Date:       Sat, 19 Nov 94 06:41:59 EST
Errors-To:  Comp-privacy Error Handler <owner-comp-privacy@uwm.edu>
From:       Computer Privacy Digest Moderator  <comp-privacy@uwm.edu>
To:         Comp-privacy@uwm.edu
Subject:    Computer Privacy Digest V5#064

Computer Privacy Digest Sat, 19 Nov 94              Volume 5 : Issue: 064

Today's Topics:			       Moderator: Leonard P. Levine

                     Re: Intrusive Supermarket Card
                     Re: Intrusive Supermarket Card
                     Re: Intrusive Supermarket Card
                     Re: Intrusive Supermarket Card
                     Re: Intrusive Supermarket Card
                        Re: Mother's Maiden Name
                         Book of the Month Club
                           Re: E-mail headers
                  Datamation Writes on the Wiretap Act
                             Proof of Birth
                           Virtual Ethnicity
             Re: Corporate Electronic Communications Policy
                      SSN and Mobile Phone Service
                      Re: Must I Always Carry I.D?
                      Re: Must I Always Carry I.D?
                           Help for a Student
         Prvcy, Healthcre Rfrm & Infrmtion Infrastrctre Cnfrnce
          Info on CPD, Contributions, Subscriptions, FTP, etc.

----------------------------------------------------------------------

From: genghis@ilces.ag.uiuc.edu (Scott Coleman)
Date: 16 Nov 94 16:54:23 GMT
Subject: Re: Intrusive Supermarket Card
Organization: University of Illinois at Urbana

    Steve Berczuk <berczuk@space.mit.edu> writes: regarding check
    cashing cards: as a side note:  >>for people who haven't figured
    out that if you pay with your Visa card you get a month's free
    float<<

Heh heh - and you're also providing the store with a way to track your
buying habits which is every bit as good as a "valued customer" or
check cashing card.

    is one of the reasons I don't understand the idea behind the
    Express Check cards that banks are issuing: it looks like you are
    making a master card payment but your bank account gets debited
    when the merchant submits the credit slip rather than the bank
    issuing you a bill. Can anyone explain what these cards offer above
    what a credit card does, besides opening you up to problems is you
    lose the card (if you lose a credit card, no money has left your
    bank account....)

You don't have to be credit-worthy to get a debit card. The advantages
to those who have screwed up their credit ratings are obvious.

-- 
Scott Coleman, President ASRE (American Society of Reverse Engineers)
asre@uiuc.edu
Life is temporally limited - drive velocitously!!


------------------------------

From: "L. Jean Camp" <lc2m+@andrew.cmu.edu>
Date: 16 Nov 1994 15:34:01 -0500
Subject: Re: Intrusive Supermarket Card
Organization: Doctoral student, Engineering and Public Policy, Carnegie Mellon, Pittsburgh, PA

    Steve Berczuk  <berczuk@space.mit.edu> wrote: as a side note: >>for
    people who haven't figured out that if you pay with your Visa card
    you get a month's free float<< is one of the reasons I don't
    understand the idea behind the Express Check cards that banks are
    issuing: it looks like you are making a master card payment but
    your bank account gets debited when the merchant submits the credit
    slip rather than the bank issuing you a bill.

Yes you get 30 days float from your VISA. So why not use it to buy
everything and just write one check a month? Do you do that? No? So why
doesn't everyone else? Well, these cards are convenient. They prevents
double spending. They are easier to use than checks. You can basically
pay cash for items like auto rentals when you have budgeted for them.
You can use your ATM card at institutions that do not offer POS
systems.

It is much cheaper in terms of transaction processing for the bank.

    Can anyone explain what these cards offer above what a credit card
    does, besides opening you up to problems is you lose the card (if
    you lose a credit card, no money has left your bank account....)

Actually the Electronic Funds Transfer Act (EFTA) limits your loss in
either case. To $50 per card I believe. So having one card for both
VISA -like payments & ATM transactions lessens your exposure. You might
want to read EFTA before offering more conclusions.

    Alan Miller \\ millera@mcs.com I think the debit cards are
    primarily used if you have a bad credit history, or for kids who
    don't have a credit history.  Since your (apparent) line of credit
    is just what you have in the bank, the bank doesn't need to worry
    about defaults.

No. Secured credit cards are used to establish a credit history.
Secured credit cards are not debit cards. The securing account is not
debited but defines your credit limit. Debit cards in the form of
ATM/VISA bank cards may not serve the purpose of improving your credit
-- since it is not an extension of credit, even conditional credit, but
merely an electronic debiting service. See the difference?

    ohnl@iecc.com (John R Levine) Nothing.  You have to go through the
    same credit application as you would for a real credit card, but
    you get no float and less protection against bogus charges.

This varies between banks. At one bank where I do business, the ATM
card is automatically in the form of a debit-VISA. There is no more
credit checking than with an ATM card. At another, they do not offer
ATM VISA cards. However, in the region server by the latter ban POS
terminals are much more widely available. Again, the EFTA is clearly
intended to cover both credit cards & debit card.

    The best answers I've gotten when I ask people why they use these
    things are vague comments about imposing better financial
    discipline or something.

It depends on whether you think these cards are substitutes for ATM
cards or credit cards. Before you were worried about electronic privacy
did you use your VISA for every puchase? Why not? Some vague reason
about financial discipline? Other people feel the same way.

--
Jean


------------------------------

From: tkaplanr@lehman.com (Roger Kaplan (Tokyo))
Date: 17 Nov 94 09:08:27 JST
Subject: Re: Intrusive Supermarket Card

    card payment but your bank account gets debited when the merchant
    submits the credit slip rather than the bank issuing you a bill.
    Can anyone explain what these cards offer above what a credit card
    does, besides opening you up to problems is you lose the card (if
    you lose a credit card, no money has left your bank account....)

The establishment does not have to accept the credit card issuing the
"check" in order to use the "check"; it has the properties of a bank
check.

In England, there is a debit scheme called Switch, which is a debit
service linked to your bank account/ATM card.  The difference between
Switch and similar schemes in the US is that Switch is accepted almost
anywhere, not just gas stations and supermarkets.  Furthermore,
businesses who normally wouldn't accept credit cards because of the
charge those cards impose, will accept Switch since it costs nothing to
them.

What's even more interesting is an experiment in the UK (reported in
Wired) to allow anonymous money.  SmartCards (which are nigh-impossible
to forge) are "charged" with money at banks (like ATM's, I guess), and
can be used at vendors. The advantage is, of course, that there's no
audit trail.  Which means that your expenditures don't go on your
credit record.

As for the US debit cards (like Visa Switch), the only perceivable
difference is that the money gets deducted fromm your account
immediately and automatically rather than at the end of the month, with
your involvement.  "More convenient" for consumers, more money for the
banks.  Everyone's happy, right?


------------------------------

From: msieving@amiserv.xnet.com (Mark Sieving)
Date: 17 Nov 1994 00:38:55 GMT
Subject: Re: Intrusive Supermarket Card
Organization: XNet - A Full Service Internet Provider - (708) 983-6064

    Spiros Triantafyllopoulos (c23st@kocrsv01.delcoelect.com) wrote:
    How hard is it to give them 'white innocent lie' answers to the
    questions?

    Kids like Ice Cream?                    NO     :-) 
    Kids like Celery?                       YES    :-) :-)

What will happen then is that you'll get junk mail about stuff that you
have absolutely no interest in.  It seems to make more sense to either
answer truthfully (that way you'll at least get good junk mail) or
don't answer at all.

--
Mark Sieving
msieving@xnet.com    OR
m.sieving1@genie.geis.com


------------------------------

From: c23st@kocrsv01.delcoelect.com (Spiros Triantafyllopoulos)
Date: 18 Nov 1994 15:26:59 GMT
Subject: Re: Intrusive Supermarket Card
Organization: Delco Electronics Corp.

    Steve Berczuk  <berczuk@space.mit.edu> wrote: regarding check
    cashing cards: The thing that disturbes me a bit about the SSNs
    being permissible for check cashing cards is that Massachusetts law
    requiring Social Security Numbers on *checks* is illegal (unless
    the SSN is your drivers lic number - which it does not have to be)
    I think courtesy cards get around this by allowing you to write
    checks above the amount of your bill (which is in effect extending
    credit), so asking for an SSN for a check cashing card IS legal.

The local Marsh chain of supermarkets (same folks who had the long
questionnaire earlier) require your SSN on their cashing card as well.
Pfff. I stopped shopping there. Vote with your feet.

    is one of the reasons I don't understand the idea behind the
    Express Check cards that banks are issuing: it looks like you are
    making a master card payment but your bank account gets debited
    when the merchant submits the credit slip rather than the bank
    issuing you a bill. Can anyone explain what these cards offer above
    what a credit card does, besides opening you up to problems is you
    lose the card (if you lose a credit card, no money has left your
    bank account....)

The local Meijer's store where I shop now offers many different ways of
accepting payment; they have their own debit card thingie which takes
money off your checking account (but I think, I'm pretty sure) requires
a PIN code. They also accept ATM cards (selected) and again, you enter
your ATM PIN code in a keypad, no further ID. Also check with a cashing
card (if you don't want to have the electronic feature it's fine, they
won't activate it), or check with driver licence.

I use the payment using ATM card and ATM PIN method much of the time.
The transaction goes thru instantly so I never have any doubt as to
when the check has cleared. It shows as an ATM withdrawal, and it's
cheaper and far faster than writing checks.

-- 
Spiros Triantafyllopoulos                  Kokomo, IN 46904   (317) 451-0815
Software Development Tools, AD/SI          c23st@kocrsv01.delcoelect.com
Delco Electronics/GM Hughes Electronics    "Reading, 'Rithmetic, and Readnews"


------------------------------

From: Panopticon@oubliette.COM
Date: 16 Nov 94 20:10:36 CST
Subject: Re: Mother's Maiden Name

My mother's maiden name is my middle name, Nelson. Ironically, I've had
bankers tell me I couldn't use my mother's maiden name.

But, more along the lines of the original discussion, the maiden name
is a prerequisite to doing a thorough asset investigation. I often am
able to confirm that a bank account belongs to a subject by calling the
bank with the social security number and the maiden name. In fact, I
had the social security number wrong once, and the teller corrected it
for me! But let me say, that this act in itself is NOT illegal. I have
never inquired during confirmation as to the contents of the account.
And, technically I have never impersonated the person under
investigation, as they do not explicitly ask you if you are that
person. They usually say the name, and you say yes, confirming the
correct correlation. Later, with another call, the level of the account
can be confirmed by inquiring as to the cashability of a check of X
amount again and again. The nicest thing about this is that if the
subject has close business ties to the bank, these methods provide the
least risk of someone at the bank bringing the inquiries to the
subjects attention.

However, illegal or not, there is clearly an invasion of privacy
occuring when I utilize these techniques, and although I feel that I am
an advocate of privacy, I cannot help applying a double standard when
it comes to finding the assets of a man who left two or three children
and a wife without support. After all, our government, local and
national, has not yet really shown significant enforcement of child
support laws. I know that many of you will mention that we must
preserve the privacy of every man in that we may secure privacy for
all, and on the face of it I agree with this. But isn't it time we made
an exception in the case of child support?  Given that the assets of
the man belong, legally in part, to his children.


------------------------------

From: "Virginia Matzek" <VMATZEK@alumni.berkeley.edu>
Date: 16 Nov 1994 15:58:56 PACIFIC
Subject: Book of the Month Club
Organization:  California Alumni Assoc.

As a new subscriber to this digest I'm not sure if this subject has
been covered before, but I thought I'd warn you with my own personal
privacy horror story.

Book-of-the-Month Club in Pennsylvania recently sent me an unsolicited
mailing asking me to join at a reduced rate. I try to avoid getting on
mailing lists, but the deal was good and I intended to unsubscribe as
soon as the initial deal was over. I sent in an order for about $20
worth of books and paid by check. Imagine my surprise when I got the
following letter (condensed):

"<Before we send your enrollment selections, will you please provide us
with some additional information?>

"Dear Ms. Matzek,

"I very much want to enroll you in Book-of-the-Month Club as soon as
possible....However, we're able to offer these valuable benefits only
by being selective about whom we enroll. As a result, our Credit
Department occasionally requests additional information from applicants
before we send their enrollment selections. A convenient answer form is
contained on the back of this letter. Please fill it out and mail it
back to us within 30 days...Your enrollment package will be sent to you
as soon as your application is approved. I know that you're eager to
get your enrollment selections. So why not answer the questions now
while you have the letter in your hand?

"Thank you...etc."

On the back of the letter were spaces for me to list my occupation, my
employer's address, my bank's name and address, my bank account and
investment account numbers, my credit card names and numbers, my
signature, and my telephone number.

Needless to say, I was outraged and wrote them back a nasty letter.  I
also called their service department and got a kindly low-level
employee who processed my order (and canceled me from future mailings)
on the spot. I also filed a report with the Pennsylvania Better
Business Bureau, but have heard nothing back from them.

Now I regret having given the BOTMC my business at all, but I figure
they probably lose money on the initial offer and make money on the
rest, so I'm not too put out.


------------------------------

From: stuckey@mrcnext.cso.uiuc.edu (Anthony J. Stuckey)
Date: 17 Nov 1994 15:37:42 GMT
Subject: Re: E-mail headers
Organization: University of Illinois at Urbana

    wbe@psr.com (Winston Edmond) writes: (2) Some mail programs will
    add a BCC: line to the message if YOU are a blind Cc recipient, to
    let you know why the message was delivered to you.

This is the behavior that I find most intuitive.  I have noticed that
some mailers turn a BCC list into what looks much more like an expanded
TO list, and this has confused myself and correspondents in the past.

It's not a nice situation to suddenly be dropped into an obviously
healthy conversation, with the headers suggesting as best they can that
you knew about this all along.

    (3) All this is irrelevant.  By just Cc'ing myself, I can forward
    the copy I get back to anyone I want, without using blind Cc, and
    none of the original recipients will have any indication that I've
    done so.  Blind Cc just makes this easier.  -WBE

Exactly.  CC'ing yourself and forwarding that mail behind someone's
back is just lame.  It's valid, but it's lame.

--
Anthony J. Stuckey		stuckey@mrcnext.cso.uiuc.edu
"And if you frisbee-throw a universe where does it go?" -- Steve Blunt.
GCS/S -d+@ p c(++) l u+ e+(-) m+(*) s+++/-- !n h(*) f+ g+ w+ t+@ r y?
KiboNumber == 1


------------------------------

From: doug@cc.ysu.edu (Doug Sewell)
Date: 17 Nov 1994 11:03:41 -0500
Subject: Datamation Writes on the Wiretap Act
Organization: Youngstown State University

The November 15, 1994 issue of Datamation, in Press Watch on p.99, has
this article (there is no by-line).

    _But Officer, I Didn't Send Bogus E-Mail!_

    Despite a last minute push by privacy geeks like the American Civil
    Liberties Union to block its passage, Congress has approved
    President Clinton's new data-wiretapping legislation.  That's
    because the FBI made it the agency's single legislative priority
    for the year, says the October 9 issue of _The New York Times._
    The Times added that FBI director Louis J. Freeh successfully
    argued that the agency couldn't fight crimes like terrorism,
    espionage, or international drug dealing without being able to tap
    into emerging telecom technologies.  The bill forces phone
    companies to modify their networks by putting special
    easy-eavesdropping software into switching stations.  The bill also
    authorizes payment of half a billion dollars to phone companies to
    pick up the costs of modifying their equipment.

This shows what "professional DP people" think of both privacy and "us
geeks".

-- 
Doug Sewell (doug@cc.ysu.edu) (http://cc.ysu.edu/doug)
It's reported that Canter & Siegel search for and archive all articles
that contain their names or "Green Card".  This .sig is to help them.


------------------------------

From: Eric Poulsen <ericp@kalama.doe.Hawaii.Edu>
Date: 17 Nov 1994 22:08:51 -1000 (HST)
Subject: Proof of Birth

Here's a potential problem I stumbled upon:  A few years ago, I was
going to do some travelling, so I set about obtaining a passport.  I
was told that I need a "record of birth" (different from a birth
certificate), and they gave me an address to write to my state of birth
(AK) to obtain this document.  Well, I wrote to them, and simply told
them my name and address (my name isn't very common, so I figured it
was unlikely to be two people born in AK -- also being low population
state -- with the same name.)

A few weeks later, I recieved a "record of birth" for someone 9 years
older than I.  Turns out that he had the same first & last name as
myself, but a different middle name, & date/place of birth (naturally.)
So I sent it back, and was MUCH more specific in my request, and they
sent me the proper one (and didn't even charge me again!)

Then it occured to me ... I could probably obtain this sort of document
for *ANYONE* as long as I knew their place of birth.  I could have
easily obtained a passport with the other fellow's name, etc, etc ...,
but with MY picture on it.  As long as I picked someone who was near
the same age, race, eye, & hair color (not that farfetched), I could
"assume" someone else's identity!  This can be very scary, considering
that passports are generally accepted as a VERY secure means of ID, and
quite usable as an ID instead of drivers license, etc.


------------------------------

From: zurawsk@uni-muenster.de (Nils Zurawski)
Date: 18 Nov 1994 15:15:27 +0100
Subject: Virtual Ethnicity
Organization: Westfaelische Wilhelms-Universitaet Muenster, Germany

I am looking for articles, books, WWW sitesetc, information so to speak
that deal with the cultural impact, ethnicity, cultural identity on the
Internet or any other net. Virtual communities or societies and the
relation to the concepts of ethnicity and maybe their changes.

- Does different cultural background have different effects of how a
person uses the net and how one behaves in a virtual
society/community?

-  Is the Internet able to accelerate the come-into-being of a "world
society"?

- The NAFTA, EU and other constructions to overcome economical, and /or
socio-cultural differences  do actually not much on these subjects,
esspecially the last one. What does the Internet do in this respect?

I appreciate any help, be it literature or personal opinion or hints.
Tell it to other people you know and maybe can help. I am lpanning to
write  a Ph.D. in sociology on that subject.

--
Nils Zurawski
zurawsk@uni-muenster.de


------------------------------

From: rj.mills@pti-us.com (Dick Mills)
Date: 18 Nov 1994 09:28:25 -0500
Subject: Re: Corporate Electronic Communications Policy

Bernie Cosell [bernie@fantasyfarm.com
Computer-Privacy-Digest:V5,062,12] apparently does not share my
paranoia about the proposed policy.  In the original posting I didn't
cite my actual fears so as not to contaminate the comments.  I'll state
them now.

    The policy states: [Company] reserves the right to review all
    electronic records and communications, although it not the intent
    to do so except for legitimate business reasons.

This implies that the company may tap phones, and bug rooms, even
though it is not their intention to do so. I fear this will cause
unnecessary fear and suspicion among employees.  Suppose an employee
sent a letter to his employer stating, "I reserve the right to
criticize company management publicly in the press, although it is not
my intention to do so."  What is the gain to offset the suspicion
caused by such a letter?

    The policy states: The message originator's department manager and
    corporate officers are the only individuals authorized to
    review...

    Bernie Cosell comments: I wouldn't even have been inclined to put
    in all the disclaimers --- I'd have ended the paragraph after the
    first sentence.

Without the disclaimers all employees, as agents of the company, would
be authorized to review any communications of anyone else in the
company.  Limitations of authorization must be explicitly stated.

    The policy states: Improper use of [company] electronic
    communications may result in disciplinary action up to and
    including discharge from employment.

Email, more so than nearly any other kind of communication, is subject
to forgery. There have been lots of discussion in computer-privacy
about the vulnerabilities.  It would be too easy for another employees,
or even an outsider to sabotage someone's employment by sending forged
email. Conversely, if the company did dismiss someone for abuse of
email, he could sue and challenge them to prove that he did indeed
create the messages; and win. Also, non-electronic forms of
communication become conspicuous by their absence from the policy.


------------------------------

From: cristy@eplrx7.es.duPont.com (Cristy)
Date: 18 Nov 1994 13:28:03 -0500
Subject: SSN and Mobile Phone Service
Organization: DuPont Central Research and Development

I'm doing my best to reverse the trend towards a defacto national ID,
the Social Security Number.  I just tried to sign-up for mobile
telephone service with Cellular One and they flat-out refused unless I
provided my SSN.  However, Bell Mobile agreed to provide service
without one.  I will follow up with a letter to Cellular One to make
them aware of the lost business.

-- 
cristy@dupont.com


------------------------------

From: Paul Robinson <PAUL@tdr.com>
Date: 18 Nov 1994 20:02:28 -0500 (EST) 
Subject: Re: Must I Always Carry I.D?
Organization: Tansin A. Darcos & Company, Silver Spring, MD USA

    All the states that I've checked have a "non driver's ID".  It
    looks like a driver's license, it's issued by the same people, but
    it doesn't let you drive a car.

In California, you could, starting about eight years ago, get both.
Back in the 1970s, when I got my license from California, getting a
license automatically cancelled your ID card, which incidentally used
the same number, which was a letter followed by 7 digits.  The first
digit tells the year of the decade you got the card; the letter would
tell which decade.

Later on, they would allow someone to get an ID card AND a license, I
guess so you could carry the ID when you just needed to cash a check,
but weren't driving.  They also eliminated the minimum age you could
get an ID card from 16 to zero.  (The LA Times showed a woman with her
3-month old baby and its id card, showing a picture of the baby.  Would
have been interesting to get the baby to pose if California used side
profile to show someone is under 21!)

    Unfortunately, some non-drivers that I know have had problems
    buying things by check, because the drelbs at the store are told to
    get "a driver's license and a major credit card" as ID.  If they
    don't follow the rules exactly, they can get fired.  "Driver's
    license" means a driver's license and nothing else.

I use the old rule, when the 'droid won't accept what should be valid,
you scream for the manager.  The ID card has the same validation as the
license, e.g. the easily defeatable "show us your birth certificate"
requirement.  It should be treated the same as a license.

I used to have the same problem for the exact *opposite* reason; I had
a drivers' license but didn't have the income to get a credit card
(secured cards were many years in the future) and sometimes needed to
get a check cashed.  It was on a made-for-TV movie that I saw a woman
say she got a U.S. Passport so that if she ever cashed a check, and
they wanted ID, she could just "whip out her Passport".

PING!  I saw a little lightbulb come on.  I applied for a passport and
recieved it a few weeks later, and decided to try it.  I went into a
store that required a drivers license and credit card and when asked
for ID, presented my passport.

It was like presenting an American Express Gold Card!  They never even
*asked* for my drivers license!  Places that had shunned my checks
before now welcomed me with open arms.  Because Passports are so rarely
used, they often got the manager out of his kiosk anyway to check.

Now I'm in the reverse situation; I now have a gold Visa and a gold
American Express Card, but I no longer have a checking account.  So
many places take credit cards, I decided to stop paying $75 a year for
the privelege of storing my money in a bank, instead I just pay the few
bills I have that don't take plastic with money orders, and pay my
credit cards directly.  (It also allows me to time my purchases that I
get 45 days without having to pay for the item, whether or not the
store offers credit, and both credit cards provide damage waivers if an
item purchased when using them is damaged or stolen; Perpetual Bank had
that privelege on its checking accounts, but Perpetual went into
receivership, and now no checking account I've found offers
damage/theft insurance.)

---
Paul Robinson - Paul@TDR.COM
Reports on Security Problems: To Subscribe write PROBLEMS-REQUEST@TDR.COM
Voted "Largest Polluter of the (IETF) list" by Randy Bush <randy@psg.com>


------------------------------

From: jswylie@delphi.com
Date: 18 Nov 94 20:47:44 -0500
Subject: Re: Must I Always Carry I.D?
Organization: Delphi (info@delphi.com email, 800-695-4005 voice)

    Steve Smith <sgs@access.digex.net> writes: In a lighter vein, one
    time I was picking up my car after having it repaired at the local
    dealer.  They required ID before they would release a car.  One of
    the forms of "acceptable ID" that they would accept is a state
    non-driver's ID ....

That isn't as crazy as it sounds.  I know of at least one person too
old to drive, and one blind person who own cars and have others drive
them around.  You don't have to be a driver to own a car.

--
John S. Wylie - Internet: jswylie@delphi.com


------------------------------

From: Heather Taylor Lorrains <htaylor@clark.edu>
Date: 17 Nov 1994 12:04:22 -0700 (PDT)
Subject: Help for a Student

I am doing a research paper reguarding privacy invasion via the internet 
such as acces to personal information or records and how or if you are 
protected by any laws.  What about finding out about banking accounts?  
Can just any one get access to see how much money you have or if you even 
have an account?  If so is there a way of blocking such information from 
being released.  Please send any information to htaylor@clark.edu

Thank-you Oh so much,
Heather Taylor


------------------------------

From: vberdaye@magnus.acs.ohio-state.edu (Vicente Berdayes)
Date: 17 Nov 1994 18:55:26 GMT
Subject: Prvcy, Healthcre Rfrm & Infrmtion Infrastrctre Cnfrnce
Organization: The Ohio State University

             PRIVACY, THE INFORMATION INFRASTRUCTURE
                      AND HEALTHCARE REFORM

                       A One Day Symposium
                          presented by

                  The Center for Advanced Study
                      in Telecommunications
                               &
           The National Regulatory Research Institute
                  at The Ohio State University

                         Co-sponsored by

                  Department of Communication,
              The Ohio State University Hospitals
                               &
                  The Ohio Supercomputer Center
                  at The Ohio State University

                    Friday, January 27, 1995
             The  Ohio State University's Ohio Union
            1739 N High Street, Columbus, Ohio 43210

The National Information Infrastructure and healthcare reform,
two policy initiatives high on the contemporary agenda, have
significant but generally overlooked implications for privacy.
This symposium will assemble a group of experts from the US and
Canada to explore these implications with participants drawn from
the private and public sectors of central Ohio.

The National Information Infrastructure may be understood as a
highly interconnected set of telecommunication networks with
greater capabilities for information collection and transfer than
available currently.  As this infrastructure develops, more and
more people will encounter it through their everyday
interaction,at work, while making purchases, while being
entertained, and in their daily communications.  The ongoing
shift to an electronic environment has already resulted in the
collection of greater amounts of information about the
population.  The information infrastructure will likely produce
more opportunities for monitoring social interactions.  One such
application is in the area of health information.

The current administration~s healthcare reform efforts seek to
control rapidly rising healthcare costs.  Most large scale
cost-control efforts in this area involve the use of computers
and telecommunications networks.  Centralization and
cross-checking of health-related information, broadening of the
array of health related information that is collected, and the
use of demographic profiles are examples of cost-control methods
made available by emerging telecommunications and computer
capabilities.  These developments are potentially privacy
threatening.  However, as with the information infrastructure,
privacy reduction is not inevitable.  New technologies such as
public-key cryptography and smart cards built into the design of
the healthcare infrastructure can yield cost control benefits and
privacy enhancement. Accordingly, decisions made at this point
concerning the shape of the information infrastructure and its
built-in privacy guarantees will have important ramifications on
the collection and use of personal information.

The one day symposium will provide a general overview of privacy
issues; in-depth and multi-perspective presentations on
infrastructure and health information issues, including current
policy developments; development of scenarios and proposals; and
will allow for audience interaction with the assembled experts.

                          REGISTER NOW!

     Conference fee is $100.00 including meals and materials

             Direct registration fee and inquiries to:
                            CAST/OSU
                3016 Derby Hall/154 N. Oval Mall
                     Columbus, OH 43210-1339
                        PH:  614/292-8444
                       FAX:  614/292-2055

            General Inquiries should be directed to:
                        Vicente Berdayes
                     Conference Coordinator
                          614/292-0080
           E-Mail: vberdaye@magnus.acs.ohio-state.edu

Register now by printing the following form and mailing it along
with the registration fee of $100 to:

CAST, 3016 Derby Hall, 154 N. Oval Mall, Columbus, OH
43210-1339.

Phone 614-292-8444. FAX 292-2055.
For further information, parking, directions, lodging, or bus
schedules, contact the CAST office.

Name:
Affiliation:
Address:
Phone:
E-Mail:


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 26 Sep 1994 12:45:51 -0500 (CDT)
Subject: Info on CPD, Contributions, Subscriptions, FTP, etc.
Organization: University of Wisconsin-Milwaukee

The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa.  The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.

If you read this from the comp.society.privacy newsgroup and wish to
contribute a message, you should simply post your contribution.  As a
moderated newsgroup, attempts to post to the group are normally turned
into eMail to the submission address below.

On the other hand, if you read the digest eMailed to you, you generally
need only use the Reply feature of your mailer to contribute.  If you
do so, it is best to modify the "Subject:" line of your mailing.

Contributions generally are acknowledged within 24 hours of
submission.  An article is printed if it is relevant to the charter of
the digest.  If selected, it is printed within two or three days.  The
moderator reserves the right to delete extraneous quoted material.  He
may change the subject line of an article in order to make it easier
for the reader to follow a discussion.  He will not, however, alter or
edit or append to the text except for purely technical reasons.

A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
Login as "ftp" with password identifying yourid@yoursite.  The archives
are in the directory "pub/comp-privacy".

People with gopher capability can most easily access the library at
gopher.cs.uwm.edu.

Mosaic users will find it at gopher://gopher.cs.uwm.edu.

Older archives are also held at ftp.pica.army.mil [129.139.160.133].

 ---------------------------------+-----------------------------------------
Leonard P. Levine                 | Moderator of:     Computer Privacy Digest
Professor of Computer Science     |                  and comp.society.privacy
University of Wisconsin-Milwaukee | Post:                comp-privacy@uwm.edu
Box 784, Milwaukee WI 53201       | Information: comp-privacy-request@uwm.edu
                                  | Gopher:                 gopher.cs.uwm.edu 
levine@cs.uwm.edu                 | Mosaic:        gopher://gopher.cs.uwm.edu
 ---------------------------------+-----------------------------------------


------------------------------

End of Computer Privacy Digest V5 #064
******************************
.