1994-08-26 - PRIVACY 101

Header Data

From: Sandy Sandfort <sandfort@crl.com>
To: Cypherpunks <cypherpunks@toad.com>
Message Hash: 6d2aef702dd2ee42c95a29a68d7b60774b90734e5940375643cd1269dd0a23c5
Message ID: <Pine.3.87.9408261108.A1106-0100000@crl2.crl.com>
Reply To: N/A
UTC Datetime: 1994-08-26 18:20:24 UTC
Raw Date: Fri, 26 Aug 94 11:20:24 PDT

Raw message

From: Sandy Sandfort <sandfort@crl.com>
Date: Fri, 26 Aug 94 11:20:24 PDT
To: Cypherpunks <cypherpunks@toad.com>
Subject: PRIVACY 101
Message-ID: <Pine.3.87.9408261108.A1106-0100000@crl2.crl.com>
MIME-Version: 1.0
Content-Type: text/plain


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                         SANDY SANDFORT
 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

C'punks,

Duncan and I are now accepting registrations for our on-line
Privacy Seminar.  If you would like to participate, you can
subscribe by sending a message to:

                      majordomo@c2.org

In the body of your message, you should have the command:

                  subscribe privacy101 [<address>]

Where [<address>] is the e-mail address you wish to use for
the Seminar.  (If you do not specify an address, the address from
which you subscribed will be used.)

Send a message to majordomo@c2.org with the word "help" in the
body of the message to get majordomo help info.

Here is some more list info:

Majordomo address:             Majordomo@c2.org
Majordomo-Owner address:       Majordomo-Owner@c2.org
List Name:                     privacy101
List posting address:          privacy101@c2.org
List request address:          privacy101-request@c2.org

The Seminar will be archived.  To participate from the beginning,
however, you should sign up immediately.  The Seminar will begin
September 1st.

The Seminar will be a series of lectures that alternate with a
moderated list for questions and comments.  As the Seminar
progresses, we may alter or add lectures, but the tentative list
of lectures is as follows:

  Privacy 101 Lectures:

     1.  Introduction to Privacy Theory and Philosophy

     2.  Threat Level Management--The Calculus of Risk

     3.  Identity Information Risks

     4.  Locational Information Risks

     5.  Financial Information Risks

     6.  Health Information Risks

     7.  Lifestyle Information Risks

     8.  Political/Philosophical Information Risks

     9.  Misc. Information Risks

    10.  Identity Privacy Techniques

    11.  Locational Privacy Techniques

    12.  Financial Privacy Techniques

    13.  Health Privacy Techniques

    14.  Lifestyle Privacy Techniques

    15.  Political/Philosophical Privacy Techniques

    15.  Misc. Privacy Techniques


If you have any specific questions or areas of interest which you
would like to have addressed during the Seminar, please let us
know as soon as possible.  We will try to work them into our
presentation.

Regards,


 S a n d y

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~















Thread