ From: jwarren@well.com (Jim Warren) Date: 07 Nov 1995 19:58:53 -0800 Subject: Re: GovAccess.183.snoops Jim Warren wrote: The FBI has finally published the details of their half-BILLION-dollar NATIONAL WIRETAP SYSTEM -- a gargantuan threat to the freedom, privacy and civil liberties of every citizen in this nation. Kreme wrote: How does all this relate to Phil Zimmerman's new project PGPphone (It think that's what it's called). Wouldn't it effectively castrate the wiretap system? For several years, the FBI has been pushing legislation, more and more vigorously, that would outlaw the use of all crypto except that approved by the government. Russia and (I hear) Australia and France have already done so. This year, the Clinton administration (e.g. the recent "Clipper Chip II" key-escrow proposal) and the FBI have repeatedly urged that such legislation be expedited -- at everything from the congressional hearings on the Okla City bombing (FBI Dir. Freeh urged this no less than three times in his testimony, and committee Chair Arlen Specter - an ex-prosecutor - overtly agreed with him), to the Arizona train derailment. Fortunately, some others (including Gingrich!) have been asking for evidence that such a prohibition would have made any difference in any of those cases ... and apparently have received no reply. -- Jim Warren, GovAccess list-owner/editor (jwarren@well.com) Advocate & columnist, MicroTimes, Government Technology, BoardWatch, etc. ------------------------------ From: kreme@cerebus.kreme.com (Kreme) Date: 07 Nov 1995 13:44:36 -0700 Subject: Re: GovAccess.183.snoops Organization: Nyx, The Spirit of the Night (nyx.net) 871-3324 Jim Warren wrote: The FBI has finally published the details of their half-BILLION-dollar NATIONAL WIRETAP SYSTEM -- a gargantuan threat to the freedom, privacy and civil liberties of every citizen in this nation. How does all this relate to Phil Zimmerman's new project PGPphone (It think that's what it's called). Wouldn't it effectively castrate the wiretap system? Distrubution of this message by Microsoft, its subsidiaries, or its software shall constitute a violation of my copyrights. Microsoft may license copyrights to my messages, for distribution only, for the sum of $1,000 US per week --. | kreme@netcom.com \ 1015 South Gaylord, Denver, CO 80209 #100 | | PGP Fingerprint \ 1D 5E F7 C8 7E C2 F9 87 0F 86 C9 B0 D2 63 9C B2 | | [303/722-2009] Vox \ Earl: "I find you absolutely out of your mind." | | [303/777-2911] Data \ Mutts: "I'm THERE!" | ------------------------------ From: bcn@world.std.com (Barry C Nelson) Date: 08 Nov 1995 05:31:31 GMT Subject: Re: Phone Number Privacy Organization: The World Public Access UNIX, Brookline, MA >chazl@leonardo.lmt.com writes: >>bcn@world.std.com (Barry C Nelson) said: ... >> It would also mean that anyone who picks up your phone can call the last person who called you just by pressing *69, which may be an amusing pastime for snoops. This doesn't seem to me to be a very big issu at all. Am I missing something? When you can see the redial button or memory on your telephone you KNOW that the information is stored there for the taking. When you have no knowledge of *69, you're information is being placed at risk by your phone company without you knowing about it. Imagine you get a late-night phone call from a secret paramour and tell your spouse that it was a "wrong number." The suspicious spouse can just press *69 to call back your wrong number, and find out who it was, or wait for the phone bill and work from there. I agree that it's somewhat paranoid for those of us with no secrets ;-) but it could be a shock to someone who finds out the hard way. I also agree with moderator's note that the biggest risk is to those who have an urge to keep their unlisted numbers private, yet make toll calls to people who have *69 features. -- BCNelson ------------------------------ From: rj.mills@pti-us.com (Dick Mills) Date: 08 Nov 1995 05:17:25 -0500 Subject: Re: Arrest Records and Employment nahe@aol.com (Nahe) wrote: I am interested in hearing from anyone who has had problems in obtaining employment or other benefits as a result of access to computerized court records which are sold to background investigation firms and then provided on line to clients of these firms. This problem is increasing in California as local courts sell computer tapes containing all previous court filings. Why do you want the information Nahe? It is not proper to make a request like that without explaining what you're up to and providing a way to verify your own name ,address and organization. You could be an extortionist trying to sucker people into revealing valuable information. -- Dick Mills +1(518)395-5154 http://www.albany.net/~dmills ------------------------------ From: ranck@joesbar.cc.vt.edu () Date: 08 Nov 1995 14:29:10 GMT Subject: Re: Copying Driver's Licenses Organization: Virginia Tech, Blacksburg, Virginia Maryjo Bruce (sunshine@netcom.com) wrote: As part of the paperwork the bank filled out because of my withdrawal, I was asked my for my employer's name. I said I am unemployed...because I AM unemployed. Two days later there was an emergency call from the bank. I was informed that being unemployed was unacceptable. I HAD to list an employer. I asked how I could do that when I have no employer. I was passed around to several people, each of whom insisted that the paperwork would be returned from the bank's internal affairs division This sounds like the standard bureaucratic nonsense that you get from people who are told to fill out the forms completely, "or else." I've seen it many times and it's just that they don't think about what the form means or anything. They just don't know what to do if all the blanks can't be filled in as they expect. Silly, but true. Somewhere there is probably an auditor that will bitch about "incomplete" information if the form doesn't have every line filled in. But, he or she may not object in this case. Unfortunately, the banks clerical staff does not know that and they are taught to fear the auditors. I seriously doubt that this is some form of entrapment as another poster suggested. Why would the bank want to do that? As the saying goes, "Never ascribe to malice that which can be explained by stupidity." This sounds like typical clerical stupidity, not some plot to get Maryjo to perjure herself. -- ***************************************************************************** * Bill Ranck +1-540-231-3951 ranck@vt.edu * * Virginia Polytechnic Institute & State University, Computing Center * ***************************************************************************** ------------------------------ From: cbarnard@cs.uchicago.edu (Christopher L. Barnard) Date: 08 Nov 1995 19:12:12 GMT Subject: Re: Act Now to Stop the Religious Right from Shutting Down the Net Organization: Univ. of Chicago Computer Science Dept. shabbir@vtw.org (Shabbir J. Safdar, VTW) writes: Name, Address, and Party Phone Fax ======================== ============== ============== R GA Gingrich, Newt 1-202-225-4501 1-202-225-4656 R KS Dole, Robert 1-202-224-6521 1-202-224-8952 ^^^^^^^^^^^^^^ For some reason Senator Dole has changed his fax number. I phoned the voice number above (224-6521) and was told that the Senator's fax number is now 1-202-228-1245. I still haven't gotten through on that number, but you at least don't get an intercept operator informing you that the number has been disconnected. +-----------------------------------------------------------------------+ | Christopher L. Barnard O When I was a boy I was told that | | cbarnard@cs.uchicago.edu / \ anybody could become president. | | (312) 702-8850 O---O Now I'm beginning to believe it. | | http://www.cs.uchicago.edu/~cbarnard --Clarence Darrow | | Cyber Rights Now: Accept No Compromise. | +----------PGP public key available via finger or PGP keyserver---------+ ------------------------------ From: Robert Gellman Date: 08 Nov 1995 14:22:49 -0500 (EST) Subject: Re: Health Privacy Legislation There have been some net postings about newly proposed legislation to protect the privacy of health records. Some of the postings show a lack of understanding of the current situation for health records. These records are largely unprotected by law, and there are few barriers to use and disclosure. This situation has been recognized for almost twenty years. In fact, virtually every study of health record confidentiality has reached similar conclusions and offered similar recommendations. In order to help educate those who are interested in this subject, I intend to post excerpts from some of these studies over the next few days. You may like or hate the current proposals, but there is no dispute that they would significantly increase protection for health records. There can be no dispute that things will continue to get worse in the absence of new legislation. From the 1977 report of the Privacy Protection Study Commission: First, medical records now contain more information and are available to more users than ever before. Second, the control medical care providers once exercised over information in medical records has been greatly diluted as a consequence of specialization within the medical profession, population mobility, third-party demands for medical-record information, and the increasing incidence of malpractice suits. Third, the comparative insulation of medical records from collateral uses, normal even a decade ago, cannot be entirely restored. Indeed, it appears that the importance of medical-record information to those outside of the medical-care relationship, and their demands for access to it, will continue to grow. Moreover, owing to the rising demand for access by third parties, coupled with the expense of limiting disclosure to that which is specifically requested by the non-medical user, there appears to be no natural limit to the potential uses of medical-record information for purposes quite different from those for which it was originally collected. Fourth, as third parties press their demands for access to medical-record information, the concept of consent to its disclosure . . . has less and less meaning. Comment: These conclusions are still valid today and, if anything, the situation has gotten worse. There are more third parties who obtain and use identifiable health records today than fifteen years ago. The longer we wait to pass legislation, the worse things will get in the future. + + + + + + + + + + + + + + + + + + + + + + + + + + Robert Gellman rgellman@cais.com + + Privacy and Information Policy Consultant + + 431 Fifth Street S.E. + + Washington, DC 20003 + + 202-543-7923 (phone) 202-547-8287 (fax) + + + + + + + + + + + + + + + + + + + + + + + + + + ------------------------------ From: ACLUNATL@aol.com Date: 08 Nov 1995 17:15:19 -0500 Subject: ACLU Cyber-Liberties and Privacy [moderator: I have excerpted from this document those items that seem to be appropriate to the list.] ----------------------------------------------------------------- November 8, 1995 ACLU CYBER-LIBERTIES UPDATE A bi-weekly e-zine on cyber-liberties cases and controversies at the state and federal level. ----------------------------------------------------------------- IN THIS ISSUE: * State Utility Commissions Consider Online Access and Privacy Issues * News on Electronic Access to Public Information in Washington State ----------------------------------------------------------------- * State Utility Commissions Consider Online Access and Privacy Issues Many state utilities commissions are considering issues that can affect your online access and privacy rights, from approving caller ID to defining universal access. Online users are urged to stay informed and involved in utilities commission decisions in their states that may affect cyberspace rights. Consumer Project on Technology has put up a list of information about state utility commissions. The list includes contact information for all 50 state utility commissions, and also lists utility consumer advocates in 40 states. See http://www.essential.org/cpt/isdn/contacts.html ----------------------------------------------------------------- * News on Electronic Access to Public Information in Washington State A Washington State task force has been examining the issue of electronic access to information maintained by government agencies. The ACLU of Washington submitted comments commending the task force for requiring some form of free electronic access, and limiting all fees to incremental costs. But the task force was criticized for not paying sufficient attention to privacy, especially increased threats to privacy presented by accumulation of information on individuals from diverse sources. Also in Washington State, King County Superior Court Judge George Finkle ruled that Geographical Information System databases are public records and must be made available to the public for nominal copying fees. (GIS systems are databases that contain information associated with a physical location, such as the location of utility cables, public buildings, roads, demographic information, zoning info, or traffic density.) As in many locations around the country, the City of Bellevue had attempted to charge far higher fees for GIS databases, which were created for government use but also have commercial value. This ruling reaffirms the notion that public information should be available to all, not just those with deep pockets. ------------------------------ From: haz1@kimbark.uchicago.edu (Bill) Date: 09 Nov 1995 04:20:52 GMT Subject: Re: Uncolicited email Advertising Organization: The University of Hell at Chicago Gary McGath wrote: If you regard first-time unsolicited E-mail as so heinous an assault on your person that you want to prosecute the person who did it, then you should at least take some reasonable precautions against letting your E-mail address be known to strangers. For example, just by posting to a newsgroup, you're letting many people know your address. Unfortunately, there is no such thing as an "unlisted" email address; if you wish to receive legitimate responses to your posted comments, then it is also possible for someone to use that address to send you junk mail. Even using an anonymous-remailer does not shield you-- if you read replies to your posts, you will also find junk email. The mania of today is that if somebody does something which we don't like, we look for a law to keep him from doing it. This has resulted in a society in which we are all criminals in more ways than we can know. Have we reached the point where people can't deal with annoyance except by calling the cops? There's a big difference between one person doing something that annoys only yourself, and dozens (soon to be hundreds, at current rates of growth) of people doing something that annoys not only yourself, but also many other people. This may be the first junk email Philip Duclos has received, but I guarantee it won't be the last. I'm getting about one a week, and I know several people who get one almost every day. Junk email is a common problem, growing in proportion, that needs to be solved before it achieves the status of junk snail-mail. Deterring junk email by "calling the cops" is, in my view, a laudable public service. If junk (snail) mail could have been fined under the law, back when it was just getting started, would you have been making similar remarks about someone who went to the trouble to punish the offenders? Think about that in the context of the junk-mail industry today: 2/3 of the mail received at my apartment (by 5 different people) is junk mail, and none of us are mail-order users. -- Bill (haz1@midway.uchicago.edu) ------------------------------ From: "Prof. L. P. Levine" Date: 09 Nov 1995 10:55:09 -0600 (CST) Subject: Newspaper's Opinion Organization: University of Wisconsin-Milwaukee In The Milwaukee Journal Sentinel on 11/8/95 the main editorial of this middle of the road paper was titled: LET FBI JUSTIFY NEED FOR NEW WIRETAP POWERS In it they point out phrases like: "The FBI and other government agencies have an ugly history of abusing their power to eavesdrop on telephone conversations and other electronic communications. That's why Congress needs to think at least twice before passing legislation that would give the FBI even more such power." and "Under J. Edgar Hoover, the FBI tapped the telephones not only of criminals, but of thousands of religious and civil rights lead- ers, politicians, students, professors and many others." and "The nation is now more wary of abuses of government power than it was 20 or more years ago, and the current FBI director, Louis J. Freeh, is an honorable man. But his successors may not be." and ends with "Yet no one in the bureau or anyone else has shown that the FBI needs this power to fight crime, or that the agency can be relied on to use such power wisely.Before Congress allows this plan to go forward, it needs to ask for, and get, reliable assurances on these matters from Freeh and others." Does anyone else have good examples of other local voices worried about privacy in our community? Examples of voices on the other side would also be called for. It might be interesting to see them posted here. (Be careful not to give a complete quote unless you have permission, just the pertinent parts.) -- Leonard P. Levine e-mail levine@cs.uwm.edu Professor, Computer Science Office 1-414-229-5170 University of Wisconsin-Milwaukee Fax 1-414-229-6958 Box 784, Milwaukee, WI 53201 PGP Public Key: finger llevine@blatz.cs.uwm.edu ------------------------------ From: "Prof. L. P. Levine" Date: 06 Nov 1995 15:10:06 -0600 (CST) Subject: Universities Censor Student Internet Use Organization: University of Wisconsin-Milwaukee Taken from Computer underground Digest Sun Nov 5, 1995 7:87 ISSN 1004-042X File 6--ACLU Cyber-Liberties Update ---------------------------------------------------------------- October 25, 1995 ACLU CYBER-LIBERTIES UPDATE A bi-weekly e-zine on cyber-liberties cases and controversies at the state and federal level. ---------------------------------------------------------------- STATE PAGE (Legislation/Agency/Court Cases/Issues) In a knee-jerk reaction to the cyber-porn scare, many universities around the country have begun to enact policies to regulate student Internet use. The ACLU believes that university censorship of student Internet usage is inconsistent with the principles of academic freedom. In addition, state universities are required as state institutions to uphold the free speech guarantees of the First Amendment. The Internet flourished for years as primarily an academic -- and uncensored -- domain. Colleges should not now cave in to the Luddites by enacting restrictive computer usage policies. Here are a few examples of university computer usage policies that tread on cyber-liberties: * After a year-long battle that made national news, Carnegie Mellon University is expected this November to approve a policy to censor certain Usenet newsgroups on Andrew, their flagship computing system. Their decision to censor is based on fear that the university could be held criminally liable under state obscenity and harmful to minors laws for providing access to newsgroups that "might be" obscene. The administration refused to accept the suggestion of both the CMU Faculty Senate and the ACLU that the computer network be categorized as a library, which would entitle the network to an exemption from the Pennsylvania obscenity statute. * The University of Minnesota will not allow students to have "offensive" content on their web sites, or even to create links to "offensive" content elsewhere on the Internet. They have also adopted the double standard of commercial services like America Online and Prodigy -- despite U of Minn's explicit content control, student web pages must include a disclaimer that the university takes "no responsibility" for anything on the pages. * At George Mason University, the "Responsible Use of Computing" policy begins with the following statement: "The following rules are not complete; just because an action is not explicitly proscribed does not necessarily mean that it is acceptable." (One could hardly imagine a better example of ambiguity with the potential to chill protected speech.) The policy creates a Security Review Panel that investigates reports of "offensive" computer behavior. As could be predicted, the backlog of cases before this panel is already quite long. (The head of the Security Review Panel is none other than Dr. Peter Denning, husband of Dr. Dorothy Denning, infamous proponent of the Clipper Chip.) On the bright side, students and faculty groups continue to hotly oppose these policies when they arise, and have been instrumental in shaping Internet usage policies to be less inhibitive of free speech and privacy rights. The following online resources will be useful to students and faculty faced with a draconian Internet usage policy: * Report on Computers at Harvard, by the Civil Liberties Union of Harvard: _Very_ comprehensive and useful report on students' computer usage rights on Harvard's network. Included are five general principles for computer use, an application of the general principles to specific aspects of computer use, and a discussion of areas where Harvard should take immediate action to secure students' rights on the network. Available at gopher://fas-gopher.harvard.edu:70/00/.studorgs/.cluh/.computer_report * Web Site on CMU Censorship Proposal: Thorough history and database of documents on Carnegie Mellon University's battle over online censorship. Also includes information on CMU's Coalition for Academic Freedom of Expression (CAFE). See http://www.cs.cmu.edu/afs/cs/usr/kcf/www/censor/ * ACLU letter and legal analysis to CMU: send a message to infoaclu@aclu.org with "Letter to CMU" in the subject line. The ACLU will continue to monitor university polices that restrict online free speech and privacy rights. The ACLU urges all students and faculty to actively work for university computer usage policies that protect their rights. To inform the ACLU of a computer usage policy at your school that may violate cyber-liberties, contact Ann Beeson, ACLU, beeson@aclu.org. To subscribe to the ACLU Cyber-Liberties Update, send a message to infoaclu@aclu.org with "subscribe Cyber-Liberties Update" in the subject line of your message. To terminate your subscription, send a message to infoaclu@aclu.org with "unsubscribe Cyber-Liberties Update" in the subject line. For general information about the ACLU, write to infoaclu@aclu.org. ------------------------------ From: "Prof. L. P. Levine" Date: 18 Oct 1995 13:55:25 -0500 (CDT) Subject: Info on CPD [unchanged since 08/18/95] Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. This digest is a forum with information contributed via Internet eMail. Those who understand the technology also understand the ease of forgery in this very free medium. Statements, therefore, should be taken with a grain of salt and it should be clear that the actual contributor might not be the person whose email address is posted at the top. Any user who openly wishes to post anonymously should inform the moderator at the beginning of the posting. He will comply. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions to CPD should be submitted, with appropriate, substantive SUBJECT: line, otherwise they may be ignored. They must be relevant, sound, in good taste, objective, cogent, coherent, concise, and nonrepetitious. Diversity is welcome, but not personal attacks. Do not include entire previous messages in responses to them. Include your name & legitimate Internet FROM: address, especially from .UUCP and .BITNET folks. Anonymized mail is not accepted. All contributions considered as personal comments; usual disclaimers apply. All reuses of CPD material should respect stated copyright notices, and should cite the sources explicitly; as a courtesy; publications using CPD material should obtain permission from the contributors. [new: Ordinary copyrighted material should not be submitted. If a] [copyright owner wishes to make material available for electronic] [distribution then a message such as "Copyright 1988 John Doe.] [Permission to distribute free electronic copies is hereby granted but] [printed copy or copy distributed for financial gain is forbidden" would] [be appropriate.] Contributions generally are acknowledged within 24 hours of submission. If selected, they are printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the Subject: line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Web browsers will find it at gopher://gopher.cs.uwm.edu. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Web: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V7 #040 ****************************** .