Date:       Sun, 23 Jul 95 09:04:05 EST
Errors-To:  Comp-privacy Error Handler <owner-comp-privacy@uwm.edu>
From:       Computer Privacy Digest Moderator  <comp-privacy@uwm.edu>
To:         Comp-privacy@uwm.edu
Subject:    Computer Privacy Digest V7#006

Computer Privacy Digest Sun, 23 Jul 95              Volume 7 : Issue: 006

Today's Topics:			       Moderator: Leonard P. Levine

        BC Telephone Co. Publishes Another Unlisted Home address
                               CPSR links
                     Toyr-R-Us Phone Number Request
              Re: Social Security Number Abuse by Employer
                            No Second Chance
                Digital Detective Reveals His Methods?
                   Re: Windows 95 Registration Wizard
                The Dark Side in Washington State [long]
                 Info on CPD [unchanged since 12/29/94]

----------------------------------------------------------------------

From: bo774@freenet.carleton.ca (Kelly Bert Manning)
Date: 20 Jul 1995 05:43:28 GMT
Subject: BC Telephone Co. Publishes Another Unlisted Home address
Organization: The National Capital FreeNet, Ottawa, Ontario, Canada

Vancouver TV stations aired a story of a woman forced to move to a
transistion house today after BC Tel published her home address.

She had called BC Tel 4 times before the new directory came out to
confirm that the address would not be published. BC Tel claimed to need
to have the home address "for billing" and had promised to just list a
PO box number.

This seems to be a chronic sort of screw up at BC Tel. A while back a
womens's shelter had to close down after BC Tel negligently published
the address. Abusive former partners started showing up immediately.
Nobody at BC Tel has explained how they could repeat an error that
created such widespread bad press the last time around.

BC Tel has done a very poor job of informing customers of their free
option to just list the name and number, with no address, as a cheap
alternative to having a non-published number. This also applies to
their $1 a pop dial up directory service, which supplies exactly the
information that would appear in the next directory, and presumably in
the CD-ROM published by Dominion Directory.

BC Tel's initial response after the angry woman contacted them was to
offer a $20 gift certificate. After being contacted by news reporters
BC Tel spokeswoman Michelle Gagon seemed to be offering to help with
relocation expenses.


------------------------------

From: cpsr-global@Sunnyside.COM
Date: 20 Jul 1995 01:15:20 -0700
Subject: CPSR links

Taken from CPSR-GLOBAL Digest 201

    From: marsha-w@uiuc.edu (Marsha Woodbury)
    Date: 19 Jul 1995 09:39:19 -0600
    Subject: CPSR links

    To the CPSR Newsletter editors:

    You may wish to note in the next edition of the CPSR Newsletter re.
    information and privacy that the Office of the Information and Privacy
    Commissioner of British Columbia has a new World-Wide Web (WWW) page.
    Please see my signature block below for our WWW address.

    Our home page contains a copy of the British Columbia Freedom of
    Information and Protection of Privacy Act, plus hyper-text links to the
    Information and Privacy Commissioner's orders, and related documents.

    If you have any questions about our home page or the Office of the
    Information and Privacy Commissioner of B.C., please call me at
    604-387-0312.  Thank you.

    +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

    R. Kyle Friesen
    Portfolio Officer
    Office of the Information
       and Privacy Commissioner of British Columbia
    4th floor, 1675 Douglas Street
    Victoria, British Columbia Canada  V8V 1X4
    tel. (604) 387-0312 / fax. (604) 387-1696
    Internet:  kfriesen@galaxy.gov.bc.ca
    World-Wide Web site:  http://www.cafe.net/gvc/foi

    +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


------------------------------

From: WELKER@a1.vsdec.nl.nuwc.navy.mil
Date: 21 Jul 1995 09:02:00 -0400 (EDT)
Subject: Toyr-R-Us Phone Number Request

Anybody out there shared the experience of having Toys-R-Us ask for
your phone number before ringing up the sale, regardless of whether
cash/check/charge?

They say it's for market survey purposes.  The clerk was quite
surprised at the tone of voice in my refusal.

You know, instead of just refusing to reveal our personal information
whenever someone asks, since they value it so highly, why don't we ask
for payment instead?  This would provide an incentive for us to give
them accurate info instead of lying (which we could do whenever no
reward was offered -- and give them "accurate disinformation" so it'd
be hard for them to tell it was bogus...)


------------------------------

From: wmcclatc@internext.com (Bill McClatchie)
Date: 21 Jul 1995 10:12:37 -0400
Subject: Re: Social Security Number Abuse by Employer

    sarig@teleport.com (Scott Arighi) noted: Although not a legal
    point, I found that my bank would allow *anyone* with my checking
    account no.  and my SS. no. to find out my bank balance -- which  I
    view as a rather private matter.  Now use a password on the
    account  in addition to the numbers.  In your case, it sounds like
    any merchant   (or friend or not so friend :-)) receiving a check
    from you could call your employer, get your SS no. and find out
    your bank balance.

This is kind of redundant since most people have their SSN's on the check 
already.


------------------------------

From: anonymous <levine@cs.uwm.edu>
Date: 21 Jul 1995 13:20:21 -0500
Subject: No Second Chance

[moderator:  I have posted this with the user's name removed and his
address replaced by mine.]

Being a recovering alcoholic I was saddned to learn that I have been
*branded* by the insurance industry for having elected to enter a drug
rehab a few years ago. It seems their records show I have a
pre-existing condition and therefore am a high-risk.This makes it most
difficult to obtain insurance; and worse, any employer whom may provide
insurance will be made aware of my past drinking and God knows what
else.(they have detailed records of my 35 day hospital stay, I saw it)

I could refuse the insurance and get my own ($$$$), which probobly
won't happen.Or perhaps luck out and have a sympathetic boss.

I've been transferred out of state so maybe each state is different, I
hope.

Sorry to ramble but I feel this is a privacy issue.If I should have
posted to alt.drinking or something, sorry for that too.

Rgds/Den


------------------------------

From: bo774@freenet.carleton.ca (Kelly Bert Manning)
Date: 21 Jul 1995 19:25:46 GMT
Subject: Digital Detective Reveals His Methods? 
Organization: The National Capital FreeNet, Ottawa, Ontario, Canada

    TELECOM Digest Editor (telecom@eecs.nwu.edu) writes: Readers will
    recall the comments here back in June about the 800 number which
    connected with the sex service. I have a followup on that and a
    request for assistance from readers in the New York City area.
    <snip> Integratel refused to remove any of the charges, and instead
    said I could write the client direct to ask for an adjustment. They
    refused to give me any phone number to reach the scumbags direct.
    Well, that's okay, I was able to track down a few things.

Is this the same person who posted the Digital Detective thread many
months ago? The former moderator of C.S.P identifed the originator of
some such thread as the Telecom Digest Moderator, and added a comment
suggesting that his intent was to raise awareness by being provactive.
I've snipped text not directly related to privacy.

While it is encouraging that his powers of information gathering don't
seem quite up to the level of button pressing ease implied in the
Digital Detective post, he obviously does know how to find out about
people or companies and spells out how he would like someone in NY to
do such searching for him.


------------------------------

From: Corey Leopold <corey@aries.uthscsa.edu>
Date: 21 Jul 1995 20:20:38 GMT
Subject: Re: Windows 95 Registration Wizard
Organization: UT Health Science Center at San Antonio

    cpsr-global@Sunnyside.COM wrote: Note:  Microsoft is coming under
    fire for releasing its new Windows software that "reads" the hard
    drive of the computer it is installed on.  Windows '95 then sends
    the data from the PC back to the main Microsoft office.  Here is
    Microsoft's version of what it is doing

This is probably true of the Registration Wizard.  The problem seems to
be when logging into the Microsoft Network.

--
Corey


------------------------------

From: "Neil A. Trilling" <neil@csd.uwm.edu>
Date: 16 Jul 1995 21:52:50 -0500 (CDT)
Subject: The Dark Side in Washington State [long]

Long, but might be of interest to you.  Some major privacy issues
here.

Neil A. Trilling Univ. of Wisconsin-Milwaukee  P.O. Box 413 Milw. WI 53201
Center for Community Computing                "Community is Our Middle Name"
Internet: neil@csd.uwm.edu                 Telephone 414-229-4041
Interbit: neil%csd.uwm.edu@INTERBIT

forwarded materials:

    From: Gordon Cook <gcook@TIGGER.JVNC.NET>
    Date: 15 Jul 1995 01:10:39 -0400
    To: Multiple recipients of list COMMUNET <COMMUNET@UVMVM.UVM.EDU>
    Subject: Nat. Info. Infrastructure: The Dark Side in Washington State 

National Information Infrastructure:
The Dark Side in Washington State

Big Brother Goes On Line - Web of Databases Woven Without
Public Knowledge Could
Determine Our Communications Future

Introduction and Summary

This report is the result of two weeks of interviews in Washington
State in late May and early June. It shows a very dark picture of
our coming technology "dystopia."

The COOK Report finds that the state of Washington leads the rest
of the nation in developing the building blocks of a statewide
information infrastructure. What is being "leveraged" there is the
Clinton -- Gore push for National Information Infrastructure (NII).
NII is touted in commercials by AT&T and others as being kind of
warm and friendly communications utopia.  But the essence of NII
is often in the eye of the beholder.  In fact, there is no widely
accepted definition of or goals for NII. Instead, it is one of those
terms with a definition specific to whomever is talking about it at
any given moment.

In the state of Washington what is being constructed is not a
service for video on demand; nor is it home shopping.  It is a
statewide web of state agency networks and inter linked
databases.  While other states have some NII related projects, we
are not aware of any that have the number and  scope of those in
Washington.

People with whom we talked generally agreed that the citizens of
Washington are facing a situation where their privacy is fast
disappearing and where the rights to information that they own
and should effectively control are being sold out from under them.
In the opinion of many to whom we talked, the situation is
volatile and may become more so.  Even George Lindamood, the
outgoing Director of the Department of Information Services,
acknowledged that when the citizens of the state understand the
totality of what had happened to them, they will be angry.

In order to bring a "competitive environment" to the citizens of
the state, Washington State agencies are moving forward to
implement new information technology programs.  But this
information technology is the new hucksterism of the second half
of the '90s. With the Clinton Administration pushing it in the first
half of the decade, officials from the various departments of state
government are lined up at the federal table to make sure they
get the technology grants that will make their agencies stand out
at home.  They are very likely perfectly well-intentioned civil
servants - in a hurry to build now and ask questions later. Policy
issues, the big picture, privacy and confidentiality concerns are
given lip service, but usually put off as being to difficult to deal
with now.  As these are put off, the web of interconnected
communications systems and databases grows and wraps more
firmly in place around Washington State residents.

There may be about a year to make meaningful changes before
the average citizen is irretrievably caught in the emerging state
data web.  The only hope that we see is for citizen groups to
coalesce, get educated and agree on the objectives for and
definition of a state commission on citizen information rights --
one that has legal power to slow down the technocratic
juggernaught -- until adequate legal safeguards to protect privacy
can be put in place. The citizen's lobby must then sell these
objectives to the legislature.  If they don't succeed, Washington
State may be neither comfortable nor a good place in which to
live.  It will be a combination of "Brave New World," "Blade
Runner" and a digital Singapore transplanted to the Pacific
northwest by a seemingly well-intentioned alliance between
corporate and political technocratic elites.

One agency that is part of this Washington State web has a
database of at-risk four-year-olds that can be linked with
databases of violent juveniles, drug use incidence, trade and
economic activity. All this information can be mapped matched
with census tract and other economic data through a Geographic
Information System (GIS).  A GIS Database allows many different
kinds of information to be overlaid on maps of differing scales
according to physical location.  GIS was described to us by the
Assistant Director of Administrative Services of Community, Trade
and Economic Development (CTED), a relatively new state agency,
as "the glue that holds all the other disparate information
together". The CTED system is under construction.

Someone has obviously decided there is a public purpose to be
served in creating a database of at-risk four-year- olds and
another of violent offenders.  Missing from the Washington State
scene is any widespread public understanding either that these
and other data  bases exist.  Also absent is any reasonable means
of challenge by the public to state agency use of them.  For
example, what if CTED were to decide that when a business had
narrowed its choice to four potential locations, the final step
towards maximum competitiveness for that business would be to
show it the population density of at-risk four-year-olds and
violent offenders in each of the sites? The business would surely
choose to locate in an area with as few undesirables as possible.
The potential of information technology to be used in building
economic ghettos in Washington State is not generally known let
alone an item on the public policy agenda.

This report describes the all ensnaring data web that is being
woven in Washington State. Since many of the programs being
field tested in Washington are federally backed, what happens
there is likely to spread to other states unless we understand
what is happening and insist that it be stopped.

The spinning of the data web begins in kindergarten -- or even
earlier -- when parents are asked to supply their children's Social
Security Numbers as identifiers.  Goals 2000 and other school
restructuring efforts have led to increased data collection about
individual students.  Educators want to know everything about
today's students, even whether they arrive at school "ready to
learn."  With the help of national business groups and the well-
intentioned but perhaps naive support of the Annenberg
Foundation,  Total Quality Management is the current Band-Aid
being applied to a education system that policy makers with the
study A Nation at Risk, in the early 1980s declared effectively
"broken." Total Quality Management demands that all "relevant"
data be gleaned and applied to the process at hand whether it
involves manufacturing, or shaping our children's future.

To this end, the educational bureaucrats within the US Department
of Education have established a National Center for Education
Statistics. The Center has come up with standards for state student
record databases and over 500 questions for states and local
school districts to choose from in constructing their own systems.
Depending on how faithfully the states follow the federal model,
what could easily become the student's life long dossier may start
with questions like the date of the last dental exam and the
condition of soft tissue inside the student's mouth!

Indeed the federal student data handbooks contains fields for the
phone number of the students email provider, whether the
student is a registered voter and information about the student's
post high school employment. If the student moves between
states, a national system called SPEEDE/ExPRESS is being put into
place to transfer his or her electronic record from one jurisdiction
to another. If federal planners have their way,  electronic tracking
will continue throughout high school and from there into the
student's employment.

The product of this nationalized and homogenized school record
system -- the graduate -- may ultimately submit electronic
portfolios, including teacher evaluations, to area employers via
WORKLINK, a national program developed by Educational Testing
Service. Under the guise of making school more relevant to the
world of work, employers with desirable jobs will be able to glean
electronically, from among thousands of area graduates, the few
with the cleanest records.  Those who don't make the electronic
cut may walk their paper records to the nearest McDonalds.

The New Information
Environment: Data
Bases and Public-
Private Partnerships

As most politicians continue to stoke citizen anger against state
and national government, citizen and legislative tax revolt
initiatives have left government with inadequate revenues to do
its job.  As a result, an alliance of politicians and some
corporations has formed to promote public -private partnerships.
According to its critics, that alliance is simply profiting from the
disenchantment the politicians have created .

In 1993 the Washington State Legislature proposed such a
partnership to improve the state's highways.  Construction firms
on a national level were invited to bid on highway improvements
to be paid for by tolls -- euphemistically known as user fees.  In
part encouraged by a federal project calling for "smart highways"
nationwide, the proposals include toll tokens tied to individual
citizens and their vehicles.  Electronic sensors will decrease the
value of each token and, in so doing, provide "information of
commercial value" to entities like auto insurance companies, the
driver's employer and any others willing to purchase the citizen's
private data. This purchasing of citizen's data is promoted as a
new revenue source for government.  Promoters say it will keep
government from having to raise taxes.

In 1993 the state legislature passed a law (which in the session
just ended was largely gutted) guaranteeing health insurance to
all Washington citizens.  In yet another public-private
partnership, the state undertook to create a statewide database to
share patient treatment referrals and medical records among
appropriate agencies and health care providers.  Missing from the
legislation were adequate protection of patient privacy and the
right to correct medical records.  Parts of the law were repealed
this year, but plans for a statewide medical database continue.

The Department of Information Services is the state agency that
provides telecommunications and computing infrastructure for the
remainder of state government.  Under George Lindamood, who
arrived as Director in February 1993 and departed June 1 1995, it
branched out into its own money making activities.  These
included a statewide compressed video network, Internet training
for other state agencies and a would-be statewide information
kiosk program.

The kiosks represented a public-private partnership between the
state, IBM and North Communications.   The heaviest use of them
was by job seekers who could access new job openings posted
through the State Division of Employment Security.  The
Department of Information Services (DIS) would like to see all
state agencies using the kiosks to transact as much as possible of
their day-to-day business with citizens.  However, it is a pilot
program. At the time of our visit there were only eleven kiosks in
operation. The program got negative press reviews when it found
that users of the employment database were asked to enter their
social security numbers.  Critics maintain DIS had no legal
justification for requiring the numbers and did not comply with
notification requirements in the federal Privacy Act when
requesting them.

The Politics of
Divisiveness

Politics in Washington State has taken a hard turn to the right.
One example  has been  ESSB5466, an "anti-pornography bill," that
did not become law this spring only because of the courageous
veto of Governor Lowry.  According to Al Huff, the Director of
WEDnet, the Washington State K-12 network linked to the
Internet, the bill would have effectively banned the Internet from
Washington K-12 schools.  Why?  Because it would have made the
system operators of digital networks liable for any "pornographic"
material found on their systems.

After the Governor's veto, the House agreed to eliminate depiction
of breast feeding from the obscenity statute while the Senate
came back with an exemption for the Internet.  The House refused
to accept the senate exemption of the Internet and the bill died at
the end of the legislative session.  This conclusion led one
observer to conclude that such an extreme right-wing agenda was
not to protect children from pornography but to censor the
Internet.  Since our return we have been told that the issue will
surface again in the legislature next year.

We have found no reason to believe that the web of connected
databases will be used only by the state agencies and their
immediate private partners.  After all, these partners have come
aboard expressly to market the end product to others. Policy
makers had better ponder what wide spread use of the databases
could lead to. Who will benefit from what they have done?  The
people or the power brokers?  For what is at stake is not just a
question of privacy but one of being able to use the information to
manipulate people and events.  Consider not only what full access
to the database information could mean to large corporations, but
also what it could do for any kind of extremist.

Consider whether the current direction leads inevitably to the
further empowerment of the already powerful? Does it give them
superior information and knowledge? Taking information that
should be private and making it publicly accessible cannot be
condoned - no matter whether it be school records, health data or
smart highway reports on our travels.  It is also undeniable that
aggregated information collected from the public by its
government at local, state, and national levels belongs to the
public.  The public should always have access to that data at
reasonable expense which may normally be defined as the
incremental cost of distribution. If the general public is denied
such access, the question emerges as to whether those in power
should ever be allowed to engage in any form of State sanctioned
economic discrimination, let alone a targeted program aimed
directly against those citizens who not only unwittingly provided
the raw data being used, but also ironically funded the
discriminatory agencies.

We have here a convergence of technology  trends that can either
empower individuals to affect positively their own lives and
neighborhoods, or can disenfranchise them and leave them at the
mercy of the powerful should they be able to monopolize the data
used for decision making. It is this very volatile mix of the middle
class - afraid and on the way down - that causes us to examine
information infrastructure issues in Washington State against the
backdrop of broader economic and social issues.

Some members of Washington State government claim to be
dealing with the policy issues. However, this study finds that the
state's Public Information Access Policy (PIAP) task force has
failed to educate the state's citizens about these issues.  It is
imperative that other's step in to the vacuum left by the task
force.  Backed by an informed media, citizen groups must come
together, possibly under a state umbrella organization, such as a
Washington State Electronic Frontier Foundation.

Such an organization must undertake a serious public education
campaign about the privacy and social control implications of the
Washington State plans, both those already activated and those
proposed. The organization must be carefully crafted to keep
citizens in control of the entire process.  It should design an
information policy commission to exist perhaps under the aegis of
the judiciary.  They and not the technocratic managers of state
agencies would carry out reviews of state agency programs and
intentions.  The commission would need a process for hearings
and prompt studies to be completed.  It must have its own
funding.  Legislation to implement the commission should be
promptly drafted and made a top priority for action in the next
legislative session.

================================================
Side Bar of Washington Report - p.2

Alvin Toffler:  Virtual reality points to a boundless capacity for
deception. Not simply by governments or corporations, but by
hostile individuals acting on each other. We can do this today, but
we are increasing the sophistication of deception faster than the
technology of verification.  The consequence of that is the end of
truth.  The dark side of the information technology explosion is
that it will breed a population that believes nothing and, perhaps,
even more dangerous, a population ready to believe only one
"truth," fanatically and willing to kill for it. [May 1995]

Washington State Citizen: The gold mine [from the databases] lies
in the realm of being able to control the progression of society and
completely maximize at every moment the flow of a person's
existence as a consumer.  It would be nice to hear Al Gore turn
around and say - "the information super highway.  It is not that.
It is a massive control and social engineering mechanism.  This is
all it ever will be.  There will be no privacy left if we continue
with things the way they are currently being done."  [May 1995]

================================================
Editor's note:  More of this 90,000 word 100 page study will
appear in future issues of the COOK Report.  The publication date
is July 15.  The price is $285.00 or $750 for a corporate site
license. The study contains interviews and our analysis woven out
them.  What you have just read is the Introduction and Summary.
An executive summary is included as Appendix 6.  This summary
will not appear in the COOK Report.
=================================================

Interviews:

Len McComb, Director Department of Revenue, Washington State,

George Lindamood, Director Department of Information Services,
Washington State,

Al Huff, Director, Washington Schools Information Processing
Cooperative,

Kate Heimbach, Assistant Director, Administrative Services,
Community Trade and Economic Development Agency, Washington
State,

Robert Aye, Deputy Regional Administrator, Washington State
Department of Transportation,

Matthew Lampe, Deputy Director, Department of Administrative
Services, City of Seattle,

Kathryn Thomas, Assistant Director for Telecommunications,
Utilities and Transportation Commission, Washington State,

Mary Moore, Director of Library Planning and Development
Division, Washington State Library,

Sam Hunt, Special Assistant to the Director, Division of
Information Services, Washington State and Co Chair of the Public
Information Access Policy (PIAP) Task Force,

Bob Jacobson, former policy analyst for the California State
Legislature and former public member of PIAP,

Vincent Pollina, Computer Systems Specialist, Washington Utilities
Transportation Commission,

Steve McCallister, Information Services Manager, Snohomish
County Planned Parenthood,

Currie Morrison, Computer Coordinator, Seattle School District,

Walter Taucher, President Corporate Computers,

Janeane Dubuar, policy expert education privacy and member
Computer Professionals for Social Responsibility,

Jeffrey Michka, community activist, Sysop Washington Community
InforSource BBS, and Board member Coalition of Washington
Communities,

Our thanks also to Peter Marshall, Dale Morrison, Jane Nelson,
Leslie N. Jacobson, Simson L. Garfinkel and others for help or
permission to use material that they authored.

=======================================================
Contents

Introduction and Summary                                        p.  1
The New Information Environment - databases and Public Private
Partnerships                                                    p.  2
The Politics of Divisiveness                                    p.  3

Part 1: Education Infrastructure Components

Privacy Invasion Begins in Kindergarten -                       p.  4
HB 1209:  Washington State Pilots the National Education Agenda p.  4
An Endemic Action:  Avoid Dealing With the Policy and Privacy   p.  5
Electronic and Paper Records Demand Different Treatment         p.  6
Electronic Student Records in Washington State The Urge to Merge
                                                                p.  8
Overcoming the Confidentiality Barrier,                         p. 10
Our Children on the Total Quality Management Assembly Line,     p. 12
The Origins of WSIPC in the Context of a Technology Bureaucracy,p. 12
WSIPC:  Time Sharing for Educational Records Evolves into State
Wide Education Telecommunications Power                         p. 14
Washington Educational Network,                                 p. 16
Educational Reform Impact on WSIPC and WEDnet?                  p. 16
Student Portfolios and Privacy,                                 p. 17
Where Is Our Public Policy on These Issues?                     p. 18
WSIPC's Future Direction in the Context of These Data Gathering
Efforts,                                                        p. 19
If WSIPC Makes No Policy Who Does?                              p. 20
Getting Washington's Largest School District on Line,           p. 20
Obtaining the Right Internet Connectivity,                      p. 22

Part 2: The State Agency Components

Strange Bed Fellows:  Merging  Community Development and
Trade & Economic Development Agencies,                          p. 23
CTED and the Washington Development  Network,                   p. 24
Business, Local Government, Families: a Three Legged Stool of
Social Control,                                                 p. 25
A Community Activist Critique of CTED,                          p. 28
Whom Does CTED Serve?                                           p. 29
A Digital Singapore?                                            p. 29
Department of Information Services as Would Be State
Information Tsar?                                               p. 33
Policy Aspects of D.I.S. Operation                              p. 34
Washington Interactive Television,                              p. 35
Information Kiosks,                                             p. 36
Internet Training                                               p. 37
Long Term Policy Implications of D.I.S. Actions,                p. 38
There Is Indeed a Potential Tinder Box,                         p. 39
But What Is the Gold Mine?  Reflections on the Department of
Information Services,                                           p. 39
Technology for Technology's Sake,                               p. 40
Department of Revenue: Government Through Public -Private
Partneships,                                                    p. 41
WSDOT:  Smart Highways as a Public Private Partnership ,        p. 42
Congestion Pricing in Puget Sound Metropolitan Area,            p. 43
Fare collection Devices and Operation,                          p. 43
Smart Highways as a National Program:Instruments of Liberation
or Social Control?                                              p. 45
Links Between ITS America and Washington State,                 p. 45
The Harvard Kennedy School of Government Jumps on the
Highway Bandwagon,                                              p. 45
State Wide Medical Database in Return for Provider's Cooperation
for State Wide Health Insurance ,                               p. 46
A Centralized Medical Records Repository for the Insurance
Industry,                                                       p. 47
Initial Operational, Reasons For, and Future Direction of the Data
System,                                                         p. 48

Part 3: Private - Public Technology Jockeying:  US West, Microsoft,
& Seattle

The City of Seattle Information Highway,                        p. 52
A View of the Seattle Highway, US West and Other Issues from
within WUTC,                                                    p. 54
US West's Position in Washington State,                         p. 55
The Public Interest Role of WUTC,                               p. 56
Microsoft's Place in the Equation,                              p. 57
MSN and Competitiveness of Internet Services,                   p. 58
Becoming a Microsoft Solution Provider and Microsoft's Virtual
Government,                                                     p. 58

Part 4:  The Policy Picture

PIAP: The Background      Bob Jacobson: Policy Analyst and
Entrepreneur,                                                   p. 59
The Beginnings of the PIAP Task Force,                          p. 60
Information policy Poverty in Washington State,                 p. 61
Our Lives Are Riddled,                                          p. 61
Sam Hunt's View of PIAP,                                        p. 61
Senator Sutherland's Role,                                      p. 61
Privacy Policy:  Who's Responsible?                             p. 62
The Role of the State Library in PIAP,                          p. 62
A Citizen's Complaint to PIAP,                                  p. 64
Do We Serve the Public Interest by Avoiding the Contentious
Issues?                                                         p. 65

Part 5:  The Center Is Not Holding

Why We Must Rush Forward,                                       p. 67
Policy and the Need to Compete,                                 p. 67
The Technology Catalyst in its Political and Economic Context,  p. 68
Relationship Between Break Away Counties and the Takings
Initiative,                                                     p. 68
Takings as a  Reaction to the Growth Management Act,            p. 69
The Pornography Issue,                                          p. 71

Part 6:  If We Are Not to Build a Blade Runner Society,
What Should We Do?

The Information Policy Problem:  A Possible Remedy?,            p. 72
Technology Policy Is Not Made in a Vacuum                       p. 73
Does Technology Control Us?                                     p. 74
But Whom Shall Be Thrown From the Life Boat?                    p. 74
Toffler's Idyllic Vision Is Wrong                               p. 75

Appendices

Appendix 1  Views of Indiana Student Records Adminsitrator on
Privacy Issues,                                                 p. 76
Appendix 2  Intelligent Transportation Systems and the National
Information Infrastructure,                                     p. 78
Appendix 3  The Road Watches You: 'Smart' Highway Systems May
Know Too Much,                                                  p. 80
Appendix 4  Acces vs Privacy in Computerized Court Records,
                                                                p. 80
Appendix 5  Ethics Charges Against Dean Sutherland Dropped
after Four Month Investigation,                                 p. 83
Appendix 6  Executive Summary,                                  p. 87

Sidebars

Educational Stratification by Means of Computers                p. 8
Information Mapping by Means of GIS Systems                     p. 30
Cyber Police on the Beat in Singapore                           p. 32
Target Solution 2000 Health database May Put Totality of State's
Information about Citizens into One System                      p. 49
Lowry's Veto of US West Bill Riles Sutherland                   p. 55
Mary Moore on Public Library Infrastructure                     p. 62

Figures

Figure 1:  Education Reform                                     p. 7
Figure 2:  Education Reform Organization Chart                  p. 9
Figure 3:  WEDnet Geographic Map and Block Diagram              p. 15
Figure 4:  Washington Development Network - Conceptual Diagram  p. 29
Figure 5:  HSIS Target Solution 2000 Data Collection and Storage
Approach                                                        p. 50

Also includes 25 photographs.
********************************************************************
Gordon Cook, Editor & Publisher       Subscript.: Individ-ascii  $85
The COOK Report on Internet -> NREN        Non Profit.          $150
431 Greenway Ave, Ewing, NJ 08618          Small Corp & Gov't   $200
(609) 882-2572                             Corporate            $350
Internet: cook@cookreport.com              Corporate. Site Lic  $650
http://www.netaxs.com/~cook <- Subscription Info & COOK Report Index
********************************************************************


------------------------------

From: "Prof. L. P. Levine" <levine@blatz.cs.uwm.edu>
Date: 29 Dec 1994 10:50:22 -0600 (CST)
Subject: Info on CPD [unchanged since 12/29/94]
Organization: University of Wisconsin-Milwaukee

The Computer Privacy Digest is a forum for discussion on the effect of
technology on privacy or vice versa.  The digest is moderated and
gatewayed into the USENET newsgroup comp.society.privacy (Moderated).
Submissions should be sent to comp-privacy@uwm.edu and administrative
requests to comp-privacy-request@uwm.edu.  

This digest is a forum with information contributed via Internet
eMail.  Those who understand the technology also understand the ease of
forgery in this very free medium.  Statements, therefore, should be
taken with a grain of salt and it should be clear that the actual
contributor might not be the person whose email address is posted at
the top.  Any user who openly wishes to post anonymously should inform
the moderator at the beginning of the posting.  He will comply.

If you read this from the comp.society.privacy newsgroup and wish to
contribute a message, you should simply post your contribution.  As a
moderated newsgroup, attempts to post to the group are normally turned
into eMail to the submission address below.

On the other hand, if you read the digest eMailed to you, you generally
need only use the Reply feature of your mailer to contribute.  If you
do so, it is best to modify the "Subject:" line of your mailing.

Contributions to CPD should be submitted, with appropriate, substantive
SUBJECT: line, otherwise they may be ignored.  They must be relevant,
sound, in good taste, objective, cogent, coherent, concise, and
nonrepetitious.  Diversity is welcome, but not personal attacks.  Do
not include entire previous messages in responses to them.  Include
your name & legitimate Internet FROM: address, especially from
 .UUCP and .BITNET folks.  Anonymized mail is not accepted.  All
contributions considered as personal comments; usual disclaimers
apply.  All reuses of CPD material should respect stated copyright
notices, and should cite the sources explicitly; as a courtesy;
publications using CPD material should obtain permission from the
contributors.  

Contributions generally are acknowledged within 24 hours of
submission.  If selected, they are printed within two or three days.
The moderator reserves the right to delete extraneous quoted material.
He may change the SUBJECT: line of an article in order to make it
easier for the reader to follow a discussion.  He will not, however,
alter or edit or append to the text except for purely technical
reasons.

A library of back issues is available on ftp.cs.uwm.edu [129.89.9.18].
Login as "ftp" with password identifying yourid@yoursite.  The archives
are in the directory "pub/comp-privacy".

People with gopher capability can most easily access the library at
gopher.cs.uwm.edu.

Mosaic users will find it at gopher://gopher.cs.uwm.edu.

Older archives are also held at ftp.pica.army.mil [129.139.160.133].

 ---------------------------------+-----------------------------------------
Leonard P. Levine                 | Moderator of:     Computer Privacy Digest
Professor of Computer Science     |                  and comp.society.privacy
University of Wisconsin-Milwaukee | Post:                comp-privacy@uwm.edu
Box 784, Milwaukee WI 53201       | Information: comp-privacy-request@uwm.edu
                                  | Gopher:                 gopher.cs.uwm.edu 
levine@cs.uwm.edu                 | Mosaic:        gopher://gopher.cs.uwm.edu
 ---------------------------------+-----------------------------------------


------------------------------

End of Computer Privacy Digest V7 #006
******************************
.