Thanks all. I think I getting the gist. But let me summarize what I've read on this thread (knowing there's lots more elsewhere):
0. It's not necessarily what the user enters, but what I do with it
1. Don't trust user input, so use -T
2. RegExp data from user form to untaint, but RegExps can vary depending on what I want to allow them to enter
3. In all cases, RegExp/escape any HTML from users so the code would never render in a browser
4. Stay away from shells and evals (this should be no problem, 'cause I don't know enough to even know why I'd want to use one), but also file ops that use user input
5. Use placeholders in MySQL inserts
6. Use modules where I can find them to help
Sorry if I was flogging the proverbial dead horse, but you can see what a little paranoia can do!
Thanks again.
P.S. Just read Gunther Birzniek's excellent article
CGI/Perl Taint Mode FAQ