perm filename STERLI.LE1[LET,JMC] blob sn#285770 filedate 1977-05-30 generic text, type C, neo UTF8
COMMENT ⊗   VALID 00002 PAGES
C REC  PAGE   DESCRIPTION
C00001 00001
C00002 00002	.require "let.pub" source
C00005 ENDMK
C⊗;
.require "let.pub" source
∂AIL Dr. Theodore D. Sterling↓Computing Science Program
↓Simon Fraser University↓Burnaby, B.C.
↓Canada V5A 1S6∞

Dear Dr. Sterling:

	I don't know where you read my review, but there was a further
exchange in the %2SIGART Newsletter%1.

	I found your %2Datamation%1 article very informative; it changed
some of my ideas of where the abuses lie.  
The following are some of my old ideas that may still have some application:

	1. A person has a right to refuse information that the
requesting organization already has.  If the requesting organization
is unsure that its information is up-to-date it can ask for confirmation,
but if it wants the information repeated, because it lost it, then
it must pay $1.00 per item.

	2. Tape-to-tape file systems wherein the information is inaccessible
between tape runs are obsolete, and it may even be desirable to
outlaw them; i.e. only on-line systems would be allowed.

	3. Public information should be accessible by remote terminal.
A scheme needs to be devised so that a person giving information to
an organization can give, if he wants to, a password.  The subsequent
use of this password should make whatever information the organization
has about him available.

	Enclosed is a paper about home terminals that touches these
issues peripherally.

.sgn