Date:       Sat, 17 Dec 94 10:18:14 EST
Errors-To:  Comp-privacy Error Handler <owner-comp-privacy@uwm.edu>
From:       Computer Privacy Digest Moderator  <comp-privacy@uwm.edu>
To:         Comp-privacy@uwm.edu
Subject:    Computer Privacy Digest V5#074

Computer Privacy Digest Sat, 17 Dec 94              Volume 5 : Issue: 074

Today's Topics:			       Moderator: Leonard P. Levine

                      What To Say To Junk Callers?
               Principles for Fair Information Practices
                           Facts About FAXes
                        New TX Drivers Licenses
                        Americans say: Brand Us!
                REVISED: Zimmermann Defense Fund Appeal
                   Re: Zimmermann Defense Fund Appeal
                        Re: Book re. PGP Manual
                         EPIC Alert 1.08 [long]
                Info on CPD, (unchanged since 11/28/94)

----------------------------------------------------------------------

From: jeffn@meaddata.com (Jeff Nye)
Date: 15 Dec 1994 20:26:11 GMT
Subject: What To Say To Junk Callers?
Organization: Mead Data Central, Dayton OH

I'm looking for the text of the (federal?) rule that requires junk
callers to honor my request to "Please take me off your calling list".

I have found this simple request to be *very* effective, so most
marketers seem to know about the rule.  But there are still some repeat
calls, so I'd like to have the approriate text near the phone so I can
read chapter and verse to the stubborn.  Anybody out there have a cite
or full text?

Thanks in advance for any info,


------------------------------

From: ELLINL@MAIL.STATE.WI.US
Date: 16 Dec 1994 08:57:02 -0600 (CST)
Subject: Principles for Fair Information Practices
Organization: The Office of the Privacy Advocate

          PRINCIPLES FOR FAIR INFORMATION PRACTICES IN 
              WISCONSIN STATE AND LOCAL GOVERNMENT

Preamble

Advances in computer and telecommunications technologies assure 
the continued growth of electronic information and transactional 
data that are collected, stored, analyzed, merged, linked and 
disseminated.  The following principles were developed by the 
Wisconsin Privacy Council to provide guidance for the use of 
personal information in a nation-wide interactive information 
highway.  The guidelines are intentionally broad and are not 
intended to address specific agency activities.  Although the 
principles are fundamental to the integrity and confidentiality 
of personal information used in an Information Age, some may need 
to be adapted to specific circumstances on an agency by agency 
basis.  Hopefully, they will also help guide policymakers and 
private companies alike to develop their own standards of fair 
information practices that attempt to balance two critical 
democratic values: individual privacy and the right to free 
speech.

*    No secret governmental record-keeping systems containing 
     identifiable personal information should exist.

*    In Wisconsin, there is a strong statutory presumption of 
     open government at both the state and local levels.  State 
     laws governing open records and open meetings are based on 
     that presumption, with exceptions clearly delineated by 
     statute and legal precedent.

*    A reasonable expectation of privacy and accuracy of 
     identifiable personal information is a characteristic of a 
     free society.  The statutory definition of personal 
     information is "any information that can be associated with 
     particular individual through one or more identifiers or 
     identifying circumstances".

*    Requests by government for identifiable personal information 
     that is not directly required by regulatory authority or 
     statutory mandate should be clearly labeled as "voluntary."

*    Any governmental authority that creates, maintains, uses, or 
     disseminates public records containing identifiable personal 
     information should establish specific procedures to ensure 
     the accuracy of information.  In addition, precautions 
     should be taken to prevent its unauthorized disclosure, 
     factual alteration, or distortion within the limitations of 
     Wisconsin law.

*    Governmental authorities should provide notice to 
     individuals, to the extent permitted by law, when 
     identifiable personal information obtained for one reason is 
     used or disclosed for a secondary purpose.  Absent such 
     notice or other provisions in the law, an individual should 
     have the means to prevent the secondary use or disclosure of 
     his/her personal information.

*    Except as otherwise provided by law, an individual should be 
     able to determine, without undue difficulty and in a timely 
     manner, what identifiable personal information exists in a 
     governmental record-keeping system and how it has been, or 
     will be, used.  Governmental officials responsible for 
     maintaining the record system should provide assistance in 
     locating the personal information being sought.

*    Except as otherwise provided by law, an individual should be 
     informed about procedures for inspecting, copying and 
     challenging the accuracy of any public record containing 
     their identifiable personal information.  It is desirable 
     that corrected or updated information then be provided to 
     all third parties who had previously obtained the 
     information, assuming the identities of these parties are 
     known.  However, individuals have a responsibility not to 
     abuse their privacy interests by making unreasonable, 
     inappropriate or costly demands regarding their own personal 
     information.

*    Governmental authorities should determine, record, and 
     maintain the source, date of collection, and date of 
     personal verification for all identifiable personal 
     information.

               The Office of the Privacy Advocate
                 148 East Wilson St., Suite 102
                        Madison, WI 53702
                      Phone: (608) 261-6261
                      Fax:   (608) 261-6264


------------------------------

From: ELLINL@MAIL.STATE.WI.US
Date: 16 Dec 1994 08:57:02 -0600 (CST)
Subject: Facts About FAXes
Organization: The Office of the Privacy Advocate

                        FACTS ABOUT FAXES

Many privacy abuses can result from errors and the carelessness 
of those who handle personal information, as well as inadequate 
security.  Responsible information-handling policies in the 
workplace and the implementation of regular training programs are 
critical to maintaining the privacy of personal information.  
This concept is particularly important when outlining proper 
procedures in sending facsimiles containing confidential or 
privileged information.  Like telephone conversations, fax 
transmissions may be intercepted or "tapped", and incorrect 
numbers can be dialed.

Many fax cover sheets merely contain a confidentiality statement 
which clarifies the intention that the fax should remain 
confidential.  Such statements often caution the recipient 
against reading the confidential or privileged material being 
sent; in reality, this may actually encourage a breach of 
confidentiality to occur.

The following provides an overview of key ideas to consider when 
developing policies for the transmittal of confidential facsimile 
documents.

Existing Capabilities of Fax Machines

The following features are available to secure the transmission 
of confidential personal information.

*    KEYLOCKS - This feature prevents information from being 
     transmitted or received unless the machine is "unlocked" by 
     an authorized person.  While impractical for the general 
     office use of a fax machine, it provides maximum security 
     for confidential fax transmittal.

*    CONFIDENTIAL MAILBOXES - This feature stores the transmittal 
     within the memory of the fax machine until a particular 
     receiver accesses the information by entering a password.  
     Problems can arise if the given password becomes widely 
     known.

*    ACTIVITY REPORTS - These reports can be programmed to be 
     issued by the fax machine and document:

     a) successful transmission
     b) the fax number of the destination which received the 
     document
     c) the number of pages successfully transmitted

Major Issues to Consider When Sending a Fax

*    THE CONFIDENTIALITY OF FAXES IS DIFFICULT TO INSURE 
     For this reason, confidential personal information should 
     not be faxed unless: a) whenever possible personal 
     identifiers are deleted from the document or otherwise 
     masked or b) one of the preceding safety features is 
     implemented.  The recipient should be notified before any 
     confidential information is sent.  The best policy is to 
     avoid faxing personal records.

*    MOST FAX MACHINES ARE LOCATED IN PUBLIC PLACES 
     Office policy should designate one person and a backup as 
     the authorities for fax transmissions.  In turn, the fax 
     machine should be placed where the authorized person(s) can 
     monitor and receive confidential transmissions.  Security is 
     difficult to insure if several departments or entities share 
     a single fax machine.

*    FAX NUMBERS CAN EASILY BE ENTERED IN ERROR 
     The fax machine, unlike a telephone, displays the 
     destination number before sending documentation.  This 
     should be confirmed by the sender before transmitting a 
     confidential document.  To insure security, the sender may 
     request an "activity report" (see first page), to keep with 
     the original fax reporting the successful and accurate 
     transmission.  Incorrect transmittals should immediately be 
     followed by a request from the sender that the document be 
     destroyed by the recipient of the fax.

*    FAXES MAY BE SEEN BY AN UNAUTHORIZED PARTY 
     To avoid this problem, the first page of a fax transmission 
     should always be a cover sheet which indicates the names and 
     fax numbers of the sender and receiver, as well as the 
     number of pages being sent.  Likewise, the receiver should 
     confirm the correct number of pages has been sent.

*    ESTABLISHED GUIDELINES CAN PREVENT BREACHES IN 
     CONFIDENTIALITY 
     By establishing written guidelines describing who is 
     responsible for safeguarding confidential information, what 
     security features are in place, and outlining proper 
     procedures, the confidentiality of faxed material can be 
     better insured. Offices should determine what constitutes 
     confidential information, as well as the protections and 
     proscriptions that should be applied.

*    FAX TRANSMISSION IS MOST SECURE DURING NORMAL BUSINESS HOURS
     For various reasons, such as the absence of authorized 
     personnel, fax transmissions will be most secure if sent 
     during regular office hours.  If the need arises for 
     confidential information to be faxed outside of the normal 
     working hours, an isolated fax machine in a secure 
     environment should be identified for transmittal.

*** If the confidentiality of sensitive or privileged information 
can not be guaranteed, the document or record should be sent by 
U.S. mail.

For more information on this or other privacy-related issues, 
contact:

               The Office of the Privacy Advocate
                 148 East Wilson St., Suite 102
                        Madison, WI 53702
                      Phone: (608) 261-6261
                      Fax:   (608) 261-6264


------------------------------

From: jaburns@jcpenney.com
Date: 16 Dec 94 12:18:06 CDT
Subject: New TX Drivers Licenses
Organization: JCPenney Co. Inc.

The Texas Department of Public Safety recently announced that they will
begin issuing new drivers licenses. Since there was some discussion of
mag strip encoded licenses in this forum in the past, I thought you
might be interested in this information.  The following quotes are from
a Dallas Morning News article, Dec 15, 1994.

"The state unveiled new driver's licenses Wednesday, complete with
high-tech security features to foil forgers and underage drinkers.

The cards.... include digital pictures and magnetically encoded strips
that merchants also can use to expedite sales..."

The article continues with further details.  Pictures for under 21
drivers (legal age for drinking) are on the left, others are on the
right. Forging protection includes lamination with the word "Texas"
that will glow under UV light. They will also include both bar codes
and a magnetic strip.  Additional forgery protection is being included
that they are not making public.  As drivers renew their licenses, they
will be required to leave an electronic thumb print to be used for "law
enforcement purposes".

As far as the magnetic strip, I'll quote the article:

"The magnetic strip will contain only the basic information - such as
date of birth, height, eye color and address - that appears on the
front of the card, Ms. Sibert said.

But the strip eventually will allow law enforcement officers to swipe
the driver's licenses through magnetic-strip reading equipment in
patrol cars for background checks instead of calling in the information
through dispatchers, she said.

The coding also will give retailers a way to expedit sales,
particularly involving checks and credit cards, Ms. Sibert said

Merchants who adapt existing magnetic-strip reading equipment -
currently used to read sales tags and credit cards - could eventually
encode customer information checks or search private data banks for
hot-check artists with a swipe of the card, Ms. Sibert said."

BTW - Ms. Sibert is Judy Sibert, the project manager for the new
cards.

As would be expected, the article puts great emphasis on the security
of the cards and the ease of use in both law enforcement situations as
well as other ID situations (check cashing, etc.).  There is very
little emphasis on the fact that your thumb print is electronically
recorded as a byproduct of this process.  Or on the fact that your
personal information (on the mag stripe) can now be quite easily loaded
into various merchants marketing and tracking databases.

One other area that I passed over above is that the pictures will not
be the old style photographs, but will be taken with digital cameras.
The article claims:

"...the most important aspect of the licenses for most people - their
pictures - should show some improvement, Ms. Sibert said.

'I can tell you the photos will be of a much higher quality because we
have the opportunity to view the photo before you leave the office.'
she said."

Could it be that the Texas DPS will now have a file of not only your
address, description and license type, but will now have your thumb
print and picture with it?  Ready for electronic dissemination as
needed???

I find it interesting to watch the marketing of the new license and the
public's reaction (or more likely, non-reaction) to the changes.  The
natural extension of this process could be the eventual introduction of
a "national driver's license (or ID card)", and maybe even "world"
instead of national.  Then, to prevent further forgeries and theft of
the ID cards, maybe there is a way to couple the ID closer to the
individual (change from a mag stripe to an encoded chip?? maybe even
plant it on the body???)

Not wanting to sound like an alarmist, just trying to stay aware of
possibilities....


------------------------------

From: vin@shore.net (Vin McLellan)
Date: 13 Dec 1994 11:44:47 -0500
Subject: Americans say: Brand Us!

Posted with permission from John Ford, APR, Public Affairs, Equifax

           CONSUMERS SUPPORT NATIONAL IDENTIFICATION SYSTEMS;
           EQUIFAX RELEASES 1994 CONSUMER PRIVACY SURVEY REPORT

ATLANTA, Dec. 12 /PRNewswire/ -- A significant majority of consumers
support national identification systems for employment and health care
purposes, according to the 1994 Equifax-Harris Consumer Privacy Survey
Report released today.

Sixty percent of consumers support establishment of a new national
identification system to curb illegal aliens being hired in the work
force.  Three quarters of the public would support such a system if
federal law were to restrict its use to immigration control and
employment verification.

If a federal law were to limit use of a national identification card to
verification of a person's work eligibility or status as a legal
resident, 65% of consumers would favor requiring such a national card
for all working Americans.

Sixty percent of the public favors having a health identification
number assigned to every citizen.  With additional safeguards such as
criminal penalties and the right to sue for misuse of the number,
almost 80% would favor such a national health number.

If some kind of national identifier were needed to administer a health
care insurance system, 66% of the respondents would find acceptable the
use of their Social Security number; 62% would like a unique physical
identifier such as a voiceprint or fingerprint; and 57% would want a
new national health number assigned.

C. B. Rogers, Jr., Equifax chairman and chief executive officer, said:
"This is our fifth annual consumer privacy survey.  In addition to the
privacy questions we track each year, this survey covers topics such as
national identification systems, health identification cards and other
types of identifiers, use of Social Security numbers, automobile
underwriting criteria and use of information by utility companies.
Many of the findings can make a valuable contribution to current public
policy debates."

The nationwide telephone survey was conducted by Louis Harris &
Associates in August/September 1994 among a cross section of 1,005
adults.  Sampling error is plus or minus three percentage points; each
point represents 1.91 million adults.

Equifax Inc. (NYSE: EFX), committed to Information Leadership in the
Information Age, is the leading provider of information solutions and
decision support services that help businesses grant credit, insure
lives and property, authorize checks, process credit card transactions,
market products, control health care costs, and complete other
transactions that benefit the economy, business and consumers.
Established in 1899 in Atlanta, Equifax today employs more than 12,000
associates throughout North and South America, the United Kingdom, and
continental Europe.  Revenues for the year ended December 31, 1993,
were more than $1.2 billion.

    /CONTACT:  John Ford, APR, Public Affairs, Equifax, 404-885-8309,
or, home, 404-414-9731/


------------------------------

From: hmiller@orion.it.luc.edu (Hugh Miller)
Date: 17 Dec 1994 06:10:35 GMT
Subject: REVISED: Zimmermann Defense Fund Appeal
Organization: Loyola University of Chicago

Tom Bryce at Duke (thanks, Tom!) has pointed out an important erratum
in my original fundraising post. I mistakenly gave out Phil Dubois's
net.address as "dubois@csm.org". This is WRONG: the correct address
is:

	dubois@csn.org

I apologize for the error. Since the post was signed, and just patching
it will mung the md5 hash, I have included the whole message below. If
you are reposting the message to other outlets, please use this new
revision (version 1.1!) instead.

Also, Irving Wolfe (thanks, Irving!) wrote me to suggest that persons
interested in donating to Phil's defense fund might like to see some
bona fides of my (and Phil Dubois's) relation to Phil Zimmermann, to
insure that the money donated is going where we say it is. I've
included something which (I hope) might go some way towards addressing
this concern in the revised post too.

Best wishes for a Happy Holidays to all on the Net (and off)!


------------------------------

From: Chuck Weckesser <71233.677@compuserve.com>
Date: 16 Dec 94 07:24:54 EST
Subject: Re: Zimmermann Defense Fund Appeal

Perhaps--just perhaps--Mr. Zimmerman isn't in such dire need of our
funds.

[moderator:  I am convinced that Mr Weckesser (or whoever is posting
in his name) is just submitting these messages to taunt the unwary.
He has not posted arguments that support his one-liners but just jabs
with them.  As moderator, not censor, I will post his material and
hope that he will defend his points.  Since he posts from compuserve I
cannot 'finger' his account to verify his presence.]


------------------------------

From: Bob Bales <74774.1326@CompuServe.COM>
Date: 16 Dec 1994 00:22:30 GMT
Subject: Re: Book re. PGP Manual
Organization: National Computer Security Association

Protect Your Privacy: The PGP User's Guide, is available from 
NCSA for $19.95.  As previously noted, NCSA will also contribute 
$1 of the proceeds to Phil Zimmermann's legal defense fund. 
Details about the book, and ordering information, will be EMailed 
upon request.

-- 
Bob Bales                   | CompuServe InfoSec Forum: GO NCSA
Natl Computer Security Assoc| Phone:  717-258-1816
10 South Courthouse Avenue  | Fax:    717-243-8642
Carlisle,  PA 17013         | Email:  74774.1326@compuserve.com


------------------------------

From: Dave Banisar <banisar@washofc.epic.org>
Date: 16 Dec 1994 14:36:56 EST    
Subject: EPIC Alert 1.08 [long]
Organization: Electronic Privacy Information Center

Date	12/16/94
Subject	EPIC Alert 1.08 
From	Dave Banisar
To	info

    =============================================================
      
       @@@@  @@@@  @@@  @@@@      @    @     @@@@  @@@@  @@@@@
       @     @  @   @   @        @ @   @     @     @  @    @
       @@@@  @@@    @   @       @@@@@  @     @@@   @@@     @
       @     @      @   @       @   @  @     @     @  @    @
       @@@@  @     @@@  @@@@    @   @  @@@@  @@@@  @   @   @
       
    
    ============================================================
    Volume 1.08                                December 16, 1994
    ------------------------------------------------------------
      
                        Published by the
           Electronic Privacy Information Center (EPIC)
                         Washington, DC

=======================================================================
Table of Contents: Special Issue: Privacy Resources
=======================================================================

 [1] Privacy Organizations
 [2] Publications
 [3] Net Sites for Privacy
 [4] Privacy Mailing Lists and Newsgroups
 [5] Donations for EPIC
 [6] Upcoming Conferences and Events
  
A regularly updated version of this issue will be available at
http://epic.digicash.com/epic and at cpsr.org
/cpsr/privacy/epic/privacy_resources.faq.

This issue is also available in html format from http://epic.digicash.com
/epic

Send additions, suggestions to alert@epic.org.

=======================================================================
[1] Privacy Organizations
=======================================================================

Electronic Privacy Information Center. EPIC was established in 1994 to
focus public attention on emerging privacy issues relating to the
National Information Infrastructure, such as the Clipper Chip, the
Digital Telephony proposal, medical records privacy and the sale of
consumer data. EPIC conducts litigation, sponsors conferences,
produces reports, publishes the EPIC Alert and leads campaigns on
privacy issues. For more info, email: info@epic.org, or
HTTP://epic.digicash.com /epic. EPIC, 666 Penn. Ave, SE, Suite 301,
Washington, DC 20003. (202) 544-9240 (tel). Director: Marc Rotenberg.

Privacy International. An international human rights group based in
London, England with offices in Washington, DC and Sydney, Australia.
PI has members in over 40 countries and has led campaigns against
privacy violations in numerous countries including Australia, New
Zealand, and the Philippines. PI publishes the International Privacy
Bulletin and sponsors international conferences on privacy issues.
Email pi@epic.org. Privacy International c/o EPIC, 666 Penn. Ave, SE,
Suite 301, Washington, DC 20003. Director General: Simon Davies.

US Privacy Council. A coalition of US privacy groups and individuals
founded in 1991 to deal with privacy issues in the US. USPC works in
Washington monitoring legislation and the activities of government
agencies. USPC works closely with other groups on privacy issues
including National ID cards, reforming credit reporting, Caller ID and
international issues. Email: privtime@access.digex.net. P.O. Box 15060,
Washington, DC 20003. (202) 829-3660 (tel). Chair: Evan Hendricks.

Privacy Rights Clearinghouse. A California-based organization formed
in 1992. The Clearinghouse has produced many fact sheets and an annual
report, and maintains a toll free hotline to provide advice to
consumers about their rights. Email: prc@teetot.acusd.edu. 5998 Alcala
Park, San Diego, CA 92110. (619) 260-4806 (tel). 800-773-7748 (in Cal.
only). Director: Beth Givens.

Computer Professionals for Social Responsibility. A national
membership organization of people concerned about the impact of
technology on society. CPSR sponsors an annual conference, maintains
numerous mailing lists on computer-related issues, a large internet
site of information and publishes a quarterly newsletter. It has 24
local chapters across the US and several international affiliates.
CPSR sponsors working groups on civil liberties, working in the
computer industry and others.  Contact: cpsr-info@cpsr.org. PO Box
717, Palo Alto, CA 94301. (415) 322-3778 (tel).  Managing Director:
Kathleen Kells.

Internet Society. Group dedicated to fostering evolution of the
Internet and its use. Sponsors yearly conference, publishes excellent
quarterly newsletter, works with standards committees to develop
Internet standards for networking and privacy. Email: isoc@isoc.org.
http://info.isoc.org/ 12020 Sunrise Valley Drive, Suite 270, Reston,
VA 22091. (703) 648-9888 (tel). Executive Director: Anthony Rutkowski.

Electronic Frontier Foundation. Formed in 1990. Maintains an Internet
site, publishes an electronic newsletter, and lobbies in Washington.
Email: info@eff.org. 1667 K St. NW, Suite 801, Washington, DC
20006-1605 USA  202-347-5400 (tel). Director: Andrew Taubman.

American Civil Liberties Union. National civil liberties organization.
Originally founded in 1920, the ACLU conducts extensive litigation on
Constitutional issues including privacy, and free speech. The ACLU
Washington office lobbies Congress for civil liberties and civil
rights issues. Email: infoaclu@aclu.org. 322 Eighth Ave, New York, NY
10001. Executive Director: Ira Glasser.

Cypherpunks. Informal group that develops technological solutions to
protect privacy. the Cypherpunks write cryptography and other
programs, set up anonymous remailers and discuss political and
technical issues. Meetings are also regularly held in California and
other states. ftp/gopher soda.berkeley.edu

Voters Telecom Watch. NY based cyber-rights lobbying group. In 1994
lobbied against the FBI Wiretap bill and for relaxation of export
controls on cryptography. Affiliated with Society for Electronic
Access. Contact: shabbir@panix.com

Society for Electronic Access. NY-based electronic civil liberties
organization promotes "civil liberties and access in cyberspace".
Email: sea@sea.org or http://www.panix.com/sea. P.O. Box 7081, New
York, NY 10116-7081. (212) 592-3801. President: Simona Nass.

EFF Austin. Austin, TX-based, electronic civil liberties organization
founded in 1990. Purpose is to engage in and support educational
activities that promote a clearer understanding of the social, legal,
and technical issues surrounding online telecommunications.  Contact:
eff-austin@zilker.net or (gopher/ftp).zilker.net.  Also see newsgroup
austin.eff. PO Box 18957, Austin, TX 78760. President: David Smith.

=======================================================================
[2] Publications
=======================================================================

Privacy Times. Biweekly newsletter on information law. Each issue
covers developments related to privacy and information access,
including summaries of court decisions on the Freedom of Information
Act and other relevant statutes. Editor: Evan Hendricks. Address: P.O.
Box 21501, Washington, DC 21501. (202) 829-3660. Cost: $250/Year

Privacy Journal. A monthly journal on mainly US privacy, now in its
20th year of publication. Editor: Robert Ellis Smith. P.O. Box 28577,
Providence, RI 02908. (401) 274-7861 (tel). Cost: $109/year. The PJ
also publishes numerous books and compendiums on privacy including its
excellent yearly Compilation of State and Federal Laws.

International Privacy Bulletin. Published quarterly by Privacy
International. The IPB covers international trends and new
technologies. Each issue also includes reports from different
countries and reviews of new publications. Editor: Dave Banisar. 666
Penn. Ave, SE #301, Washington, DC 20003. (202) 544-9240 (tel). Cost:
$50/year individuals, $200/year organizations.

Privacy and American Business. Published bi-monthly. A new publication
provides the industry perspective on privacy. Editor: Bob Belair.
Bimonthly with special issues. Two University Plaza, Suite 414,
Hackensack, NJ 07601. (201) 996-1154 (tel). Cost: $395/year.

Full Disclosure. A monthly newspaper on surveillance and civil
liberties issues. Editor: Glen Roberts.  Box 734, Antioch, IL 60002.
(708) 395-6200. Cost: $29.95/year.

Low Profile. Asset protection and financial privacy. Published
monthly. Editor: Mark Nestman. P.O. Box 84910, Phoenix, AZ 85701.
702-333-5942 (tel). Cost: $149/year.

Privacy and Security 2001. Technical aspects of privacy and security.
Focuses on electronic surveillance and counter-measures with recent
assaults on privacy highlighted. Editor Jim Ross. 504 Shaw Road, Suite
222, Sterling, VA 20166. (703) 318-8600.  10/year. $35/year.

2600 Magazine.  Inside technical information on telephone and computer
network operations. Published quarterly. Editor: Emmanual Goldstein.
Email 2600@well.sf.ca.us.  P.O. Box 752, Middle Island, NY 11953.
Cost:$21/year.

Privacy Law and Policy Reporter. A well written, law-oriented overview
of privacy developments in NZ and Australia. 10 issues/year. Level 11,
Carlton Centre, 55-63 Elizabeth Street, Sydney, NSW 2000, Australia.
61-2-221-6199 (tel). Cost: $AZ 345

Transnational Data and Communications Report. Bimonthly international
overview of privacy, data protection, telecommunications and
information access. Editor: Russell Pipe. P.O. Box 10528, Burke VA
22009-0528. Cost: $280/year.

Privacy Laws and Business. A quarterly comprehensive overview of
privacy issues in Europe. Focuses mainly on regulatory and data
protection from a business perspective.  Editor: Stewart Dresner.
Cost:  3 Central Avenue, Pinner, Middlesex HA5 5BT United Kindgom.
44-81-866-8641(tel). $UK 240/year.

=======================================================================
[3] Net Sites
=======================================================================

ACLU On-line Reading Room. Files on civil liberties. ftp/gopher
aclu.org

CPSR Internet Library. Maintains the online archives for CPSR, EPIC
Privacy International and others. FTP/Gopher/WAIS/HTTP cpsr.org /cpsr

Cypherpunks. Archives on cryptography and other privacy technologies.
ftp/gopher soda.berkeley.edu

Electronic Frontier Foundation Archives. Archives on privacy, free
speech, underground newsletters. http://WWW.eff.org, FTP: ftp.eff.org

Electronic Privacy Information Center. Includes back issues of EPIC
Alert, privacy resources, legislation, and articles.
http://www.epic.digicash.com/

Privacy Rights Clearinghouse. http://www.manymedia.com/prc/ E-mail:
prc@teetot.acusd.edu. Gopher: gopher.acusd.edu FTP:ftp.acusd.edu.
Telnet: teetot.acusd.edu (local> c teetot, login: privacy). BBS:
619-260-4670 (same login as telnet).

=======================================================================
[4] Electronic Newsgroups and Mailing Lists
=======================================================================

Unmoderated Newsgroups and mailing lists:

Alt.privacy. Unmoderated discussion on privacy. High traffic, low
content.

Alt.privacy clipper. Unmoderated discussion of the Clipper chip and
encryption policy.

Comp.org.cpsr.talk. Unmoderated discussion of issues related to the
Computer Professionals for Social Responsibility. Topics include
privacy, the NII, telecommunications reform and social implications of
technology.

Comp.org.eff.talk. Unmoderated discussion of issues related to the
Electronic Frontier Foundation.

Cypherpunks Mailing list. Discussion of cryptography and technical
protections of privacy. Warning: High Traffic (100+ messages/day).

Sci.crypt. Unmoderated technical discussion of encryption.

talk.politics.crypto. Unmoderated discussion of the Clipper chip and
encryption policy.

Moderated Newsletters and Digests:

EPIC Alert. Biweekly electronic newsletter of the Electronic Privacy
Information Center. Mail to listserv@cpsr.org. 1st line: subscribe
cpsr-announce. Back issues at cpsr.org /cpsr/alert and
http://www.epic.digicash.com/

CPSR-Global. A new CPSR sponsored mailing list on Global information
infrastructure issues. Moderator: Marsha Woodbury. To subscribe, email
listserv@cpsr.org with the 1st line: subscribe cpsr-global

Risks Digest. Moderated digest on risks to the public using computers
and related systems. Newsgroup: comp.risk.  Also available as mailing
list from  email: risks-request@csl.sri.com 1st line: SUBSCRIBE.  Back
Issues at ftp unix.sri.com /risks. Moderator: Peter Neumann.

Computer Privacy Digest. Moderated digest on privacy. Newsgroup:
comp.society.privacy.  at wam.uwm.edu. Moderator: Len Levine. To
Subscribe, email: comp-privacy-request@uwm.edu, 1st line "subscribe"
Back issues gopher: gopher.cs.uwm.edu, ftp: ftp.cs.uwm.edu/comp-priv.

Computer Underground Digest. Weekly moderated digest on computer
underground, privacy, free speech issues. Newsgroup:
comp.society.cu-digest. Email at LISTSERV@VMD.CSO.UIUC.EDU, 1st line:
SUB CUDIGEST <your name>. Back issues at etext.archive.umich.edu
/pub/CuD/. Moderator: Jim Thomas.

Computer Privacy Forum. Moderated digest on privacy sponsored by ACM.
To subscribe, send message: help to privacy-request@vortex.com. Back
issues at ftp.vortex.com /privacy or http://www.vortex.com/.
Moderator: Lauren Weinstein.

Comp.org.cpsr.announce. Moderated mailing list for CPSR. Includes EPIC
Alert, and other CPSR newsletters and releases. Also available as
mailing list. See EPIC Alert for subscription info.

VTW Announce. Moderated mailing list of Voters Telecomm Watch. Email
listproc@panix.com, 1st line of the message: SUBSCRIBE VTW-ANNOUNCE
<your name>.

=======================================================================
[5] Contributions to EPIC
=======================================================================

If you'd like to support the work of the Electronic Privacy
Information Center, contributions are welcome and fully
tax-deductible. Checks should be made out to "The Fund for
Constitutional Government" and sent to EPIC, 666 Pennsylvania Ave.,
SE, Suite 301, Washington DC 20003.

Your contributions will help support Freedom of Information Act
litigation, strong and effective advocacy for the right of privacy and
efforts to oppose Clipper and Digital Telephony wiretapping proposals.

=======================================================================
[6] Upcoming Privacy Related Conferences and Events
=======================================================================

1995 Data Security Conference. Jan 9-11, 1995. Redwood City, CA.
Sponsored by RSA Data Security. Contact: kurt@rsa.com.

Second International Conference on Information Warfare: "Chaos on the
Electronic Superhighway" Jan 18-19, Montreal, CA. January 18, 1995,
Sponsored by NCSA. Contact: Mich Kabay (75300.3232@compuserve.com).

Privacy, The Information Infrastructure and Healthcare Reform, Ohio
State University, Columbus, OH,  Jan. 27.  Contact:
vberdaye@magnus.acs.ohio-state.edu.

Towards an Electronic Patient Record '95. Orlando, FL. Mar. 14-19,
1995. Sponsored by Medical Records Institute. Contact: 617-964-3926
(fax).

Access, Privacy, and Commercialism:  When States Gather Personal
Information, College of William and Mary, Williamsburg, VA, March 17.
Contact:  Trotter Hardy  804 221-3826.

Computers, Freedom and Privacy '95. Palo Alto, Ca. Mar. 28-31, 1995.
Sponsored by ACM. Contact: cfp95@forsythe.stanford.edu.

ETHICOMP95:  An international conference on the ethical issues of
using Information Technology, DeMontfort University, Leicester,
ENGLAND, March 28-30, 1995.  Contact: Simon Rogerson srog@dmu.ac.uk 44
533 577475 (phone)  44 533 541891 (Fax).

1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 8-10.
Contact:  sp95@itd.nrl.navy.mil.

INET '95. Honolulu, HI. June 28-30, 1995. Sponsored by the Internet
Society. Contact inet95@isoc.org.

Key Players in the Introduction of Information Technology: Their
Social Responsibility and Professional Training. July 5-6-7, 1995.
Namur, Belgium. Sponsored by CREIS. Contact: nolod@ccr.jussieu.fr.

          (Send calendar submissions to Alert@epic.org)
  

=======================================================================

The EPIC Alert is a free biweekly publication of the Electronic
Privacy Information Center. To subscribe, send the message:

SUBSCRIBE CPSR-ANNOUNCE Firstname Lastname

to listserv@cpsr.org. You may also receive the Alert by reading the
USENET newsgroup comp.org.cpsr.announce.

Back issues are available via FTP/WAIS/Gopher/HTTP from cpsr.org
/cpsr/alert and on Compuserve at Keyword: NCSA, Library 2
(EPIC/Ethics). A HTML version of the current issue is available from
epic.digicash.com/epic

=======================================================================

The Electronic Privacy Information Center is a public interest
research center in Washington, DC.  It was established in 1994 to
focus public attention on emerging privacy issues relating to the
National Information Infrastructure, such as the Clipper Chip, the
Digital Telephony proposal, medical record privacy, and the sale of
consumer data.  EPIC is sponsored by the Fund for Constitutional
Government and Computer Professionals for Social Responsibility. EPIC
publishes the EPIC Alert and EPIC Reports, pursues Freedom of
Information Act litigation, and conducts policy research on emerging
privacy issues. For more information, email info@epic.org, WWW at
HTTP://epic.digicash.com /epic or write EPIC, 666 Pennsylvania Ave.,
SE, Suite 301, Washington, DC 20003. (202) 544-9240 (tel), (202)
547-5482 (fax).

The Fund for Constitutional Government is a non-profit organization
established in 1974 to protect civil liberties and constitutional
rights. Computer Professionals for Social Responsibility is a national
membership organization of people concerned about the impact of
technology on society. For information contact: cpsr-info@cpsr.org

 ------------------------ END EPIC Alert 1.08 ------------------------

_________________________________________________________________________
Subject: EPIC Alert 1.08
_________________________________________________________________________
David Banisar (Banisar@epic.org)       * 202-544-9240 (tel)
Electronic Privacy Information Center  * 202-547-5482 (fax)
666 Pennsylvania Ave, SE, Suite 301    * ftp/gopher/wais/HTTP 
Washington, DC 20003                   * cpsr.org /cpsr/privacy/epic


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 28 Nov 1994 08:46:14 -0600 (CST)
Subject: Info on CPD, (unchanged since 11/28/94)
Organization: University of Wisconsin-Milwaukee

The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa.  The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.  

This digest is a forum with information contributed via Internet
eMail.  Those who understand the technology also understand the ease of
forgery in this very free medium.  Statements, therefore, should be
taken with a grain of salt and it should be clear that the actual
contributor might not be the person whose email address is posted at
the top.  Any user who openly wishes to post anonymously should inform
the moderator at the beginning of the posting.  He will comply.

If you read this from the comp.society.privacy newsgroup and wish to
contribute a message, you should simply post your contribution.  As a
moderated newsgroup, attempts to post to the group are normally turned
into eMail to the submission address below.

On the other hand, if you read the digest eMailed to you, you generally
need only use the Reply feature of your mailer to contribute.  If you
do so, it is best to modify the "Subject:" line of your mailing.

Contributions generally are acknowledged within 24 hours of
submission.  An article is printed if it is relevant to the charter of
the digest and is not redundant or insulting.  If selected, it is
printed within two or three days.  The moderator reserves the right to
delete extraneous quoted material.  He may change the subject line of
an article in order to make it easier for the reader to follow a
discussion.  He will not, however, alter or edit or append to the text
except for purely technical reasons.

A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
Login as "ftp" with password identifying yourid@yoursite.  The archives
are in the directory "pub/comp-privacy".

People with gopher capability can most easily access the library at
gopher.cs.uwm.edu.

Mosaic users will find it at gopher://gopher.cs.uwm.edu.

Older archives are also held at ftp.pica.army.mil [129.139.160.133].

 ---------------------------------+-----------------------------------------
Leonard P. Levine                 | Moderator of:     Computer Privacy Digest
Professor of Computer Science     |                  and comp.society.privacy
University of Wisconsin-Milwaukee | Post:                comp-privacy@uwm.edu
Box 784, Milwaukee WI 53201       | Information: comp-privacy-request@uwm.edu
                                  | Gopher:                 gopher.cs.uwm.edu 
levine@cs.uwm.edu                 | Mosaic:        gopher://gopher.cs.uwm.edu
 ---------------------------------+-----------------------------------------


------------------------------

End of Computer Privacy Digest V5 #074
******************************
.