PRIVACY Forum Archive Document
|
PRIVACY Forum Digest Wednesday, 14 January 1998 Volume 07 : Issue 02 Moderated by Lauren Weinstein (lauren@vortex.com) Vortex Technology, Woodland Hills, CA, U.S.A. http://www.vortex.com ===== PRIVACY FORUM ===== ------------------------------------------------------------------- The PRIVACY Forum is supported in part by the ACM (Association for Computing Machinery) Committee on Computers and Public Policy, "internetMCI" (a service of the Data Services Division of MCI Telecommunications Corporation), Cisco Systems, Inc., and Telos Systems. - - - These organizations do not operate or control the PRIVACY Forum in any manner, and their support does not imply agreement on their part with nor responsibility for any materials posted on or related to the PRIVACY Forum. ------------------------------------------------------------------- CONTENTS AT&T Database Reveals Unlisted Names From Numbers (Lauren Weinstein; PRIVACY Forum Moderator) Intuit Canada policy of forced disclosure (John Tillquist) Data Creep [PRIVACY Forum Digest V06 #18] (Stanley F. Quayle) Privacy problems with patient data in hospitals, by Simson Garfinkel (Fr. Stevan Bauman) Re: ATM card problems (David C. Kulp) Airlines Debut Profiling System (Monty Solomon) A spy satellite of one's own [TBTF for 1/12/98] (Keith Dawson) Self regulation (Marianne Kim) ACM Policy98 Preliminary announcement (Jim Horning) *** Please include a RELEVANT "Subject:" line on all submissions! *** *** Submissions without them may be ignored! *** ----------------------------------------------------------------------------- The Internet PRIVACY Forum is a moderated digest for the discussion and analysis of issues relating to the general topic of privacy (both personal and collective) in the "information age" of the 1990's and beyond. The moderator will choose submissions for inclusion based on their relevance and content. Submissions will not be routinely acknowledged. All submissions should be addressed to "privacy@vortex.com" and must have RELEVANT "Subject:" lines; submissions without appropriate and relevant "Subject:" lines may be ignored. Excessive "signatures" on submissions are subject to editing. Subscriptions are by an automatic "listserv" system; for subscription information, please send a message consisting of the word "help" (quotes not included) in the BODY of a message to: "privacy-request@vortex.com". Mailing list problems should be reported to "list-maint@vortex.com". All messages included in this digest represent the views of their individual authors and all messages submitted must be appropriate to be distributable without limitations. The PRIVACY Forum archive, including all issues of the digest and all related materials, is available via anonymous FTP from site "ftp ftp.vortex.com", in the "/privacy" directory. Use the FTP login "ftp" or "anonymous", and enter your e-mail address as the password. The typical "README" and "INDEX" files are available to guide you through the files available for FTP access. PRIVACY Forum materials may also be obtained automatically via e-mail through the listserv system. Please follow the instructions above for getting the listserv "help" information, which includes details regarding the "index" and "get" listserv commands, which are used to access the PRIVACY Forum archive. All PRIVACY Forum materials are available through the Internet Gopher system via a gopher server on site "gopher.vortex.com/". Access to PRIVACY Forum materials is also available through the Internet World Wide Web (WWW) via the Vortex Technology WWW server at the URL: "http://www.vortex.com"; full keyword searching of all PRIVACY Forum files is available via WWW access. ----------------------------------------------------------------------------- VOLUME 07, ISSUE 02 Quote for the day: "... I expected to be frightened on my wedding night, but nothing like this!" -- Joan Hayden (Gloria Castillo) "Invasion of the Saucer Men" (American International; 1957) ---------------------------------------------------------------------- Date: Tue, 13 Jan 98 10:05 PST From: lauren@vortex.com (Lauren Weinstein; PRIVACY Forum Moderator) Subject: AT&T Database Reveals Unlisted Names From Numbers Greetings. In a memorable scene from the 1975 film "Three Days of the Condor," CIA agent-on-the-run Joe Turner, played by Robert Redford, monitors a phone line with a telephone test set (known in telco parlance as a "butt set" or more popularly a "butt-in"). After taping and determining the touch- tone digits being dialed, he makes a call to an "operator" who provides the name and address of the party associated with that dialed number. His exchange with that operator was completely authentic. For decades telephone companies have operated "Customer Name and Address" bureaus, known colloquially as "CNA" bureaus. Presented with a phone number, the CNA operators provide name and address data, even for unlisted or non-published numbers. This service was and is ostensibly only for telephone company use. The telcos rightly considered this information sensitive, and CNA access numbers were always subject to frequent changing, but still leaked out. They were highly coveted by private detectives, phone phreaks, and others, for various investigative or even harassing purposes (few things can upset a person who thinks they have an unlisted number more than a bizarre call from an unknown person in the dead of night who knows their name...) Over the years, telephone subscribers have become more aware of the various commercial and other purposes to which their telephone listings have been subjected, and increasing percentages of folks have unlisted ("non-published" or "non-pub") numbers. In states like California, the majority of numbers are non-pub. Telephone company literature usually states that a non-pub status (for which subscribers now typically have to pay an extra monthly fee) also protects them from so-called "upside-down" listings and services--essentially published versions of CNA that provide listings in telephone number and/or house address order. Clearly the telcos realize that people are still very sensitive about their names and/or addresses being looked up by number. So it was with considerable concern late last year when I learned of an easily accessible AT&T database that provides a major portion of CNA--the provision of names from numbers, even for unlisted or non-published numbers. I have been engaged in a dialogue with various AT&T officials concerning this database since then. Getting an official response has taken some time (the holidays didn't help of course), and I've been told that I'm the first person to ever bring this issue to their attention (a familiar enough refrain when it comes to privacy issues...) The database in question is a "service" (which AT&T says is greatly appreciated by their customers) which ostensibly exists to allow automated access to number information by business customers. AT&T long distance business customers, upon calling their designated customer service number from their bills, enter a typical complex voice mail maze. After entering their main AT&T account number into the system, one of the choices available relates to "if you do not recognize a number on your bill." Choosing this option drops the user into an automated system which allows the direct entering of phone numbers. For each number entered, the system then attempts to read out (using a voice synthesizer) the name associated with that number. An option is also available to spell out the name, since text-to-speech handling of proper names can be less than optimal (remind me to tell the story of my "Touch-Tone Unix" synthesizer system from the '70's someday). The number entry/readout sequence can be repeated (apparently) as many times as desired. The need for a customer to find out who is associated with a truly unknown number on their bill can be a real one. Unfortunately, this database has a variety of negative characteristics: -- The database does not limit lookups to numbers actually on the customer's bill! Any numbers can be entered, and the system will usually provide the associated name, even if they are not on the current (or any) bill. Presence or absence from the bill is totally irrelevant. -- The database provides data for unlisted or non-published numbers just as happily as for listed numbers. This includes corporate internal numbers, modem and fax lines, residential second lines, and so on. -- For listed numbers, the database sometimes provides not the name associated with the listing, but rather the name of the person who is apparently the "billing contact" for the listed entity and usually has nothing whatever to do with the listing itself! To quote from the official response I received from the AT&T media relations representative with whom I have been in contact about these concerns: "As a matter of policy, AT&T safeguards customer information from unauthorized access. It is also our policy to allow business customers to access their account-billing records to check the accuracy of their records and to request changes, as necessary, by using an automated system. Until now, questions such as yours have never come up, so we want to thank you very much for bringing your concerns to our attention. ... The system has been in use for several years and, in our search for ways to improve the accuracy, timeliness and cost- effectiveness of the services we offer customers, we had already begun evaluating a number of options. Your inquiry has hastened our considerations of new ways to offer capabilities that our business customers value while safeguarding private customer information from unauthorized access. So, again, we thank you for bringing this issue to our attention." What this really means in terms of actual changes is decidedly unclear. No date is specified for any alterations, nor have they explained in any manner what sorts of customer privacy changes (if any) will be made, nor how any new system might differ from the current one. In the meantime, I have been told that they do not intend to alter the operations of the current database in any manner. I have suggested suspending or limiting the current system as a clear move to help protect telephone subscribers' privacy. AT&T has chosen not to do so. They point out that the database is not "intended" for other than the lookup of unknown numbers on the bills, and that they consider any other use to be improper. However, such improper uses will continue to be completely possible under the current system. My overall impression is that AT&T feels people aren't concerned about number to name lookups, and that AT&T doesn't see what harm such information could do in any case. This sort of "What harm could it do?" attitude is one that PRIVACY Forum readers have seen repeatedly with commercial databases of various sorts. It of course is important that persons make their feelings about such issues known once they come to light. If people don't bother to complain, faulting the commercial database policies themselves becomes considerably more problematical. Others may agree, or perhaps disagree, with AT&T's apparent attitudes about this matter. It seems likely that more persons expressing their opinion, either positive or negative about the system, would be useful to AT&T in helping to gauge public feelings about such matters. AT&T has told me specifically that the appropriate venue for such opinions would be AT&T Executive Resolution, at (908) 221-4191 (8-5 PM Eastern--I'm told that collect calls are accepted during those business hours). All too often, we see that the implementation of potentially useful services is done in a manner that produces undesirable (and often unintended) negative privacy side-effects. A key issue is to what extent an entity responds to privacy concerns, even when they might not agree with them, after they've been made aware of the issues. So far, I'm afraid that AT&T's response to this situation has not been stellar. --Lauren-- Lauren Weinstein Moderator, PRIVACY Forum http://www.vortex.com ------------------------------ Date: Fri, 02 Jan 1998 09:30:43 -0800 From: John Tillquist <john.tillquist@commerce.ubc.ca> Subject: Intuit Canada policy of forced disclosure Intuit Canada wants your personal information. Intuit, producer of popular home and small business financial software, requires purchasers of their 'QuickBooks' package (retail Can$129) to provide their name, address, and telephone number for continued use of the software. Customers must dial an 1-888 number and provide this personal information before Intuit will release the registration code necessary to run QuickBooks. Rolo Lacroix, Intuit Canada's Head of Customer Service, said in a telephone interview that the policy was to track customers for software update notification and to stem computer piracy. "We need your contact information to bind your name with the registration number," he said. Asked if a pseudonym could be used instead, Lacroix stated, "that would be illegal." The Risk. Forced disclosure of personal information to activate software is a compelling means for organizations to build an inventory of customer data. Aside from notification of release updates and protection against software piracy, the company also could potentially save tremendous amounts of advertising dollars by targeting sales campaigns, tailoring sales pitches to individuals on their database, and selling their database to direct marketing operations. Forfeiting privacy of personal information as condition of use has significant implications. Conceivably, any software or product retailer could do the same if they could build-in controls to restrict post-sale customer use. Cash no longer would protect the confidentiality of the buyer. Electronic profiles of individual's buying habits and preferences are matched with direct contact information, leaving anonymity and personal privacy a thing of the past. Imagine being required to provide personal information for using MS-Windows... John Tillquist, PhD | Faculty of Commerce | 604-822-8392 (o) University of British Columbia | 822-9574 (f) Vancouver, BC V6T 1Z2 | john.tillquist@ubc.ca ------------------------------ Date: Thu, 1 Jan 1998 03:48:40 -0500 From: "Stanley F. Quayle" <quayle@pobox.com> Subject: Re: Data Creep [PRIVACY Forum Digest V06 #18] > This form of "data creep," where information is collected > ostensibly for one purpose but then made available for other > applications, is an increasingly serious one. A recent article in an aviation magazine (Flying, perhaps; sorry, I don't have the reference) mentioned that recordings of airline pilots' in-flight conversations were only to be used in investigating an accident. They're now reviewed by the FAA for other purposes. --Stan Stanley F. Quayle, P.E. N8SQ +1 888 527-5127 Fax: +1 614 868-1671 8572 North Spring Ct. NW, Pickerington, OH 43147 Preferred address: quayle@pobox.com http://www.pobox.com/~quayle ------------------------------ Date: Wed, 17 Dec 1997 01:16:39 -0500 (EST) From: csb@indy.net (Fr. Stevan Bauman) Subject: Privacy problems with patient data in hospitals, by Simson Garfinkel [ Excerpted from Risks-Forum Digest; Volume 19 : Issue 51 by PRIVACY Forum Moderator ] [This item originally appeared in The Boston Globe, 5 Jun 1997. It was later reprinted in American Reporter, a daily electronic newspaper, http://www.american-reporter.com for initial free access. Contact Joe Shea at joeshea@netcom.com for comments and subscriptions. This article is reproduced here with permission of the author. PGN] Simson Garfinkel American Reporter Correspondent Martha's Vineyard, Mass. October 2, 1997 COMPUTERS COMPROMISE PRIVACY, CUT COST OF CARE by Simson Garfinkel American Reporter Correspondent MARTHA'S VINEYARD, Mass. -- A few months ago, a patient at the University of Washington Medical Center made what sounded like a reasonable request. Worried about his medical privacy, the patient asked that the hospital's computers be set up so that his medical record could not be displayed on a computer terminal. Today the UW Medical Center is still considering the request, but the doctors involved aren't quite sure how to proceed. University of Washington has been a leader in bringing computers to medicine, and there are few parts of the hospital that still rely on paper. Various computer systems at the hospital keep track of each patient's appointments, record the procedures done by a physician, record the laboratory work requested and performed, send the results electronically back to the physician, remind the patient when it is necessary to schedule a follow-up, and most importantly, send out bills to insurance companies and the patients themselves. Precisely which computer does the patient not wish his information to be displayed upon? "We're trying to figure that out right now," says one of the physicians on the hospital's medical informatics review panel. So far, there is no good answer. For thousands of years, it's been the obligation of physicians to protect the privacy of their patients. But many physicians are increasingly worried that this age-old commitment is being jeopardized as hospitals adopt increasingly-advanced medical information systems. Earlier this year, the National Research Council issued a report on the issues surrounding electronic health information. Called "For the Record," the report identified five "threat levels" for information stored in health care computers: * Threat 1: Insiders who make "innocent" mistakes and cause accidental disclosures of confidential information. This could be as simply as a lab sending a fax sent to a wrong phone number, or a nurse pulling up one patient's medical records instead of another's. * Threat 2: Insiders who abuse their record-access privileges. Browsing seems to be a problem with many electronic record systems. The Internal Revenue Service, for example, has had persistent problems with curious employees looking through the tax records to which they have access. It's unreasonable to think that hospitals will somehow avoid this scourge. * Threat 3: Insiders who knowingly access information for spite or for profit. During the 1992 Democratic primaries, a pathologist at Beth Israel Hospital here in Boston was contacted by a member of the press who wanted access to former U.S. Sen. Paul Tsongas' medical records. The reporter offered good money, and a less ethical pathologist could easily have retrieved the file -- probably without having that information traced back to him. * Threat 4: An unauthorized physical intruder gains access to information. Many hospitals rely on physical security to protect information stored inside a computer: the terminals are put in a special room or behind a desk to which only authorized personnel are supposed to have access. Unfortunately, hospitals are not as secure as hospital administrators would like to believe. If that journalist had simply put on a white lab coat and gotten a fake badge, that person might have been able to retrieve Tsongas' medical records unassisted. * Threat 5: Vengeful employees and outsiders, such as vindictive patients or intruders, who mount attacks to access unauthorized information, damage systems, and disrupt operations. A doctor who practices at an HMO recently told me of a problem that her group has been having: an employee -- they think they know who -- has been accessing the HMO's scheduling computer and deleting patient appointments. The scheduling desk then thinks the appointment slot is free, and two or three patients show up at the same time. The increased reliance on Social Security numbers is further compromising patient confidentiality. These days it is relatively easy to find out somebody's Social Security number, and if you have that magic number, you can call up a hospital or doctor's office and impersonate that person, hunting out embarrassing or valuable pieces of information. What makes this scam possible is the fact that many hospitals use Social Security numbers as a kind of secret patient password for patients to prove their identity. Hospitals don't seem to realize that even if Social Security numbers were once relatively secret, that day is long past. Disturbingly, use of Social Security numbers by health care organizations is about to expand dramatically. Section 1173 of the Kennedy Kassenbaum health care portability legislation passed last year defines a set of "administrative simplification procedures" which require the establishment of universal health identification numbers. The identifier will make it easier for different organizations to combine data, both to improve patient care and to make it easier to perform large-scale epidemiological studies. Right now, it looks as if Congress or Health and Human Services will adopt the Social Security number as that universal identifier. Some computer professionals have suggested that the way to solve the health care privacy issue is to encrypt all of a patient's files with a secret key, so that a patient's files can't be decrypted without their permission. The problem with this sort approach is that it makes it difficult for doctors to access critical information in times of urgent need. Hospitals, and other institutions, are loathe to deploy systems that restrict anybody's access to information. Instead, many hospitals seem to prefer systems that allow relatively open access, but record every file that's viewed or modified by every health care worker. That record is called an audit trail. The information can be used to find and punish employees who violate patient confidentiality, and having it works as a deterrent for others. But even audit trails breaks down in an emergency room, where forcing people to type a username and password before ordering a test could mean the difference between life and death. Are you willing to die for your right to privacy? With all of these problems, sometimes it is easy to forget that the reasons that hospitals are turning to computers is to lower costs and improve patient care. Unfortunately, ensuring patient privacy can be expensive and can prevent doctors and public health officials from considering all of the pertinent data for a given problem. It's doubtful that we will be able to resolve the fundamental tension between the need to know and the need not to know. ------------------------------ Date: Sun, 4 Jan 1998 17:01:22 -0800 From: "David C. Kulp" <dkulp@cse.ucsc.edu> Subject: RE: ATM card problems Following up on Joe Bates' recent email (V06 #18) and others involving Wells Fargo's infamous banking schemes, I called Wells to discontinue the Master Card / debit "feature" on the cards for me and my wife. Like Joe, I had destroyed our old cards under the assumption that they were going to expire. The Wells customer service representative was very kind and willing to re-replace my card. What I found ironic were the "security" steps which the representative had to take to process my request. The representative had to ask me my mother's maiden name, my PIN number for my checking account, when I made my last deposit, and how much that deposit was. To re-replace my wife's card (although we share the same account), my wife had to personally speak with the representative, too. Of course, for all the representative knows, my wife could have been anyone and my mother's maiden name is easily discovered. Still, I don't object to these checks, but it is truly ironic when an individual can use the same card number without any additional security measures to make purchases for thousands of dollars, immediately withdrawn from your account. David Kulp ------------------------------ Date: Fri, 2 Jan 1998 23:39:52 -0500 From: Monty Solomon <monty@roscom.COM> Subject: Airlines Debut Profiling System Excerpt from ACLU News 12-31-97 --- As Airlines Debut Profiling System, ACLU Launches Web Complaint Form FOR IMMEDIATE RELEASE Wednesday, December 31, 1997 WASHINGTON -- Anticipating complaints resulting from the national debut of a computerized airline passenger profiling system, the American Civil Liberties Union today launched a special web complaint form to collect information on incidents of discrimination and mistreatment by airport security personnel. The ACLU said that it was establishing its own complaint collection process in part because the Department of Transportation has so far failed to establish its own means of adequately collecting and tracking passenger complaints, and has refused to set up an independent monitoring panel to review complaints about the new system. The Computer Assisted Passenger Screening System (CAPS) was developed and mandated by the Federal Aviation Administration based on a recommendation from the White House Commission on Aviation Safety and Security headed by Vice President Gore. It is scheduled to be phased in nationwide beginning on January 1. "The ACLU is concerned that the CAPS system will have a unequal impact on some passengers, resulting in their being selected for treatment as potential terrorists based on their race, religion or national origin," said Gregory T. Nojeim, a Legislative Counsel for the ACLU's Washington National Office. "Fasten your seat belts, ladies and gentlemen," Nojeim cautioned, "because the government is about to take you on a very bumpy ride." The ACLU's complaint form, linked online at http://www.aclu.org/forms/complaint_aviation.html, offers airline passengers to provide details of discriminatory or abusive security screening incidents, and asks passengers to report information about their flight, themselves, and who mistreated them. Nojeim said the ACLU would use the data collected on its web site to look for patterns of abusive or discriminatory security screening. All personal data, he said, will be kept confidential on request. The ACLU has long criticized passenger profiling, calling it a speculative means of predicting criminal conduct that does nothing to insure safety. Profiling is based on characteristics that do not individually suggest evidence of criminality, the ACLU added, and can involve the troublesome maintenance and evaluation of personal information about passengers and their travel, using criteria that are kept secret for "security reasons." Under this system, passengers who "fit the profile" are selected for heightened security measures, which can include a thorough search of their luggage in front of other passengers, intrusive personal questioning, tagging of luggage with orange tape, and a physical escort from the check-in counter to the airport gate by security personnel, in full view of other passengers. Earlier this year, a newspaper reporter who obtained confidential airline security manuals found that they explicitly listed some ethnic associations, like a name of Middle Eastern origin, as grounds for suspicion. The CAPS system will replace, for most domestic flights, the manual profiling system now being used. Northwest Airlines has been testing the CAPS system in select airports since earlier this year, and, according to Nojeim, the ACLU has received more complaints of discriminatory security screening from Northwest passengers than from passengers on any other airline. However, it is not yet clear whether and how those complaints are linked to use of CAPS. Nojeim said that the ACLU continues to call for the establishment of an independent Civil Liberties Panel to insure that security measures are not implemented in a discriminatory way, that passengers' data is kept confidential, and that privacy standards are created for new security scanning devices. Criminals -- including those who "fit the profile" -- may find the profiling system easy to evade: all they have to do is dupe a passenger who does not fit the profile into carrying a bomb. The ACLU is reiterating its call for full "luggage match" as an alternative to passenger profiling. Bag matching assures that no one can check a bag without boarding the flight. "The ACLU has never challenged the use of the x-ray machine on everyone's checked luggage," Nojeim said. "What we have challenged are discriminatory methods of choosing which passengers will be subjected to heightened security measures." Note: The form can be found online at http://www.aclu.org/forms/complain_aviation.html. Individuals who do not have Internet access can call the ACLU's Washington Office at 202-544-1681. ------------------------------ Date: Mon, 12 Jan 1998 22:58:25 -0600 From: dawson@world.std.com (Keith Dawson) Subject: A spy satellite of one's own [TBTF for 1/12/98] [ Excerpted from TBTF for 1/12/98 by PRIVACY Forum Moderator ] Soon you'll be able to buy images from space that show the car in your driveway. Spying on the earth from space was a monopoly of governments for its first two decades. In 1986 the French company SPOT IMAGE [19] began selling images from its SPOT satellite to all comers. At 10 meters minimum resolution, the images were sufficient to resolve objects the size of houses.Now a US company -- EarthWatch, of Longmont, Colo- rado -- has launched EarlyBird [20] atop a Russian booster [21]. For a few hundred dollars charged to your credit card you'll be able to order a 3-meter resolution photo of any place on earth. Visit this simulation to appreciate the difference between 3-meter and 10-meter resolution [22]. In 1999 EarthWatch plans to launch the first of two next-generation QuickBird satellites with a minimum resolution below 1 meter. That's just about sharp enough to resolve people from space [23]. Here are specs for the EarlyBird and QuickBird satellites [24]. Eyes in the sky with such acuity must begin to raise privacy concerns. Visit the Freedom Forum [25], [26] for some cautionary thoughts from technology director Adam Clayton Powell Jr. [19] http://www.spot.com/ [20] http://www.digitalglobe.com/news/pr_eb1launch.html [21] http://www.sjmercury.com/breaking/headline2/080192.htm [22] http://www.hitachi.co.jp/Prod/remosen/eng/3mimage.htm [23] http://www.hitachi.co.jp/Prod/remosen/eng/1mimage.htm [24] http://www.digitalglobe.com/company/ewconstell.html [25] http://www.freedomforum.org/technology/1997/12/31satell.asp [26] http://www.freedomforum.org/technology/1997/12/05sputnik.asp ------------------------------ Date: Mon, 12 Jan 1998 21:18:18 -0600 From: Marianne Kim <lpas260@uts.cc.utexas.edu> Subject: self regulation Hi everyone: I'm looking for information related to how self regulating governing bodies (such as trade associations) can protect the transfer of customer profile data from abuse and simultaneously bring forward antitrust issues. The basic idea is that data collecters will have little incentive to sell information to marketing groups that represent their competitors, thus restricting the use of competitive tools. I'm new to this topic and it's been difficult for me to find literature on antitrust issues related to regulation. Does anyone have suggestions? Thanks. ------------------------------ Date: Fri, 09 Jan 98 18:11:00 P From: Jim Horning <horning@intertrust.com> Subject: ACM Policy98 Preliminary announcement +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ ASSOCIATION FOR COMPUTING ANNUAL MEETING =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= POLICY98 "Shaping Policy in the Information Age" Washington, DC, Renaissance Hotel May 10-12, 1998 Preliminary Notice For Conference and Registration information see: http://www.acm.org/usacm/events/policy98/ On May 10-12 1998, the Association for Computing will hold its annual meeting in Washington DC. This national conference will focus on critical public policy issues affecting the future of applications of computing. The purpose of the conference is to forge stronger links between computer professionals and policy makers. You will interact with leaders from academia, industry, Congress, and Executive agencies, and participate in debates on policy issues including Universal Access, Electronic Commerce, Intellectual Property, and Education Online. You can influence decisions about making productive use of computing and information processing innovations, while coping with the inherent dangers of any transformational technology. Your continuing collaborations with policy makers will be beneficial to citizens, consumers, entrepreneurs, students, and computing professionals. You can make a difference! All attendees are invited to the Annual ACM Awards Banquet on Sunday evening May 10th, and a conference reception on Monday night May 11th. +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ PANEL TOPICS AND COORDINATORS =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ Universal Service: Ollie Smoot What can be done to promote widespread access to the benefits of the Internet? What is the role of government and the role of the private sector in wiring schools, libraries, and medical facilities? Electronic Commerce: Jim Horning How much public policy does EComm need? What problems would inadequate, excessive, or misguided policies cause? Can compromises in areas like fair trade practices, fraud prevention, security, privacy, and taxation advance the interests of all stakeholders? Intellectual Property in Cyberspace: Pam Samuelson What will be the impact of the WIPO agreements on copyright in cyberspace? How should intellectual property be protected and what safeguards are necessary to protect libraries and academic institutions? Education Online: Charles N. Brownstein The Internet offers unparalleled opportunities for learning and teaching. What public policy and technical challenges must be met to realize these prospects? +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ CONFERENCE CO-CHAIRS =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ Ben Shneiderman, USACM (U.S. Public Policy Committee) C. Dianne Martin, SIGCAS (ACM Special Interest Group on Computers & Society) +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ PROGRAM COMMITTEE CHAIRS =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ Marc Rotenberg, Public Policy Keith Miller, Ethics and Social Impacts +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ REGISTRATION INFORMATION =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ For more information or to register electronically, see http://www.acm.org/usacm/events/policy98/reginfo.html ------------------------------ End of PRIVACY Forum Digest 07.02 ************************
Copyright © 2005 Vortex Technology. All Rights Reserved.