Date:       Tue, 20 Dec 94 11:57:05 EST
Errors-To:  Comp-privacy Error Handler <owner-comp-privacy@uwm.edu>
From:       Computer Privacy Digest Moderator  <comp-privacy@uwm.edu>
To:         Comp-privacy@uwm.edu
Subject:    Computer Privacy Digest V5#075

Computer Privacy Digest Tue, 20 Dec 94              Volume 5 : Issue: 075

Today's Topics:			       Moderator: Leonard P. Levine

                  Re: 3 Hits and you're Out? (SSN use)
                         Government vs. Citizen
                    Re: What to say to Junk Callers?
                      Re: Americans say: Brand Us!
                 Moderation of Computer Privacy Digest
                     PRIVACY Forum Status [not CPD]
                         Conference ETHICOMP95
                Info on CPD, (unchanged since 11/28/94)

----------------------------------------------------------------------

From: Robert Ellis Smith <0005101719@mcimail.com>
Date: 16 Dec 94 13:20 EST
Subject: Re: 3 Hits and you're Out? (SSN use)

On Dec. 5, 1994, Geoffrey Knauth asked whether the mere fact that
someone inquires into your credit-bureau file may have negative
consequences for you.  The answer is yes.  Credit grantors regard an
inquiry from a company into your credit file without any evidence in
your  credit file that the company subsequently granted you credit as
evidence that the company rejected you.  To many credit grantors, three
inquiries in a short period of time without any granting of credit
indicates that your credit applications have been r ejected three
times.  That's enough for other companies to reject you.

Most credit grantors - retail stores, banks, credit-card issuers, etc.
- mindlessly follow the credit scorecard issued by Fair-Isaacs Co.
According to the scorecard (which was published in Privacy Journal
July 1994), two or three inquiries into your fil e result in plus five
points on the scorecard; but four inquiries result in MINUS five points
and five or six inquiries result in MINUS 16 points.  You figure.
About the only thing worse on their scorecard is getting two or more
major derogatory credit r eferences.

Robert Ellis Smith, Publisher Privacy Journal 401/274-7861
0005101719@mcimail.com


------------------------------

From: Scott.Nuchow@f120.n109.z1.fidonet.org (Scott Nuchow)
Date: 18 Dec 94 04:08:56 -0500
Subject: Government vs. Citizen
Organization: Fidonet: TIDMADT 703-765-0822 

I was browsing through some forty odd messages dealing with DMV, caller
ID, proposed federal legislation, etc.  Perhaps it is because I am a
neophyte at this, or maybe I am just plain cynical.  But, my experience
is that no matter what laws are passed, personal information will
always become public, especially if it is the government that wants
it.  This problem is growing, especially as records and documents are
fed into computers.  Computers makes dissemination of of information
easier and that spells problems, especially when hard copy, paper
records are wrongfully obtained.  I am an attorney and, when I
represent defendants, I frequently ask or demand that the government
turn over documents.  Usually, nothing happens and the judges go along
with the excuse that either such records do not exist or that the
records are secret based on some type of privilege.  I tried to obtain
the psychiatric records of a complaining witness to prove the witness
was schizophrenic.  This would have been exculpatory and showed that
the witness may not have witnessed anything other than that which was
constructed through illness.  I was not able to obtain the records
because this was a civil case and the government does not have to turn
over exculpatory information in non-criminal cases despite ethical
rules stating that the government must act in the interests of
justice.  I took a plea.  However, six months later, the government
obtained the same records from St.  Elizabeth's Hospital.  The release
of this information was quite illegal since the witness never gave
permission.  You expect to have privacy over computer lines?  Hell will
freeze over first.

--
Fidonet:  Scott Nuchow 1:109/120
Internet: Scott.Nuchow@f120.n109.z1.fidonet.org


------------------------------

From: jeffn@meaddata.com (Jeff Nye)
Date: 19 Dec 1994 16:24:57 GMT
Subject: Re: What to say to Junk Callers?
Organization: Mead Data Central, Dayton OH

Found what I needed at the Privacy Rights Clearinghouse, 
http://www.manymedia.com/prc/ .

Here's an excerpt from their http://www.manymedia.com/prc/telemarket.html :

 o "Do not call" lists. The Federal Communications Commission
   requires telemarketers to take you off their list if you ask them
   to do so as enacted in the Telephone Consumer Protection Act (47
   USC section 227). They must maintain "do not call" lists of all
   residences who do not want to be contacted. If you are called
   again after you have asked to be removed from a telemarketer's
   list, you can lodge a complaint with the Federal Communications
   Commission and/or file suit in small claims court. Nonprofit and
   tax-exempt organizations are not required to keep "do not call"
   lists. (For more details about "do not call" procedures, see 47
   CFR Part 64.1200.)


------------------------------

From: pmacghee@motown.ge.com (Peter F. MacGhee, x 2266)
Date: 19 Dec 1994 19:00:33 GMT
Subject: Re: Americans say: Brand Us!
Organization: Martin Marietta Corp, Moorestown NJ

    From vin@shore.net (Vin McLellan) CONSUMERS SUPPORT NATIONAL
    IDENTIFICATION SYSTEMS; EQUIFAX RELEASES 1994 CONSUMER PRIVACY
    SURVEY REPORT Sixty percent of consumers support establishment of a
    new national identification system to curb illegal aliens

60%???  Wow!  Nobody asked me.  Did anybody ask You?  Do you want to be
"Branded?"  Not me, thanks!

--
"Pete MacGhee Jr.
pmacghee@motown.ge.com  
>> Extraordinary bright, witty comment goes here <<"


------------------------------

From: Ted Lemon <mellon@ipd.wellsfargo.com>
Date: 19 Dec 1994 11:01:23 -0800
Subject: Moderation of Computer Privacy Digest

    The moderator stated:  I am convinced that Mr Weckesser (or whoever
    is posting in his name) is just submitting these messages to taunt
    the unwary.  He has not posted arguments that support his
    one-liners but just jabs with them.  As moderator, not censor, I
    will post his material and hope that he will defend his points.
    Since he posts from compuserve I cannot 'finger' his account to
    verify his presence.

I have always assumed that the moderator's job was to increase the
signal-to-noise ratio of a mailing list or newsgroup by (a) filtering
out flames, (b) combining duplications and (c) killing threads that are
being beaten to death.   While Mr. Weckesser is not being loud and
obnoxious, his postings are essentially content-free, and thus would
appear to qualify for exclusion under (a).

There's always a risk that a moderator will, for personal reasons, take
it upon him- or herself to edit out messages that should have been
included.  To mitigate this risk, I think that the raw feed for a
mailing list should be available to interested parties.  However,
another risk is that a moderator will, in the interests of fairness,
allow stuff through that really should have been edited out.

I think you are to be complimented for your desire to be fair, but I
hope the general reaction of this group is, like mine, that Chuck's
postings should be edited out until such time as he starts saying
something both interesting *and* informative.

Either way, thanks for moderating - I know it's a lot of work.

--
Ted Lemon		      Wells Fargo Bank, Information Protection Division
mellon@ipd.wellsfargo.com					+1 415 477 5045

[moderator: I received several valid criticism for posting Mr
Weckesser's remarks and I take them to heart.  I will modify my
moderation to agree with the remarks above.]


------------------------------

From: "Prof. L. P. Levine" <levine>
Date: 20 Dec 1994 09:31:32 -0600
Subject: PRIVACY Forum Status [not CPD]

[This discusses the Privacy Forum Digest, not this, the Computer
Privacy Digest.  Lauren needs help and deserves it if you can get him
the access he describes here.  L. Levine, moderator CPD]

		   PRIVACY Forum Status and Problems
		   ---------------------------------
			       12/16/94

This message contains important information regarding the status of the
PRIVACY Forum.

I'm happy to continue the gratis offering of the growing amount of time
and resources it takes to keep the PRIVACY Forum going, so long as I am
able, since I consider it to be an important and worthwhile
undertaking.

However, I'm very sorry to report that external circumstances may force
the termination of *all* PRIVACY Forum services (digest, ftp, gopher,
WWW, etc.) in the *extremely* near future, due to the probable loss of
the current network connection and lack of sufficient funds to obtain a
replacement connection.  I've been attempting to find a way to replace
the necessary PPP or SLIP connection via locally accessible points here
in the Los Angeles area, so far without success.

If the situation does not change very shortly, I will post a message
with the details.  In the meantime, if you wish more information about
this situation or have suggestions regarding available connection
points or entities who might be interested in helping to sponsor the
continued work of the Forum, please contact me directly by email.

Thank you for your continuing support of the PRIVACY Forum.

Lauren Weinstein
PRIVACY Forum Moderator
lauren@vortex.com


------------------------------

From: Simon Rogerson <srog@de-montfort.ac.uk>
Date: 19 Dec 1994 11:37:29 +0000 (GMT)
Subject: Conference ETHICOMP95

An international conference on the ethical issues of using Information
Technology

28th, 29th and 30th March 1995

Queen's Building,
De Montfort University
Leicester UK

Co-directors
Simon Rogerson, Department of Information Systems,=20
De Montfort University
Terrell Ward Bynum, Director Research Center on Computing and
Society,=20
Southern Connecticut State University

 ------------------------------------------------------------------

The programme of events for ETHICOMP95 provides an excellent forum for
stimulating debate on fundamental issues relating to the development
and use of Information Technology and Information Systems. There will
be an opportunity to consider approaches based on the different
cultures and countries of both conference presenters and conference
delegates. The three-day conference consists of three parallel themes.
Each theme will comprise a series of papers and workshops.

There will be three broad themes within the conference programme

ETHICAL DEVELOPMENT
 -------------------

This is concerned with the use of development methodologies and the
consideration of ethical dilemmas, user education and professionalism.

ETHICAL TECHNOLOGY
 ------------------

This is concerned with the advances in technologies and the likely
ethical issues they raise as they are applied to business and societal
problems.

ETHICAL APPLICATION
 -------------------

This is concerned with developing ethical strategies which allow
technology to be exploited in an ethically acceptable way.

CONFERENCE ATTRACTIONS INCLUDE
 ------------------------------

* Keynote presentations will be given by

  Professor William Maner, Bowling Green University, US
    Professor Maner has been a leading authority on Computer Ethics in
    US for over 25 years. He has produced many books and papers on the
    subject and has been prominent in establishing the subject as a
    mandatory element of Computer Science education accredited by ACM
    and IEEE.

  Mrs Elizabeth France, Data Protection Registrar, UK
    Before taking becoming Data Protection Registrar, Mrs France was
    head of the Home Office's Information and Pay Services Division. A
    member of the Committee for the Co-ordination of Computerisation in
    the Criminal Justice System and of the CCTA's Computers Committee
    Mrs France has extensive experience of national computing policy
    making.

  Professor Jacques Berleur, Namur, Belgium
    Professor Berleur was chairman of the IFIP task group which has
    produced the strategic report entitled  "IFIP Framework for Ethics"
    and recently endorsed by IFIP. This work establishes an approach to
    addressing Computer ethics from a global perspective.

* Presentation of refereed papers

* Interactive  workshops

* Information stalls and interactive demonstrations

* Bookstall with books and journals on Computer Ethics

* Conference dinner at the prestigious location of Bosworth Hall

KEY BENEFITS
 ------------

* An update of the current and future ethical dilemmas facing IS/IT

* An opportunity to exchange ideas on ethical practices with
  colleagues from different work environments and cultures

* Guidance on how to develop and implement more acceptable systems

* Research-oriented and practically-oriented sessions providing a
  unique opportunity for knowledge dissemination

WHO SHOULD ATTEND
 -----------------

Educators, researchers and practitioners in the field of IS/IT

Decision makers in industry and commerce responsible for the
application of IS/IT

ACCOMMODATION
 -------------

Belmont House Hotel

Telephone (+44) 533 544773  Fax (+44) 533 470804

Bed and breakfast daily rate   double: 7=9C4 ponds, single: =9C63.5 pounds
(state DMU rate)

The Grand Hotel

Telephone (+44) 533 555599  Fax (+44) 533 544736

Bed and breakfast daily rate   double: 76 pounds, single: 58 pounds
(state DMU rate)

Stoneycroft Hotel

Telephone (+44) 533 707605  Fax (+44) 533 706067

Bed and breakfast daily rate
                          double: from =9C33 pounds, single: from 24 pounds

It is recommended that accommodation is booked well in advance.
Details are correct at time of going to press.

FEES AND REGISTRATION
 ---------------------

The conference fee of $375 (=9C250) includes conference
proceedings, refreshments, lunches and the conference dinner. All
conference fees must be paid in sterling by cheque or money order
in advance.

Registration paid in full on or before 15th February 1995 will
receive a $25 discount. The fee will then be $350 (=9C235)

Fees are inclusive of VAT

To register please provide the following information and include
a cheque or money order for the appropriate amount made payable
to De Montfort Expertise. These should be sent to

Sue Colledge
ETHICOMP95
External Relations
De Montfort University
The Gateway
Leicester LEI 9BH
UK                Tel:   (+44) 533 577354    Fax:   (+44) 533 577533

 -----------------------------------------------------------------------

ETHICOMP95           28th, 29th and 30th March 1995
 ----------           ------------------------------

BOOKING FORM
 ------------

Title                                              First Name

Surname

Position

Organisation

Address

Telephone                     Fax              E-mail=20

Accommodation should be booked direct with the hotels.

Joining Instructions will be issued approximately two weeks
before the date of the conference.

Cancelled bookings may incur a cancellation fee. If written
notification of cancellation reaches us later than 10 days before
the conference commences we reserve the right to charge the full
fee.

 ---------------------------------------------------------------------


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 28 Nov 1994 08:46:14 -0600 (CST)
Subject: Info on CPD, (unchanged since 11/28/94)
Organization: University of Wisconsin-Milwaukee

The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa.  The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.  

This digest is a forum with information contributed via Internet
eMail.  Those who understand the technology also understand the ease of
forgery in this very free medium.  Statements, therefore, should be
taken with a grain of salt and it should be clear that the actual
contributor might not be the person whose email address is posted at
the top.  Any user who openly wishes to post anonymously should inform
the moderator at the beginning of the posting.  He will comply.

If you read this from the comp.society.privacy newsgroup and wish to
contribute a message, you should simply post your contribution.  As a
moderated newsgroup, attempts to post to the group are normally turned
into eMail to the submission address below.

On the other hand, if you read the digest eMailed to you, you generally
need only use the Reply feature of your mailer to contribute.  If you
do so, it is best to modify the "Subject:" line of your mailing.

Contributions generally are acknowledged within 24 hours of
submission.  An article is printed if it is relevant to the charter of
the digest and is not redundant or insulting.  If selected, it is
printed within two or three days.  The moderator reserves the right to
delete extraneous quoted material.  He may change the subject line of
an article in order to make it easier for the reader to follow a
discussion.  He will not, however, alter or edit or append to the text
except for purely technical reasons.

A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
Login as "ftp" with password identifying yourid@yoursite.  The archives
are in the directory "pub/comp-privacy".

People with gopher capability can most easily access the library at
gopher.cs.uwm.edu.

Mosaic users will find it at gopher://gopher.cs.uwm.edu.

Older archives are also held at ftp.pica.army.mil [129.139.160.133].

 ---------------------------------+-----------------------------------------
Leonard P. Levine                 | Moderator of:     Computer Privacy Digest
Professor of Computer Science     |                  and comp.society.privacy
University of Wisconsin-Milwaukee | Post:                comp-privacy@uwm.edu
Box 784, Milwaukee WI 53201       | Information: comp-privacy-request@uwm.edu
                                  | Gopher:                 gopher.cs.uwm.edu 
levine@cs.uwm.edu                 | Mosaic:        gopher://gopher.cs.uwm.edu
 ---------------------------------+-----------------------------------------


------------------------------

End of Computer Privacy Digest V5 #075
******************************
.