Date: Tue, 02 Jul 96 11:32:37 EST Errors-To: Comp-privacy Error Handler From: Computer Privacy Digest Moderator To: Comp-privacy@uwm.edu Subject: Computer Privacy Digest V9#001 Computer Privacy Digest Tue, 02 Jul 96 Volume 9 : Issue: 001 Today's Topics: Moderator: Leonard P. Levine Welcome to Volume 9 Re: Cookies Re: Cookies Re: Cookies Re: Cookies Re: Cookies Re: Cookies California Caller ID News INS: Security Is In Hand Re: Privacy while Downloading from Newsgroup HUMOR: Top Ten Industry Practices Information Technology and Social Accountability [long] Info on CPD [unchanged since 11/22/95] ---------------------------------------------------------------------- From: "Prof. L. P. Levine" Date: 02 Jul 1996 10:35:01 -0500 (CDT) Subject: Welcome to Volume 9 Organization: University of Wisconsin-Milwaukee On April 27th 1992 Dennis G. Rears, a systems programmer at the Picatinny Arsenal in New Jersey began CPD, the Computer Privacy Digest, a continuation of his telecom-priv list which he had run for some time before that. On December 3rd 1993, I took over the running of the digest with Volume 4 when Dennis' "day job" work load became too heavy to continue the Digest work. I have been running CPD ever since. It has been my practice to begin a new volume with the first January and the first July issue of each year. This is the first issue of Volume 9. With this issue we announce the presence of CPD on the web with a home page located at http://www.csd.uwm.edu/org/comp-privacy/ . The home page is very rudamentary at the moment (I also have a day job) consisting only of a simple descripter and some pointers to addresses appropriate to the topic. However, I now expect to have two young interns working with me for a part of the summer and I hope to improve on this real soon now. For those who are graphically impaired, the logo I have used for the CPD home page is a rotary cardfile locked up with a padlock. It seemed to indicate data privacy to me. I even got permission from Master Lock to use their product in this way. If there is ANYONE who has a more reasonable logo, or who can draw better than I can I would appreciate an improved logo. (No logo involving an eye peeking through venetian blinds or a hermit in front of his cave please.) As they say in Atlanta, "Let the games begin." ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Mosaic: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ From: frogfarm@yakko.cs.wmich.edu (Damaged Justice) Date: 28 Jun 1996 12:31:56 GMT Subject: Re: Cookies Organization: Somewhere just far enough outside of your jurisdiction References: Scott Wyant (scott_wyant@loop.com) allegedly wrote: Oh, and one other thing. If you edit your cookie file BEFORE you connect to "doubleclick," and then jump around at the site, you'll notice that they DON'T hand you a cookie. I probed the site pretty carefully, checking the MagiCookie file, and nothing happened. Until I closed Netscape. The LAST thing the 'doubleclick" site did was.... You guesed it. They handed me a cookie. So much for making the client-server negotiation more efficient. (In fairness, that cookie may have been in memory until I closed Netscape -- I can't tell for sure.) Scott Wyant Spinoza Ltd. For the uninitiated, what exactly is a cookie and what does it do? Are they just as dangerous to someone like me, who uses Lynx, as opposed to Netscape or another graphical browser? -- "I *did* take a still of the placenta from Tina's birth, but when the wife heard I was going to scan it and post it on a.b.p.t. she hid it and the negatives. I've looked, but with no success to date." (robnorth@freenet.edmonton.ab.ca on alt.tasteless) ------------------------------ From: dp@world.std.com (Jeff DelPapa) Date: 28 Jun 1996 15:05:18 GMT Subject: Re: Cookies Organization: Chaos and Confusion References: Scott Wyant wrote: Until I closed Netscape. The LAST thing the 'doubleclick" site did was.... You guesed it. They handed me a cookie. So much for making the client-server negotiation more efficient. (In fairness, that cookie may have been in memory until I closed Netscape -- I can't tell for sure.) Scott Wyant Spinoza Ltd. There is a simple way to keep sites from leaving crumbs on your machine: After you delete cookie.txt, create one of length 0 (touch on unix, new folder on win95), and set it read only. Cookies cease to be a concern. They can't leave any, and when they ask for the existing one, they get silence. Netscape 1.x seems happy with the arrangement. (I won't use 3.x until they ship binaries that don't contain the client side execution mechanisims (java, javascript, I am not satisfied with a switch), and provide for access by the disabled. (you must use a pointing device to select a link. Tabbing between them is a pain, but possible on MS IE and other Spry derived browsers, the Lynx numbering system is much better)) ------------------------------ From: peter@baileynm.com (Peter da Silva) Date: 28 Jun 1996 15:38:36 GMT Subject: Re: Cookies Organization: Network/development platform support, NMTI References: John wrote: Cookies add an important feature to the web - state tracking - if you want to buy somthing from a site it's important to be able to track from page to page (so the order form can know which product you were looking at). Funny thing, though... that sort of state tracking has always been possible by adding a cookie to the URL presented to the client. The whole purpose of the Netscape cookie files is precisely to add this *state* to the system. Isn't it funny how this keeps coming up. The security holes in Java and Javascript are due to the ability to add *state* to the language. Viruses are hidden *state*. Any time you you add the ability for third parties to invisibly manage state on your system you get these security and privacy concerns! Remember the AOL temporary file issue? Remember the Registration Wizard? Microsoft's doing that again, by the way... there's a new remote administration tool in the next release of Windows 95 (Windows 96? 97?) that will let you allow Microsoft into your system to help debug problems. A useful idea, I hasten to add, but fraught with hazards. I hope they've learned from the last time around. -- Peter da Silva (NIC: PJD2) `-_-' Bailey Network Management 'U` +1 713 274 5180 "Har du kramat din varg idag?" Bailey pays for my technical expertise. ------------------------------ From: Kevin McAleavey Date: 29 Jun 1996 02:18:26 -0700 Subject: Re: Cookies Organization: wizvax.net References: Scott Wyant wrote: Until I closed Netscape. The LAST thing the 'doubleclick" site did was.... You guesed it. They handed me a cookie. So much for making the client-server negotiation more efficient. (In fairness, that cookie may have been in memory until I closed Netscape -- I can't tell for sure.) Scott Wyant Spinoza Ltd. Please forgive me my morsel of spam here - I promise to be good about it. I have just released a product called NSCLEAN for MS_Windoze. It is a program which allows you to kill cookies, cache files, newsgroup traces, the notorious Netscape "history file" (trust me, after you've seen the history file contents, cookies are nothing) and other pieces of Netscape which remain on your computer for no known purpose after you've quit Netscape. It will sell by direct mail for $20.00. Now I know mama didn't raise no suckers, so I am in the middle of arranging with simtel.net, jumbo.com and a few other FTP locations to make available for free a program which will be called NS-DEMO1.EXE which will allow you to look at the contents of these various files. Naturally I am trying to sell you the $20.00 product so the demo will not delete any of these files. But it will let you SEE them at least. If anyone is interested in getting a copy prior to the availability of NS-DEMO1.EXE on FTP sites (shouldn't be more than a couple of days depending on how fast I get permission to upload), email me and I will tell you more about it. Sorry if this appears to be like so much other spam you've sat through, but NSCLEAN is a viable solution and if it makes ya feel any better, I *hate* spam ... spam, eggs bacon and spam ... spam spam spam and spam The ns-demo.ZIP program has been posted and I wanted to include the locations if you wish to add the comment that the demo is now available. You might want to examine it yourself ... http://www.simtel.net/pub/simtelnet/win3/inet/ns-demo1.zip ftp://ftp.simtel.net/pub/simtelnet/win3/inet/ns-demo1.zip Thank you for your patience. Since this product is the first step in what I hope to make available as security tools for ordinary people, I consider the information germaine to your list and apologize once again for "advertising" it. I'm rather proud of its capabilities and simplicity. ------------------------------ From: ejm@sprynet.com (Eric) Date: 29 Jun 1996 11:35:50 GMT Subject: Re: Cookies Organization: Netcom References: Scott Wyant wrote: This list has seen discussion about the little "cookie" that a Netscape server hands to your browser. Have you wondered how someone might use it to make some money? As part of my boot-up, I have a batch file that deletes whatever cookie file is lying around. It's not fool-proof, but it cuts down on what's in my cookie file in any session. :) ------------------------------ From: Ken Johnson Date: 29 Jun 1996 16:39:02 -0500 Subject: Re: Cookies Organization: Tapestry Computing, Inc. References: John wrote: Cookies add an important feature to the web - state tracking - if you want to buy somthing from a site it's important to be able to track from page to page (so the order form can know which product you were looking at). The thing that has people bent out of shap is the option to make cookies persistant (i.e make them live beyond one session). This is easy to fix by making your cookies files read only. Cookies are not the same as a membership card. When I fill out a membership application and get a membership card, I KNOW that I just gave someone a bunch of information about myself, and agreed to this. With cookies (especially with inexperienced users) you don't know that information is being tracked on you, nor do you have any control over how this information is used. I agree with you that the appropriate use cookies is a good thing, but unfortunately the Internet has become innudated with marketing people out to make a quick buck, for example: ad.doubleclick.net FALSE / FALSE 942195540 IAF 39121a I think the best thing to do is to set your browser to warn you before it establishes a cookie, and only let it do so if there is a good reason (like ordering cds at cdnow.com, etc.), not because someones web page happended to have a doubleclick image at the top. -- Ken Johnson ------------------------------ From: Beth Givens Date: 27 Jun 1996 18:51:13 -0700 (PDT) Subject: California Caller ID News CALLER ID: THE CASE FOR CONSUMER EDUCATION by Beth Givens, Privacy Rights Clearinghouse The introduction of Caller ID to California has been an enlightening study in what happens when consumers are given adequate information to make meaningful decisions about safeguarding their privacy. The California Public Utilities Commission (CPUC) has mandated that the local phone companies educate consumers about the privacy implications of Caller ID. The CPUC has also required that the phone companies make both Complete and Selective Blocking available to consumers at no charge (called Per Line and Per Call Blocking in other states). Since March 1996, radio and TV spots as well as full-page newspaper ads have repeatedly told California consumers that Caller ID is coming in June 1996, that free blocking options are available, and that consumers can call an 800 number to choose either Complete or Selective Blocking. Bill inserts regarding Caller ID Blocking have appeared in customers' monthly phone bills. Consumer organizations have been funded to educate hard- to-reach populations. Information about blocking options has been made available in 21 languages. The results? The customer service phone lines of Pacific Bell and GTE (California's major local phone companies) have been flooded with calls. Both companies have had to hire more staff to handle the volume. And now, the California Public Utilities Commission and the Federal Communications Commission have agreed to allow Pacific Bell and GTE to delay the implementation of Caller ID in order to catch up with the onslaught. The delay will allow the phone companies to send confirmation letters to all phone customers indicating which blocking option they have selected, or been assigned by default (a CPUC requirement), and will enable the phone companies to have all their switches ready. A recent survey of Californians found that 74% of those polled knew about Caller ID and that 67% were aware there is a way to prevent the delivery of their phone number to the called party. This is a phenomenal rate of awareness for a three-month public education campaign. Unofficial sources indicate that about 50% of households are expected to have chosen the Complete Blocking (Per Line) option, in other words, maximum privacy protection. The moral of the story? The CPUC's three-part strategy has been an effective way to mitigate the privacy impacts of a new technology. That strategy is outlined as follows: Step one is to conduct a privacy impact assessment of the technology (which the CPUC did in the early 1990s). The second step is to require the entity which introduces the technology to build in privacy protection mechanisms (in the case of Caller ID, these are Complete and Selective Blocking). The third step is to require that extensive consumer education be provided to consumers to explain the privacy implications of the technology and alert them to what they can do to protect their privacy. It should be pointed out that the CPUC insisted that the educational "message" which the phone companies impart be truly educational, and not a marketing pitch. The phone companies were not allowed to offer Caller ID until their plans were approved by the CPUC. The CPUC gathered together a team of consumer advocates who reviewed phone company plans and educational materials. It also hired an outside evaluator, Professor Brenda Dervin, an expert in public communication campaigns from Ohio State University's Department of Communication, to critique Pacific Bell's education plan. Many of these individuals' suggestions were incorporated into the education campaign. The dark cloud on the horizon of this relatively sunny scene has been the Federal Communications Commission (FCC). The California Public Utilities Commission had originally required the phone companies to automatically provide Complete Blocking to all households with unlisted/unpublished numbers -- about 50% of California households. The CPUC reasoned that since these households were already paying a monthly fee to keep their phone numbers private, they would no doubt want the Complete Blocking option and should therefore not have to expressly request it. But the FCC pre-empted the CPUC and established the weaker privacy measure, Selective Blocking, as the nationwide blocking standard. (Selective Blocking is called Per Call Blocking in other states. Callers must enter *67 before dialing each and every call in which number blocking is desired.) Court rulings upheld the FCC's position. The FCC's decision is unfortunate. The California Public Utilities Commission had undergone an exhaustive technology assessment process, spanning several years. The CPUC's analysis took into account the unique nature of California -- for example, the fact that the state has the highest percentage of unpublished numbers in the country, and that the California constitution has an exceptionally strong right-to-privacy clause. The FCC's rather weak argument, that Caller ID with a Per Call Blocking standard is good for the economy, has prevailed over a much stronger body of evidence. In the absence of honoring California's technology assessment process, the FCC would do well study the state's consumer awareness campaign and its successful results. California has demonstrated that a proactive consumer awareness campaign can go a long way to lessen the potentially harmful effects of a new technology. There have been a couple interesting sidelights to California's Caller ID awareness campaign. The first involves the public's massive response to the consumer awareness campaign and the apparent inability of Pacific Bell to cope with the flood of requests for Complete Blocking. Many consumers who had requested the maximum blocking option received letters from the phone company stating erroneously that they had opted for Selective Blocking, the weaker measure. Confusion reigned. As a result, Pacific Bell decided to delay its Caller ID implementation date until the matter is cleared up. The second sidelight involves 800 and 900 numbers. The Caller ID educational materials have pointed out that blocking does not work with 800 and 900 numbers because a different technology, called Automatic Number Identification (ANI), is involved. Most consumers are not aware that when they call 800 numbers, they are transmitting their own phone numbers. Many contacted the phone company, CPUC, Privacy Rights Clearinghouse and other consumer organizations to indicate their outrage about ANI and to express frustration at not being able to block their phone numbers on those calls. This only goes to underscore a point made earlier: Consumer education works. When consumers are given adequate information about the privacy implications of a technology, they take action. Let's hope that what California has learned from this unprecedented consumer awareness campaign is applied to other situations where communications technologies have the potential to threaten personal privacy. Beth Givens Voice: 619-260-4160 Project Director Fax: 619-298-5681 Privacy Rights Clearinghouse Hotline (Calif. only): Center for Public Interest Law 800-773-7748 University of San Diego 619-298-3396 (elsewhere) 5998 Alcala Park e-mail: bgivens@acusd.edu San Diego, CA 92110 http://www.acusd.edu/~prc ------------------------------ From: taxhaven@ix.netcom.com (Adam Starchild ) Date: 29 Jun 1996 04:00:50 GMT Subject: INS: Security Is In Hand Organization: Netcom Taken from Business Travel News, June 24, 1996: INS: Security Is In Hand New York - International travelers will soon be able to clear Customs simply by placing their hands on an electronic reader. Long envisioned as the future of security, this (dare we say) foolproof method of identification, called "hand geometrics," will become familiar to travelers when the Immigration and Naturalization Service starts rolling out INFOPASS in August. The agency will add one U.S. city per month following a recently completed three-year test in which over 160,000 passengers cleared the INS based on the unique shape of their hands and a clean record. When entering the United States and the INS facility, the traveler simply puts the card and his hand through the readers. If clearance is approved, a receipt is printed and the traveler moves to Customs. The automated system will cut processing time from one to two minutes to less than 30 seconds -- and possibly as few as 11, said Ron Hayes, assistant chief inspector for the INS. "We can't seem to break the floor of 11 seconds for the record," said Hayes, who noted that "of 6,000 checks where an inspector verifies the computer's approval of passenger clearance, we haven't found a single error or counterfeit card." Tests at Newark, JFK and Toronto will be expanded to Miami in August, followed by Vancouver, Houston, LA and Honolulu. In order to enroll, travelers must be interviewed by an inspector at the airport's INS facility. The traveler fills out a form that is entered into the INS database and transferred to a credit card-sized card. The traveler then has a hand geometrics template taken, which stores an accurate mathematical representation of the hand. Hayes said INFOPASS service is free but might require a fee in the future. He also suggested that it is only useful for people who travel frequently and do not have a "look-out" record with the agency. Hayes said INS initially planned to use fingerprints for identification, but the airlines suggested hand geometrics. Similar programs in place in Canada, Singapore, Holland and Germany will be compatible with the INS system this year. -- Jay Campbell (I notice that this article calls it INFOPASS. Earlier articles I've seen called it INSPass.) -- Posted by Adam Starchild The Offshore Entrepreneur at http://www.au.com/offshore ------------------------------ From: shh19@shell01.vivanet.com (Steve Hunter) Date: 02 Jul 1996 05:35:18 GMT Subject: Re: Privacy while Downloading from Newsgroup Organization: VivaNET, Rochester, NY's Internet Provider: (716) 475-1610 References: acar@vcn.bc.ca (Al Acar) wrote: I can think of 3 possibilities (And I'm sure there're more...) 1- People hacking into your ISP from outside, 2- People who use the same ISP as you do and have found a way to access other user's account info (internal hackers, if you will) 3- Anyone who can use a newsgroup search engine- this will show only those newsgroups you've been active in. But if follows that if you've been active in those groups, you're probably downloading them as well. O.K. so, let's say I've downloaded the plans for a nuclear device from my PC based system. (PC at home directly into my server account. I don't know if that's IP, TCP, ISP, BBC or B.B. King) No shell, no employer, just me and my faithful PC. Can I expect the FBI at my door tomorrow morning asking to see my A-Bomb, please?" -- Steve Hunter | We are the music makers, and Buffalo, NY, USA | We are the dreamers of the dreams. shh19@vivanet.com | --Willy Wonka ------------------------------ From: alfredo@crl.com (Alfredo Gomez) Date: 28 Jun 1996 05:27:48 GMT Subject: HUMOR: Top Ten Industry Practices Organization: Destroy Fascist Republicans, Inc. Hi, folks! I wrote this fun post for the privacy mailing list maintained by the FTC, where there is a lot of close-quarter debating, as you can tell. "The privacy list is run automatically by the Majordomo list manager. Send a "help" command to majordomo@ftc.gov for assistance." = = = = = = Audience: Announcer: LIIIVE! From San Francisco! Heeeeere's Alfredo Letttttterman! Alfredo : Hi Anton, hi Paul Schaeffer! I have in my hot little hands, a copy of tonight's Top 10! Audience: Alfredo: The top ten category tonight! (Taps blue card on desk and makes funny faces at camera. Audience laughs) I say, the category tonight! Top ten tricks, excuses and demagoguery used by those pesky info-thieves! Audience: Alfredo: Here we go, number 10! OBJECTIVITIS! Privacy wouldn't really work for all these millions of totally fake reasons! Look at *how many* fake reasons there are! Alfredo : Looks at Paul Schaeffer and asks, "Paul! Isn't that also known as Red-Herring-itis? Paul: I think so, Dave. I mean, Alfredo. Alfredo: Thaaaat's what I thought. Number 9! OFFER SOLUTIONS THAT AREN'T SOLUTIONS! Wouldn't it be better if we just *pretended* that we had privacy? That way, no one would have to worry about it and it would go away! Here, write 10,000 letters to this telemarketer and ask him to take you off his list. Do the same for the other million telemarketers out there. Number 8! SCARE MONGERING! Dream up totally ridiculous (but scary) scenarios where you can't get health care or credit cards or even CABBAGE PATCH DOLLS if you don't give up your privacy! Number 7! AD-HOMINEM ATTACKS! If you are on the ropes, and your ass got nailed for saying something stupid, or you got unmasked as an industry goon, try to turn things around by throwing out insults at random and hope they stick! Number 6! BRIBING! Nothing like greasin' a politician's palm, if you know what I mean! Number 5! DISINFORMATION! Log onto usenet and pretend you are a regular person who just loooooves the way AhOL sells out his privacy! Subscribe to the FTC's privacy mailing list, and pretend you are a human being, without green scales and a tail, who just looooooves having his privacy compromised! Number 4! FALSE FRONTS! Go to testify at congressional hearings, and be one of the organizations that billed itself as a privacy advocate but is actually funded by the privacy invasion industry, and argue against pro-privacy proposals! Number 3! SPIN-CONTROL! Try to paint privacy advocates as criminals, child molesters and foreign spies intent on stealing your teenage daughter and selling her to aliens from Zeta Reticuli! Number 2! AMORAL SOPHISTRY! Hey! The constitution doesn't forbid privacy invasions! Same with slavery and denying women the vote! Well, OK, we changed those, but we should still be able to look up your private life, just like they did in the Soviet Union, after all this is still America dammit! < DRUM ROLL! > And the number one trick, excuse or demagoguery used by the presumptuous info-thieves! Two words! - VICTIM-ITIS!! Us pooooooooor billion-dollar companies! We would have no wayyy of checking up on applicants! BWAAAAAAAAAAHHHH. Alfredo: We'll be right back after this commercial break with our special guest, from the TV show, "My So-Called Life", the lovely, the talented young actress Claire Danes and movie reviews from Mr. Dixwell Burnham and Mr. Bryan C. Del Monte! -- _/_/_/ Alfredo Jacobo Perez Gomez ( alfredo @ crl.com ) _/_/_/ _/_/_/ El Salvador / Costa Rica / San Francisco, USA _/_/_/ ------------------------------ From: Stephen F Roehrig Date: 25 Jun 1996 10:49:18 -0400 (EDT) Subject: Information Technology and Social Accountability [long] References: CALL FOR PAPERS INFORMATION TECHNOLOGY AND SOCIAL ACCOUNTABILITY HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES - 30 JANUARY 7 - 10, 1997 Papers are invited for the minitrack on Information Technology and Social Accountability as part of the Information Systems track at the Hawaii International Conference on System Sciences (HICSS). The so-called ``information age'' has given us new technologies promising data on demand and access to information and tools which were previously unavailable or difficult to use. On the other hand, many people are understandably concerned that new information technologies might have a negative impact on their quality of life. As the details of individuals and organizations seem to become more readily available, many argue that those responsible for the new information technologies also consider their consequences for privacy and confidentiality. More broadly, information technologists with the best intentions sometimes overlook some of the consequences of their creations. The Information Technology and Social Accountability mini-track is a way for scientists knowledgable in IT to contribute to an understanding of potential negative societal effects of IT and to devise and propose solutions overcoming them. Specific topics of relevance include, but are not limited to: * database privacy and confidentiality * disclosure limitation techniques * information system security * organizational restrictions on IT use * data accuracy and integrity * impact of computer-based medical records * data ownership Mini-Track Coordinators Stephen F. Roehrig George T. Duncan roehrig+@andrew.cmu.edu gd17@andrew.cmu.edu The H. John Heinz III School of Public Policy and Management Carnegie Mellon University 5000 Forbes Ave. Pittsburgh, PA 15213-3890 The purpose of HICSS is to provide a forum for the interchange of ideas, research results, development activities, and applications among academicians and practitioners in computer-based systems sciences. The conference consists of tutorials, advanced seminars, presentations of accepted papers, open forum, tasks forces, and plenary and distinguished guest lectures. There is a high degree of interaction and discussion among the conference participants because the conference is conducted in a workshop- like setting. Instructions for submitting papers: 1. Submit 6 (six) copies of the full paper, consisting of 20 - 25 pages double-spaced including title page, abstract, references and diagrams directly to the minitrack coordinator. 2. Do not submit the paper to more than one minitrack. The paper should contain original material and not be previously published or currently submitted for consideration elsewhere. 3. Each paper must have a tile page which includes the title, full name of all authors, and their complete addresses including affiliation(s), telephone number(s) and e-mail address(es). 4. The first page of the paper should include the title and a 300- word abstract. DEADLINES: July 1, 1996: Full papers submitted to the appropriate track, or minitrack coordinator. August 31, 1996: Notification of accepted papers mailed to authors. October 1, 1996: Accepted manuscripts, camera-ready, sent to minitrack coordinators; one author from each paper must register by this time. November 15, 1996: All other registrations must be received. Registrations received after this deadline may not be accepted due to space limitation. The Information Technology and Social Accountability minitrack is part of the Information Systems Track. The Information Systems Track has several minitracks that focus on a variety of research topics in Collaboration Technology, Decision Support and Knowledge-Based Systems, and Organizational Systems and Technology. For more information contact: Ralph H. Sprague, Jr. Jay F. Nunamaker, Jr. E-mail: sprague@.hawaii.edu E-mail: nunamaker@bpa.arizona.edu (808) 956-7082 (520) 621-4475 FAX: (808) 956-9889 (520) 621-2433 Eileen Dennis (Track Assistant) E-mail: edennis@uga.cc.uga.edu (706)613-7807 FAX: (706)542-3743> There are three other majors tracks in the conference: Software Technology, Digital Documents and Advanced Technology. For more information on the other tracks, please contact Software Technology Track: Hesham El-Rewini rewini@cs.unomaha.edu Digital Documents Track: M. Stuart Lynn msylnn@cpa.org Advanced Technology Track: Ralph H. Sprague, Jr. sprague@hawaii.edu For more information on the conference, please contact the conference coordinator: Barbara Edelstein College of Business Administration University of Hawai'i 2404 Maile Way Honolulu, HI 96822 (808) 956-3251 FAX: (808) 956-9685 e-mail: hicss@hawaii.edu or by checking the World Wide Web page: http://www.cba.hawaii.edu/hicss ------------------------------ From: "Prof. L. P. Levine" Date: 01 Jul 1996 09:00:00 -0500 (CDT) Subject: Info on CPD [unchanged since 11/22/95] Organization: University of Wisconsin-Milwaukee The Computer Privacy Digest is a forum for discussion on the effect of technology on privacy or vice versa. The digest is moderated and gatewayed into the USENET newsgroup comp.society.privacy (Moderated). Submissions should be sent to comp-privacy@uwm.edu and administrative requests to comp-privacy-request@uwm.edu. This digest is a forum with information contributed via Internet eMail. Those who understand the technology also understand the ease of forgery in this very free medium. Statements, therefore, should be taken with a grain of salt and it should be clear that the actual contributor might not be the person whose email address is posted at the top. Any user who openly wishes to post anonymously should inform the moderator at the beginning of the posting. He will comply. If you read this from the comp.society.privacy newsgroup and wish to contribute a message, you should simply post your contribution. As a moderated newsgroup, attempts to post to the group are normally turned into eMail to the submission address below. On the other hand, if you read the digest eMailed to you, you generally need only use the Reply feature of your mailer to contribute. If you do so, it is best to modify the "Subject:" line of your mailing. Contributions to CPD should be submitted, with appropriate, substantive SUBJECT: line, otherwise they may be ignored. They must be relevant, sound, in good taste, objective, cogent, coherent, concise, and nonrepetitious. Diversity is welcome, but not personal attacks. Do not include entire previous messages in responses to them. Include your name & legitimate Internet FROM: address, especially from .UUCP and .BITNET folks. Anonymized mail is not accepted. All contributions considered as personal comments; usual disclaimers apply. All reuses of CPD material should respect stated copyright notices, and should cite the sources explicitly; as a courtesy; publications using CPD material should obtain permission from the contributors. Contributions generally are acknowledged within 24 hours of submission. If selected, they are printed within two or three days. The moderator reserves the right to delete extraneous quoted material. He may change the Subject: line of an article in order to make it easier for the reader to follow a discussion. He will not, however, alter or edit the text except for purely technical reasons. A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18]. Login as "ftp" with password identifying yourid@yoursite. The archives are in the directory "pub/comp-privacy". People with gopher capability can most easily access the library at gopher.cs.uwm.edu. Web browsers will find it at gopher://gopher.cs.uwm.edu. ---------------------------------+----------------------------------------- Leonard P. Levine | Moderator of: Computer Privacy Digest Professor of Computer Science | and comp.society.privacy University of Wisconsin-Milwaukee | Post: comp-privacy@uwm.edu Box 784, Milwaukee WI 53201 | Information: comp-privacy-request@uwm.edu | Gopher: gopher.cs.uwm.edu levine@cs.uwm.edu | Web: gopher://gopher.cs.uwm.edu ---------------------------------+----------------------------------------- ------------------------------ End of Computer Privacy Digest V9 #001 ****************************** .