Date:       Fri, 19 Jun 92 16:09:46 EST
Errors-To:  Comp-privacy Error Handler <comp-privacy-request@PICA.ARMY.MIL>
From:       Computer Privacy Digest Moderator  <comp-privacy@PICA.ARMY.MIL>
To:         Comp-privacy@PICA.ARMY.MIL
Subject:    Computer Privacy Digest V1#052

Computer Privacy Digest Fri, 19 Jun 92              Volume 1 : Issue: 052

Today's Topics:				Moderator: Dennis G. Rears

      Feds require it, was Re: Drivers Licenses w/photos and SSNs
                     Columnist quotes private email
                      CFP'93 Call for Particiption
                 SURVEY:  Is Big Brother Watching You?

     The Computer Privacy Digest is a forum for discussion on the
   effect of technology on privacy.  The digest is moderated and
   gatewayed into the USENET newsgroup comp.society.privacy
   (Moderated).  Submissions should be sent to
   comp-privacy@pica.army.mil and administrative requests to
   comp-privacy-request@pica.army.mil.
       Back issues are available via anonymous ftp on ftp.pica.army.mil
  [129.139.160.200].
----------------------------------------------------------------------

From: Wm Randolph Franklin <wrf@ecse.rpi.edu>
Subject: Feds require it, was Re: Drivers Licenses w/photos and SSNs
Date: Thu, 18 Jun 1992 20:48:04 GMT

The current Loompomanic catalog flyer has an article stating that the
federal government is requiring states to convert to using SSNs.  So
we're getting a federal ID by the back door.

BTW, NYS was the last state to include photos on driver licenses; it was
in the last 10 years.  DMV now has a centralized database running IBM's
VTAM, I think, with over 4GB of data.  32 bits of addressing are
insufficient.  License issuance was centralized to prevent local offices
from "forgetting" to record licenses they'd issued.

There is still bribery going on, of course.  A few years ago a large
used-car dealer in, I think, Rochester, was nailed for paying bribes to
expidite transferring titles for his cars.  His unsuccessful defense was
that he was only paying them to do their jobs, but faster.
-- 
Prof. Wm. Randolph Franklin,  wrf@ecse.rpi.edu, (518) 276-6077;  Fax: -6261
ECSE Dept., 6026 JEC, Rensselaer Polytechnic Inst, Troy NY, 12180 USA
======= LOST MAIL: Mail sent to me between F5-29-92 and M6-1-92 might ========
======= have been lost in a disk crash.  Please resend it.  Sorry.    ========

------------------------------

From: Wm Randolph Franklin <wrf@ecse.rpi.edu>
Subject: Columnist quotes private email
Date: Thu, 18 Jun 1992 21:00:16 GMT


Jeffrey Hart, a conservative columnist extensively quoted the private
email of several Dartmouth administrators concerning their successful
effort to get a local business to withdraw advertising from the
Dartmouth Review, a conservative student newspaper, unaffiliated with
Dartmouth. 

He didn't say how he got the messages.  Maybe the administrators
released it.  Maybe a Review staffer cracked the system.  Hart's son is,
I think, one of the Review's founders. Stealing private email would be
on a par, morally, with some other staffer actions, such as harassing a
faculty member who refused to talk to them, until he completely blew up. 

This newsgroup has pretty-well established that even sysadmins shouldn't
read private email.  What about columnists?  Of course, reporters always
read anything they can get their hands on.  There was a question a few
years back of whether a reporter had the right to read material on your
desk if you left him in your office.  The reporters' consensus was yes.

(This isn't new.  Shortly before the American Revolution, Benj. Franklin
got into hot water for reading private mail on a (soon-to-be-former)
friend's desk in England and publishing what he saw.  It concerned how
England should treat the colonies.)

-- 
Prof. Wm. Randolph Franklin,  wrf@ecse.rpi.edu, (518) 276-6077;  Fax: -6261
ECSE Dept., 6026 JEC, Rensselaer Polytechnic Inst, Troy NY, 12180 USA
======= LOST MAIL: Mail sent to me between F5-29-92 and M6-1-92 might ========
======= have been lost in a disk crash.  Please resend it.  Sorry.    ========

------------------------------

Date: Thu, 18 Jun 92 15:25:32 -0700
From: Bruce R Koball <bkoball@well.sf.ca.us>
Subject: CFP'93 Call for Particiption


                 Call for Participation
                         CFP'93
   The Third Conference on Computers, Freedom and Privacy
         Sponsored by ACM SIGCOMM, SIGCAS & SIGSAC
                    9 - 12 March 1993
     San Francisco Airport Marriott Hotel, Burlingame, CA

INVITATION

This is an invitation to submit session and topic proposals for 
inclusion in the program of the Third Conference on Computers, 
Freedom and Privacy.  Proposals may be for individual talks, panel 
discussions, debates or other presentations in appropriate 
formats. Proposed topics should be within the general scope of the 
conference, as outlined below.

SCOPE

The advance of computer and telecommunications technologies holds 
great promise for individuals and society. From convenience for 
consumers and efficiency in commerce to improved public health and 
safety and increased participation in democratic institutions, 
these technologies can fundamentally transform our lives.

At the same time these technologies pose threats to the ideals of 
a free and open society. Personal privacy is increasingly at risk 
from invasion by high-tech surveillance and eavesdropping. The 
myriad databases containing personal information maintained in the 
public and private sectors expose private life to constant 
scrutiny. 

Technological advances also enable new forms of illegal activity, 
posing new problems for legal and law enforcement officials and 
challenging the very definitions of crime and civil liberties. But 
technologies used to combat these crimes can threaten the 
traditional barriers between the individual and the state.

Even such fundamental notions as speech, assembly and property are 
being transformed by these technologies, throwing into question 
the basic Constitutional protections that have guarded them. 
Similarly, information knows no borders; as the scope of economies 
becomes global and as networked communities transcend 
international boundaries, ways must be found to reconcile 
competing political, social and economic interests in the digital 
domain.

The Third Conference on Computers, Freedom and Privacy will 
assemble experts, advocates and interested people from a broad 
spectrum of disciplines and backgrounds in a balanced public forum 
to address the impact of computer and telecommunications 
technologies on freedom and privacy in society. Participants will 
include people from the fields of computer science, law, business, 
research, information, library science, health, public policy, 
government, law enforcement, public advocacy and many others.

Topics covered in previous CFP conferences include:

Personal Information and Privacy
International Perspectives and Impacts
Law Enforcement and Civil Liberties
Ethics, Morality and Criminality
Electronic Speech, Press and Assembly
Who Logs On (Computer & Telecom Networks)
Free Speech and the Public Telephone Network
Access to Government Information
Computer-based Surveillance of Individuals
Computers in the Workplace
Who Holds the Keys? (Cryptography)
Who's in Your Genes? (Genetic Information)
Ethics and Education
Public Policy for the 21st Century

These topics are given as examples and are not meant to exclude 
other possible topics on the general subject of Computers, Freedom 
and Privacy.

PROPOSAL SUBMISSION

All proposals should be accompanied by a position statement of at 
least one page, describing the proposed presentation, its theme 
and format. Proposals for panel discussions, debates and other 
multi-person presentations should include a list of proposed 
participants and session chair. Proposals should be sent to:

	CFP'93 Proposals
	2210 Sixth Street
	Berkeley, CA 94710

or by email to:    cfp93@well.sf.ca.us    with the word "Proposal" 
in the subject line. Proposals should be submitted as soon as 
possible to allow thorough consideration for inclusion in the 
formal program. The deadline for submissions is 15 August 1992.

STUDENT PAPER COMPETITION

Full time students are invited to enter the student paper 
competition. Winners will receive a scholarship to attend the 
conference and present their papers.

Papers should not exceed 2500 words and should address the impact 
of computer and telecommunications technologies on freedom and 
privacy in society. All papers should be submitted to Professor 
Dorothy Denning by 15 October 1992. Authors may submit their 
papers either by sending them as straight text via email to:   
denning@cs.georgetown.edu   or by sending 6 printed copies to:

	Professor Dorothy Denning
	Georgetown University
	Dept.  of Computer Science
	225 Reiss Science Bldg.
	Washington DC 20057

Submitters should include the name of their institution, degree 
program, and a signed statement affirming that they are a full-
time student at their institution and that the paper is an 
original, unpublished work of their own.

INFORMATION

For more information on the CFP'93 program and advance 
registration, as it becomes available, write to:

	CFP'93 Information
	2210 Sixth Street
	Berkeley, CA 94710

or send email to:    cfp93@well.sf.ca.us    with the word 
"Information" in the subject line.

THE ORGANIZERS

General Chair
 -------------
Bruce R. Koball
CFP'93
2210 Sixth Street
Berkeley, CA 94710
510-845-1350 (voice)
510-845-3946 (fax)
bkoball@well.sf.ca.us

Steering Committee
 ------------------
John Baker                        Mitch Ratcliffe
Equifax                           MacWeek Magazine

Mary J. Culnan                    David D. Redell
Georgetown University             DEC Systems Research
                                   Center
Dorothy Denning
Georgetown University             Marc Rotenberg
                                  Computer Professionals
Les Earnest                        for Social Responsibility
GeoGroup, Inc.
                                  C. James Schmidt
Mike Godwin                       San Jose State University
Electronic Frontier Foundation
                                  Barbara Simons
Mark Graham                       IBM
Pandora Systems
                                  Lee Tien
Lance J. Hoffman                  Attorney
George Washington University
                                  George Trubow
Donald G. Ingraham                John Marshall Law School
Office of the District Attorney,
 Alameda County, CA               Willis Ware
                                  Rand Corp.
Simona Nass
Student - Cardozo Law School      Jim Warren
                                  MicroTimes
Peter G. Neumann                   & Autodesk, Inc.
SRI International

Affiliations are listed for identification only.

Please distribute and post this notice!

[Moderator's Note:  Sounds like a good conference.  If possible I will
attend.  Maybe we can a BOF on some of our readers there?  _Dennis ]


------------------------------

Subject: SURVEY:  Is Big Brother Watching You?
Reply-To: lorrayne@smiley.mitre.org
Date: Fri, 19 Jun 92 11:18:44 -0400
From: lorrayne@smiley.mitre.org


For your information, this has been posted on some newsgroups a few
months ago.  This survey has also been distributed to various
conferences over the past few months.  All results will be in the form
of statistical information and keywords.  All participants will remain
anonymous.

Thanks for submitting this survey.

Lorrayne Schaefer
<lorrayne@smiley.mitre.org>

[Moderator's Note:  Responses do not come to the digest. _Dennis ]

			SURVEY:  MONITORING IN THE WORKPLACE


The purpose of this survey is to collect data for a presentation that
I will give at this year's National Computer Security Conference in
October.  I would like to thank you for taking the time to fill out
this survey.  If you have any questions, you can call me at
703-883-5301 or send me email at lorrayne@smiley.mitre.org.  Please
send your completed survey to:

				     Lorrayne Schaefer
				The MITRE Corporation
					M/S Z213
				   7525 Colshire Drive
				     McLean, VA 22102
				lorrayne@smiley.mitre.org

1.	What is your title?


2.	What type of work does your organization do?


3.	Does your organization currently monitor computer activity?  (Yes/No)


a.	If yes, what type of monitoring does your company do (e.g.,
electronic mail, bulletin boards, telephone, system activity, network
activity)?


b.	Why does your company choose to monitor these things and how
is it done?


4.	If you are considering (or are currently) using a monitoring
tool, what exactly would you monitor?  How would you protect this
information?


5.	Are you for or against monitoring?  Why/why not?  Think in
terms of whether it is ethical or unethical ("ethical" meaning
that it is right and "unethical" meaning it is wrong) for an
employer to monitor an employee's computer usage.  In your
response, consider that the employee is allowed by the company to use
the computer and the company currently monitors computer activity.


6.	If your company monitors employees, is it clearly defined in
your company policy?

7.	In your opinion, does the employee have rights in terms of
being monitored?

8.	In your opinion, does the company have rights to protect its
assets by using a form of monitoring tool?


9.	If you are being monitored, do you take offense?  Managers:
How do you handle situations in which the employee takes offense at
being monitored?


10. What measures does your company use to prevent misuse of
monitoring in the workplace?


11. If an employee is caught abusing the monitoring tool, what would
happen to that individual?  If your company is not using any form of
monitoring, what do you think should happen to an individual who
abused the tool?


12. Is it unethical to monitor electronic mail to determine if the
employee is not abusing this company resource (e.g., suppose the
employee sends personal notes via a network to others that are not
work related)?  Why or why not?




------------------------------


End of Computer Privacy Digest V1 #052
******************************