Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 07 Issue 97
Computer underground Digest Sun Dec 16, 1997 Volume 7 : Issue 97
ISSN 1004-042X
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #7.97 (Sun, Dec 16, 1997)
File 1--CuD is Changing Servers - RESUBS ARE NECESSARY
File 2-- ALERT: The Net rocks the capitol;still time to call (fwd)
File 3-- Last Stop Before the Censorship State (Reprint)
File 4--Re: Child Pornography and Beastiality
File 5--Response to "Bestiality on the Net (Re: CuD 7.96)
File 6--Privacy: What is it?
File 7--Computer, Freedom and Privacy 1996
File 8--Cu Digest Header Info (unchanged since 5 Nov, 1995)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Sun, 16 Dec, 1995 16:19:32 CST
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 1--CuD is Changing Servers - RESUBS ARE NECESSARY
** CuD IS CHANGING SERVERS **
In about mid-January, Cu Digest will be moving to a new server at
weber.ucsd.edu. We're following the strong consensus of readers and
requiring that, to continue to receive CuD after mid-January, you must
RE-SUBSCRIBE.
Although the move will not take place for a few weeks, you can enter
your subscribtion before then, so WE STRONGLY URGE YOU TO SUB NOW.
Re-subbing is easy. Just send a message with this in the
"Subject:" line
SUBSCRIBE CU-DIGEST
send it to:
cu-digest-request@weber.ucsd.edu
Issues will still be sent out from the older server for a few weeks,
so the strategy is to collect the resubs first, and then make the
transition.
If you prefer to access CuD from Usenet, use
comp.society.cu-digest
If you prefer archives, you can use the ftp/www site at
ftp.eff.org (or www.eff.org) or the CuD archives at:
http://www.soci.niu.edu/~cudigest.
We also hope to have a mail archive set up soon as well.
You can still contact the moderators at:
cudigest@sun.soci.niu.edu
or tk0jut2@mvs.cso.niu.edu
Please *DO NOT* send inquiries to the server at UIUC.
Jim and Gordon
------------------------------
Date: Wed, 13 Dec 1995 23:33:11 -0500 (EST)
From: "Shabbir J. Safdar" <shabbir@VTW.ORG>
Subject: File 2-- ALERT: The Net rocks the capitol;still time to call (fwd)
========================================================================
CAMPAIGN TO STOP THE NET CENSORSHIP LEGISLATION IN CONGRESS
THE NET ROCKS AMERICA'S CAPITOL - NEARLY 20,000 PARTICIPANTS
THURSDAY DECEMBER 14, 1995
SENATE CONFEREES COULD STILL VOTE THIS WEEK
RALLIES HAPPENING IN AUSTIN, NEW YORK, SF, & SEATTLE
PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
REDISTRIBUTE ONLY UNTIL December 25, 1995
________________________________________________________________________
RECAP: INTERNET DAY OF PROTEST: TUESDAY DECEMBER 12, 1995
The net came into its own as a political force on Tuesday. The
press release has more details. If you haven't taken a moment to
call, fax, or email, do so now. We're still keeping track and only
need a few more to break 20,000.
VTW had someone onhand in DC monitoring the response at the Congressional
offices. The feedback was amazing; Congress got the message. We need to
sustain that by continuing to tell them we're not happy with the options
being offered to us at this time.
Directions for calling Congress can still be found at http://www.vtw.org/
and the many other sites listed at the end of this message. Take a moment
to call! Don't forget to mail us a note at protest@vtw.org to let us
know you took part in the Day Of Protest (and Day 2, and Day 3, and Day 4).
FOR IMMEDIATE RELEASE December 13, 1995
Contact: Steven Cherry
(718) 596-2851
stc@vtw.org
Shabbir Safdar
(718) 596-2851
shabbir@vtw.org
New York, NY
Are 20,000 phone calls a lot? 30,000? 50,000? They are if you're one of a
handful of Congressional staffers trying to field them. Tuesday, December
12th was the Internet's Day of Protest. A variety of net-activists and
telecommunications-related services exhorted the on-line community to call
a selected group of Senators and Representatives to declare their
opposition to the threat of Internet censorship. And call they did.
As the Senate members of the Telecommunications Reform conference
committee contemplated portions of legislation that would censor
"indecent" material on-line, their staffers were being overwhelmed with
phone calls. Senator Inouye's office said they were "getting lots and lots
of calls and faxes." Senator Lott's said they were "flooded with calls."
At Senator Stevens' office there were so many calls they couldn't keep
a complete tally.
At Senator Exon's office, the fax machine was "backed up." And at one
point, activists couldn't even get through to Senator Gorton's office to
ask. Exon is the Senator whose Communications Decency Act started the
nearly year-long struggle between those who would create special
regulations to restrict speech on-line (even, in certain instances,
private email between two individuals) to a greater extent than even
traditional broadcast media; regulations that, according to the ACLU and
many other civil liberties groups, will certainly be proven to be
unconstitutional if passed into law.
"We've never seen anything like it," said Stanton McCandish of the
Electronic Frontier Foundation (EFF). The EFF is one member of the on-line
coalition that has been fighting an array of censorship legislation since
this spring, when Senator Exon introduced his Communications Decency Act.
"We may have almost overwhelmed our provider," said Shabbir Safdar, head
of Voter's Telecommunications Watch (VTW). VTW is the organization that
organized the on-line coalition. Their on-line connectivity is provided by
Panix.com, a New York-area Internet service provider. "Panix has been
doing some maintenance work today, so it's hard to tell," Safdar
continued. "But we think it's actually made a dent in their connection
to the rest of the Net."
How many calls were actually made? No one can tell. For Leslie Miller, a
reporter for USA Today, it took much of the afternoon to get some counts
from Congressional staffers, and she couldn't get any report from the
Senate's Sergeant-At-Arms, the office nominally responsible for the
Senate's telephone system. VTW may be the only organization that can
really make an educated guess.
"In our Alerts we ask that people drop us an email note after they call,"
explained VTW board member Steven Cherry. "The message count peaked in the
late afternoon at over 70 per minute. Many of those were from people who
called several offices. By 7:30 P.M. (EST) we had gotten 14,000 messages.
By Wednesday morning the count was over 18,000. And of course there are
the people who called but didn't send us email. So all told, our very
rough guess is there were well over 50,000 phone calls and faxes made on
the one day."
"The Net is coming of age, politically," said Jerry Berman, Director of
the Center for Democracy and Technology (CDT), another member of the
on-line coalition. Safdar, of VTW, concurred, saying, "I think Washington
got the message today that there's a new grass-roots interest group
around, and we're going to be a big part of the 1996 elections." (VTW's
initial election activities can be found at http://www.vtw.org/pledge.)
In addition to the Day of Protest, rallies are scheduled on Thursday,
December 14th, in San Francisco and Seattle, and a protest will be held
that day at 2:00 in New York City.
The New York rally will be at the Cyber-Cafe, 273A Lafayette St from 2-3pm
on Thursday, Dec 14th. Contact Steven Cherry or Shabbir J. Safdar for
details.
The Austin rally is planned for Tue. Dec 19th. No more information is
available at this time.
Information about the San Francisco rally can be obtained from
http://www.hotwired.com/staff/digaman/.
Information about the Seattle rally can be obtained from
http://www.wnia.org/WNIA/hap/rally.html.
Voters Telecommunications Watch is a volunteer organization, concentrating
on legislation as it relates to telecommunications and civil liberties.
VTW publishes a weekly BillWatch that tracks relevant legislation as it
progresses through Congress. It publishes periodic Alerts to inform the
about immediate action it can take to protect its on-line civil liberties
and privacy.
More information about VTW can be found on-line at
gopher -p 1/vtw gopher.panix.com
www: http://www.vtw.org
or by writing to vtw@vtw.org. The press can call (718) 596-2851 or
contact:
Shabbir Safdar Steven Cherry
shabbir@vtw.org stc@vtw.org
------------------------------
Date: Sun, 17 Dec 1995 16:47:19 -0600
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 3-- Last Stop Before the Censorship State (Reprint)
From: Howard Rheingold (hlr@well.com)
Date: Fri Dec 15 '95 (14:52)
Last Stop Before the Censorship State
By Howard Rheingold
Americans have one last chance before we lose the Net. If
American citizens write, call, and fax the President now and urge him to
veto the telecommunications deregulation bill, we might not lose an
opportunity to revitalize the democratic process and grow hundreds of
thousands of small Net-based businesses. And we might not hand over a
nascent native industry - the industry of the twenty first century - to
international competitors.
The effects of this legislation [BILL NUMBERS TK] go far beyond
the Internet, reaching into every aspect of American lives, undoubtedly
influencing the shape of the democracy our children will grow up in. This
telecommunications bill encourages the concentration of ownership of all
news, entertainment, and communication media, institutes censorship
provisions that will put online service providers out of business, cut
off universities from the worldwide network, and turn American
scientists, engineers, educators, entrepreneurs into a nation of
Net-morons in an increasingly online world. This bill allows rates to
rise too high and too fast, is generous with megacorporations and stingy
with education, and it completely ignores the widening gap between
information-rich and information-poor.
Through months of committee debates and decisions, censors and
monopolists have won every battle over the future of the Internet. By
shamelessly exploiting legislators' and citizens' ignorance of the nature
of the Internet, a small group who are intent upon imposing their brand
of morality on everyone else,are about to silence a potentially powerful
medium for citizen-to-citizen communication, cripple American industries
trying to compete in global markets, and create a Federal bureaucracy
with the power to determine what is decent for citizens to say.
Congress will almost certainly send to the President a
telecommunications reform bill that can send people to jail for two years
and fine them $100,000 for mentioning the seven words that are forbidden
from radio and television. Mention of abortion, condoms or safe sex are
almost certain to be the next items forbidden. American universities, on
the advice of their attorneys will turn off all Internet access for their
students as soon as the law goes into effect.
American citizens don't have to be electrical engineers to
understand the nature of the new communication media. But we do need to
have the truth told and the complexities explained, and that has not
happened. Computer BBSs, e-mail, citizen networks, mean that you no
longer have to own a press to benefit from freedom of the press: every
desktop connected to the Net is a printing press, a place of assembly, a
broadcasting station. The idea that ordinary taxpayers should have the
power to publish eyewitness reports, argue policy, distribute information
threatens the old power structures. Politicians and corporations whose
fortunes are based on control of mass media fear their power will erode
to the citizens.
Legislators have failed to uphold their oath to defend the
Constitution by pursuing such nonsense as flag-burning amendments to the
Constitution while at the same time destroying the liberties that flag
symbolizes. Internet censorship legislation is not about pornography on
the Internet - that will easily move offshore. It's about who will have
the power and control to broadcast words, images, and sounds, to everyone
else. Citizens? Or cartels?
A trillion-dollar pie is being cut up. We, the people, are
getting cut out. Speak up. We still have the right to communicate with
the President and demand that he hold the line. Tell him to send this
back to Congress. We've been living for sixty years under the rules set
forth in the Communications Act of 1934. Now the Congress is changing the
rules again, determining the way our nation and its industries will
communicate, educate, and do business for decades to come. We deserve
better than this. Tell Clinton to tell Congress to try again, to cut the
citizens of this country into the deal, and to keep their hands off the
Bill of Rights.
------------------------------
From: glaze@RCLSGI.ENG.OHIO-STATE.EDU(Larry Glaze)
Subject: File 4--Re: Child Pornography and Beastiality
Date: Thu, 14 Dec 1995 10:48:04 -0500 (EST)
Content-Length: 7350
Patrick A. Townson <ptownson@LCS.MIT.EDU> wrote in File 5--Child
Pornography and beastiality, Cu Digest, #7.96:
>No sysadmin is required to carry any alt group not of his (or his
>employer's) liking. No explanation required, it simply does not
>appear on his news spool. Some sites don't carry ANY alt groups
>period. Some sites have even violated the (long-ago) gentlemen's
>agreement of Usenet that for widest possible propogation, each
>site carry all groups, i.e. as a courtesy I display messages from
>your users and in return you display messages from my users.
Very true.
>So if the sysadmin at your site carries alt.sex.whatever.variations
>on his spool, it is because he *wants* to carry it there. It
>might be a business decision (lots of subscribers paying good money
>to have this available to read) or a personal decision (he wants
>to read it himself). Don't believe him if he rationalizes it
>by claiming 'we have to carry all newsgroups'. He can make the
>needed changes in the system .newsrc file, and that, as they say,
>will be that. It is doubtful these days he has to carry all of
>the Usenet groups and he never was required to carry alt groups.
Due to the size of Usenet, you are not required to carry anything you
don't want to. There are thousands of newsgroups related to only one
city, or one country. We do not have to carry any of these newsgroups,
nor do we have to carry any of the more traditional ones. The
bandwidth and disk space required for a full newsfeed has gotten
so large that it is impossible for most sites to carry a full
feed.
>If you do NOT want to have such a newsgroup, then you tell your
>syadmin about it. You tell him in your opinion it cheapens and
>harms the reputation of his site by having those groups available.
>You ask him to remove them (or not make them available for public
>reading) and perhaps you offer to take your business elsewhere
>to a site you feel is better operated, or with higher quality.
>If the sysadmin gets enough comments on a newsgroup, he will take
>action on that group.
Oh, come on now. This is the equivalent of 'I don't like this
channel on my cable services so I am going to try to get the
cable services to drop it so nobody can watch it.' That is
totally uncalled for. If someone doesn't like a newsgroup, then
they don't have to subscribe to it. Like you say, it is as
simple as that. If you don't like it personally and feel strongly
enought about it then the best thing to do would be to leave. But
lets not keep everyone else using the services from reading a
particular newsgroup you don't like. It is as much their right to
choose to read a newsgroup as it is yours to choose not to.
> After all, there are people who read {The New York Times} specifically
> because they do not fill up their pages with the likes of columnists
> like Ann Slanders or her sister Scabby Van Buren, and I believe
> sites which carry only a limited subset of the news, picking the
> groups which meet their taste requirements have a place also.
I agree.
> Just because 'child porn may be legal in some countries in Europe' (I
> hear that one a lot) and just because the {New York Times} is sold and
> distributed regularly in Europe and a lot of the readers are European
> there still is no requirement that the {New York Times} print child
> porn under some vaugely thought out line of reasoning which says 'well
> it came here on our newsfeed from someplace in Europe where it is
> legal so how can the authorities here punish us for printing it?' ...
> Very easily ... that is what editors are for. If you carry
> Usenet/altnet/*net news on your site, then the sysadmin becomes an
> editor by default.
>
> Remember, a 'news' group without any news spools to sit on really
> doesn't exist. Self-censorship is the best censorship of all ... it
> works, is far more effective than anything the government tries to
> legislate, and even the ACLU has not yet been able to figure out
> how to force people to like it who in reality are totally opposed to
> the actual/perceived or encouraged abuse of children/animals in this way.
You said it right here, self-censorship is the best censorship of all.
If I do not want to see or read something, then it is *my* choice not
to see or read it. *I* make the decision, not the government or any
other person forcing me not to read or see it by completely keeping it
off of the system. Also, I highly doubt the ACLU is condoning any
"actual/perceived or encouraged abuse of children/animals". They are
just trying to protect our freedom of speech so I can say "You don't have
a damn clue what you are talking about" and not get thrown in jail for it.
> So sysadmins, start acting more like responsible publishers/editors.
> If you want that garbage at your site, hey -- just say so and
> carry it. If you don't, then get rid of it and block it out of
> your accepted newsfeed.
News admins *are not editors or publishers*. PERIOD! This has already
been proven in court. Prodigy lost their court case because they
monitored a chat room and, therefore, the courts said that they were
a publisher because of that fact. If they had not been
monitoring the chat room then they would have been found innocent.
News admins do not monitor content of the newsgroups and it would
be very difficult to do so due to hardware/software requirements
needed to scan *every* news article that comes through the site.
Besides all of that, I have better things to do with my time than
to go reading through all of the articles my users post. I am
*not* an editor and I do not want to be one. Nor am I a publisher.
I am the equivalent of the phone company. I provide a gateway for
people to send out their messages to Usenet.
Adults have to start taking responsibility for what their children see.
If you don't want your child coming into contact with certain segments
of the net community then you take the time to monitor their activity.
Just because you are too lazy to take the time to monitor your
child while they surf the net is no reason to limit what *everyone*
else can see, say or do on the net. If you would rather the government
ban "indecent" images/language, then you have just forced your moral
standards upon everyone else in the country. What will you do
when someone decides they don't like a particular activity that you
enjoy? I suppose you will just say "Oh, they think it is too dangerous
for me or too 'indecent' for me so I will just go along with it.
Never mind the fact that I have every right to choose for myself
what I do." And no, I am not advocating child pornography or
beastiality. My response is directed towards all of the people who,
because they deem something inappropriate, feel they have the right
to impose their views or opinions on me.
------------------------------
From: tallthin@IRS.COM(Tall Thin Jones)
Subject: File 5--Response to "Bestiality on the Net (Re: CuD 7.96)
Date: Sun, 17 Dec 1995 11:49:00 -0500
* Carbons Sent to: Alt.sex.bestiality
In File 5, CuD #7.96, Patrick A. Townson spoke against "bestiality"
on the net. I believe he was wrong on several points, and I want to
submit a rebuttal here.
Bestiality, in its definition of "humans having sex with animals"
is not inherently cruelty. It's not illegal in all fifty states, as
even under humane laws, harm has to be real. Animals do form romantic,
loving relationships, they do experience sex for pleasure, they do
exercise discretion in their choice of mates, and they do consent or
withhold consent, to the point of using deadly force. Anyone who is
literate can learn these things from the scholarly literature. If Mr.
Townson wants to discuss it further, he can go to alt.sex.bestiality.
Try to keep it rational, please, we do have standards.
Mr. Townson urged that providers be encouraged to drop groups like
alt.sex.bestiality and others he doesn't like. I'm sure they have a
right to choose what they will carry, but it is also a principled stand
to carry all of the USENET groups if one is a USENET provider. This is
the support of the larger principle that the Constitution protects
everyone or it protects no one. If it worked otherwise I'd be on the
bandwagon against the pedophiles in an instant. But maybe hatred is
still hatred even against the right targets... But I ramble.
The hyenas are at our door. Our situation as users of the Internet
will not improve if we give them a little of what they want, taken from
our neighbors who we don't like or approve of. The hyenas see us all as
meat. In plainer English, the Christian Coalition that is pushing the
decency laws has already labelled all users of the Internet as potential
pedophiles who must be restricted for our own good. Pointing fingers at
each other will weaken us and strengthen them, then they will take all
of our freedoms. Patrick L. Townson's proposals will make it much
easier for them to do this.
We have to decide which is worse. Having a few newsgroups some of
us can't stand reading, and a few websites some of us won't use, or
allowing the Christian Coalition to filter all of human knowledge for
the rest of us. They didn't do too well when they were able to do this
before.
------------------------------
Date: Thu, 14 Dec 1995 15:16:44 -0500
From: Galkin@AOL.COM
Subject: File 6--Privacy: What is it?
THE COMPUTER LAW REPORT
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
December 14, 1995 [#14]
SORRY FOR THE DELAY SINCE THE LAST ISSUE. THIS ISSUE BEGINS A SERIES
DISCUSSING PRIVACY RIGHTS IN THE DIGITAL AGE.
=====================================
GENERAL INFO: The Computer Law Report is distributed (usually) weekly for
free and is prepared by William S. Galkin, Esq. The Report is designed
specifically for the non-lawyer. To subscribe, send e-mail to galkin@aol.com.
All information contained in The Computer Law Report is for the benefit of
the recipients, and should not be relied on or considered as legal advice.
Copyright 1995 by William S. Galkin.
=====================================
ABOUT THE AUTHOR: Mr. Galkin is an attorney in private practice in Owings
Mills, Maryland (which is a suburb of Baltimore), and has been an adjunct
professor of Computer Law at the University of Maryland School of Law. Mr.
Galkin has concentrated his private practice in the Computer Law area since
1986. He represents small startup, midsized and large companies, across the
U.S. and internationally, dealing with a wide range of legal issues
associated with computers and technology, such as developing, marketing and
protecting software, purchasing and selling complex computer systems, and
launching and operating a variety of online business ventures. He also enjoys
writing about computer law issues!
===> Mr. Galkin is available for consultation with individuals and companies,
wherever located, and can be reached as follows: E-MAIL:
galkin@aol.com/TELEPHONE: 410-356-8853/FAX: 410-356-8804/MAIL: 10451 Mill Run
Circle, Suite 400, Owings Mills, Maryland 21117
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
Articles in The Report are available to be published as columns in both print
and electronic publications. Please contact Mr. Galkin for the terms of such
usage.
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
PRIVACY: WHAT IS IT?
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
[This is the first of a series of articles discussing privacy rights in the
digital age.]
As the Information Age reaches maturity, its tentacles seem to stretch into
every aspect of our lives. These fiber optic tentacles gather information
from us often without our knowledge. Vast amounts of personal information is
collected, sorted, organized by both government and private entities, and
then used for a wide variety of purposes. Do we have any right to control the
uses made of "our" information? Is there a right to privacy that provides us
with some protection?
I remember once calling an 800 number. The person who answered the phone knew
my name and address immediately without my giving this information. Through
use of a caller identification system linked to a data base sorted by phone
numbers, they had personal information available instantaneously when
people called. I was disturbed by the knowledge that making a telephone call
could no longer be done with anonymity. I wondered how much information they
had about me, where it was gleaned from, and whether I could have any control
over how this information would be used.
It is important to identify what is meant by a right to privacy in the
context of personal information. In 1928, the Supreme Court in Olmstead v.
United States, explained the right to privacy as the right to be "left
alone." While many will agree with this description, it will need to be much
further refined to be useful for applying it in the many different situations
where this right will arise.
Rather than trying to define the right to privacy at this point, it is better
to look at some circumstances where such a right might arise:
(1) Where the government unlawfully seizes evidence of a crime and the
evidence is then inadmissible in court. One example of this is where the
unlawful seizure occurs in a location where the possessor of the information
had a "reasonable expectation of privacy." Where a car is lawfully stopped by
the police for a simple traffic violation, illegal objects that are in plain
view from outside the car may be seized because there cannot be a reasonable
expectation of privacy, but , without probable cause for suspicion, objects
seized from the glove compartment would not be admissible because there is a
reasonable expectation of privacy applicable to the glove compartment.
(2) Where government agencies or private entities are lawfully collecting
personal data, but more data is collected than is needed to accomplish the
purpose of the data collection. The collection of this excess data might
amount to an invasion of privacy, even though the data is never misused.
(3) Where information that has been lawfully collected is then disclosed
(e.g., disclosure to the public under the Freedom of Information Act (FOIA)
or disclosure to other entities). The courts have determined that since the
purpose of the FOIA is to allow the public to monitor the activities of
government, disclosure of personal data about individuals does not further
this purpose, and therefore is not subject to disclosure under the FOIA. This
conclusion results from balancing the public's right to access to government
records and the privacy interests of individuals. Disclosure to third parties
might be data transfer or data matching between government agencies or a
business selling customer lists.
(4) Where information lawfully collected is not disclosed, but rather used
for a purpose different than the purpose for which it was originally
collected. For example, information collected pursuant to an application for
a mortgage might be used for trying to sell other products or services
offered by the same company.
(5) Where data lawfully collected is inaccurate. The classic case of this is
the credit report. In this context, the right to privacy might be the right
to examine and correct these records.
The "Right to Privacy" is a battle cry we often hear these days as we see our
cherished realm of privacy being invaded by the onslaught of technology.
However, legal scholars and the courts have had difficulty identifying the
specific source of this right and defining its scope and application.
Many believe that this right emanates from the Constitution. While it may,
the U.S. Supreme Court has never expressly recognized a
constitutionally-based right to privacy relating to collection and use of
personal data, except as regards disclosure in criminal law proceedings. In
1965, in the case of Griswald v. Connecticut, the Supreme Court recognized a
right to privacy relating to birth control counseling. This and subsequent
cases identified the right to privacy relating to controlling an individual's
life as relates to personal decisions. However, this does not provide a
foundation for a right to privacy of personal information.
Others prefer to view the right to privacy as a property right, similar to
the accepted corresponding property right found in the commercial context:
trade secrets. As a property right, the owner of this information would have
the right not to disclose the information and to restrict others who received
this information through a permitted disclosure from further disclosure in a
manner that is not inconsistent with the "owner's" expressed instructions.
The comparison of trade secrets law with a right to privacy of personal
information is difficult to take too far because the primary requirements for
establishing a trade secret are not usually present in personal data. These
requirements are (1) the secret information has value because it provides an
economic advantage over competitors and (2) the information is actually
secret, and the owner made reasonable efforts to maintain the secrecy of the
information.
First, in the personal information context, the information itself has no
value to the "owner," rather it is the disclosure of the information that
has a negative value, though usually in a noneconomic sense. Second, much of
the information that people would like to keep secret is already lawfully in
the possession of some company or government entity, and what we want is to
stop further disclosure without our authorization.
When viewing the current legal landscape relating to the right to privacy of
personal information, it is useful to consider that there may be no such
single "right". Rather privacy rights will take different forms depending
upon the type of personal information involved, how it was gathered, and
what it is being used for.
These different forms, may often have little to do with each other, and
therefore need to be distinguished from one another. Some of these rights may
actually emanate from the U.S. Constitution, others from state constitutions,
and yet others from federal and state statutes and common law. In each
context, the right is not absolute, but must be balanced against other
competing interests of the public, law enforcement, government agencies and
private commercial interests.
In future issues, we will examine various places that these rights are found.
The following federal statutes are an example of the diversity: the Freedom
of Information Act, the Electronic Communication Privacy Act of 1986, the
Privacy Act of 1974, the Paperwork Reduction Act of 1980, the Fair Credit
Reporting Act, and the Family Educational Rights and Privacy Act.
The purpose of this series is not to come up with a definition of the right
to privacy or to identify its ultimate source. Rather, we will explore
various legal sources of these rights along with examining vulnerable areas
where no clear rights have yet become manifest. It will be left up to the
readers to determine what definition might be appropriate in different
circumstances, taking into account relevant competing interests.
------------------------------
Date: Wed, 13 Dec 1995 00:32:02 -0600
From: Stephen Smith <libertas@COMP.UARK.EDU>
Subject: File 7--Computer, Freedom and Privacy 1996
****************************************
Please redistribute widely
****************************************
The Sixth Conference on Computers, Freedom, and Privacy will take
place at the Massachusetts Institute of Technology on March 27-30,
1996. CFP96 is hosted by MIT and by the World Wide Web Consortium.
You can register for CFP96 by US Mail, by fax, or via the World Wide
Web.
Conference attendance will be limited. Due to the enormous public
interest in CFP issues over the past year, we encourage you to
register early.
SPECIAL NOTE TO STUDENTS: There are a limited number of places
available at a special student rate. These will be allotted on a
first-come first-served basis, so register as soon as possible.
For more information, see the CFP96 Web page at
http://web.mit.edu/cfp96
or send a blank email message to
cfp96-info@mit.edu
Since its inception in 1991, the series of CFP conferences has brought
together experts and advocates from the fields of computer science,
law, business, public policy, law enforcement, government, and many
other areas to explore how computer and telecommunications
technologies are affecting freedom and privacy.
Events planned for this year's conference include:
- Federal prosecutors square off against civil-liberties lawyers
in a mock Supreme Court test of the "Cryptography Control Act of
1996", which criminalizes non-escrowed encryption.
- Authors Pat Cadigan, Tom Maddox, Bruce Sterling,
and Vernor Vinge divine the future of privacy.
- College administrators, students, lawyers, and journalists
role-play scenarios that plumb the limits of on-line expression
on campus networks.
- Panels on international issues in privacy and encryption; on the
struggle to control controversial content on the Internet; on
tensions between copyright of digital information and freedom of
expression; on threats posed by electronic money to law
enforcement, privacy, and freedom; on mass communication versus
mass media.
------------------------------
Date: Sun, 5 Nov 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 8--Cu Digest Header Info (unchanged since 5 Nov, 1995)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@VMD.CSO.UIUC.EDU
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CUDIGEST
Send it to LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #7.97
************************************