There is a lot of work to be done, but the problems are certainly not insurmountable. However, if we do not do it ourselves, nothing will change, because nobody is going to do it for us.”

3. Access to Information

Strategy Coordinator:
Magda Seydegart, Executive
Director, Human Rights Research
& Education Centre, University of Ottawa

“ A prime concern expressed by those who participated in the 'Information Control and Access' workshops is that women need to create and control their own data bases. Not only must we design our own programs - we must also determine their uses, thus taking steps to make technology empower women. In this process, we can refer to existing feminist models, such as the National Women's Mailing List (NWML). What makes this model 'feminist' is that it is participatory, self-identifying, not totally dependent on outside funding, and it applies non-sexist indexing terminology. Furthermore, it has a multiplier effect: all women can have access to the information. Organizations are encouraged to enquire about, and possibly join, the National Women's Mailing List, and to contact the Canadian Research Institute for the Advancement of Women (CRIAW) for information on its new talent bank.

Participants insist that, in setting up their data banks, women's organizations should start by identifying their needs. Only then should they find a system: one which they can control, rather than vice versa. Possible uses of data banks include:

  • Lists of women looking for employment, which could be accessed by potential employers.

  • Lists of legal decisions affecting women, and proposed legislation.

  • Political developments of specific concern for women.

  • Lists of women with specific expertise.

  • Funding sources.

  • Women doing research or writing on feminist issues.

  • Catalogues of courses with related information, such as registration fees.

Within women's organizations, particular interest groups, such as the handicapped, could maintain and update their own data bases. It was also suggested that equipment should be shared where possible. This would seriously reduce hardware and software costs. Sharing could be organized between women's groups, or with other groups of compatible interests.

In the area of security, participants underlined the urgency of defining laws to cover theft, misuse, erasure, or sale of information. International agreements are needed to cover the export of data. Some discussion centred on the Freedom of Information, and Privacy Act, which apparently will be receiving third reading within a few days. If it is passed, we should all become familiar with this act, and learn to use it. Furthermore, it was strongly stated that no one should give out information lightly. Women should check their records. Don't limit yourself to fighting the use of the Social Insurance Number (S.I.N.). It is the broader concept: of unmonitored linking which we must oppose. Any piece of I information can be used to identify a person: date of birth, name of mother, etc. S.I.N. is but one such piece of information.

Finally, participants also raised the issue of language and computer literacy, necessary tools if we are to have access to information and to the legislation governing its uses.



Back Contents Next