home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Mar 22, 1995 Volume 7 : Issue 23
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Semi-retiring Shadow Archivist: Stanton McCandlish
- Intelligent Agent: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Monster Editor: Loch Nesshrdlu
-
- CONTENTS, #7.23 (Wed, Mar 22, 1995)
-
- File 1--Hong Kong's I-net Provider Raids, and Internet Digital Voice
- File 2--Conference - First Amendment In Cyberspace
- File 3--Gibson, Sterling Arrange MTV Donation To EFF-Austin (fwd)
- File 4-- Re: Campaign to Defeat Communications Decency Act
- File 5--(fwd) American Library Association Draft Computer Policy (fwd)
- File 6--FTC Legislative Alert (Telemarketing legislation)
- File 7--Cu Digest Header Info (unchanged since 19 Mar, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Fri, 17 Mar 1995 23:33:54 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 1--Hong Kong's I-net Provider Raids, and Internet Digital Voice
-
-
- Forwarded from:
-
- In, Around and Online- Issue 2.10 - Week Ending 3/10/95
- =======================================================
- Copyright (C) 1995 Robert Seidman (robert@clark.net). All rights
- reserved. May be reproduced in any medium for non-commercial purposes.
-
- HONG KONG POLICE told Internet providers whose equipment was seized in
- March 3rd raids that they could pick up their equipment. The raid left
- only one provider up and running in the British colony. There is still
- some confusion on why the police bothered to raid them over the lack of a
- $96 (750 Hong Kong Dollars) license. The operators of services shut down
- in the raid have stated they will not put their services back online
- until they have received their licenses. The seven operators, mostly
- newcomers to the exploding market had been engaged in a price war with
- the one commercial service left operational after the March 3 raid, Hong
- Kong SuperNet. We have it easy in the states, SuperNet charges about
- $25/hour for daytime use and about $12.50/hr. off-peak. The grounded
- competitors offered services at a cheaper prices ranging from about $6-$8/hr.
-
- (Seidman's newsletter is free and ambitious in its overview of the
- Internet and the online services. Anyone who is interested in a
- subscription should sending e-mail to LISTSERV@CLARK.NET and -- in the
- BODY of the message -- writing: Subscribe Online-L <YOUR FULL NAME>
-
- Example: SUBSCRIBE ONLINE-L Robert Seidman.)
-
- ------------------------------
-
- Date: Thu, 9 Mar 1995 11:33:47 -0600
- From: Barad@MAIL.UTEXAS.EDU(Meredith Barad)
- Subject: File 2--Conference - First Amendment In Cyberspace
-
- THE FIRST AMENDMENT IN CYBERSPACE
-
- THE JOHN HENRY FAULK CONFERENCE ON THE FIRST AMENDMENT
- Sponsored by The Center for American History
- The University of Texas at Austin
-
- Tuesday, April 18, 1995
- 1:00 - 5:00 p.m.
- Joe C. Thompson Conference Center
- 26th St. and Red River
-
- 1:00-1:20 Introductions
-
- 1:20-1:30 The Legacy of John Henry Faulk, by Michael Burton
-
- 1:30-3:15 Panel I: The First Amendment in Cyberspace
-
- 3:30-5:00 Panel II: Who is Driving on the Information Superhighway?
-
- 5:00 Reception at the Center for American History.
-
- "The First Amendment in Cyberspace" will explore the legal definition of
- free speech on the information superhighway, censorship online, universal
- access to the Internet, and new directions for information technologies in
- the 21st century.
-
- Conference speakers
- Introduction:
- Michael Burton, author of John Henry Faulk: The Making of a Liberated Mind
- and former journalist specializing in educational and media awareness
- issues
-
- Panel I:
- Mike Godwin, online counsel for the Electronic Frontier Foundation
-
- Katie Hafner, technology reporter for Newsweek and author of Cyberpunk:
- Outlaws and Hackers on the Computer Frontier
-
- Peter Lewis,The New York Times correspondent on cyberspace issues
-
- John Seigenthaler, chair of the Freedom Forum First Amendment Center at
- Vanderbilt University and former editorial director for USA Today
-
- Eugene Volokh, professor of copyright and constitutional law at UCLA Law
- School and author of "Cheap Speech and What it Will Do," forthcoming in The
- Yale Law Journal
-
- Frederick Williams, Mary Gibbs Jones Centennial Chair, UT College of
- Communication, and author of The People's Right to Know: Media, Democracy
- and the Information Highway (moderator)
-
- Panel II:
- Smoot Carl-Mitchell, managing Partner in Texas Internet Consulting and
- president of Matrix Information and Directory Services and the Zilker
- Internet Park
-
- Gary Chapman, coordinator for the 21st Century Project at UT's LBJ School
- of Public Affairs and former executive director of the Computer
- Professionals for Social Responsibility
-
- Jon Loehman, Southwestern Bell Telephone Company, focusing on regulation
- and planning in the telecommunications industry
-
- James Love, director of Economic Studies at the Center for the Study of
- Responsive Law and the director of the Center's Taxpayer's Assets Project
- in Washington D.C.
-
- Yolanda Rivas, M.A. student, Communication and Technology Policy Program in
- the Department of Radio-Television-Film at UT specializing in online access
- issues for Latin America
-
- Bruce Sterling, author of The Hacker Crackdown: Law and Disorder on the
- Electronic Frontier, science fiction author, journalist, and editor
- (moderator)
-
- The Faulk Conference is presented in honor of Texas humorist John Henry
- Faulk, a victim of the blacklist during the McCarthy years. The Faulk
- Conference is free and seating is on a first come, first serve basis. The
- conference brochure and conference summaries will be posted at
- http://www.lib.utexas.edu/Libs/CAH/cah.html. For more information contact
- the Center for American History at (512) 495-4515 or e-mail
- m.norkunas@mail.utexas.edu.
-
- *********************************************
- Martha Norkunas
- Center for American History
- SRH 2.101
- University of Texas at Austin
- Austin, TX 78712
-
- Phone: 512-495-4515
- FAX: 512-495-4542
- internet address: m.norkunas@mail.utexas.edu
-
- ------------------------------
-
- Date: Wed, 22 Mar 1995 00:10:56 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 3--Gibson, Sterling Arrange MTV Donation To EFF-Austin (fwd)
- ---------- Forwarded message ----------
- Date: Tue, 21 Mar 1995 22:10:05 -0600 (CST)
- From: Steve Jackson <sj@io.com>
-
- PRESS RELEASE
-
- MTV-EUROPE DONATES 500 POUNDS TO AUSTIN CYBERSPACE CIVIL RIGHTS GROUP
-
- Austin, March 21, 1995
-
- EFF-Austin, an Austin, Texas civil rights group concerned with
- electronic network access and free expression, gratefully acknowledges
- a contribution of 500 pounds from the European branch of MTV Music
- Television. The donation came in response to an MTV publication
- titled "Global Communication: Channel Your Experience," which was
- released in conjunction with the 1994 First European Music Awards,
- held at the Brandenburg Gate in Berlin.
-
- Cyberpunk science fiction writers William Gibson and Bruce Sterling
- created an original collaborative artwork for the "Global
- Communication" project. MTV-Europe then contributed a cheque for 500
- pounds to the two authors' favorite charity -- EFF-Austin.
-
- "We've seen some oddities in our five years on the electronic
- frontier," said EFF-Austin President David Smith, "but this one takes
- the cake. Not only are we so hip that we get contributions from
- MTV-Europe, but now we can describe ourselves as 'William Gibson's
- favorite charity.'"
-
- For more information, contact Steve Jackson, EFF-Austin secretary
- (sj@io.com)
-
- ** Steve Jackson - yes, of SJ Games - yes, we won the USSS case -
- fnord ** yes, INWO is out - http://io.com/sjgames/ - dinosaurs,
- Lego, Kahlua!
-
- ------------------------------
-
- Date: Sun, 19 Mar 1995 19:19:36 -0600
- From: Stephen Smith <libertas@COMP.UARK.EDU>
- Subject: File 4-- Re: Campaign to Defeat Communications Decency Act
-
-
- ---------- Forwarded message ----------
- Date: Sun, 19 Mar 1995 14:29:48 -0700 (MST)
- From: Charles Levendosky <levendos@ed.trib.com>
-
- If it will be helpful, you can distribute my column on this bill. It ran
- on the NYT wire last week for two days, but many on the internet may not
- have read it. Feel free to use it.
-
- Charles Levendosky
- Editorial Page Editor
- Casper (Wyoming) Star-Tribune
- email: levendos@trib.com
- tel: 307-266-0619
- ----------
-
- `DECENCY ACT' A FLASHER IN HIDING
-
- (EDITOR'S NOTE: Charles Levendosky, editorial page editor of the
- Casper (Wyo.) Star-Tribune, has a national reputation for First
- Amendment commentary. His columns recently won the American Bar
- Association's Silver Gavel Award and The Baltimore Sun's H.L. Mencken
- Award.)
-
- By CHARLES LEVENDOSKY
-
- c.1995 Casper (Wyo.) Star-Tribune
-
- (Distributed by New York Times Special Features)
-
- There's a nasty bill lurking in the Senate, like a flasher hiding in a
- doorway waiting for the opportunity to throw open his trenchcoat and
- show you his wares. When it's too late to turn away.
-
- The bill, S. 314, was introduced by Sen. J. James Exon, D-Neb., and
- Sen. Slade Gorton, R-Wash. It's called the "Communications Decency Act
- of 1995." Don't let that fool you, there's nothing decent about it.
-
- The bill would amend the Communications Act of 1934 and the U.S. Code to
- force those, who allow others access to the Information Superhighway, to
- monitor their customers' communications. If the provisions of the bill
- are violated, those who allow access to the information highway face
- potential federal criminal prosecution that could lead to $100,000 fines
- and/or two years in prison.
-
- On the Information Superhighway, there is no way to monitor a moving
- message. It's broken into digital packets that scoot over telephone
- wires across the world. If you were to look at one packet, it would be
- indecipherable. It's only a small bit of the information sent ---- not
- unlike putting a normal letter into a shredder and then sending each
- strip to the recipient in separate envelopes along with hundreds of
- other envelopes each containing a strip from different pieces of mail.
-
- Messages in transit on the information highway are impossible to
- monitor.
-
- That means the organization that provides access to Internet must
- monitor the information flow from the source or at the receiver's end.
- That is possible. But it makes the access provider a Big Brother agent
- of the federal government who leans over your computer.
-
- The bill doesn't define what would be legally "indecent." The vagueness
- of this term could apply to lovers or married couples who are e-mailing
- one another sweet murmurs about the night before.
-
- It could apply to, by some subjective standards, to a photo of a child
- lying bloody in a street, killed by a drive-by shooter.
-
- It could apply to a photo rendition of one of Auguste Rodin's most
- famous sculptures, "The Kiss." It could apply to many of Pierre Renoir's
- paintings. Or any of the classical paintings of nudes that museums have
- put on the Internet.
-
- The bill can be characterized as a federal agent muscling a private
- citizen. Agent Big Brother in your study or in your workplace, breathing
- on your neck, reading over your shoulder. Leaning on you. Leaning over
- the person with whom you are communicating.
-
- Apparently, the intent of the bill is to protect children who might
- stumble on something too adult for them on the information highway. It's
- a wrong-headed approach --- the atom bomb solution --- it would blow
- away the free flow of information. It would melt the promise of this
- Electronic Gutenberg.
-
- The information highway is an interactive medium. Consumers can control
- their own access. Parents can control the access of their children.
- America Online already gives parents control over what chat sessions are
- available to their children. More can be done, and is being done, so
- that parents can select and control their children's access to the vast
- variety of information offered on the electronic highway.
-
- As this indecent bill is written, it would apply to public and
- university libraries that offer their patrons the use of online
- computers, according to Daniel Weitzner, deputy director of the Center
- of Democracy and Technology. Libraries could be fined; librarians
- jailed. Think of it, a librarian imprisoned because some patron found
- his way through Internet byways to the Penthouse calendar nude of the
- month.
-
- It's bad law. It places criminal liability, not on the actor, but on the
- provider. A legal parallel would be to frame the law so that a gun
- dealer who sold a legal weapon to a qualified citizen would be
- prosecuted if that citizen later shot his neighbor.
-
- And, worse, a broad range of content would be actionable under this
- bill.
-
- Less discussed by critics of this bill, are ramifications for newspapers
- and news organizations who use the information highway.
-
- Newspapers, like the Casper Star-Tribune, who go online with their
- product, do not necessarily have their own access to the Internet. In
- the Star-Tribune's case, the access provider is the University of
- Wyoming. By this bill, the university could be liable for criminal
- prosecution for something the Star-Tribune put on Internet; therefore,
- it might want to monitor what news the Star-Tribune put online.
-
- What happens to freedom of the press then? News decisions could be taken
- away from the editor of the papers, or newspapers might elect to keep
- their product off the information highway. Either way the public
- suffers.
-
- More and more newspapers are making portions of their dailies available
- through the information highway. This intersection of the press with
- telecommunications will cause headaches for First Amendment experts for
- decades to come.
-
- The electronic media has never enjoyed the liberties guaranteed by the
- freedom of the press clause of the First Amendment. Now there is a
- convergence of the two and American must either opt for greater freedom
- for the electronic media or less for the press.
-
- Wrap up this bill in its soiled trenchcoat, lock it in a closet, and
- toss away the key. This issue needs a great deal more thought than
- either Sen. Exon or Sen. Gorton have given to it.
-
- Keep liberty a priority. There are better ways to protect our children
- than sacrificing the free exchange of information and ideas.
-
- Copyright Casper Star-Tribune
-
- March 5, 1995
-
- ------------------------------
-
- Date: Mon, 20 Mar 1995 22:29:03 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 5--(fwd) American Library Association Draft Computer Policy (fwd)
-
- Here is more evidence to support my thesis that librarians are just the
- coolest.
-
- David Smith * Calendar of way cool e-things:
- bladex@bga.com * Mar 15-17 SXSW Multimedia
- President, EFF-Austin * Mon Mar 20th EFF-Austin General Meeting
- Board of Directors, CTCLU * April 1-2 Robofest
-
- ---------- Forwarded message ----------
-
- ============================================================
-
- Date-- Mon, 20 Mar 1995 10:55:29 CST
- From--Cyndi Robinson <U24803@UICVM.BITNET>
- Subject--Draft Interpretation
-
-
- Following is the draft Interpretation on Access to Information, Services and
- Networks, drafted by the ALA Intellectual Freedom Committee. The Committee
- welcomes all comments on the draft. Comments can be forwarded to
- Judith.Krug@ala.org or by mail to the Office for Intellectual Freedom,
- American Library Association, 50 E. Huron, Chicago, IL 60611.
-
- Please feel free to distribute this draft widely.
- =================================================
-
-
- DRAFT DRAFT DRAFT DRAFT
- Draft Version 1.1
- 3/5/95
-
- ACCESS TO ELECTRONIC INFORMATION, SERVICES, AND NETWORKS: AN
- INTERPRETATION OF THE LIBRARY BILL OF RIGHTS
-
- Freedom of expression is an inalienable human right and the
- foundation for self-government. Freedom of expression encompasses
- the freedom of speech and the corollary right to receive
- information. These rights extend to children as well as adults.
-
- Libraries and librarians exist to facilitate these rights by
- providing access to, identifying, retrieving, organizing, and
- preserving recorded expression regardless of the formats or
- technologies in which that expression is recorded.
-
- It is the nature of information that it flows freely across
- boundaries and barriers despite attempts by individuals,
- governments, and private entities to channel or control its flow.
- Electronic technology has increased the speed and universality of
- this flow.
-
- Although we live in a global information village, many persons do
- not have access to electronic information sources because of
- economic circumstances, capabilities of technology, and
- infrastructure disparity. The degree of access to electronic
- information divides people into groups of haves and have-
- nots. Librarians, entrusted as a profession with the stewardship
- of the public good of free expression, are uniquely positioned to
- address the issues raised by technological change.
-
- Librarians address intellectual freedom from a strong ethical base
- and an abiding commitment to the preservation of the individual's
- rights.
-
- The American Library Association has expressed these basic
- principles of librarianship in its CODE OF ETHICS and in the
- LIBRARY BILL OF RIGHTS and its Interpretations. These serve to
- guide professional librarians and library governing bodies in
- addressing issues of intellectual freedom and the rights of the
- people they serve.
-
- The constant emergence and change of issues arising from the
- still-developing technology of computer-mediated information
- generation, distribution, and retrieval need to be approached by
- librarians from a context of established policy and constitutional
- principles so that fundamental and traditional tenets of
- librarianship are not swept away.
-
- In making decisions on how to offer access to electronic
- information, each library should consider its mission, goals,
- objectives, cooperative agreements, and the needs of all the
- people it serves. The library should address the rights of users,
- the equity of access, and information resources and access issues.
-
- THE RIGHTS OF USERS
-
- All library system and network policies, procedures or regulations
- relating to electronic resources and services should be
- scrutinized for potential violation of user rights.
-
- User policies should be developed according to the policies and
- guidelines established by the American Library Association,
- including GUIDELINES FOR THE DEVELOPMENT AND IMPLEMENTATION OF
- POLICIES, REGULATIONS AND PROCEDURES AFFECTING ACCESS TO LIBRARY
- MATERIALS, SERVICES AND FACILITIES.
-
- Users have the right to be free of interference and unreasonable
- limitations or conditions set by libraries, librarians, system
- administrators, vendors, network service providers, or others.
- This specifically includes contracts, agreements, and licenses
- entered into by libraries on behalf of their users.
-
- No user should be restricted or denied access for expressing or
- receiving constitutionally protected speech. No user's access
- should be changed without due process, including, but not limited
- to, notice and a means of appeal.
-
- Users have a right to full descriptions of and access to the
- documentation about all electronic systems and programs they are
- using, and the training and assistance necessary to operate the
- hardware and software.
-
- Users have the right of confidentiality in all of their activities
- with electronic resources and services provided by the library,
- and the library shall ensure that this confidentiality is
- maintained. The library should support, by policy, procedure, and
- practice, the user's right to privacy. Users should be advised,
- however, that security is technically difficult to achieve and
- that electronic communications and files are safest when they are
- treated as if they were public.
-
- The rights of users who are minors shall in no way be abridged.
-
- EQUITY OF ACCESS
-
- Electronic information, services, and networks provided directly
- or indirectly by the library should be readily, equally, and
- equitably accessible to all library users. Once the decision is
- made to use library funds to provide access to electronic
- information, the user must not be required to pay to obtain the
- information or use the service. When resources are insufficient
- to meet demand, rationing service may be necessary to provide
- equitable access. All library policies should be scrutinized in
- light of ECONOMIC BARRIERS TO INFORMATION ACCESS: AN
- INTERPRETATION OF THE LIBRARY BILL OF RIGHTS.
-
-
- INFORMATION RESOURCES AND ACCESS ISSUES
-
- Electronic resources provide unprecedented opportunities to expand
- the scope of information available to users. Libraries and
- librarians should provide material and information presenting all
- points of view. This pertains to electronic resources, no less
- than it does to the more traditional sources of information in
- libraries. (See DIVERSITY IN COLLECTION DEVELOPMENT: AN
- INTERPRETATION OF THE LIBRARY BILL OF RIGHTS.)
-
- Libraries and librarians should not deny or limit access to
- information available via electronic resources because of its
- allegedly controversial content or because of the librarian's
- personal beliefs or fear of confrontation. Information retrieved
- or utilized electronically should be considered constitutionally
- protected unless determined otherwise by a court with appropriate
- jurisdiction.
-
- Providing access to electronic information, services, and networks
- is not the same thing as selecting and purchasing material for a
- library collection. Libraries may discover that some material
- accessed electronically may not meet a library's selection or
- collection development policy. It is, therefore, left to each
- user to determine what is appropriate. Parents who are concerned
- about their children's use of electronic resources should provide
- guidance to their own children. (See FREE ACCESS TO LIBRARIES FOR
- MINORS: AN INTERPRETATION OF THE LIBRARY BILL OF RIGHTS; ACCESS TO
- RESOURCES AND SERVICES IN THE SCHOOL LIBRARY MEDIA PROGRAM; and
- ACCESS FOR CHILDREN AND YOUNG PEOPLE TO VIDEOTAPES AND OTHER
- NONPRINT FORMATS)
-
- Just as libraries do not endorse the viewpoints or vouch for the
- accuracy or authenticity of traditional materials in the
- collection, they do not do so for electronic information.
-
- Libraries must support access to all materials on all subjects
- that serve the needs or interests of all users regardless of the
- user's age or the content of material. Libraries and librarians
- should not limit access to information on the grounds that it is
- perceived to be frivolous or lacking value.
-
- Libraries have a particular obligation to provide access to
- government publications available only in electronic format.
-
- Libraries may need to expand their selection or collection
- development policies to reflect the need to preserve materials
- central to the library's mission as a retrievable copy in an
- appropriate format to prevent loss of the information.
-
- CONCLUSION
-
-
- By applying traditional tenets of intellectual freedom to new
- media, librarians provide vision and leadership in an arena where
- it is so clearly needed. Our services have never been more
- important.
-
- James Madison wrote, "A popular government, without popular
- information, or the means of acquiring it, is but a Prologue to a
- Farce or a Tragedy; or perhaps both. Knowledge will forever
- govern ignorance; and a people who mean to be their own Governors
- must arm themselves with the power which knowledge gives."
-
- ------------------------------
-
- From: Druff <71553.1102@COMPUSERVE.COM>
- Subject: File 6--FTC Legislative Alert (Telemarketing legislation)
- Date: 20 Mar 1995 17:45:16 GMT
-
- Legislative Alert!
-
- New proposed Federal Trade Commission Rules on Telemarketing pose a
- great threat
-
- to businesses, sysops, list brokers, copywriters, printers, desktop
- publishers, etc., and to freedom of speech!
-
- Your Immediate Attention Is Called To 16 CFR Part 310
-
- Telemarketing Sales Rules
-
- Note: Section 310. Definitions...includes...the use of facsimile
- machines...computer modems, or any telephonic medium.
-
- Your attention is called to "Assisting and Facilitating" Section
- 310.3[b] [1] {page 11} of the proposed rule sets forth a general
- prohibition against assisting or facilitating deceptive telemarketing
- acts or practices. Assistors who engage in these activities will
- violate the rule if they know, or should know, that the person they
- are assisting is engaged in an act or practice that violates the rule.
-
- The five types of assisting and facilitating activities listed in the
- proposed rule are as follows: first, providing lists of customer
- contacts to a seller or telemarketer [e.g., serving as a list
- broker]...and fifth, providing any script, advertising, brochure,
- promotional material, or direct marketing piece to be used in
- telemarketing.
-
- Section 310.4[b] [pages 14 & 15] ...it is an abusive act or practice
- and a violation of the rule to call a person's residence to offer,
- offer for sale, or sell, on behalf of the same seller, the same or
- similar goods or services more than once within any three month
- period...
-
- Page 25 - #7 - The proposed rule states that the term "telemarketing"
- includes the use of a facsimile machine, computer modem, or any other
- telephonic medium, as well as calls initiated by persons in response
- to postcards, brochures, advertisements, or any other printed, audio,
- video, cinematic or electronic communications by or on behalf of the
- seller...
-
- Page 25 - #8 - The proposed definition of "telemarketing" includes
- within the rule's coverage On-Line information services which a person
- accesses by computer modem.
-
- Section 310.3 [a] [4] {page 11} would prohibit consumers from paying
- by check over the phone without prior written authorization while
- allowing credit card holders to do so without prior written
- authorization. This would discriminate against the 75 million
- consumers who do not have a credit card, the millions of consumers who
- have no usable credit on their credit card and the businesses, most of
- them small or new, who cannot obtain credit card merchant status to
- accept credit cards. It would also further the monopoly of Visa and
- MasterCard and the up to 21 percent interest they charge credit card
- users.
-
- Please read the proposed rules in their entirety to ascertain their
- possible effect on your business, the telemarketing industry and the
- growth of the Information Super Highway.
-
- Since most businesses and individuals are totally unaware of these
- proposed rules, it is important that this information is distributed
- through every means possible so that interested parties have the
- opportunity to comment and protect their interests.
-
- Written comments must be submitted on or before March 31, 1995. A
- public workshop-conference will be held at the Chicago Hilton on April
- 18th through April 20th from 9am to 5pm.
-
- Five paper copies of each written comment should be submitted to the
-
- Office of the Secretary, Room 159, Federal Trade Commission,
- Washington DC 20580.
-
- To encourage prompt and efficient review and dissemination of the
- comments to the public, all comments should be submitted, if possible,
- in electronic form, on either a 5< or 3= inch computer disk, with a
- label on the disk stating the name of the commenter and the name and
- version of the word processing program used to create the document.
- Submissions should be captioned: "Proposed Telemarketing Sales Rule"
- FTC File NO. R411001.
-
- The full 50 pages of the proposed rules can be downloaded from the
- NYACC Bulletin Board, file name "FTC" - phone 718-539-3338.
-
- I would appreciate your feedback and a copy of any comments that you
- intend to submit and I suggest that you disseminate this information
- as widely as possible.
-
- Ronald A. Stewart
-
- 126 13th Street
-
- Brooklyn, NY 11215
-
- Phone 718-768-6803
-
- Fax 718-965-3400
-
- =========================================================
-
- From--Druff <71553.1102@COMPUSERVE.COM>
- Subject--FTC Alert (more info)
- Date--20 Mar 1995 17:45:51 GMT
-
- Proposed comments to FTC about written authorization required for
- checks by phone
-
- Under Section 310.3 [a] [4] of the proposed rule, it is a prohibited
- deceptive telemarketing act or practice for a seller or telemarketer
- to obtain or submit for payment from a person's checking, savings,
- share, or similar account, a check, draft, or other form of negotiable
- paper without that person's express written authorization. For
- example, a telemarketer cannot submit an unsigned draft on a
- consumer's bank account without that consumer's prior written
- authorization. This Section of the proposed rule would discriminate
- against the 75 million Americans who do not have a credit card [1990
- census] and the millions of credit card holders who want to make a
- purchase by phone, fax, computer, computer bulletin board, etc., but
- who have no usable credit on their card.
-
- Would discriminate against the thousands of new and small businesses
- who cannot obtain Credit Card Merchant Status to accept major credit
- cards and reduce their sales by not being able to accept a customer's
- check over the phone.
-
- The rules would allow credit card payments over the phone, increasing
- the monopoly of MasterCard and Visa with their up to 21 percent
- charges to consumers.
-
- Would effectively kill the rapidly growing "checks by phone" industry,
- putting over 20 companies (and their employees) out of business and
- costing countless less sales to the thousands of clients these
- businesses are now servicing.
-
- Fraud associated with checks by phone is less than with credit cards.
- Any consumer can take a check to his or her bank and, since consumer's
- signature is not on check, have the check kicked back to the bank it
- was originally deposited in and have their account credited. As with
- credit card sales over the phone, it is the merchant that is at risk,
- not the consumer.
-
- The FTC must demonstrate why checks over the phone must require prior
- written authorization from consumers [which would effectively negate
- its usefulness] while allowing credit card purchases by phone without
- prior written authorization.
-
- In order for the Information Super Highway to continue to grow, checks
- by phone will play a positive important role. People will be shopping
- from their personal computers, from their TV sets using their
- interactive remote control device...on computer bulletin boards and on
- the Internet and by fax machine. Consumers will need ways to transmit
- money over the phone and fax lines and businesses will need ways to
- receive money by phone line and fax and by computer. 75 million
- Americans do not have a credit card and thousands of legitimate
- businesses cannot qualify for credit card merchant account status to
- accept major credit cards. To preclude checks by phone will cause
- great economic loss to the American economy.
-
- If banks received numerous complaints about checks by phone they would
- stop paying them [checks without account holders signature].
-
- Handicapped, the elderly, shut-ins, etc., would be further penalized
- by being forced to address envelopes, purchase postage stamps, and
- going to a mail box instead of being able to conveniently give a check
- over the phone.
-
- If future information and statistics demonstrate that checks by phone
- produces more fraud and complaints than credit card fraud, the FTC can
- revisit this issue in future rules. No anecdotal evidence presently
- exists that this is currently the case.
-
- ------------------------------
-
- Date: Sun, 19 Mar 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 19 Mar, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB <your name>
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.23
- ************************************
-
-