privacy

2004-08-01 Thread Michael Perelman
I just found this on Risks Digest.

[http://www.odci.gov/cia/notices.html#priv]


Privacy Notice
The Central Intelligence Agency is committed to protecting your
privacy and will collect no personal information about you unless you
choose to provide that information to us.





--
Michael Perelman
Economics Department
California State University
Chico, CA 95929

Tel. 530-898-5321
E-Mail michael at ecst.csuchico.edu


Market Solutions to Privacy Problems?

2003-09-02 Thread Kenneth Campbell
These kinds of ideas are fine in an abstract, make-believe world -- the
Wired magazine/Negroponte realm. Robinson Crusoe versions of a wired
world. Everyone on their own little island, everyone wired together.

Deighton says, below: It's about offering its customers and prospects
an identity that they find useful and are proud to wear. God, where's
the barf bag. I can't read anymore.

Sigh... I had hoped these kinds of wired business visionaries went the
way of garden.com and John Perry Barlow. Or had been banished to the
Island of the Direct Marketers to interview each other endlessly about
getting discount options on coconuts if they would just show each
other just a little bit more of their undies.

Ken.

--
And in a capitalist society
Crime is the last vestige of liberty
  -- Killdozer, 1994


--- cut here ---

Selling your personal data

From HBS Working Knowledge
Special to CNET News.com
September 1, 2003


It's a startling idea: Instead of relying on regulators to protect our
privacy against telemarketers, data miners and consumer companies, we
should capitalize on the value of our personal information and get
something in return.

That is the idea put forward by John Deighton, a Harvard Business School
professor, in a recent working paper titled Market Solutions to Privacy
Problems?

Just what would consumers get in return for their personal information?
Money perhaps, or price discounts, better customer service, maybe
products tailored specifically to their needs.

His point: The information that is gathered about you by stores,
researchers and credit agencies belongs to those companies, not to you.
They in turn resell that information to others. So if our personal
information is such an asset, shouldn't we benefit from our asset as
well? Why shouldn't intelligent consumers sell their identities to
stores they trust? And wouldn't those trusted stores in return be
motivated to use that information wisely?

The challenge is to give people a claim on their identities while
protecting them from mistreatment, Deighton said. The solution is to
create institutions that allow consumers to build and claim the value of
their marketplace identities and that give producers the incentive to
respect them.

We asked Deighton to elaborate on his ideas.

--

Q: You argue that market forces can do a better job than regulators in
protecting privacy. In general, what is wrong with a regulatory
approach? Isn't the telemarketing hotline working?

A: Regulation solution routinely disappoints. Rules lag behind the
cunning of those who want to exploit the limitations of the rules,
particularly in the nimble digital world.

The do-not-call list is the rich desserts of a thoroughly nasty
industry. The saddest thing about it is that it will not put an end to
uninvited outbound telemarketing. You'll still get calls from firms you
deal with, including those you have no choice but to deal with such as
local phone companies. Politicians will still be free to call. It took
20 years for politicians to act on their constituencies' widespread
indignation. Don't count on regulation to solve anything in time or on
budget.

This is what makes a market-based way to deliver consumer privacy
attractive. Markets have an advantage in that they set cunning against
cunning and self-adjust to technological innovation. But the idea of
offering the opportunity to buy privacy is hard to swallow--if privacy
is something to which we are entitled, should our share of it depend on
ability to pay? Inevitably it does. Whenever we claim privacy, we incur
a cost in the form of a loss of valued identity. Our identity is an
asset to the extent that others value access to us and use it in ways
that benefit us.

The idea of offering the opportunity to buy privacy is hard to swallow.
The challenge is to give people a claim on their identities while
protecting them from mistreatment. The solution is to create
institutions that allow consumers to build and claim the value of their
marketplace identities and that give producers the incentive to respect
them. Privacy and identity then become opposing economic goods, and
consumers can choose how much of each they would like to consume. There
is some evidence to suggest that markets evolve toward this solution of
their own accord, but regulation can accelerate the evolution.

Q: Why is the distinction between privacy as a right and identity as an
asset an important one to consider?

A right, as I use it, is just a claim that takes precedence over merely
contractual or customary claims. It draws its authority from established
constitutional, religious or humanistic principles. In this sense, a
right cannot be bought or sold.

By contrast, an asset is a possession or quality with value in exchange
as well as in use. It is property with a market price and opportunity
cost. Rights are matters for regulation, assets are matters safely and
usually better left to markets. Framed in these terms, here

US Ambassador Schneider on data privacy

2003-08-25 Thread Jurriaan Bendien
The most important technological development of the late 20th century is
arguably the advance in Information Technology. The world is increasingly
information-rich and information dependent. The unfettered ability to tap
into those flows of information already is critical to many businesses and
organizations. In the near future, that information dependency will be
universal. Electronic Commerce appears to be a key component of our common
destiny. This is why my government is deeply concerned about the issue of
data privacy.

- Remarks by Ambassador Cynthia P. Schneider at The Hague and Amsterdam
American Business Clubs, as prepared
The Hague, Holiday Inn Crown Plaza, January 26, 2000

Source: http://www.usemb.nl/012600.htm


Ritualistic chantings, the stock market, and the right to privacy

2000-03-12 Thread Eric Nilsson

I'm looking for readings for an undergraduate course about the link between
the social market and social norms about acceptable business behavior in the
USA.

For instance, I'm interested in analyses of how the change between #1 and #2
occurred:
1) layoffs by businesses during good economic times in the USA where very
difficult to justify in the "court of public opinion" (before 1980)
2) layoffs by businesses during good economic times can be socially
justified by the ritualistic chanting by the business of "the stock market
requires we boost profitability (in the 1990s).

Of course social norms about layoffs are only one of many that have changed.

Also, is there anything on current tensions about changing social norms for
business behavior? For instance, social norms about business's invasion of
individuals' right to privacy on the Internet are not a site of conflict.
For instance, DoubleClick recently had to back off on their plans to merge
various databases holding information about individuals not because it was
illegal but because of "public outcry": this behavior violated social norms.
However, I would bet that in 20 years this "public outcry" will have become
a faint sound as social standards against invasions of privacy by businesses
fade away. Is there anything written on this sort of process?

Thanks for any help.

Eric Nilsson





Re: Ritualistic chantings,the stock market,and the right to privacy

2000-03-12 Thread Bill Rosenberg

Not really what Eric asked for, but a delightful example of business ethics
appeared in the London "Times" in February. The following letter to the Times
quotes the essential part. (Stagecoach is a UK-based transnational transport
firm with holdings in Sweden, Eastern Europe, Africa, China, New Zealand, and
recently the US. It has a particularly unsavoury ethical and industrial record.)

Bill Rosenberg

Sir, In his report on Stagecoach, Fraser Nelson (Business February 17) quotes
the chairman Brian Souter as saying: 

"If we were to apply the values of the Sermon on the Mount to our business, we
would be rooked within six months. Ethics are not irrelevant, but some are
incompatible with what we have to do because capitalism is based on greed. We
call it a dichotomy, not hypocrisy."

This must be a classic of its kind, and represents the ultimate rationalisation
of what Cicero meant when he said, over 2,000 years ago, long before the Sermon
on the Mount, that 

"It is the error of men who are not strictly upright to seize upon something
that seems to be expedient and straight away to dissociate it from the question
of moral right." 

Yours sincerely, 
G.S. Guest.


Eric Nilsson wrote:
 
 I'm looking for readings for an undergraduate course about the link between
 the social market and social norms about acceptable business behavior in the
 USA.
 
 For instance, I'm interested in analyses of how the change between #1 and #2
 occurred:
 1) layoffs by businesses during good economic times in the USA where very
 difficult to justify in the "court of public opinion" (before 1980)
 2) layoffs by businesses during good economic times can be socially
 justified by the ritualistic chanting by the business of "the stock market
 requires we boost profitability (in the 1990s).
 
 Of course social norms about layoffs are only one of many that have changed.
 
 Also, is there anything on current tensions about changing social norms for
 business behavior? For instance, social norms about business's invasion of
 individuals' right to privacy on the Internet are not a site of conflict.
 For instance, DoubleClick recently had to back off on their plans to merge
 various databases holding information about individuals not because it was
 illegal but because of "public outcry": this behavior violated social norms.
 However, I would bet that in 20 years this "public outcry" will have become
 a faint sound as social standards against invasions of privacy by businesses
 fade away. Is there anything written on this sort of process?
 
 Thanks for any help.
 
 Eric Nilsson



[PEN-L:7606] SISTEMA ELECTRÓNICO PARA LA TRANSFERENCIA DE LA POTENCIA ECONÓMICA Y POLÍTICA A LAGENTEHelp - AltaVista HomeEn Español:SISTEMA ELECTRÓNICO PARA LA TRANSFERENCIA DE LA POTENCIA ECONÓMICA Y POLÍTICA A LAGENTETo translate, type plain text or the address (URL) of a Web page here:Translate from:Put the power of Babel Fish into your browser from the Babel Fish Tool page.Download SYSTRAN Personal and translate your private documents in seconds.AltaVista Home | Help | Feedback©1995-98 | Disclaimer | Privacy | Advertising InfoHelp - AltaVista Home

1999-06-03 Thread peoples

Content-Transfer-Encoding: 8bit

CONSUMIDORES DE TODOS LOS PAÍSES, UNEN!

 La gente no tiene ninguna influencia.

Toda la potencia económica y política se concentra en las
corporaciones transnacionales, su monopolio de los medios de 
masas y sus políticos.

 Y desde su punto de vista la gente está solamente de interés

 1. - como trabajo auxiliar, solamente ser mantenido 
descubierto vivo en el nivel mínimo de la existencia, - esto que 
da lugar a la lucha general de la clase -

 pero en el mismo tiempo también

 2. - como consumidores para guardar la maquinaria del 
beneficio el ejecutarse en la velocidad máxima. 
El gran potencial de este otro papel más agradable el nuestros 
se ha explotado hasta ahora solamente a un fragmento muy limitado 
y solamente para los propósitos defensivos.

 Déjenos tan amplían la lucha de la clase con explotar este 
potencial en una estrategia OFENSIVA:

 Utilicemos las contradicciones que existen dentro de los 
barones de ladrón para escudarse a nuestra ventaja y para 
desarmar su lucha imperialista concluído mercados y recursos antes 
de que ahora conduzca de nuevo a la guerra mundial.
 
 Utilicemos el hecho de que es nuestro dinero que los ladrones 
están luchando encima, y jugar los depredadores hacia fuera contra 
eachother, antes de que tengan éxito en terminar el proceso del
monopolization.

 Porqué si permanecemos siempre en la defensiva aunque los 
vendedores son totalmente dependientes en nuestra buena voluntad 
de comprar sus productos!

 GLOBAL

 la potencia de los consumidores se puede utilizar para la 
internacionalización de las corporaciones.

 Esta estrategia del parlamento formativo del mundo DE LA 
GENTE UNIDA para salvar nuestro planeta tiene direccionamiento
http://www.unitedpeoples.net   del Web site (bajo construcción).

 REGIONALMENTE y NACIONALMENTE

 la potencia de los consumidores se puede utilizar para la 
toma de posesión de la gente de la propiedad o de la parte de 
los beneficios de compañías nacionales o de empresas corporativas
locales de la producción o de la distribución.
 
 En cada país forman un partido unido de la gente o, al 
comienzo con, a un comité de la potencia de los consumidores, 
un " CPC ", abarcando organizaciones, los movimientos y a 
individuos progresivos y aprobado por el parlamento del mundo.
 
 El CPC puede abarcar a un grupo de países vecinos.

 El análisis del mercado y de la identificación de los 
productos y de las empresas que se apuntarán es realizado por 
el profesional progresivo economistas/NGOs/estudiantes bajo 
dirección del CPC.

 Las tareas de los miembros serán, pues los consumidores, 
comprar, boicotean respectivamente continuamente o por un período 
del tiempo especificado los productos precisaron por el CPC, 
y motivarán el resto de la población para hacer igual.

 EJEMPLO:

 Tres empresas, A, B y C, están vendiendo productos casi 
idénticos y comparten el mercado como sigue:

A  B C
Partes del mercado:  xx 

A  B C
Beneficios:  xx 
 
 Dependiendo del mercado, de la fuerza del CPC, del etc., 
cada de las empresas se pide cualquiera

 A) - si está dispuesto a volcar la propiedad a la gente, si 
se elige como la única para sobrevivir, el dinero invertido de 
los accionistas que se pagará detrás concluído un período del 
tiempo especificado,

 o

 B) - cómo la gran parte de sus beneficios adicionales él 
asignará a la gente, si se elige como la única o una de las 
pocas empresas que productos no serán boicoteados.

 Si, por ejemplo, A y B hacen una oferta lo más arriba posible, 
el CPC puede elegir dejó mercado de la parte c de A y de B y 
beneficio de la parte c con la gente, más bien que dejó A o B 
conseguir monopolio completo:

 A B
Partes del mercado: xx 

A   B CPC
Beneficios:  x xxx xx

 Todo por supuesto será basado en un acuerdo escrito de 
antemano.
 
 SISTEMA ELECTRÓNICO PARA MOVILIZAR A LOS CONSUMIDORES Y 
 DOCUMENTAR EL NÚMERO DE PARTICIPANTES

 1. Una base de datos administrada por el parlamento del 
mundo de la gente unida, http://www.unitedpeoples.net

 Hasta que han elegido al primer parlamento, los organizadores 
funcionarán como un parlamento provisional.

 La base de datos salva las huellas digitales biométricas 
digitalizadas de todos los consumidores que participan por todo 
el mundo.

 La documentación de los consumidores activos del af del 
número extenso permite al parlamento del mundo poner la presión 
en las corporaciones transnacionales para los propósitos 
ecológicos, económicos y políticos.

 2. El 

[PEN-L:1193] Re: Emergency civil liberties appeal for Jim Craven's right to privacy

1998-11-24 Thread Rosser Jr, John Barkley
 have made their mark.
 
 This is a communication that Jim just received from a Clark College
 administrator:
 
 FROM: Chuck Ramsey, Interim Vice President of Instruction
 
 TO: Professor Jim Craven
 
 "We have received a complaint/expression of concern about your use of
 College e-mail. So that I may gather relevant information about the
 complaint, you are hereby directed to provide paper copies of all e-mails
 you have sent or received, using College e-mail or other electronic
 resources, that name or refer, directly or indirectly, to Kevin Annett. You
 are directed to provide paper copies of all these e-mails to the Office of
 Instruction no later than 5:00 p.m., Tuesday, November 24, 1998."
 
 Jim has asked me to contact people wide and far to send email to Clark
 College to protest this violation of his political expression and right to
 privacy. The school has no right to demand that he turn over his private
 email. Jim is even conscientious enough to include the words "My Employer
 has no association with my private/protected OPINION" at the end of all his
 communications.
 
 Email supporting Jim's right to privacy should be sent to President Tana
 Hasart ([EMAIL PROTECTED]).
 
 
 Louis Proyect
 (http://www.panix.com/~lnp3/marxism.html)
 
 
 

-- 
Rosser Jr, John Barkley
[EMAIL PROTECTED]






[PEN-L:1184] Re: Emergency civil liberties appeal for Jim Craven'sright to privacy

1998-11-24 Thread Ajit Sinha

At 18:30 22/11/98 -0500, you wrote:

Anyway, here is a copy of the letter I sent. If the address was right, then
it went to the right place.

Professor Tana Hasart
President, Clark College

Dear Professor Hasart,

I have learnt that there is an attempt to suppress the freedom of speech of
a senior academic of your college, Professor Jim Craven, due to his
unorthodox political views; as it appears from the below cited
communication from Chuck Ramsey, Interim Vice President of Instruction. 

Professor Craven is well known in the international academic cerciles for
being a good scholar and a man of high integrity. If freedom of speech is
not secure in an academic institution, then where should we look for it? I
think this sort of actions do not augur well for Western democracy. And
definitely gives a bad name to your college. I hope you will intervene
personally and restore Professor Craven's right to free speech without
intimidation and harassment. Thank you.

Sincerely,
Dr. Ajit Sinha

FROM: Chuck Ramsey, Interim Vice President of Instruction

TO: Professor Jim Craven

"We have received a complaint/expression of concern about your use of
College e-mail. So that I may gather relevant information about the
complaint, you are hereby directed to provide paper copies of all e-mails
you have sent or received, using College e-mail or other electronic
resources, that name or refer, directly or indirectly, to Kevin Annett. You
are directed to provide paper copies of all these e-mails to the Office of
Instruction no later than 5:00 p.m., Tuesday, November 24, 1998."


In the course of getting to know Jim Craven, I have been made privy to his
various battles in Indian country and academia. Jim is a Blackfoot Indian
who teaches economics at Clark College in Washington State. Lately fights
in these two worlds have become meshed in such a way as to threaten his
employment. These are the facts.

Jim has been embroiled in various battles with the College administration
for a number of years, mainly revolving around issues like corruption, due
process, hiring and academic standards. Jim is not only an outspoken
radical, but has a blunt and uncompromising style. His tenure has protected
him, but he has become such a thorn in the side of the administration that
they are trying to fire him nonetheless.

Part of the ammunition they are trying to use against him involves his role
in exposing a former cleric named Kevin Annett. As an expert witness in an
inquiry on residential schools in Canada (based on dubious credentials, as
it turned out), Annett used his access to testimony in order to promote his
career. The material on videotapes of horribly abused Canadian Indians
found their way into an article Annett wrote for some journal. The material
was used without the permission of the Indian victims and activists, who
are organized in a group called Circle of Justice. Annett was once a member
of the group but has been expelled for his high-handed behavior.

Jim has been a forceful spokesman for the Circle of Justice people and has
written both private and public email making their case for returning the
tapes. Annett has now contacted Clark College and demand that they do
something about Jim, whose criticisms of Annett have made their mark.

This is a communication that Jim just received from a Clark College
administrator:

FROM: Chuck Ramsey, Interim Vice President of Instruction

TO: Professor Jim Craven

"We have received a complaint/expression of concern about your use of
College e-mail. So that I may gather relevant information about the
complaint, you are hereby directed to provide paper copies of all e-mails
you have sent or received, using College e-mail or other electronic
resources, that name or refer, directly or indirectly, to Kevin Annett. You
are directed to provide paper copies of all these e-mails to the Office of
Instruction no later than 5:00 p.m., Tuesday, November 24, 1998."

Jim has asked me to contact people wide and far to send email to Clark
College to protest this violation of his political expression and right to
privacy. The school has no right to demand that he turn over his private
email. Jim is even conscientious enough to include the words "My Employer
has no association with my private/protected OPINION" at the end of all his
communications.

Email supporting Jim's right to privacy should be sent to President Tana
Hasart ([EMAIL PROTECTED]).


Louis Proyect
(http://www.panix.com/~lnp3/marxism.html)








[PEN-L:1183] Re: Emergency civil liberties appeal for Jim Craven'sright to privacy

1998-11-24 Thread Ajit Sinha

Isn't Jim teaching somewhere in Canada? Could you please confirm that the
e-mail for the President of the college you have given below is correct.
Cheers, ajit sinha

At 18:30 22/11/98 -0500, you wrote:
In the course of getting to know Jim Craven, I have been made privy to his
various battles in Indian country and academia. Jim is a Blackfoot Indian
who teaches economics at Clark College in Washington State. Lately fights
in these two worlds have become meshed in such a way as to threaten his
employment. These are the facts.

Jim has been embroiled in various battles with the College administration
for a number of years, mainly revolving around issues like corruption, due
process, hiring and academic standards. Jim is not only an outspoken
radical, but has a blunt and uncompromising style. His tenure has protected
him, but he has become such a thorn in the side of the administration that
they are trying to fire him nonetheless.

Part of the ammunition they are trying to use against him involves his role
in exposing a former cleric named Kevin Annett. As an expert witness in an
inquiry on residential schools in Canada (based on dubious credentials, as
it turned out), Annett used his access to testimony in order to promote his
career. The material on videotapes of horribly abused Canadian Indians
found their way into an article Annett wrote for some journal. The material
was used without the permission of the Indian victims and activists, who
are organized in a group called Circle of Justice. Annett was once a member
of the group but has been expelled for his high-handed behavior.

Jim has been a forceful spokesman for the Circle of Justice people and has
written both private and public email making their case for returning the
tapes. Annett has now contacted Clark College and demand that they do
something about Jim, whose criticisms of Annett have made their mark.

This is a communication that Jim just received from a Clark College
administrator:

FROM: Chuck Ramsey, Interim Vice President of Instruction

TO: Professor Jim Craven

"We have received a complaint/expression of concern about your use of
College e-mail. So that I may gather relevant information about the
complaint, you are hereby directed to provide paper copies of all e-mails
you have sent or received, using College e-mail or other electronic
resources, that name or refer, directly or indirectly, to Kevin Annett. You
are directed to provide paper copies of all these e-mails to the Office of
Instruction no later than 5:00 p.m., Tuesday, November 24, 1998."

Jim has asked me to contact people wide and far to send email to Clark
College to protest this violation of his political expression and right to
privacy. The school has no right to demand that he turn over his private
email. Jim is even conscientious enough to include the words "My Employer
has no association with my private/protected OPINION" at the end of all his
communications.

Email supporting Jim's right to privacy should be sent to President Tana
Hasart ([EMAIL PROTECTED]).


Louis Proyect
(http://www.panix.com/~lnp3/marxism.html)








[PEN-L:1175] Re: Re: Emergency civil liberties appeal for JimCraven's right to privacy

1998-11-23 Thread Louis Proyect

At 04:27 PM 11/23/98 -0500, you wrote:
Louis,
 Thanks for letting us know about Jim's situation.  I, 
for one, have sent a message of support and hope others do 
so as well.
 BTW, Louis, I thought you weren't a fan of academic 
tenure.  Changed your mind?
Barkley Rosser

The only thing that ever bugged me was tenured radicals who neither engage
in political struggle, nor who challenge the underlying assumptions of
capitalist society. I have learned to develop an enormous amount of respect
for Michael Perelman even though, as far as I know, he does "nothing"
except write books on a yearly basis that are the theoretical equivalent of
a molotov cocktail. His latest, which I had the good fortune to read while
it was being written, strips away all the illusions about how peasants
welcomed the idea of joining the working-class. One of my biggest gripes
about a certain form of dogmatic Marxism is that it assumes that people
left the farm and moved to the city because there was indoor plumbing and
department stores there. It took me a while to figure out that not all
tenured radicals were bad guys, but in case I owe anybody a belated
apology: I'm sorry.



Louis Proyect

(http://www.panix.com/~lnp3/marxism.html)






[PEN-L:1173] Re: Emergency civil liberties appeal for Jim Craven's right to privacy

1998-11-23 Thread Rosser Jr, John Barkley

Louis,
 Thanks for letting us know about Jim's situation.  I, 
for one, have sent a message of support and hope others do 
so as well.
 BTW, Louis, I thought you weren't a fan of academic 
tenure.  Changed your mind?
Barkley Rosser
On Sun, 22 Nov 1998 18:30:40 -0500 Louis Proyect 
[EMAIL PROTECTED] wrote:

 In the course of getting to know Jim Craven, I have been made privy to his
 various battles in Indian country and academia. Jim is a Blackfoot Indian
 who teaches economics at Clark College in Washington State. Lately fights
 in these two worlds have become meshed in such a way as to threaten his
 employment. These are the facts.
 
 Jim has been embroiled in various battles with the College administration
 for a number of years, mainly revolving around issues like corruption, due
 process, hiring and academic standards. Jim is not only an outspoken
 radical, but has a blunt and uncompromising style. His tenure has protected
 him, but he has become such a thorn in the side of the administration that
 they are trying to fire him nonetheless.
 
 Part of the ammunition they are trying to use against him involves his role
 in exposing a former cleric named Kevin Annett. As an expert witness in an
 inquiry on residential schools in Canada (based on dubious credentials, as
 it turned out), Annett used his access to testimony in order to promote his
 career. The material on videotapes of horribly abused Canadian Indians
 found their way into an article Annett wrote for some journal. The material
 was used without the permission of the Indian victims and activists, who
 are organized in a group called Circle of Justice. Annett was once a member
 of the group but has been expelled for his high-handed behavior.
 
 Jim has been a forceful spokesman for the Circle of Justice people and has
 written both private and public email making their case for returning the
 tapes. Annett has now contacted Clark College and demand that they do
 something about Jim, whose criticisms of Annett have made their mark.
 
 This is a communication that Jim just received from a Clark College
 administrator:
 
 FROM: Chuck Ramsey, Interim Vice President of Instruction
 
 TO: Professor Jim Craven
 
 "We have received a complaint/expression of concern about your use of
 College e-mail. So that I may gather relevant information about the
 complaint, you are hereby directed to provide paper copies of all e-mails
 you have sent or received, using College e-mail or other electronic
 resources, that name or refer, directly or indirectly, to Kevin Annett. You
 are directed to provide paper copies of all these e-mails to the Office of
 Instruction no later than 5:00 p.m., Tuesday, November 24, 1998."
 
 Jim has asked me to contact people wide and far to send email to Clark
 College to protest this violation of his political expression and right to
 privacy. The school has no right to demand that he turn over his private
 email. Jim is even conscientious enough to include the words "My Employer
 has no association with my private/protected OPINION" at the end of all his
 communications.
 
 Email supporting Jim's right to privacy should be sent to President Tana
 Hasart ([EMAIL PROTECTED]).
 
 
 Louis Proyect
 (http://www.panix.com/~lnp3/marxism.html)
 

-- 
Rosser Jr, John Barkley
[EMAIL PROTECTED]






[PEN-L:12192] ALERT: Congress near a vote on Net privacy legislation; call now! (fwd)

1997-09-08 Thread Sid Shniad

 Date: Mon, 08 Sep 1997 12:12:45 -0400
 From: "Shabbir J. Safdar" [EMAIL PROTECTED]
 Subject: ALERT: Congress near a vote on Net privacy legislation; call now!
 
 ==
   ___  _ _  _ _
  / _ \| |   | |  _ \_   _| | Congress is about to vote on privacy and
 | |_| | |   |  _| | |_) || | | | security on the Net.  Call your member of
 |  _  | |___| |___|  _  | | |_| Congress before September 17, 1997
 |_| |_|_|_|_| \_\|_| (_)Posted September 8, 1997
 
Please forward where appropriate until September 17, 1997
 
 This alert brought to you by
 the Voters Telecommunications Watch, the Center for Democracy  Technology,
and the Electronic Frontier Foundation
 _
 Table of Contents
   What's Happening Right Now
   What You Can Do To Help Privacy And Security On The Internet
   Background On SAFE (HR. 695)
   About This Alert
 
 _
 WHAT'S HAPPENING RIGHT NOW
 
 During the next two weeks two Congressional committees (the House
 Intelligence and National Security committees) will vote on the
 "Security and Freedom Through Encryption Act" (SAFE, HR 695) --
 important legislation designed to protect privacy and security on the
 Internet by encouraging the widespread availability of strong,
 easy-to-use encryption technologies.
 
 Opponents of the bill include the FBI, NSA and members of the Clinton
 Administration. They seek to force all Americans to provide guaranteed
 law enforcement access to private online communications by imposing
 "key recovery" systems inside the U.S., have a great deal of support in
 Congress.  It is possible that Congress could amend SAFE in a way that
 undermines privacy and allows the government broad new surveillance
 power.
 
 This is a critical moment in the fight for privacy and security on the
 Internet.
 
 Your member of Congress needs to know that you care about privacy and
 security on the Internet.  Please take a moment to read the
 instructions below or details on how you can help protect privacy and
 security online.  A summary of the bill and pointers to additional
 information are also included below.
 
 Five minutes of your time will go a long way.
 
 
 WHAT YOU CAN DO NOW
 
 Please call your Representative. THIS WEEK to express your support for
 the SAFE and urge them to oppose any amendments to impose key recovery
 or modify the export relief provisions.
 
 INSTRUCTIONS:
 
 
 IF YOU DON'T KNOW WHO YOUR MEMBER OF CONGRESS IS
 
 1. Go to http://www.crypto.com/member/ and enter your zip code to find your
member of Congress and all the information needed for contacting them.
 
or
 
 IF YOU KNOW WHO YOUR MEMBER OF CONGRESS IS
 
 1. Pick up the phone and call 202-225-3121, ask for you Representative.
 
 2. Ask for the staffer that handles the encryption issue.
 
 3. Urge your Rep. to support SAFE (HR695) and to oppose Administration
efforts to modify the bill.
 
Feel free to use your own words but be sure to stress the points below:
 
- Encryption is critical National Security by protecting sensitive data and
  critical points on the National Information Infrastructure like the Air
  Traffic Control System and the power grid from attacks.
 
- SAFE will encourage the widespread availability of strong, easy to use
  encryption.
 
- SAFE will help foil hackers, terrorists, and foreign spies from obtaining
  unauthorized access to personal, business, and government communications
  and data.
 
- Key escrow or key recovery systems will hurt national security by
  creating new points of vulnerability and new targets for hackers and
  terrorists to seek to exploit, and will not work to prevent crime.
 
- Key recovery comes at a grave cost to privacy and security. Why would
  a criminal use an encryption product that they know the US government
  holds the keys to?
 
 4. IMPORTANT! -- PLEASE LET US KNOW HOW IT WENT!
 
Visit our feedback page at:
 
   http://www.crypto.com/member/
   or
   a href="http://www.crypto.com/member/"Crypto.Com feedback/a
 
...and let us know how it went!
 
 5. Please forward this alert to your friends and colleagues
who live in your congressional district.
 
 6. Finally, relax! You have done more to help fight for privacy and
security on the Internet in 5 minutes than most people do in a year!
We appreciate your support!
 
 
 BACKGROUND ON SAFE (HR 695)
 
 The Security And Freedom Through Encryption Act (SAFE) seeks to protect

[PEN-L:9745] ALERT! Hse. Committee to Vote on Internet Privacy Bill Soon (fwd)

1997-04-30 Thread Harry M. Cleaver



-- Forwarded message --
Date: Tue, 29 Apr 1997 15:39:26 -0400
From: Bob Palacios [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: ALERT! Hse. Committee to Vote on Internet Privacy Bill Soon
Resent-Date: Tue, 29 Apr 1997 15:37:55 -0400
Resent-From: [EMAIL PROTECTED]

==
  ___  _ _  _ _
 / _ \| |   | |  _ \_   _| |   THE HOUSE PREPARES TO ENSURE ENCRYPTION
| |_| | |   |  _| | |_) || | | |AND PRIVACY ON THE INTERNET; SAFE
|  _  | |___| |___|  _  | | |_| BILL (HR 695) ABOUT TO BE VOTED ON!
|_| |_|_|_|_| \_\|_| (_)   April 28, 1997

 Do not forward this alert after June 1, 1997.

This alert brought to you by:

Americans for Tax ReformCenter for Democracy and Technology
Eagle Forum EF-Florida
Electronic Frontier Foundation  Electronic Privacy Information Ctr.
Voters Telecommunications Watch Wired Magazine

_
Table of Contents
  What's Happening Right Now
  What You Can Do To Help Privacy And Security On The Internet
  Background On SAFE (HR 695)
  Why Is This Issue Important To Internet Users?
  About This Alert / Participating Organizations

_
WHAT'S HAPPENING RIGHT NOW

HOUSE JUDICIARY COMMITTEE TO VOTE ON "SAFE" PRO-INTERNET PRIVACY BILL

The House Judiciary Committee is set to vote on a bill designed to protect
privacy and promote electronic commerce on the Internet as early as the
second week of May.  The SAFE bill will also be considered by a Judiciary
subcommittee this week and is expected to pass without difficulty.

The House Judiciary committee vote on HR695 will mark a critical stage
in the effort to pass real reform of US encryption policy in a way that
protects privacy, promotes electronic commerce, and recognizes the
realities of the global Internet.

Although no bill is perfect, Internet advocates including CDT, EFF,
EPIC, VTW and others, including the Internet Privacy Coalition, have
expressed support for the bill.  Supporters agree that the SAFE bill
holds great promise for enhancing privacy and security on the Internet
and have offered their strong support and suggestions to improve it in
a detailed letter at http://www.privacy.org/ipc/safe_letter.html

Please take a moment to read the attached alert, and make a phone call
to urge the committee to pass the bill.

___
WHAT YOU CAN DO TO HELP PRIVACY AND SECURITY ON THE INTERNET

1. Check out the information on the SAFE bill below.

2. Call the Representative on the Judiciary committee from your state.  Note
   that there may be more than one person from your state on the committee.
   The list is enclosed below the telephone script.

   SAMPLE SCRIPT
  You:  dial Capitol switchboard +1.202.224.3121
May I speak to the office of Rep. (INSERT NAME FROM LIST BELOW)

  Them: Hello, Rep. Mojo's office!

   You: May I speak with the staffer who deals with Internet or
telecom issues?

  Them: One minute..

SAYYou: Hello!  HR695 will be voted on by the Judiciary committee in a
THIS-  couple of weeks.  I'm calling to urge Rep. Mojo to pass the
bill because it's important to security and privacy on the
Internet.

  Them: Thanks, goodbye!

   You: Goodbye! click

   If you have concerns about specific improvements to the bill, bringing
   them up when you're on the phone with the staffer is a good opportunity
   for raising issues.

  Judiciary Committee Members (from committee Web page)

MR. HYDE (ILLINOIS), CHAIRMAN
Mr. Sensenbrenner (Wisconsin)Mr. Conyers (Michigan)
Mr. McCollum (Florida)   Mr. Frank (Massachusetts)
Mr. Gekas (Pennsylvania) Mr. Schumer (New York)
Mr. Coble (North Carolina)   Mr. Berman (California)
Mr. Smith (Texas)Mr. Boucher (Virginia)
Mr. Schiff (New Mexico)  Mr. Nadler (New York)
Mr. Gallegly (California)Mr. Scott (Virginia)
Mr. Canady (Florida) Mr. Watt (North Carolina)
Mr. Inglis (South Carolina)  Ms. Lofgren (California)
Mr. Goodlatte (Virginia) Ms. Jackson Lee (Texas)
Mr. Buyer (Indiana)  Ms. Waters (California)
Mr. Bono (California)Mr. Meehan (Massachusetts)
Mr. Bryant (Tennessee)   Mr. Delahunt (Massachusetts)
Mr. Chabot (Ohio)Mr. Wexler (Florida)
  

[PEN-L:8858] Privacy Protection Conference (fwd)

1997-03-09 Thread D Shniad

Forwarded message:
Date: Sat, 08 Mar 1997 17:06:19 -0800
From: Colin Bennett [EMAIL PROTECTED]
Subject: Privacy Protection Conference
Sender: [EMAIL PROTECTED]
To: "'[EMAIL PROTECTED]'" [EMAIL PROTECTED]

Dear Colleagues:  

Over the last year or so, there have been a number of developments in the complicated 
and dynamic world of privacy protection policy to which, I believe, the Advisory 
Council and the BC Government will have to respond.   These include:

1)  The passage of the Model Code for the Protection of Personal Information by the 
Canadian Standards Association (CSA)  -- the national privacy standard for Canada.
2)  The pledge by the Federal government to pass legislation to protect privacy in the 
private sector by the year 2000.This will almost certainly be based on the CSA 
standard.
3)  The resulting consultations with the provinces about policy harmonization and the 
federal/provincial jurisdiction over this issue.   
4)  The drafting of a model privacy law through the Uniform Law Conference of Canada.  
 
5)  The passage of a European Union Directive on Data Protection that is expected to 
have major consequences for those businesses that rely on international data flows.   

Needless to say these developments have profound consequences for any organization 
that collects, stores and processes individually identifiable information in BC.   
They also have implications for the operation of the provincial Freedom of Information 
and Protection of Privacy Act (due for fundamental review and possible revision over 
the next year or so), as well as for other provincial statutes.   

These issues are the subject of a one-day conference on April 19th organized by myself 
and two other colleagues under the auspices of the UBC School of Library, Archival and 
Information Studies (SLAIS).   We will explain international and national policy 
developments, outline the requirements within the CSA privacy standard and attempt to 
explain what this new standard means for organizations in the public and private 
sectors.   

If any of you is interested in attending, further details can be obtained from the UBC 
SLAIS - (604) 822-2404, [EMAIL PROTECTED]   The workshop programme is also posted on 
the website of the Information and Privacy Commissioner (www.oipcbc.org).   

Or of course you can contact me at [EMAIL PROTECTED]  

I look forward to seeing you again on the 20th.  

Colin Bennett 







[PEN-L:8242] Re: Privacy in the Workplace (fwd)

1997-01-15 Thread D Shniad

 From [EMAIL PROTECTED] Wed Jan 15 03:31 PST 1997
 Date: Wed, 15 Jan 1997 06:31:37 -0500 (EST)
 From: "Carl Cuneo (EVNET Program Leader)" [EMAIL PROTECTED]
 To: D Shniad [EMAIL PROTECTED]
 
 PBS did an excellent video about the ways in which companies going online 
 with websites are collecting information on people, and using it to sell 
 them their products, without any knowlege on the part of the internet 
 surfers that such data is being collected on them merely by the fact that 
 they are hitting these companies' web sites, and/or filling out some forms.
 
 The name of the video is: High Stakes in Cyberspace.
 
 Carl
 
 
 






[PEN-L:8242] Re: Privacy in the Workplace (fwd)

1997-01-15 Thread D Shniad

 From [EMAIL PROTECTED] Wed Jan 15 03:31 PST 1997
 Date: Wed, 15 Jan 1997 06:31:37 -0500 (EST)
 From: "Carl Cuneo (EVNET Program Leader)" [EMAIL PROTECTED]
 To: D Shniad [EMAIL PROTECTED]
 
 PBS did an excellent video about the ways in which companies going online 
 with websites are collecting information on people, and using it to sell 
 them their products, without any knowlege on the part of the internet 
 surfers that such data is being collected on them merely by the fact that 
 they are hitting these companies' web sites, and/or filling out some forms.
 
 The name of the video is: High Stakes in Cyberspace.
 
 Carl
 
 
 





[PEN-L:8228] Privacy in the workplace

1997-01-14 Thread D Shniad

'Brave new world' in the workplace:

BIG BROTHER'S WATCHING

   Most people are unaware of just how much bosses are
invading workers' privacy.  According to a survey by
the American Civil Liberties Union, it's a lot.
   A new ACLU report on worker rights -- including
free speech, due process, equality, and privacy -- says
more than 20 million American workers are subject to
electronic surveillance -- up from 8 million in 1990,
when the last study was done.  Workers are monitored by
computer terminals, time clocks, telephone keypads, and
other devices. If  you're unplugged from your terminal
for what the boss thinks is too many trips to the
restroom, you could risk discipline.
   Over the last six years, as the percentage of major
companies requiring drug testing climbed from 38 to 70
percent, employers have also been administering genetic
tests, which can reveal potential health problems and
influence hiring or promotion. In a Georgetown
University survey of people with family genetic
disorders, 43 percent claimed they were denied
insurance or a job based on the disclosures of
potential genetic problems. One woman was fired a day
after she told her boss she had a genetic disease.
   Consumers are affected, too. Some 400 million phone
calls every year are monitored thanks to a federal
loophole exempting eavesdropping on "job-related"
employee conversations.
   Unless workers have union contracts, they have no
legal recourse if management decides to fire them
because of what they might say on or off the job. Up to
now, the ACLU notes, efforts to get states to pass laws
protecting constitutional rights on the job have met
with only moderate success. "Legislators have been
resistant to considering, much less passing, new laws
that would protect private-sector workers," it said.
   
  -- UAW Solidarity
   December, 1996





[PEN-L:8228] Privacy in the workplace

1997-01-14 Thread D Shniad

'Brave new world' in the workplace:

BIG BROTHER'S WATCHING

   Most people are unaware of just how much bosses are
invading workers' privacy.  According to a survey by
the American Civil Liberties Union, it's a lot.
   A new ACLU report on worker rights -- including
free speech, due process, equality, and privacy -- says
more than 20 million American workers are subject to
electronic surveillance -- up from 8 million in 1990,
when the last study was done.  Workers are monitored by
computer terminals, time clocks, telephone keypads, and
other devices. If  you're unplugged from your terminal
for what the boss thinks is too many trips to the
restroom, you could risk discipline.
   Over the last six years, as the percentage of major
companies requiring drug testing climbed from 38 to 70
percent, employers have also been administering genetic
tests, which can reveal potential health problems and
influence hiring or promotion. In a Georgetown
University survey of people with family genetic
disorders, 43 percent claimed they were denied
insurance or a job based on the disclosures of
potential genetic problems. One woman was fired a day
after she told her boss she had a genetic disease.
   Consumers are affected, too. Some 400 million phone
calls every year are monitored thanks to a federal
loophole exempting eavesdropping on "job-related"
employee conversations.
   Unless workers have union contracts, they have no
legal recourse if management decides to fire them
because of what they might say on or off the job. Up to
now, the ACLU notes, efforts to get states to pass laws
protecting constitutional rights on the job have met
with only moderate success. "Legislators have been
resistant to considering, much less passing, new laws
that would protect private-sector workers," it said.
   
  -- UAW Solidarity
   December, 1996






[PEN-L:1749] Re: Privacy Watchdog Outs Big Brother Companies (fwd)

1995-12-06 Thread Doug Henwood

New York area list-ers: I'm going to have the director of Privacy
International on my radio show on Thurs eve, 5-6 PM, WBAI (99.5 FM) to talk
about the surveillance report.

Doug

--

Doug Henwood
Left Business Observer
250 W 85 St
New York NY 10024-3217
USA
+1-212-874-4020 voice
+1-212-874-3137 fax
email: [EMAIL PROTECTED]
web: http://www.panix.com/~dhenwood/LBO_home.html




[PEN-L:1729] Privacy Watchdog Outs Big Brother Companies (fwd)

1995-12-05 Thread D Shniad

 Date: 4 Dec 1995 10:33:40 -0500
 From: "Dave Banisar" [EMAIL PROTECTED]
 To: "CPSR Civil Liberties Group" [EMAIL PROTECTED]
 Subject: PRIVACY WATCHDOG OUTS BIG B
 
 
 MEDIA RELEASE
 
 Contact: Simon Davies, Privacy International
 [EMAIL PROTECTED]
 
 PRIVACY WATCHDOG OUTS BIG BROTHER COMPANIES 
 
 New report uncovers a massive international surveillance trade
 funded by the arms industry and led by the UK
 
 On Monday 4 December, Privacy International will publish Big
 Brother Incorporated, a 150 page report which investigates the
 global trade in repressive surveillance technologies. The report, to
 be published on several Web sites on the Internet,  shows how
 technology companies in Europe and North America provide the
 surveillance infrastructure for the secret police and military
 authorities in such countries as China, Indonesia, Nigeria, Angola,
 Rwanda and Guatemala
 
 The reports primary concern is the flow of sophisticated
 computer-based technology from developed countries to
 developing countries  - and particularly to non-democratic regimes.
 The report demonstrates how these companies have strengthened
 the lethal authority of the world's most dangerous regimes.
 
 The report lists the companies, their directors, products and exports.
 In each case, source material is meticulously cited. 
 Privacy International is publishing the report in digital form in
 several sites on the Internet to ensure its accessability by interested
 parties anywhere in the world.
 
 Surveillance technologies are defined as technologies which can
 monitor, track and assess the movements, activities and
 communications of individuals.  More than 80 British companies are
 involved, making the UK the world leader in this field. Other
 countries, in order of significance, are the United States, France,
 Israel, the Netherlands and Germany.
 
 _Big Brother Incorporated_ is the first investigation ever conducted
 into this trade.  Privacy International intends to update the report
 from time to time using trade fair documents and leaked information
 from whistleblowers.
 
 The surveillance trade is almost indistinguishable from the arms
 trade. More than seventy per cent of companies manufacturing and
 exporting surveillance technology also export arms, chemical
 weapons, or military hardware.  Surveillance is a crucial element
 for the maintenance of any  non-democratic infrastructure, and is an
 important activity in the pursuit of intelligence and political control.
 Many countries in transition to democracy also rely heavily on
 surveillance to satisfy the demands of police and military. The
 technology described in the report makes possible mass
 surveillance of populations.  In the past, regimes relied on targeted
 surveillance.
 
 Much of this technology is used to track the activities of dissidents,
 human rights activists, journalists, student leaders, minorities, trade
 union leaders, and political opponents. It is also useful for
 monitoring larger sectors of the population. With this technology,
 the financial transactions, communications activity and geographic
 movements of millions of people can be captured, analysed and
 transmitted cheaply and efficiently.
 
 Western surveillance technology is providing invaluable support to
 military and totalitarian authorities throughout the world.  One
 British computer firm provided the technological infrastructure to
 establish the South African automated Passbook system, upon
 which much of the functioning of the Apartheid regime  British
 surveillance cameras were used in Tianamen Square against the
 pro-democracy demonstrators.  In the 1980s,  an Israeli company
 developed and exported the technology for the computerised death
 list used by the Guatemalan police. Two British companies
 routinely provide the Chinese authorities with bugging equipment
 and telephone tapping devices. 
 
   Privacy International was formed in 1990 as a non-government, non-profit
 organisation.  It brings together privacy experts, human rights advocates and
 technology experts in more than 40 countries, and works toward the goal of
 promoting privacy issues worldwide.  The organisation acts as an impartial
 watchdog
 on surveillance activities by governments and corporations.
 
 For further information or interview, contact Simon
 Davies in London at [EMAIL PROTECTED]  The address of the web
 site is  http://www.privacy.org/pi/reports/big_bro/
 
 _
 
 David Banisar ([EMAIL PROTECTED]) *  202-544-9240 (tel)
 Privacy International Washington Office *  202-547-5482 (fax)
 666 Pennsylvania Ave, SE, Suite 301 *  HTTP://www.privacy.org/pi/
 Washington, DC 20003   
 
 



[PEN-L:1676] Howard Rheingold on highway privacy (fwd)

1995-12-03 Thread D Shniad

Forwarded message:
Date: Sat, 2 Dec 1995 12:39:02 -0800 (PST)
From: Phil Agre [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Howard Rheingold on highway privacy
Reply-To: [EMAIL PROTECTED]
X-URL: http://communication.ucsd.edu/pagre/rre.html
X-Loop: [EMAIL PROTECTED]
Precedence: list

[Forwarded with permission.]

Date: Thu, 30 Nov 1995 20:33:42 -0800
From: Howard Rheingold [EMAIL PROTECTED]

We Need Privacy Protection On Intelligent Highways

By Howard Rheingold

Ominous steps have been taken recently, steps that perhaps move us
all closer to a global surveillance state, but few people are aware of them.
Governments around the world are installing "intelligent highways," whose
snooping capabilities ought to concern every driver.
I recently remarked to my friend Peter, as he drove me  around
Geneva, that he is scrupulous about obeying the speed limit. He told me in
reply that he had on a previous occasion received in his mailbox an envelope
containing a photograph of his automobile, the radar detector readout
superimposed, along with a notice of his fine. On key Swiss roads, radar
detectors automatically videotape speeders, computers automatically
recognize the license plate number, check it against a database, and issue
mail to the home address of the owner. It happens in Japan, too, and more
and more locations around the world..
If my Swiss friend had not told me that story, the hair on the back
of neck would not have started to stand up when I read, the next day, in the
October 9, 1995 edition of the International Herald Tribune, that Kansas
became the tenth state to adopt electronic toll collection. Electronic
transponders installed in vehicles automatically communicate with toll
collecting machinery via radio, and tolls are automatically deducted from
the driver's account. The following day, October 10, the same newspaper
reported that Singapore had announced contracts to wire up the road system
of the entire city-state. Singapore, never known as a bastion of civil
liberties, will be able to track the location of every vehicle, and identify
most drivers, on a minute-by-minute basis.
 A government and private industry initiative now underway proposes
multibillion dollar investments in "Intelligent Vehicle Highway Systems"
(IVHS) in the US. These systems, combining massive numbers of embedded
sensors, video cameras, chips embedded in vehicles, and even satellite
global positioning signals, are now under construction in every
industrialized country. IVHS promise greater convenience and perhaps safety
by monitoring highway traffic, routing around jams, and automatically
collecting tolls. If these systems are not designed with the privacy of
citizens in mind, however, we might be buying a heap of surveillance
capabilities for future secret police. This is a technology policy issue
where informed groups of citizens can have an impact if we act now. It isn't
a matter of banning the technology. It's a matter of making sure today that
these systems are designed with the privacy of future citizens in mind.
One of the best sources of information about the social impact of
IVHS comes from Professor Phil Agre at the University of California, San
Diego. Agre stated recently: "Society may decide that it wishes to provide
law enforment with generalized abilities to track citizens' movements, but
this would clearly be a grave decision - one that should be discussed well
in advance rather than building the technical capabilities into ITS systems
with virtually no public discussion."
There is a technical fix, however. Encryption techniques make it
possible to transmit account information from an automobile without
disclosing the identity of the owner.
 However, it is critically important that the early majority of
transponder manufacturers build encryption capabilities into their devices.
Making privacy a standard will work far better than attempts at legislative
regulation after the market has settled on a standard.
 Agre's reports can be found on the Web at
http://communication.ucsd.edu/pagre/rre.html. To access his
whimsically-named but extremely useful "Red Rock Eater News Service," via
e-mail send a message to [EMAIL PROTECTED], Subject: archive help.
We still have time to do something about this one. We need to ask
manufacturers now to consider the importance of building privacy protection
into their technology. I support Agre's statement that "People need to use
roads to participate in the full range of associations (educational,
political, social, religious, labor, charitable, etc) that make up a free
society.  If we turn the roads into a zone of total surveillance then we
chill that fundamental right and undermine the very foundation of freedom."
END




[PEN-L:770] Privacy

1995-10-11 Thread D Shniad

FROM THE "IT'S NOT PARANOIA -- THEY'RE REALLY 
WATCHING YOU" DEPARTMENT

Confidential plans to impose a national identity card on citizens of 
the U.K. were recently discovered in a government-surplus file 
cabinet bougth for about $55 in a junk shop.  The file cabinet 
contained a confidential memo to Prime Minister John Major along 
with the proposed design of the smart card and a 17-page report 
describing implementation by the year 2000.

The paper showed that the Home Secretary is eager to introduce a 
compulsory ID card despite a recent Gallup poll showing widespread 
public worry about the security of the cards and their capacity for 
gathering more personal information.

-- From the Privacy Journal, cited in the Sept-Oct. 1995 
bulletin of the British Columbia Freedom of Information and 
    Privacy Association