544 lines
20 KiB
Plaintext
544 lines
20 KiB
Plaintext
|
* THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY *
|
|||
|
|
|||
|
(submitted by Tom Jennings, fidonet 1:125/111
|
|||
|
uucp ...hoptoad!kumr!anomaly!tom.jennings)
|
|||
|
|
|||
|
Pursuing Policies for the Information Age in the
|
|||
|
Bicentennial Year of the Bill of Rights
|
|||
|
|
|||
|
Tutorials & Invitational Conference, Limited to 600 Participants
|
|||
|
|
|||
|
Monday-Thursday, March 25-28, 1991
|
|||
|
|
|||
|
Airport SFO Marriott Hotel, Burlingame, California (San Francisco <20>
|
|||
|
Peninsula)
|
|||
|
|
|||
|
Co-sponsors & cooperating organizations include
|
|||
|
Institute of Electrical and Electronics Engineers-USA
|
|||
|
Association for Computing Machinery
|
|||
|
Electronic Networking Association
|
|||
|
Electronic Frontier Foundation
|
|||
|
Videotex Industry Association
|
|||
|
Cato Institute
|
|||
|
American Civil Liberties Union
|
|||
|
ACM Special Interest Group on Software
|
|||
|
IEEE-USA Intellectual Property Committee
|
|||
|
ACM Special Interest Group on Computers and Society
|
|||
|
ACM Committee on Scientific Freedom and Human Rights
|
|||
|
IEEE-USA Committee on Communications and Information Policy
|
|||
|
Autodesk, Inc.
|
|||
|
The WELL
|
|||
|
Portal Communications
|
|||
|
|
|||
|
Sponsored by the Computer Professionals for Social Responsibility
|
|||
|
A nonprofit educational corporation
|
|||
|
(415)322-3778, e-mail: cfp@well.sf.ca.us. fax: (415)851-2814
|
|||
|
|
|||
|
|
|||
|
ABOUT COMPUTERS, FREEDOM & PRIVACY
|
|||
|
----------------------------------
|
|||
|
|
|||
|
We are at a crossroads as individuals, organizations and<6E>
|
|||
|
governments depend more and more on computers and computer<65>
|
|||
|
networks. Within ten years, most global information will be<62>
|
|||
|
collected and utilized electronically. The 1990's are the pivotal<61>
|
|||
|
decade in which statutes, policies and judicial precedents will<6C>
|
|||
|
be developed for controlling access, use -- and abuse -- of<6F>
|
|||
|
computerized information and electronic mail.
|
|||
|
|
|||
|
Current government and private-sector policies are an<61>
|
|||
|
uncoordinated jumble, created as each group evolves ways to<74>
|
|||
|
collect, manipulate, extract, share and protect computerized and<6E>
|
|||
|
networked information and services.
|
|||
|
|
|||
|
Data on individuals and groups is being computerized by numerous<75>
|
|||
|
agencies, organizations and special interests, often without the<68>
|
|||
|
knowledge or approval of those it concerns, and with varying<6E>
|
|||
|
degrees of accuracy.
|
|||
|
|
|||
|
Computers can greatly assist individuals, organizations and<6E>
|
|||
|
government in making sound decisions based on efficient access to<74>
|
|||
|
adequate information -- for personal benefit, business<73>
|
|||
|
improvement and national well-being.
|
|||
|
|
|||
|
Or, inappropriate use and regulation can seriously threaten<65>
|
|||
|
fundamental freedoms, personal privacy, and the democratic<69>
|
|||
|
processes that are at the very foundation of this nation and of<6F>
|
|||
|
any free society.
|
|||
|
|
|||
|
ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday, March 26th-28th)
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
PLENARY SPEAKERS:
|
|||
|
|
|||
|
* Laurence H. Tribe, Professor of Constitutional Law, Harvard Law<61>
|
|||
|
School, offering major policy proposals in the opening Conference<63>
|
|||
|
session, "The Constitution in Cyberspace: Law & Liberty Beyond<6E>
|
|||
|
the Electronic Frontier".
|
|||
|
|
|||
|
* Eli M. Noam, Director of the Center for Telecommunications and<6E>
|
|||
|
Information Studies, Columbia University, and a recognized leader<65>
|
|||
|
in telecommunications regulation, international communications<6E>
|
|||
|
policies and economics, will discuss, "Network Environments of<6F>
|
|||
|
the Future: Reconciling Free Speech and Freedom of Association."
|
|||
|
|
|||
|
* William A. Bayse, Assistant Director, FBI Technical Services<65>
|
|||
|
Division, Washington DC, providing perspectives on "Balancing<6E>
|
|||
|
Computer Security Capabilities with Privacy and Integrity" at the<68>
|
|||
|
Wednesday evening banquet.
|
|||
|
|
|||
|
|
|||
|
THE CONFERENCE SESSIONS offer diverse speakers & panel<65>
|
|||
|
discussions:
|
|||
|
|
|||
|
Trends in Computers & Networks.
|
|||
|
Overview and prognosis of computing capabilities and networking<6E>
|
|||
|
as they impact personal privacy, confidentiality, security,
|
|||
|
one-to-one & many-to-one communications, and access to<74>
|
|||
|
information about government, business and
|
|||
|
society.
|
|||
|
|
|||
|
International Perspectives & Impacts.
|
|||
|
Other nationsU models for protecting personal information and<6E>
|
|||
|
communications, and granting access to government information;<3B>
|
|||
|
existing and developing laws; requirements for trans-national<61>
|
|||
|
dataflow and their implications; impacts on personal expression;<3B>
|
|||
|
accountability.
|
|||
|
|
|||
|
Personal Information & Privacy.
|
|||
|
Government and private collection, sharing, marketing,<2C>
|
|||
|
verification, use, protection of, access to and responsibility<74>
|
|||
|
for personal data, including buying patterns, viewing habits,<2C>
|
|||
|
lifestyle, work, health, school, census, voter, tax, financial<61>
|
|||
|
and consumer information.
|
|||
|
|
|||
|
Law Enforcement Practices & Problems.
|
|||
|
Issues relating to investigation, prosecution, due process and<6E>
|
|||
|
deterring computer crimes, now and in the future; use of<6F>
|
|||
|
computers to aid law enforcement.
|
|||
|
|
|||
|
Law Enforcement & Civil Liberties.
|
|||
|
Interaction of computer crime, law enforcement and civil<69>
|
|||
|
liberties; issues of search, seizure and sanctions, especially as<61>
|
|||
|
applied to shared or networked information, software and<6E>
|
|||
|
equipment.
|
|||
|
|
|||
|
Legislation & Regulation.
|
|||
|
Legislative and regulatory roles in protecting privacy and<6E>
|
|||
|
insuring access; legal problems posed by computing and computer<65>
|
|||
|
networks; approaches to improving related government processes.
|
|||
|
|
|||
|
Computer-based Surveillance of Individuals.
|
|||
|
Monitoring electronic-mail, public & private teleconferences,<2C>
|
|||
|
electronic bulletin boards, publications and subscribers;<3B>
|
|||
|
monitoring individuals, work performance, buying habits and<6E>
|
|||
|
lifestyles.
|
|||
|
|
|||
|
Electronic Speech, Press & Assembly.
|
|||
|
Freedoms and responsibilities regarding electronic speech,<2C>
|
|||
|
public and private electronic assembly, electronic publishing,<2C>
|
|||
|
prior restraint and chilling effects of monitoring.
|
|||
|
|
|||
|
Access to Government Information.
|
|||
|
Implementing individual and corporate access to federal, state &<26>
|
|||
|
local information about communities, corporations, legislation,<2C>
|
|||
|
administration, the courts and public figures; allowing access<73>
|
|||
|
while protecting confidentiality.
|
|||
|
|
|||
|
Ethics & Education.
|
|||
|
Ethical principles for individuals, system administrators,<2C>
|
|||
|
organizations, corporations and government; copying of data,<2C>
|
|||
|
copying of software, distributing confidential information;<3B>
|
|||
|
relations to computer education and computer law.
|
|||
|
|
|||
|
Where Do We Go From Here? [closing session]
|
|||
|
Perspectives, recommendations and commitments of participants<74>
|
|||
|
from the major interest groups, proposed next steps to protect<63>
|
|||
|
personal privacy, protect fundamental freedoms and encourage<67>
|
|||
|
responsible policies and action.
|
|||
|
|
|||
|
Also:
|
|||
|
Tuesday and Wednesday will include structured opportunities for<6F>
|
|||
|
attendees to identify groups with whom they want to establish<73>
|
|||
|
contact and, if they wish, announce topics they would like to<74>
|
|||
|
discuss, one on one.
|
|||
|
|
|||
|
|
|||
|
ABOUT THIS PREMIER EVENT
|
|||
|
------------------------
|
|||
|
|
|||
|
This is an intensive, multi-disciplinary survey Conference for<6F>
|
|||
|
those concerned with computing, teleconferencing, electronic<69>
|
|||
|
mail, computerized personal information, direct marketing<6E>
|
|||
|
information, government data, etc. -- and those concerned with<74>
|
|||
|
computer-related legislation, regulation, computer security, law<61>
|
|||
|
enforcement and national and international policies that impact<63>
|
|||
|
civil liberties, responsible exercise of freedom and equitable<6C>
|
|||
|
protection of privacy in this global Information Age.
|
|||
|
|
|||
|
For the first time, this four-day invitational event will bring<6E>
|
|||
|
together representatives from all of these groups and more, all<6C>
|
|||
|
in one place, all at one time.
|
|||
|
|
|||
|
Many of the recognized leaders and strongest advocates<65>
|
|||
|
representing the various groups having an interest in the issues<65>
|
|||
|
of the conference will discuss their concerns and proposals.
|
|||
|
|
|||
|
A maximum of 600 applicants will be invited to attend. Balanced<65>
|
|||
|
representation from the diverse groups interested in these issues<65>
|
|||
|
is being encouraged. Please see the enclosed Invitation<6F>
|
|||
|
Application for details.
|
|||
|
|
|||
|
To inform participants about topics beyond their specialties,<2C>
|
|||
|
half-day seminars are scheduled for the first day (Monday, March<63>
|
|||
|
25th). These parallel tutorials will explore relevant issues in<69>
|
|||
|
computing, networking, civil liberties, regulation, the law and<6E>
|
|||
|
law enforcement. Each tutorial is designed for those who are<72>
|
|||
|
experienced in one area, but are less knowledgeable in the<68>
|
|||
|
subject of that tutorial.
|
|||
|
|
|||
|
To explore the interactions and ramifications of the issues,<2C>
|
|||
|
conference talks and panel discussions are scheduled for the<68>
|
|||
|
remaining three days (Tuesday-Thursday, March 26th-28th). These<73>
|
|||
|
will emphasize balanced representation of all major views,<2C>
|
|||
|
especially including probing questions and discussion.
|
|||
|
|
|||
|
Explicit Conference events to foster communication across<73>
|
|||
|
disciplines are planned. Working luncheons, major breaks and two<77>
|
|||
|
evening banquets will further encourage individual and small<6C>
|
|||
|
group discussions.
|
|||
|
|
|||
|
|
|||
|
ABOUT JUST *SOME* OF THE SPEAKERS IN THE 3-DAY CONFERENCE
|
|||
|
---------------------------------------------------------
|
|||
|
|
|||
|
Ken Allen, Senior Vice President for Governmental Relations,<2C>
|
|||
|
Information Industries Association (IIA).
|
|||
|
|
|||
|
Sharon Beckman, civil rights and criminal defense attorney and<6E>
|
|||
|
Electronic Frontier Foundation litigation counsel, Silverglate &<26>
|
|||
|
Good.
|
|||
|
|
|||
|
Jerry Berman, Director of the ACLU's Project on Information<6F>
|
|||
|
Technology and Communications Policy Fellow, Benton Foundation.
|
|||
|
|
|||
|
Paul Bernstein, columnist, Trial magazine; Electronic Bar Assn.<2E>
|
|||
|
Legal Info. Network administrator; LawMUG BBS sysop; edits on<6F>
|
|||
|
line lawyers' newsletter.
|
|||
|
|
|||
|
Sally Bowman, promotes responsible computing practices through<67>
|
|||
|
school teaching units; Director, Computer Learning Foundation.
|
|||
|
|
|||
|
David Burnham, author, *Rise of the Computer State*; former *New<65>
|
|||
|
York Times* investigative reporter; specialist in IRS & Freedom<6F>
|
|||
|
of Information Act.
|
|||
|
|
|||
|
Mary Culnan, co-authored major credit reporting policies<65>
|
|||
|
presented to Congress; School of Business Administration,<2C>
|
|||
|
Georgetown University.
|
|||
|
|
|||
|
Peter Denning, Editor, 1990 *Computers Under Attack*; past Pres.,<2C>
|
|||
|
ACM; founding Director, RIACS; editor, *Communications of the<68>
|
|||
|
ACM*.
|
|||
|
|
|||
|
Dorothy Denning, received Aerospace's 1990 Distinguished Lecturer<65>
|
|||
|
in Computer Security award; author, *Cryptography & Data<74>
|
|||
|
Security*.
|
|||
|
|
|||
|
Dave Farber, co-founder, CSNET; member, National Research<63>
|
|||
|
Council's Computer Science & Telecommunications Board; University<74>
|
|||
|
of Pennsylvania.
|
|||
|
|
|||
|
Cliff Figallo, Chief Executive Officer and Director of the WELL<4C>
|
|||
|
(the Whole Earth 'Lectronic Link).
|
|||
|
|
|||
|
David Flaherty, Canadian surveillance expert, Professor of<6F>
|
|||
|
History & Law at the University of Western Ontario.
|
|||
|
|
|||
|
John Ford, Public Relations Director for Equifax, one of the<68>
|
|||
|
nation's largest maintainers of information on individuals.
|
|||
|
|
|||
|
Bob Gellman, Chief Counsel, U.S. House of Representatives<65>
|
|||
|
Governmental Information Subcommittee.
|
|||
|
|
|||
|
Janlori Goldman, Director, ACLU Project on Privacy & Technology,<2C>
|
|||
|
Washington, DC.
|
|||
|
|
|||
|
Harry Hammit, Editor, *Access Reports*, focusing on access to<74>
|
|||
|
information.
|
|||
|
|
|||
|
Martin Hellman, identified potential hazards in federal DES<45>
|
|||
|
national encryption standard; co-invented public-key encryption;<3B>
|
|||
|
Stanford University.
|
|||
|
|
|||
|
Evan Hendricks, Editor & Publisher of *Privacy Times* newsletter.
|
|||
|
|
|||
|
Lance Hoffman, public policy researcher and Professor of<6F>
|
|||
|
Electrical Engineering & Computer Science at George Washington<6F>
|
|||
|
University.
|
|||
|
|
|||
|
Don Ingraham, wrote the first-ever search warrant for magnetic<69>
|
|||
|
media, computer crime prosecutor; Asst. District Attorney,<2C>
|
|||
|
Alameda County.
|
|||
|
|
|||
|
Bob Jacobson, former Principal Consultant, Calif. State Assembly<6C>
|
|||
|
Utilities and Commerce Committee; drafted landmark comp.<2E>
|
|||
|
communications legislation.
|
|||
|
|
|||
|
Mitch Kapor, co-founder, Electronic Frontier Foundation; founder,<2C>
|
|||
|
Lotus Corp.; received DPMA's 1990 Distinguished Information<6F>
|
|||
|
Science Award.
|
|||
|
|
|||
|
Tom Mandel, Director of the Leading Edge Values & Lifestyles<65>
|
|||
|
Program at SRI International.
|
|||
|
|
|||
|
John McMullen, well-known on-line journalist; co-authors<72>
|
|||
|
"Newsbytes" column on GEnie and Online America.
|
|||
|
|
|||
|
Peter Neumann, member, National Research Council's 1990<39>
|
|||
|
*Computers at Risk* committee; Chair, ACM Comm.on Computers &<26>
|
|||
|
Public Policy; hosts RISKS Forum.
|
|||
|
|
|||
|
Donn Parker, perhaps the best-known international consultant and<6E>
|
|||
|
author on information security and computer crime, SRI<52>
|
|||
|
International.
|
|||
|
|
|||
|
Ron Plesser, former majority party congressional committee<65>
|
|||
|
counsel; privacy expert; attorney, Piper & Marbury.
|
|||
|
|
|||
|
John Quarterman, author, Digital Press' definitive *The Matrix:<3A>
|
|||
|
Computer Networks and Conferencing Systems Worldwide*; networking<6E>
|
|||
|
consultant.
|
|||
|
|
|||
|
Jack Rickard, Editor of *Boardwatch* magazine, perhaps the best<73>
|
|||
|
news source about computer bulletin boards; Online Information<6F>
|
|||
|
Service.
|
|||
|
|
|||
|
Tom Riley, Canadian specialist in international computing and<6E>
|
|||
|
privacy issues; Riley & Associates.
|
|||
|
|
|||
|
Lance Rose, co-author of *Syslaw*, about the law applied to
|
|||
|
on-line situations; attorney, Wallace & Rose.
|
|||
|
|
|||
|
Marc Rotenberg, expert in federal computer and privacy law;<3B>
|
|||
|
Computer Professionals for Social Responsibility, Washington<6F>
|
|||
|
office Director.
|
|||
|
|
|||
|
Noel Shipman, attorney for plaintiffs in electronic-mail privacy<63>
|
|||
|
landmark 1990 litigation against Epson America.
|
|||
|
|
|||
|
Harvey Silverglate, Electronic Frontier Foundation litigation<6F>
|
|||
|
counsel, specialist in criminal defense and civil rights,<2C>
|
|||
|
Silverglate & Good.
|
|||
|
|
|||
|
Gail Thackeray, computer crime prosecutor; involved in Secret<65>
|
|||
|
Service's 1990 "Operation Sun Devil", Arizona Asst. State<74>
|
|||
|
Attorney General.
|
|||
|
|
|||
|
Robert Veeder, Acting Chief, Information Policy Branch, Office of<6F>
|
|||
|
Information Regulatory Affairs, OMB (Office of Management &<26>
|
|||
|
Budget).
|
|||
|
|
|||
|
Willis Ware, computer security expert; Fellow, RAND Corporation.
|
|||
|
|
|||
|
Sheldon Zenner, former federal prosecutor in Chicago; defended<65>
|
|||
|
*Phrack* electronic publisher, Craig Neidorf; Katten, Muchin &<26>
|
|||
|
Zavis.
|
|||
|
|
|||
|
|
|||
|
ABOUT THE LOW-COST TUTORIALS (Monday, March 25th)
|
|||
|
-------------------------------------------------
|
|||
|
|
|||
|
Seminars on the first day offer introductions to the different<6E>
|
|||
|
disciplines that intersect in this conference. These are surveys<79>
|
|||
|
for individuals not already expert in the topics presented. <20>
|
|||
|
These half-day tutorials are scheduled in four parallel tracks:
|
|||
|
|
|||
|
Global Communications & the Worldwide Computer Matrix. <20>
|
|||
|
[morning*]
|
|||
|
Survey of electronic-mail & teleconferencing services, global<61>
|
|||
|
information access, remote services and the matrix of networks.
|
|||
|
|
|||
|
Low-Cost Computer Networking & Computer Bulletin Board Systems. <20>
|
|||
|
[afternoon*]
|
|||
|
Reviews e-mail, bulletin board and teleconferencing alternatives<65>
|
|||
|
on personal computers; outlines low-cost PC-based networks and<6E>
|
|||
|
their gateways to the global matrix. -- Mark Graham*, co-founder<65>
|
|||
|
of Institute for Global Communications, PeaceNet and EcoNet;<3B>
|
|||
|
Pandora Systems
|
|||
|
|
|||
|
Current & Proposed International Policies. [morning*]
|
|||
|
Law and regulation that will or may impact trans-border
|
|||
|
data-flow and computer communications, impacting U.S. information<6F>
|
|||
|
practices and international business.
|
|||
|
|
|||
|
Federal Legislation Impacting Computer Use. [afternoon*]
|
|||
|
Detailed review of landmark federal statutes impacting access to<74>
|
|||
|
information, privacy of information, computer security and<6E>
|
|||
|
computer crime. -- Marc Rotenberg*, former congressional counsel<65>
|
|||
|
and expert on federal legislation, CPSR, Washington DC.
|
|||
|
|
|||
|
How Computer Crackers Crack! [morning*]
|
|||
|
Suggested by a deputy district attorney specializing in
|
|||
|
high-tech crime, this is for law enforcement officials,<2C>
|
|||
|
prosecutors, systems administrators and Bulletin Board System<65>
|
|||
|
(BBS) sysops. -- Russell Brand*, computer security specialist;<3B>
|
|||
|
programmer with Reasoning Systems, Palo Alto CA.
|
|||
|
|
|||
|
How Computer Crime is Investigated.
|
|||
|
[afternoon*] This reviews investigation, search, seizure and<6E>
|
|||
|
evidence requirements for pursuing computer crime. It is for<6F>
|
|||
|
computer users, computer owners, BBS sysops and investigators<72>
|
|||
|
unfamiliar with computer crime practices.
|
|||
|
|
|||
|
Information Security. [afternoon*]
|
|||
|
Survey for systems managers of internal and external threats,<2C>
|
|||
|
security measures, alternatives and other computer and data<74>
|
|||
|
security issues. -- Donn Parker*, a leading consultant in<69>
|
|||
|
information security and computer crime, SRI International.
|
|||
|
|
|||
|
* - Lecturers, descriptions and times were confirmed as of<6F>
|
|||
|
1/8/91, but may be subject to change.
|
|||
|
|
|||
|
|
|||
|
CONFERENCE CHAIR
|
|||
|
Jim Warren, Autodesk, Inc. & *MicroTimes*
|
|||
|
415-851-7075, jwarren@well.sf.ca.us / e-mail
|
|||
|
|
|||
|
PROGRAM COMMITTEE
|
|||
|
Dorothy Denning, Digital Equipment Corporation
|
|||
|
Peter Denning, Research Institute for Advanced Computer Science
|
|||
|
Les Earnest, SF Peninsula ACLU & Stanford University, ret.
|
|||
|
Elliot Fabric, Attorney at Law
|
|||
|
Mark Graham, Pandora Systems
|
|||
|
Don Ingraham, Alameda County District AttorneyUs Office
|
|||
|
Bruce Koball, Motion West
|
|||
|
Marc Rotenberg, Computer Professionals for Social Responsibility
|
|||
|
Glenn Tenney, Fantasia Systems & Hacker's Conference
|
|||
|
|
|||
|
ADVISORS
|
|||
|
Ron Anderson, ACM SIGCAS & University of Minnesota
|
|||
|
John Perry Barlow, Electronic Frontier Foundation
|
|||
|
Jerry Berman, ACLU & Benton Foundation
|
|||
|
Dave Caulkins, USSR GlasNet
|
|||
|
Vint Cerf, Corporation for National Research Initiatives
|
|||
|
Margaret Chambers, Electronic Networking Association
|
|||
|
Steve Cisler, Apple Computer, Inc.
|
|||
|
Whit Diffie, Northern Telecom
|
|||
|
Mary Eisenhart, *MicroTimes*
|
|||
|
Dave Farber, University of Pennsylvania
|
|||
|
Cliff Figallo, The WELL
|
|||
|
John Gilmore, Cygnus Support
|
|||
|
Adele Goldberg, ParcPlace Systems
|
|||
|
Terry Gross, Rabinowitz, Boudin, Standard, et al
|
|||
|
Keith Henson, consultant & Alcor
|
|||
|
Lance Hoffman, George Washington University
|
|||
|
Dave Hughes, Chariot Communications
|
|||
|
Bob Jacobson, Human Interface Technology Laboratory
|
|||
|
Mitch Kapor, Electronic Frontier Foundation
|
|||
|
Roger Karraker, Santa Rosa College
|
|||
|
Tom Mandel, SRI International
|
|||
|
John McMullen, NewsBytes
|
|||
|
Peter Neumann, SRI International
|
|||
|
Dave Redell, Digital Equipment Corporation
|
|||
|
Ken Rosenblattt, Santa Clara County District Attorney's Office
|
|||
|
Paul Saffo, Institute for the Future
|
|||
|
Gail Thackeray, Arizona Attorney GeneralUs Office
|
|||
|
Jay Thorwaldson, Palo Alto Medical Foundation
|
|||
|
Terry Winograd, CPSR & Stanford University
|
|||
|
Sheldon Zenner, Katten, Muchin, & Zavis
|
|||
|
|
|||
|
Affiliations listed only for identification
|
|||
|
|
|||
|
============================
|
|||
|
= Request for Invitation =
|
|||
|
============================
|
|||
|
First Conference on Computers, Freedom & Privacy
|
|||
|
March 25-28, 1991
|
|||
|
Monday: Tutorials, Tuesday-Thursday: Conference Sessions
|
|||
|
SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010
|
|||
|
For hotel reservations at Conference rates, call: (800)228-9290<39>
|
|||
|
#3
|
|||
|
|
|||
|
** Invitational Conference, limted to 600 participants. ** To<54>
|
|||
|
facilitate useful dialogue and balanced participation by<62>
|
|||
|
representatives from all of the diverse groups interested in<69>
|
|||
|
these issues, attendance is limited. (The capacity of the<68>
|
|||
|
Conference facility is similarly limited).
|
|||
|
|
|||
|
All interested individuals are encouraged to request an<61>
|
|||
|
invitation. Invitations will be primarily issued on a first-come,<2C>
|
|||
|
first-served basis within each major interest group.
|
|||
|
|
|||
|
Fees if payment is received by: Jan.31 -Mar.15 after Mar.15
|
|||
|
Tutorials (full day) $ 95 $ 145 $ 195
|
|||
|
Conference (3 days) $ 295 $ 350 $ 400
|
|||
|
|
|||
|
Conference Registration fee includes three luncheons, two banquet<65>
|
|||
|
meetings and selected handouts. Please make checks payable to<74>
|
|||
|
"Computers, Freedom & Privacy/CPSR". Please don't send cash. <20>
|
|||
|
Invitations will be promptly issued, or the uncashed check will<6C>
|
|||
|
be voided and promptly returned.
|
|||
|
|
|||
|
Please type or print. Thank ye, kindly.
|
|||
|
name:
|
|||
|
title:
|
|||
|
organization:
|
|||
|
mailing address:
|
|||
|
city, state ZIP:
|
|||
|
phone(s):
|
|||
|
fax:
|
|||
|
e-mail:
|
|||
|
|
|||
|
Comments to assist in evaluating this request:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
To aid in balancing participation among groups,
|
|||
|
please check all significantly applicable items.
|
|||
|
[ ] user of computers or computer networking
|
|||
|
[ ] user of electronic-mail services
|
|||
|
[ ] user of teleconferencing services
|
|||
|
[ ] user of direct marketing services
|
|||
|
[ ] user of computerized personal information
|
|||
|
[ ] user of government information
|
|||
|
[ ] computer professional
|
|||
|
[ ] BBS sysop (bulletin board system operator)
|
|||
|
[ ] systems administrator / infosystems manager
|
|||
|
[ ] network administrator
|
|||
|
[ ] computer / communications security specialist
|
|||
|
[ ] provider of data communications services
|
|||
|
[ ] provider of electronic-mail services
|
|||
|
[ ] provider of teleconferencing services
|
|||
|
[ ] provider of direct marketing services
|
|||
|
[ ] provider of computerized personal information
|
|||
|
[ ] provider of government information
|
|||
|
[ ] legislative official [ ] federal [ ] state
|
|||
|
[ ] regulatory official or staff [ ] federal [ ] state
|
|||
|
[ ] law enforcement offi [ ] federal [ ] state [ ] local
|
|||
|
[ ] prosecutor [ ] federal [ ] state [ ] local
|
|||
|
[ ] judicial representat [ ] federal [ ] state [ ] local
|
|||
|
[ ] criminal defense attorney
|
|||
|
[ ] corporate or litigation attorney
|
|||
|
[ ] civil liberties specialist
|
|||
|
[ ] journalist [ ] newspaper [ ] television [ ] radio [ ] other
|
|||
|
[ ] other:
|
|||
|
[ ] other:
|
|||
|
<<1/7/91>>
|
|||
|
|
|||
|
Please mail form and payment to:
|
|||
|
CFP Conference, 345 Swett Road, Woodside CA 94062
|
|||
|
|
|||
|
Privacy Notice: This information will not be sold, rented,<2C>
|
|||
|
loaned, exchanged or used for any purpose other than official<61>
|
|||
|
CPSR activity. CPSR may elect to send information about other<65>
|
|||
|
activities, but such mailings will always originate with CPSR.
|
|||
|
|
|||
|
Sponsor: Computer Professionals for Social Responsibility,<2C>
|
|||
|
(415)322-3778 A nonprofit, educational corporation [ Internal<61>
|
|||
|
Revenue Code 501(c)(3) ]
|
|||
|
e-mail: cfp@well.sf.ca.us; fax: (415)851-2814
|
|||
|
Chair: Jim Warren, (415)851-7075
|
|||
|
|
|||
|
Please copy, post & circulate!
|