Date:       Fri, 17 Mar 95 17:45:01 EST
Errors-To:  Comp-privacy Error Handler <owner-comp-privacy@uwm.edu>
From:       Computer Privacy Digest Moderator  <comp-privacy@uwm.edu>
To:         Comp-privacy@uwm.edu
Subject:    Computer Privacy Digest V6#027

Computer Privacy Digest Fri, 17 Mar 95              Volume 6 : Issue: 027

Today's Topics:			       Moderator: Leonard P. Levine

                              Re: Net Rape
                            Re: SSN Question
                            Re: SSN Question
                            Re: SSN Question
                            Re: SSN Question
           Private Medical Records Available Online in Mass.
               Can My Neighbor Peruse My Medical Records?
                      Re: Proving your Citizenship
                      Re: Proving your Citizenship
                       Privacy Subscription Lists
                          E-Mail Privacy Cases
                  Company Policies on Internal E-Mail
                          Re: Cordless Phones
                          Re: Privacy Research
              How to Remove Your Name from Junk Mail Lists
                 Need Information on Microchip Implants
                            AT&T Encryption
      Alert #2: Fifth Conference on Computers, Freedom and Privacy
                 Info on CPD [unchanged since 12/29/94]

----------------------------------------------------------------------

From: markg@shadow.net (Mark G.)
Date: 11 Mar 1995 18:57:54 -0500
Subject: Re: Net Rape
Organization: Shadow Information Services, Inc.

    Arthur Anderson (aca3@netaxs.com) wrote: For the most part, the
    InterNet has been a realm of free and friendly information
    exchange. Lately, however, things have been changing quite a bit.
    With all the hype regarding the information superhighway (AKA
    Infobahn), more and more opportunists are feeding upon the trusting
    nature of optimistic Net users.  Writings and ideas are being
    stolen, and there's little that can be done about it without
    sacrificing the ideals of free communication.

Just don't put on the net stuff that isn't already copyrighted. Problem
solved.

-- 
               | The pen is mightier than the sword.
8*<%%%%%%%%%%%%|+>-================================-----------
               | But, the sword sure hurts a hell of a lot more.


------------------------------

From: cm5585@scitsc.wlv.ac.uk (J.Tench)
Date: 12 Mar 1995 15:32:14 -0000
Subject: Re: SSN Question
Organization: University of Wolverhampton, U.K.

Is the USA Social Security Number, something akin to our (UK) National
Insurance Number, if yes (or no really) what body of peoples ask to see
it.  If no, then what is it exactly.

-- 
   ~)~.      ~)~   _   _ |_    ||    || ||\ || || || \\ // 
 (_/ / /')   / (' / ) (_ | )   ||    || ||\\|| || ||  )X(  
 Wolverhampton Polyversity     ||__| || || \|| \\_// // \\ 
 E_MAIL cm5585@scitsc.wlv.ac.uk           UNIX++  


------------------------------

From: gmcgath@condes.MV.COM (Gary McGath)
Date: 12 Mar 1995 12:44:58 GMT
Subject: Re: SSN Question
Organization: Conceptual Design

    wmccarth@t4fsa-gw.den.mmc.com (Wil McCarthy) wrote: This
    requirement stems from the fact that publishers have to withold
    taxes from payments to an author if they pay him more than $600 in
    a year, and as of 1994 I believe they have to file a 1099-MISC on
    you for "information purposes" if they pay you anything at all.
    IRS has no repect for your privacy.

That doesn't answer my question, though, of what the law requires them
to do if they don't get an SSN.

This is also of concern to me from the other end; I'm in a 501(c)(3)
organization that has published a songbook and pays paltry royalties to
contributors. It may be that we'll have to file a bunch of nuisance
1099's (though I seem to recall that payments less than $20 still don't
have to be reported); and if any of the contributors don't provide
SSN's, we might have to pay them under the table if the IRS in fact
orders the voiding of contracts. But so far no one's cited a reg to
that effect.

But the way the government has crippled small organizations is another
story, for another newsgroup.

-- 
Gary McGath
gmcgath@condes.mv.com
PGP Fingerprint: 3E B3 62 C8 F8 9E E9 3A  67 E7 71 99 71 BD FA 29


------------------------------

From: Barry Gold <barryg@sparc.sandiegoca.attgis.com>
Date: 13 Mar 1995 23:44:22 GMT
Subject: Re: SSN Question
Organization: AT&T GIS (San Diego, CA)

    Gary McGath <gmcgath@condes.MV.COM> wrote: Recently a magazine sent
    me a set of writer's guidelines, which contained the following
    remarkable (to me, anyway) claim: "Please understand that, by law,
    we can not send payment for an article until we have your personal
    information including your social security number." Does anyone
    know if this is true? [snip]

It's probably because the IRS wants to get a form 1099-R from the
magazine, so they can track your income.  It's part of the general
tendency of the govt to use taxation as an excuse to intrude into more
and more of our lives.  Similarly with child support, the "war on
drugs" and other supposedly beneficial purposes.

Actually, I suspect they also couldn't *use* your article without the
appropriate paperwork, just as an employer wouldn't be able to hire you
without your SSN to they can file W-2s with the IRS.  Once they print
your article, I suspect they're contractually obligated, although you
might have to take them to court to collect.

-- 
Barry.Gold@SanDiego.NCR.COM


------------------------------

From: rthomas007@aol.com (RThomas007)
Date: 16 Mar 1995 00:50:41 -0500
Subject: Re: SSN Question
Organization: America Online, Inc. (1-800-827-6364)

    Gary McGath <gmcgath@condes.MV.COM> wrote: Recently a magazine sent
    me a set of writer's guidelines, which contained the following
    remarkable (to me, anyway) claim: "Please understand that, by law,
    we can not send payment for an article until we have your personal
    information including your social security number." Does anyone
    know if this is true? [snip]

I believe it's true. As a business, I'm required to obtain either a
federal tax ID or SSN number when making payment to vendors and such. 


------------------------------

From: pmcvay@interramp.com
Date: 12 Mar 95 09:51:58 PDT
Subject: Private Medical Records Available Online in Mass.
Organization: PSI Public Usenet Link

This was excerpted from a copyrighted article in the Boston GLOBE,
Tuesday, March 7 1995:

"Mental Health professionals at Harvard Community Health Plan routinely
put detailed psyciatric notes into patients'  computerized medical
records, making supposedly confidential information available to
hundreds of physicians and staff members who work for the health
maintenance organization.

"The information includes not only mental health diagnoses --
depression or alcoholism, for instance -- but also the notes of
individual psychiatric sessions, during which patients may disclose
private and potentially embarrassing information...other HMOs plan to
follow suit."

The article is long, with several references to abuse of the system.
For example, employees in a training class routinely called up the
medical records of Paul Tsongas and Michael Dukakis, both prominent
national political figures.

The article does not state if the practice is done in other states.
There have been followup articles since then about a flood of protests
and demands that HCHP change its policy.

I am bringing this to your attention for obvious reasons, and am
posting it to many forums.


------------------------------

From: Harry Kingsmill <kingsmill@esdsdf.dnet.ge.com>
Date: 17 Mar 95 08:43:45 EST
Subject: Can My Neighbor Peruse My Medical Records?

I've read with great interest the debates over Radio Shack, the IRS,
U.S. crypto restrictions, and safeguarding of SS numbers.  I was lead
to the book "Privacy for Sale" through this newsgroup.  My awareness of
the privacy issue has gone from normal interest to deep concern.  I
hope my question doesn't come off as being too domestic for inclusion
here.

We have a neighbor who we have done our absolute best to avoid because
she tends to be very snoopy and free with personal information that she
has gathered on the other neighbors.  As a result of our avoiding her,
she has naturally taken a keen dislike for my wife and I.  During the
past year, this person has taken a part time job in the admissions
department of our community hospital.  Since then, other neighbors tell
us that she has all of the "dirt" on anyone she knows who checks in to
the hospital for any reason.  She was apparently very proud of herself
to report that the nephew of one of the neighbors had to spend time in
the psychiatric ward after attempting suicide.  I'm sure there's much
that she's reported on that I don't know about (thankfully).

My questions are: 1) With my insurance info on file at that hospital,
how safe are my family's medical records from this woman?  2) How can
she be stopped from wreaking further damage to the community?

We can refuse to cooperate with Radio Shack, but we must, out of
necessity, cut open a veritable artery of information for doctors and
hospitals.  There's alway been concern regarding commercial and
bureaucratic misuse/abuse of that information, but a nosy and mean
spirited person can do as much - if not more - damage.

Thanks for being here.

=======================================================================
Harry Kingsmill                                  Lockheed Martin Corp.
Moorestown, NJ                                       - LockMart -
                                       One stop shopping for all of your
                                       national defense needs!
========================================================================


------------------------------

From: stanley@skyking.OCE.ORST.EDU (John Stanley)
Date: 12 Mar 1995 21:11:56 GMT
Subject: Re: Proving your Citizenship
Organization: Coastal Imaging Lab, Oregon State University

    Kareem Hinedi <khinedi@bu.edu> wrote: Dominic-Luc Webb
    (dominic@enk.ks.se) wrote: The problem here is the number of
    Americans, especially younger ones who, like me had a .... Please
    explain how you cannot prove you are a US citizen ?

There are millions of Americans who cannot prove US citizenship. They
were born in Canada, Mexico, Chile, Brazil ... In fact, any
{North|South} American country that wasn't the USA.


------------------------------

From: robert.heuman@rose.com (robert heuman)
Date: 13 Mar 1995 03:33:39 GMT
Subject: Re: Proving your Citizenship
Organization: Rose Media Inc, Toronto, Ontario.

    dominic@enk.ks.se (Dominic-Luc Webb) wrote: The problem here is the
    number of Americans, especially younger ones who, like me had a
    terrible time trying to prove legitimate citizenship, who must wait
    many years to get a job because of the requirement to prove
    citizenship.  Is the same thing going to happen with this. There
    are a lot of Americans who simply cannot prove citizenship.

And what of Americans who live outside the US?  Where do they go for
these new SS cards?  Who notifies them?

--
My opinions are my own! They are NOT those of my [sons, employer....]
======================================================================
R.S. (Bob) Heuman  <rn.1886@rose.com> | Willowdale, Ontario, Canada
   RoseReader 2.52  P001886 Entered at [ROSE]
   RoseMail 2.60 : RoseNet<=>Usenet Gateway : Rose Media 416-733-2285


------------------------------

From: Ronald Dietz <74315.1546@CompuServe.COM>
Date: 14 Mar 1995 04:10:28 GMT
Subject: Privacy Subscription Lists
Organization: via CompuServe Information Service

I have been using the Internet for Email purposes at work for years,
but I am fairly new to usnet newsgroups.  I have a privacy related
question.

Who or where or how, as the case may be, is the suscriber list to the
various newsgroups maintained?

Is there a keeper of the list(s)?

Is it private or not?

Are ones activities or participation in a news group monitored/recorded
by anyone?

--
Ron  74315,1546@compuserve.com

[moderator:  This list is held at UWM by the moderator in a well
protected private space.  It is never posted and never shared.  My
understanding from other moderators is that the security varies from
list to list.  Other privacy oriented groups have attitudes very
similar to those used here.  l. p. levine]


------------------------------

From: LArnoldi@aol.com
Date: 14 Mar 1995 11:27:40 -0500
Subject: E-Mail Privacy Cases

Does anyone have current information on Flanagan v. Epson America and
Bourke v. Nissan Motors?  Both are cased filed in California regarding
employer's monitoring their employee's e-mail.  Any ideas on how I can
get information on other cases similar to this?

Thanks in advance.

--
Linda


------------------------------

From: mo_white@ix.netcom.com (Maureen White)
Date: 16 Mar 1995 15:30:51 GMT
Subject: Company Policies on Internal E-Mail
Organization: Netcom

I am trying to obtain information on the various policies issued by
companies regarding internal electronic mail.  We recently installed
LOTUS Notes and are using the electronic mail facility as a standard.
Specifically...

Should all internal electronic mail be encrypted?

Does the encryption create server overhead which may impair service
levels?

Is internal electronic mail private or does a company have the right to
monitor and censor contents?  (Any reference to successful lawsuits?)

Any company policies/code of ethics regarding 'politically correct' use
of electronic mail?

Thanks for any help.


------------------------------

From: Andrew Grosso <agrosso@access.digex.net>
Date: 11 Mar 1995 18:33:38 -0500
Subject: Re: Cordless Phones

It is legal to use encryption on any converstation, and it is legal to
use encryption on a cordless phone.  The problem which I see, as a
former prosecutor, is in the enforcement of the recent changes to the
law which make it a crime to intercept a non-encrypted conversation
transmitted between the handset and transmission unit.  It is
pholosophically desireable to have privacy at this stage; it is
technologically unfeasible and it for that reason impractical to
enforce by law.  My opinion in 1986 (when this amendment was first
proposed and rejected) was that anyone who used a cordless phone had
made a conscious decision to trade privacy for convenience, and thus
waived any legal protection he or she might expect as to the privacy of
his or her conversation.

This differs from the "Clipper" controversy, which would (as a
practical matter) require everyone to use a single encryption algorithm
whenever one wants to encrypt a conversation.  Conveniently, the
algorithm is ones whose keys are held by the government.  This is an
extraordinarily sad proposal.

Between Clipper, and Digital Telephony (now law), and FinCEN, and other
proposals, we are slowly but definitely constructing a universal
surveil- lance platform.  I am sorry, but no matter how worthy the
goals of law enforcement and national security, they are not worth
turning this great nation, and the world along with it, into the living
embodiment of 1984.  When are we going to heed the wake up calls?


------------------------------

From: Jeff Smith <smithjj@cat.com>
Date: 17 Mar 95 11:45:21 CST
Subject: Re: Privacy Research

    I am doing a research paper on information systems and technology
    in the workplace, focusing on the ethical use of systems and
    technology.  I want to gather responses to a few questions:

    1. Should information systems monitor employees?

    2. Do employees have a right to privacy in their use of business
    technology and systems?

1. No--they should monitor results, and work in process The real issue
is, should managers monitor employees.  IT doesn't monitor anything--it
is merely a tool.  Do the firm's managers monitor employees' work or
not?  This is a management policy issue.  Generally, the best work is
done by empowered employees who own the process. Managers should focus
on external issues to their area of responsibility.  If they can't
trust the employees to do their jobs, then they need new employees.

2. No.  The employees do not own the phone system, email, or any of the
business's resources.  The business may allow some personal use of
these items as a professional courtesy, but that is entirely at the
business's discretion.  Certainly any email or voice mail communication
that uses company equipment is subject to inspection.

--
Jeff Smith


------------------------------

From: rjgilli@clipper.ssb.com (Robert Gillis)
Date: 13 Mar 1995 20:08:56 GMT
Subject: How to Remove Your Name from Junk Mail Lists
Organization: State Street

Hello Everyone,

I received a ton of junk mail -- some interesting, some not, and some
very offensive.  I understand all the ways that my name gets on the
mailing lists -- my question is how do I get my name removed from these
lists?

--
Bobby

[moderator: we now have such information in our z-library directory.
CPD maintains this as a part of a library of back issues on
ftp.cs.uwm.edu [129.89.9.18].  Login as "ftp" with password identifying
yourid@yoursite.  The archives are in the directory
"pub/comp-privacy".  People with gopher capability can most easily
access the library at gopher.cs.uwm.edu.  Mosaic users will find it at
gopher://gopher.cs.uwm.edu.]


------------------------------

From: obie602@aol.com (Obie 602)
Date: 14 Mar 1995 18:09:54 -0500
Subject: Need Information on Microchip Implants
Organization: America Online, Inc. (1-800-827-6364)

I do not really know who to ask about this, but I have heard rumors
about the use of microchip transmitters in animals to track their where
abouts.  I  am told that there a product called KIDSCAN that has been
developed to be placed into children to prevent kiddnapping and so on.
Have you heard anything about this and can you suggest where I might go
for more information?


------------------------------

From: jwarren@well.sf.ca.us (Jim Warren)
Date: 15 Mar 1995 22:03:48 +0800
Subject: AT&T Encryption

    taken from a friend, who spotted this in Electronic Design, March
    6, 1995, pages 39-40.  The product is called the VM06868, and is
    made by VLSI Technologies for AT&T.  It uses Diffie-Hellman key
    exchange to exchange a 1024 bit key, then generates a DES key for
    each session.  Intended application is cable TV decoder boxes, but
    it's not limited to that.

Contacts are
        AT&T Secure Communications Development
        508-691-3052, attn Mike Powers

        VLSI Technologies
        602-752-6418, attn Neil Shea

        Wave Systems Corp
        212-755-3282

So maybe we can get hardwired privacy from the teevee scramblers that
govt fears we will get from software.

--
jim


------------------------------

From: ceh@leland.Stanford.EDU (Carey Heckman)
Date: 13 Mar 1995 00:35:07 -0800
Subject: Alert #2: Fifth Conference on Computers, Freedom and Privacy
Organization: Stanford University, CA 94305, USA

* WHO'S CFP?
* SPEAKER SPOTLIGHT
* BIRDS OF A FEATHER SESSIONS
* A MACHINE ROOM
* TUTORIALS
* REGISTRATION DEADLINE: MARCH 14
* CONNECTING TO CFP'95

* WHO'S CFP?

Do you belong at the Fifth Conference on Computers, Freedom and Privacy 
(CFP'95) which takes place March 28-31, 1995 in Burlingame, California?

You do if you are concerned about the definition of rights, and the
processes by which they are being defined, now that computer and
telecommunications technologies have become part of mainstream living,
conversation, and politics. CFP'95 participants will include people
from the fields of computer science, business, public policy,
government, law enforcement, research, information, health, law, civil
liberties, library science, education, social science, and many
others.

Among the early registrants: The president of an East Coast software
developer, a Canadian government official, a former general counsel of
IBM, a computer science professor from MIT, a high school history
teacher, an attorney from Italy, a partner from a major Silicon Valley
law firm, an anthropologist, the CEO of a British software company, and
an exchange student from Russia.

CFP'95 offers a much-needed neutral ground, a demilitarized zone, where
people from widely different backgrounds and positions can learn from
each other.  Like past Computers, Freedom and Privacy conferences,
CFP'95 will be a place where information industry executives talk to
concerned end users, law enforcement officials talk to civil rights
advocates, information systems managers talk to legal and security
experts. and more. This interaction, and the mutual understanding it
promotes, will shape the future.

SPEAKER SPOTLIGHT

Gain new insights from the different perspectives offered by the CFP'95
speakers, as well as the participants.

A business viewpoint will come from keynote speaker John Morgridge,
chairman of Cisco Systems. Social implications will be assessed by
Roger Wilkins a Pulitzer Prize-winning commentator for National Public
Radio and Professor of History and American Culture at George Mason
University. New ways of thinking about property rights in the computer
and computer communications world will be offered by Margaret Jane
Radin, a Stanford Law School professor and expert on property law and
political philosophy. Computers, freedom, and privacy in the big
emerging markets of Eastern Europe and the former Soviet Union will be
analyzed by Esther Dyson, a recognized expert on that region's computer
industry and co-chair of the National Information Infrastructure
Advisory Council's Information Privacy and Intellectual Property
Subcommittee.

Reflecting a similar diversity is the list of speakers in the main
program added since the publication of the conference brochure. These
additional speakers include:

 * Scott Charney (Chief, Computer Crime Unit, Department of Justice): 
 * Mark Traphagen (Software Publishers Association)
 * Francis Preston (President and CEO, Broadcast Music, Incorporated (BMI))
 * Terry Southwick (Attorney-Advisor, US Patent and Trademark Office)
 * Gary Sikorski (former U.S. Congressman; West Publishing representative)
 * Stephen Walker (Trusted Information Systems)
 * Barbara Clements (National Elementary and Secondary Education Data
        and Information Systems Project)
 * Kenneth Rosenblatt (Assistant District Attorney, Santa Clara County)
 * Tim May (Independent Investor and Consultant, Cypherpunks co-founder)
 * Michael Stern (VP Business Affairs and General Counsel, General Magic)
 * David Chaum (DigiCash bv)
 * Don Ingraham (Deputy District Attorney, Alameda County)
 * Yale Braunstein (U.C. Berkeley School of Library and Information Science)
 * Janlori Goldman (Deputy Director, Center for Democracy and Technology)

BIRDS OF A FEATHER SESSIONS

CFP'95 during the day will bring together people with different
interests. The CFP'95 Birds of a Feather (BoF) sessions in the evenings
will let participants explore their shared interests in greater detail.
Currently slated BoFs will cover:

* Cryptography Policy. Share your opinions with members of the National
Academy of Sciences/National Research Council commission studying
cryptography policy at Congress's request. The study began in October,
1994, and seeks broad input from CFP'95 attendees.

* FCC and FTC Rules. Pending ISDN and caller ID regulation at the FCC,
and proposed Federal Trade Commission rules for commercial transactions
using telephones and modems will be the topics of this BoF, led by a
Washington, D.C. communications attorney.

* Law and Ethics. George Trubow, Director of the Center of Informatics
Law and Professor of Law at the John Marshall Law School, is leading a
BoF to generate reactions to Law and Ethics on the Nets (LEON), a
project the Center is cosponsoring with the American Bar Association's
Science/Technology Section.

* Cyber Roots. Gary Marx of the University of Colorado will lead a
general discussion on sociological and anthropological approaches to
computers, freedom and privacy.

* Governance and Sanctions. Ross Stapleton-Gray, formerly of the CIA
and now director of TeleDiplomacy, Inc. will lead a "town meeting" BoF
to determine what, if anything, can be done by the community as a form
of creative and effective protest/response to anti-social behavior on
the nets.

* Electronic Cash. Privacy for electronic payments will be discussed in
detail in a BoF let by the ACM's Myles Losch and a consultant to the
MONDEX Electronic Purse Consortium.

* Copyright and Media. This BoF will explore the balance between free
speech, privacy, and copyright protection in the media.

TUTORIALS

The conference sessions and CFP'95 focus on the controversies. The
tutorials held on March 28, the day before the formal conference opens,
will help you get the most from CFP'95 by giving you the general
background needed to discuss the issues of the day.

Get the inside scoop on the new power players in Washington and how you
can best play with them from Marc Rotenberg and David Banisar of the
Electronic Privacy Information Center. Learn "Everything You Need To
Know to Argue About Cryptography" from Matt Blaze, the AT&T researcher
who discovered a fatal flaw in the Clipper chip. Understand "The Law of
Fundamental Rights for Non- Lawyers" with the skillful guidance of Mike
Godwin, EFF Staff Counsel.  Confused by copyrights, patents, and
trademarks? Lance Rose, an attorney and author of "Netlaw," will give
you the grand tour of "Intellectual Property for the Information Age."
Other tutorials will explore National ID card initiatives and digital
activism. A game room that allows participants to explore concepts of
anonymity, digital personas, and security threats will be hosted by
Russell Brand, Senior Computer Scientist at Reasoning Systems, and
friends.

AT LAST, A MACHINE ROOM!

For the first time in CFP history, an onsite Internet Room will be
available to CFP'95 attendees throughout the conference to make it
easier for everyone to voice and exchange their views and to keep in
better touch with the rest of the world. The room will have five
workstations, four configured with telnet capability and one with a web
browser to view our conference pages. The equipment, net connection,
and technical services are being provided by the generous efforts of:

 * Sunset Data & Distribution, which is providing a loan of Sun workstations.
 * John Mayes and Assoc. of Palo Alto, which is configuring the machines and
        providing technical services 
 * TLGnet, a San Francisco-based Internet service provider, which is donating
        the connection and technical expertise. 

REGISTRATION DEADLINE: MARCH 14

Act now! Save 15% by registering for CFP'95 before Wednesday, March 15.
You can do this by mail, phone, fax, or electronic mail. See the
contact information below for how to get registration information.

CONNECTING TO CFP'95

Registration and other information about CFP'95 is readily available from many 
sources:

By WWW:       URL=http://www-techlaw.stanford.edu/CFP95.html
By Gopher:    www-techlaw.stanford.edu
By FTP:       www-techlaw.stanford.edu
By Email:     Info.CFP95@forsythe.stanford.edu
By Fax:       (415) 548-0840
By Telephone: (415) 548-9673


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 29 Dec 1994 10:50:22 -0600 (CST)
Subject: Info on CPD [unchanged since 12/29/94]
Organization: University of Wisconsin-Milwaukee

The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa.  The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.  

This digest is a forum with information contributed via Internet
eMail.  Those who understand the technology also understand the ease of
forgery in this very free medium.  Statements, therefore, should be
taken with a grain of salt and it should be clear that the actual
contributor might not be the person whose email address is posted at
the top.  Any user who openly wishes to post anonymously should inform
the moderator at the beginning of the posting.  He will comply.

If you read this from the comp.society.privacy newsgroup and wish to
contribute a message, you should simply post your contribution.  As a
moderated newsgroup, attempts to post to the group are normally turned
into eMail to the submission address below.

On the other hand, if you read the digest eMailed to you, you generally
need only use the Reply feature of your mailer to contribute.  If you
do so, it is best to modify the "Subject:" line of your mailing.

Contributions to CPD should be submitted, with appropriate, substantive
SUBJECT: line, otherwise they may be ignored.  They must be relevant,
sound, in good taste, objective, cogent, coherent, concise, and
nonrepetitious.  Diversity is welcome, but not personal attacks.  Do
not include entire previous messages in responses to them.  Include
your name & legitimate Internet FROM: address, especially from
 .UUCP and .BITNET folks.  Anonymized mail is not accepted.  All
contributions considered as personal comments; usual disclaimers
apply.  All reuses of CPD material should respect stated copyright
notices, and should cite the sources explicitly; as a courtesy;
publications using CPD material should obtain permission from the
contributors.  

Contributions generally are acknowledged within 24 hours
of submission.  If selected, they are printed within two or three days.
The moderator reserves the right to delete extraneous quoted material.
He may change the SUBJECT: line of an article in order to make it easier
for the reader to follow a discussion.  He will not, however, alter or
edit or append to the text except for purely technical reasons.

A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
Login as "ftp" with password identifying yourid@yoursite.  The archives
are in the directory "pub/comp-privacy".

People with gopher capability can most easily access the library at
gopher.cs.uwm.edu.

Mosaic users will find it at gopher://gopher.cs.uwm.edu.

Older archives are also held at ftp.pica.army.mil [129.139.160.133].

 ---------------------------------+-----------------------------------------
Leonard P. Levine                 | Moderator of:     Computer Privacy Digest
Professor of Computer Science     |                  and comp.society.privacy
University of Wisconsin-Milwaukee | Post:                comp-privacy@uwm.edu
Box 784, Milwaukee WI 53201       | Information: comp-privacy-request@uwm.edu
                                  | Gopher:                 gopher.cs.uwm.edu 
levine@cs.uwm.edu                 | Mosaic:        gopher://gopher.cs.uwm.edu
 ---------------------------------+-----------------------------------------


------------------------------

End of Computer Privacy Digest V6 #027
******************************
.