711 lines
30 KiB
Plaintext
711 lines
30 KiB
Plaintext
|
|
Computer underground Digest Sun June 15, 1997 Volume 9 : Issue 46
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.46 (Sun, June 15, 1997)
|
|
|
|
File 1--CFP: Symposium on Network and Distributed System Security (fwd)
|
|
File 2--DC-ISOC Meeting This Monday (Internet Gridlock ?)
|
|
File 3--Upcoming Computer Policy and Law Program
|
|
File 4--Sequel/Internet Monitoring at NetSec
|
|
File 5--SSA Privacy Forum 6.16.97
|
|
File 6--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Tue, 10 Jun 1997 11:11:25 -0500
|
|
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
|
|
Subject: File 1--CFP: Symposium on Network and Distributed System Security (fwd)
|
|
|
|
CALL FOR PAPERS
|
|
|
|
The Internet Society Symposium on Network and Distributed System Security
|
|
|
|
Where: San Diego, California
|
|
When: March 1998
|
|
|
|
GOAL: The symposium will foster information exchange between hardware and
|
|
software developers of network and distributed system security services.
|
|
The intended audience is those who are interested in the practical aspects
|
|
of network and distributed system security, focusing on actual system
|
|
design and implementation, rather than theory. Encouraging and enabling
|
|
the Internet community to apply, deploy, and advance the state of available
|
|
security technology is the major focus of symposium. Symposium proceedings
|
|
will be published by the Internet Society. Topics for the symposium
|
|
include, but are not limited to, the following:
|
|
|
|
* Architectures for large-scale, heterogeneous distributed systems
|
|
* Security in malleable systems: mobile code, mobile agents, dynamic policy
|
|
updates, etc.
|
|
* Special problems: e.g. interplay between security goals and other goals --
|
|
efficiency, reliability, interoperability, resource sharing, and cost.
|
|
* Integrating security services with system and application security
|
|
facilities and with application protocols, including message handling,
|
|
file transport, remote file access, directories, time synchronization,
|
|
data base management, routing, voice and video multicast, network
|
|
management, boot services, and mobile computing.
|
|
* Fundamental services: authentication, integrity, confidentiality,
|
|
authorization, non-repudiation, and availability.
|
|
* Supporting mechanisms and APIs: key management and certification
|
|
infrastructures, audit, and intrusion detection.
|
|
* Telecommunications security, especially for emerging technologies -- very
|
|
large systems like the Internet, high-speed systems like the gigabit
|
|
testbeds, wireless systems, and personal communication systems.
|
|
* Controls: firewalls, packet filters, application gateways
|
|
* Object security and security objects
|
|
* Network information resources and tools such as World Wide Web (WWW),
|
|
Gopher, Archie, and WAIS.
|
|
* Electronic commerce: payment services, fee-for-access, EDI, notary;
|
|
endorsement, licensing, bonding, and other forms of assurance; intellectual
|
|
property protections
|
|
|
|
GENERAL CHAIR:
|
|
David Balenson, Trusted Information Systems
|
|
PROGRAM CHAIRS:
|
|
Matt Bishop, University of California at Davis
|
|
Steve Kent, BBN
|
|
PROGRAM COMMITTEE:
|
|
Steve Bellovin, AT&T Labs -- Research
|
|
Doug Engert, Argonne National Laboratories
|
|
Warwick Ford, VeriSign
|
|
Li Gong, JavaSoft
|
|
Rich Graveman, Bellcore
|
|
Ari Juels, RSA Laboratories
|
|
Tom Longstaff, CERT/CC
|
|
Doug Maughan, National Security Agency
|
|
Dan Nessett, 3Com Corporation
|
|
Rich Parker, NATO
|
|
Michael Roe, Cambridge University
|
|
Rob Rosenthal, DARPA
|
|
Wolfgang Schneider, GMD Darmstadt
|
|
Christoph Schuba, Purdue University
|
|
Win Treese, Open Market, Inc.
|
|
Jonathan Trostle, Novell
|
|
Gene Tsudik, USC/Information Sciences Institute
|
|
Steve Welke, Institute for Defense Analyses
|
|
LOCAL ARRANGEMENTS CHAIR:
|
|
Thomas Hutton, San Diego Supercomputer Center
|
|
PUBLICATIONS CHAIR:
|
|
Steve Welke, Institute for Defense Analyses
|
|
LOGISTICS CHAIR:
|
|
Torryn Brazell, Internet Society
|
|
|
|
SUBMISSIONS: The committee invites technical papers and panel
|
|
proposals, for topics of technical and general interest. Technical
|
|
papers should be 10-20 pages in length. Panel proposals should be two
|
|
pages and should describe the topic, identify the panel chair, explain
|
|
the format of the panel, and list three to four potential panelists.
|
|
Technical papers will appear in the proceedings. A description of each
|
|
panel will appear in the proceedings, and may at the discretion of the
|
|
panel chair, include written position statements from each panelist.
|
|
|
|
Each submission must contain a separate title page with the type of
|
|
submission (paper or panel), the title or topic, the names of the
|
|
author(s), organizational affiliation(s), telephone and FAX numbers,
|
|
postal addresses, Internet electronic mail addresses, and must list a
|
|
single point of contact if more than one author. The names of authors,
|
|
affiliations, and other identifying information should appear only on
|
|
the separate title page.
|
|
|
|
Submissions must be received by 1 August 1997, and should be made via
|
|
electronic mail in either PostScript or ASCII format. If the committee
|
|
is unable to print a PostScript submission, it will be returned and
|
|
hardcopy requested. Therefore, PostScript submissions should arrive
|
|
well before 1 August. If electronic submission is difficult,
|
|
submissions should be sent via postal mail.
|
|
|
|
All submissions and program related correspondence (only) should be
|
|
directed to the program chair: Matt Bishop, Department of Computer
|
|
Science, University of California at Davis, Davis CA 95616-8562,
|
|
Email: sndss98-submissions@cs.ucdavis.edu. Phone: +1 (916) 752-8060,
|
|
FAX: +1 (916) 752-4767,
|
|
|
|
Dates, final call for papers, advance program, and registration
|
|
information will be available at the URL:
|
|
http://www.isoc.org/conferences/ndss98.
|
|
|
|
Each submission will be acknowledged by e-mail. If acknowledgment is
|
|
not received within seven days, please contact the program chair as in-
|
|
dicated above. Authors and panelists will be notified of acceptance by
|
|
1 October 1997. Instructions for preparing camera-ready copy for the
|
|
proceedings will be sent at that time. The camera-ready copy must be
|
|
received by 1 November 1997.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 10 Jun 1997 00:15:54 -0400
|
|
From: Russ Haynal <Russ@NAVIGATORS.COM>
|
|
Subject: File 2--DC-ISOC Meeting This Monday (Internet Gridlock ?)
|
|
|
|
DC-ISOC Announces additional details of its next event...
|
|
|
|
- - - - - Internet Gridlock - Fact, Fiction, or Future ? - - - - -
|
|
|
|
Monday, June 16, 1997, 7-9 p.m.
|
|
|
|
There has been increasing press coverage about the Internet's incredible
|
|
growth, and the occasional Internet "brown-outs" or ISP outages. Is the
|
|
Internet going to collapse under its own weight? Is congestion inevitable,
|
|
or will access speeds improve overall? Join DC-ISOC to hear from Industry
|
|
leaders how the Internet's infrastructure is growing and adapting to this
|
|
exponential growth.
|
|
|
|
Meeting Agenda
|
|
|
|
Speaker #1: David Boyes - Internet Backbone and Interconnection Engineer
|
|
Dimension Enterprises
|
|
|
|
This first talk outlines what's on the other side of your
|
|
favorite ISP, discusses some changes in the Internet backbone
|
|
structure and interconnection policy, and outlines one network
|
|
engineer's viewpoint on what current major challenges are to
|
|
developing a higher-performance Internet backbone in a
|
|
completely economically competitive Internet.
|
|
http://www.dimension.net dboyes@dimension.net
|
|
|
|
Speaker #2: Robert Cannon - Computer Telecommunications Attorney
|
|
practicing in the Washington DC area.
|
|
|
|
The baby bells have been lobbying for access charge reform
|
|
due to the congestion that the Internet is allegedly causing
|
|
on the voice phone system. Robert will give us a preview of
|
|
his "Cybernauts vs. Ma Bell" Paper being presented this
|
|
summer at INET '97
|
|
http://www.cais.net/cannon/ cannon@dc.net
|
|
http://www.fcc.gov/isp.html (FCC Access Charge Reform Homepage)
|
|
|
|
Speaker #3: Robert Hagens - Director, Internet Engineering
|
|
MCI Telecommunications Corporation
|
|
|
|
Presentation of MCI's strategy to keep its Internet
|
|
backbone ahead of the capacity curve, or "How to avoid
|
|
being run over by the Internet freight-train!"
|
|
http://www.mci.com
|
|
|
|
Speaker #4: TBD - Sprint Internet Services
|
|
|
|
Presentation of Sprint's approach to keep up with
|
|
the Internet's rapid growth.
|
|
http://www.sprint.com/fornet/
|
|
|
|
Speaker #5: Charles Brownstein - Executive Director
|
|
Cross-Industry Working Team, CNRI
|
|
|
|
As the Internet matures into a core component of the
|
|
commercial communications infrastructure, the providing
|
|
industry needs mechanisms to keep it robust and reliable.
|
|
IOPS.ORG is a mechanism for engineering reliability
|
|
solutions in the Internet context. XIWT is an industry
|
|
group devoted to advancing NII architecture, services and
|
|
applications, and to industry cooperation to advance the NII
|
|
marketplace in the public interest.
|
|
http://www.iops.org and http://www.xiwt.org
|
|
|
|
Following the speaker presentations, there will be an open Q&A session
|
|
with the audience.
|
|
|
|
- - - - - - - - Meeting Location - - - - - - - - - -
|
|
|
|
The meeting will be held at the Sprint/Global One Building in Reston, VA
|
|
(12524 Sunrise Valley Dr.) This is immediately off the Dulles Toll-road;
|
|
only minutes from Tysons Corner
|
|
|
|
Directions From Beltway/Tysons Corner:
|
|
|
|
- Take Dulles Toll road west to exit 11
|
|
(exit sign is for Fairfax County Parkway; Rte 7100)
|
|
- At end of exit ramp, make a left onto Fairfax County Parkway (South)
|
|
- At first intersection light, make a right onto Sunrise Valley Drive
|
|
- Make immediate right into Sprint/Global One Campus
|
|
- Global One building is the first building on your left
|
|
( # 12524 Sunrise Valley Drive)
|
|
- Ample parking is available on your right
|
|
- Enter through front lobby - Go down the stairs to the conference center
|
|
|
|
As with all of our previous events, there is no charge to attend this event.
|
|
Seating will be on a first-come, first-seated basis, though we expect that
|
|
there should be room for all those interested.
|
|
|
|
Please plan to arrive by 6:45, so we can begin on time, at 7pm
|
|
|
|
************* T H A N K S T O O U R S P O N S O R ***************
|
|
* DC-ISOC wishes to thank Sprint Internet Services *
|
|
* for sponsoring this meeting. *
|
|
* Sprint's Global all-fiber network makes them uniquely qualified to *
|
|
* bring you innovative products and services for Internet, Intranets, *
|
|
* and IP Security. Please visit, http://www.sprint.com/fornet/ *
|
|
* (To Sponsor a DC-ISOC Meeting, see http://www.dcisoc.org/sponsor.htm )*
|
|
*************************************************************************
|
|
|
|
Individuals who are interested in becoming members of DC-ISOC can do so
|
|
by joining the Internet Society. See their web site at
|
|
http://www.isoc.org for more information.
|
|
|
|
The Washington DC Chapter of the Internet Society maintains its own web
|
|
site at: http://www.dcisoc.org Please feel free to pass this announcement
|
|
message along to other interested individuals. If this message was
|
|
forwarded to you, you can join our announcement mailing list through
|
|
out web site ( http://www.dcisoc.org )
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 9 Jun 1997 19:32:13 -0500
|
|
From: "Margie W. Hodges" <mwh2@cornell.edu>
|
|
Subject: File 3--Upcoming Computer Policy and Law Program
|
|
|
|
*************************************************************
|
|
CORNELL UNIVERSITY
|
|
COMPUTER POLICY AND LAW
|
|
July 9-11, 1997
|
|
Ithaca, New York
|
|
*************************************************************
|
|
|
|
An Invitation
|
|
-------------
|
|
To Technology Administrators, Legal Counsel, Judicial Administrators,
|
|
Risk Managers, Auditors, Librarians, and Affirmative Action Officers at
|
|
Colleges and Universities.
|
|
|
|
In order to design appropriate computer-use policies and to plan for
|
|
their effective implementation, colleges and universities must develop
|
|
a new level of collaboration between technology specialists and the
|
|
institution's legal counsel. At COMPUTER POLICY AND LAW, participants
|
|
will examine the legal implications of extensive campus networking and
|
|
explore frameworks for limiting personal and institutional exposure to
|
|
liability, while at the same time preserving free speech and academic
|
|
freedom.
|
|
|
|
All too often computer-use policies are developed in response to crises
|
|
resulting from the misuse of computer and networking resources. The
|
|
Computer Policy and Law program will provide a much-needed opportunity
|
|
to take stock of our institutional policies in an atmosphere of frank
|
|
evaluation and informed discussion. PLEASE JOIN US as we identify the
|
|
hallmarks of best practice in this area and develop the policy
|
|
frameworks that will serve all of us in the critical days ahead.
|
|
|
|
|
|
PROGRAM SESSIONS:
|
|
|
|
Communication Technologies in Higher Education
|
|
----------------------------------------------
|
|
We'll go on-line to explore the remarkable resources available to the
|
|
faculty, staff, and students of an Information Age institution and to
|
|
discover how electronic communications are used for scholarship and
|
|
instruction, registration and record-keeping, study and research. As
|
|
we review the state of the art of electronic communications
|
|
technologies, we will identify the legal issues raised by the use of
|
|
e-mail, listservs, discussion groups, the World-Wide Web, and desktop
|
|
videoconferencing systems, such as Cornell's CU-SeeMe.
|
|
|
|
Copyright in Cyberspace
|
|
-----------------------
|
|
Electronic communication technologies have dramatically increased the
|
|
ease with which words and images can be copied, altered, and
|
|
disseminated. On-line instructional materials, for example, often
|
|
present text and graphics adapted from other sources. While copyright
|
|
infringement is widespread on the Internet, it is not legal. Current
|
|
case law and legislation provide mixed signals about an institution's
|
|
responsibility to curb copyright infringement on its computer
|
|
networks. This session will review how institutional copyright
|
|
policies can navigate such uncertainty and provide accurate information
|
|
about the application of copyright laws and permissions policies in
|
|
cyberspace. It will also cover trademark law, including strategies
|
|
for protecting institutional logos and domain names. An entire session
|
|
is devoted to the future of copyright law and policy.
|
|
|
|
Public Key Infrastructure
|
|
-------------------------
|
|
Public-key encryption provides the technological base for secure
|
|
e-mail, digitally "signed" transactions, and reliable authentication.
|
|
For higher education, this technology will present new opportunites for
|
|
conducting business electronically, both with outside organizations and
|
|
between internal departments. Interactions among all members of the
|
|
university community will likely be impacted. This session will
|
|
examine the emerging public-key infrastructure in the context of
|
|
existing and anticipated legislation and case law.
|
|
|
|
Electronic Communications: Institutional and Individual Liability
|
|
-----------------------------------------------------------------
|
|
This presentation will provide an overview of laws relating to libel,
|
|
pornography, obscenity, indecency, and "negligent publication"
|
|
(including the Telecommunications Act of 1996), as they pertain to
|
|
colleges and universities in their roles as on-line information
|
|
distributors. It will focus on the new theories of law used in recent
|
|
litigation over on-line incidents, including CyberPromotions v. AOL.
|
|
We will outline a number of steps that network administrators can take
|
|
to minimize institutional and individual liability when responding to
|
|
complaints about illegal or offensive materials.
|
|
|
|
On-Line Privacy
|
|
---------------
|
|
The institution may own the computers and the networks, but who owns
|
|
the information on them? What on-line privacy rights do computer users
|
|
have, and does the answer vary by an individual's status as a student,
|
|
faculty member, or staff member? Formulating answers that will provide
|
|
a basis for policy making, we will look at the details of open records
|
|
laws, the Electronic Communications Privacy Act (ECPA), the Family
|
|
Educational Rights and Privacy Act (FERPA), and discovery issues
|
|
surrounding records retention policies.
|
|
|
|
Policy Panel
|
|
------------
|
|
College and university administrators are called upon with increasing
|
|
frequency to respond to complaints about misuse of computer resources,
|
|
many involving such emotionally charged issues as harassment and
|
|
discrimination. In this panel presentation, representatives of a
|
|
variety of institutions will describe the policies they relied on -- or
|
|
later implemented -- to deal with a number of highly publicized
|
|
computer-abuse cases. Panelists will address how well these
|
|
institutional policies served those affected by the conflict and what
|
|
steps they would take in resolving similar problems today. Particular
|
|
attention will be given to the ways institutional goals and
|
|
administrative structures should influence policy design and
|
|
implementation.
|
|
|
|
Computer Crime and the Law
|
|
--------------------------
|
|
This session will provide an update on recent initiatives of the US
|
|
Department of Justice Computer Crime Unit, including current
|
|
perspectives on the ECPA. Topics will include the scope of the
|
|
computer crime problem, changes in legislation, sentencing guidelines,
|
|
and efforts on domestic and international fronts to reduce
|
|
computer-related crimes.
|
|
|
|
Designing Computer-Use Policies You Can Live With
|
|
-------------------------------------------------
|
|
Pulling it all together, this session will provide a framework for
|
|
policy making on your campus. Highlighting the advantages and
|
|
disadvantages of existing policies, we will address ways to decrease
|
|
legal and public relations liability, to use educational programs to
|
|
inform campus communities about their rights and responsibilities in
|
|
cyberspace, and to draw on model policies to meet the needs and goals
|
|
of individual institutions.
|
|
|
|
The Cornell Legal Information Institute Post-Program Open House
|
|
---------------------------------------------------------------
|
|
The Legal Information Institute at the Cornell Law School (LII) was
|
|
established in July, 1992 to explore new ways of distributing legal
|
|
documents and commentary in electronic form. The LII will host an Open
|
|
House at the Cornell Law School on Friday, 11 July, 1997, from 2:00 to
|
|
3:30 p.m. The founding (and current) directors of the LII, Thomas R.
|
|
Bruce and Peter W. Martin, the Jane M.G. Foster Professor of Law at
|
|
Cornell, will be present to answer questions about the development,
|
|
operation, and future initiatives of the Institute. All participants
|
|
in the Computer Policy and Law Program are invited to attend.
|
|
|
|
PROGRAM PRESENTERS:
|
|
|
|
Dan L. Burk, Assistant Professor of Law, Seton Hall University
|
|
|
|
Mark Eckenwiler, Attorney, Computer Crime Unit, Department of Justice
|
|
|
|
Robert W. Hamilton, Partner, Jones, Day, Reavis & Pogue
|
|
|
|
Marjorie W. Hodges, Program Director, Computer Policy and Law, and
|
|
Policy Advisor, Office of Information Technologies, Cornell University
|
|
|
|
Barbara L. Krause, Judicial Administrator, Cornell University
|
|
|
|
Terrence P. Maher, Special Counsel, Cooley, Godward, LLP
|
|
|
|
Steven J. McDonald, Associate Legal Counsel, The Ohio State University
|
|
|
|
Gary M. Pavela, Director, Judicial Programs, University of Maryland -
|
|
College Park
|
|
|
|
David Post, Visiting Associate Professor of Law, Georgetown University
|
|
Law Center, and Co-Director, Cyberspace Law Institute
|
|
|
|
Brian B. Shaw, Partner, Cumpston and Shaw
|
|
|
|
Steven L. Worona, Program Director, Computer Policy and Law, and
|
|
Assistant to the Vice President for Information Technologies, Cornell
|
|
University
|
|
|
|
PROGRAM FEE:
|
|
$875, which includes meals.
|
|
Enrollment is limited; early registration is encouraged.
|
|
|
|
FOR INFORMATION:
|
|
Computer Policy and Law
|
|
E-mail: sp@sce.cornell.edu
|
|
Phone: (607) 255-7259
|
|
Fax: (607) 255-8942
|
|
B20 Day Hall, Cornell University, Ithaca, NY 14853-2801
|
|
http://www.sce.cornell.edu/exec/CPL.html
|
|
|
|
|
|
*************************************************************
|
|
|
|
Marjorie W. Hodges
|
|
Office of Informatiopn Technologies
|
|
326 CCC, Garden Avenue
|
|
Cornell University
|
|
Ithaca, NY 14850
|
|
|
|
email: mwh2@cornell.edu
|
|
phone: (607) 255-4188
|
|
fax: (607) 254-5222
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 10 Jun 1997 07:04:07 -0400 (EDT)
|
|
From: mds@mds.prwire.com
|
|
Subject: File 4--Sequel/Internet Monitoring at NetSec
|
|
|
|
Sequel/Internet Monitoring at NetSec
|
|
|
|
Sequel Technology Presents Net Access Manager Internet Monitoring and
|
|
Reporting Software at CSI's NetSec Conference
|
|
|
|
Sequel's Cornerstone Product Enhances Network Security and Complements
|
|
Firewall Technology
|
|
|
|
SAN FRANCISCO, June 10 /PRNewswire/ -- Sequel Technology, leading
|
|
developer of the Sequel Net Access Manager(TM) Internet and intranet
|
|
monitoring and reporting tool, announced today at the Computer Security
|
|
Institute (CSI) NetSec conference, its plan to enhance network security by
|
|
offering a tool that measures employee usage of the Internet and manages
|
|
access privileges at the individual, departmental or enterprise level.
|
|
"Many businesses, today, think of firewalls as a vaccine for Internet
|
|
security," said Richard Villars, Director of Network Architectures and
|
|
Management at IDC Research. "Once a firewall is installed, they believe that
|
|
they're immune to all future security problems. Unfortunately, many companies
|
|
quickly discovered that this sense of security is an illusion. Organizations
|
|
need to develop Internet usage polices for their internal users and
|
|
reinforcing these guidelines with software that manages the flow of traffic
|
|
both into and out of the network."
|
|
|
|
How Net Access Manager Adds Value to a Firewall
|
|
Sequel Net Access Manager provides IS managers with a customizable toolset
|
|
for reporting and managing connections from the network to the Internet. Like
|
|
a firewall, it provides the highest degree of security by running from the
|
|
server and working as a dual-homed gateway to accurately monitor all TCP/IP
|
|
activity between network users and the Internet.
|
|
Sequel Net Access Manager is Internet management software that is designed
|
|
to monitor access from the inside (network users) to the outside (the
|
|
Internet). Conversely, a firewall works by blocking outside intruders from
|
|
entering into the network. Together, these two technologies offer a
|
|
comprehensive security solution.
|
|
|
|
Sequel Provides Sophisticated E-mail Security
|
|
Sequel Technology will soon be joining forces with two leading security
|
|
software vendors -- Integralis and SRA International -- to offer a fully
|
|
integrated high-end surveillance solution to supervise, track and log all
|
|
e-mail communications. Key components of the system include e-mail content
|
|
management software from Integralis which opens and screens the subject,
|
|
message body and all attachments for viruses or offensive language. An even
|
|
more intensive screening process developed by SRA uses sophisticated natural
|
|
language analysis to detect even the most subtle language patterns, such as
|
|
"guaranteed money maker" and "hot little tech stock." After the messages have
|
|
been cleared and delivered to the end user, the Sequel component logs all
|
|
traffic and generates various types of activity reports. The three partners
|
|
will be launching the financial solution in July, with plans to customize the
|
|
software for other industries which require the same level of management over
|
|
highly sensitive information; such as medical records, banking statements,
|
|
personnel records and insurance claims.
|
|
|
|
About Sequel
|
|
Sequel Technology Corporation was founded in 1995 and is the worldwide
|
|
leader in the development, marketing and support of powerful and practical
|
|
Internet Management Software products. These products allow information
|
|
systems professionals, management and end users to better understand and
|
|
manage their corporate and individual investment in Internet, intranet and
|
|
online usage. Sequel Technology is an international company with over eighty
|
|
employees located in offices around the world including Seattle, New York,
|
|
Chicago, Washington, D.C., Atlanta, London, Tokyo, Ottawa and Toronto. Sequel
|
|
Technology can be reached at the corporate offices located at Suite 300,
|
|
3245 - 146th Place SE, Bellevue, WA 98007, telephone 206-556-4000 or at
|
|
http://www.sequeltech.com.
|
|
NOTE: Sequel Technology and Sequel Net Access Manager are trademarks of
|
|
Sequel Technology. All other trademarks, trade names or service marks are the
|
|
property of their respective owners.
|
|
|
|
SOURCE Sequel Technology
|
|
-0- 06/09/97
|
|
/CONTACT: Frances Cala, Public Relations Specialist, 206-556-4074, or
|
|
fcala@sequeltech.com, or Susan McPherson, Director, Public Relations,
|
|
206-556-4057, or smcpherson@sequeltech.com, both of Sequel Technology/
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 13 Jun 1997 18:05:37 -0400
|
|
From: Dave Banisar <banisar@EPIC.ORG>
|
|
Subject: File 5--SSA Privacy Forum 6.16.97
|
|
|
|
Social Security Administration Forum
|
|
Privacy and Customer Service in the Electronic Age
|
|
|
|
Monday, June 16, 1997
|
|
|
|
Georgetown U. Law Center
|
|
Moot Court Room
|
|
600 New Jersey Ave. NW
|
|
Washington D.C. 20001
|
|
|
|
|
|
Agenda:
|
|
|
|
WELCOME
|
|
|
|
12-12:15 pm
|
|
|
|
Welcome by Marc Rotenberg, Director,
|
|
Electronic Privacy Information Center and
|
|
Professor, Georgetown Law University
|
|
|
|
Introduction of Dr. John J. Callahan,
|
|
Acting Commissioner of the Social Security Administration
|
|
|
|
PANEL #1 PRIVACY EXPERTS AND CONSUMER ADVOCATES 12:15-1:15 pm
|
|
|
|
Leslie Byrne, Special Assistant to the President, and
|
|
Director, U.S. Office of Consumer Affairs
|
|
|
|
Harry Hammitt, Editor and Publisher,
|
|
Access Report Newsletter
|
|
|
|
Evan Hendricks, Editor and Publisher,
|
|
Privacy Times and Chairman, U.S. Privacy Council
|
|
|
|
Sally Katzen, Director, Office of Information
|
|
and Regulatory Affairs, Office of Management and Budget
|
|
|
|
Deirdre Mulligan, Staff Counsel, Center for
|
|
Democracy and Technology
|
|
|
|
PANEL #2 COMPUTER TECHNOLOGY EXPERTS 1:30-2:15 pm
|
|
|
|
Edward G. Amoroso, Technical Manager, AT&T Laboratories
|
|
|
|
Michael Angelo, Principal Member, Technology Staff,
|
|
Compaq Corporation
|
|
|
|
Dorothy E. Denning, Professor of Computer Science,
|
|
Georgetown University
|
|
|
|
David P. Jablon, Software Engineer and Cryptographic
|
|
Specialist, Integrity Sciences, Inc.
|
|
|
|
George Spix, Chief Architect Consumer Platforms Division,
|
|
Microsoft Corporation
|
|
|
|
PANEL #3 INTERNET COMMERCE, BANKING AND FINANCIAL PLANNING EXPERTS
|
|
|
|
2:30-3:15 pm
|
|
|
|
Mark Greene, Vice President, Electronic Payments and
|
|
Certification, IBM Internet Division
|
|
|
|
Russ Housely, Chief Scientist, Spyrus, Inc.
|
|
|
|
Charles Merrill, Partner, McCarter & English Law Firm
|
|
|
|
Jahan Moreh, Chief Security Architect, Open Horizon, Inc.
|
|
|
|
|
|
PUBLIC COMMENT PERIOD - 3:15 pm
|
|
|
|
Members of public who have registered may
|
|
speak for 4 minutes. The panel may ask
|
|
questions following each individual's
|
|
testimony, if desired.
|
|
|
|
|
|
CLOSING REMARKS - 4:30 pm
|
|
|
|
For more information and directions, see:
|
|
|
|
http://www.ssa.gov/forums/washingtondc.htm
|
|
|
|
More information on EPIC is available at
|
|
|
|
http://www.epic.org/
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 6--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.46
|
|
************************************
|
|
|