544 lines
20 KiB
Plaintext
544 lines
20 KiB
Plaintext
* THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY *
|
||
|
||
(submitted by Tom Jennings, fidonet 1:125/111
|
||
uucp ...hoptoad!kumr!anomaly!tom.jennings)
|
||
|
||
Pursuing Policies for the Information Age in the
|
||
Bicentennial Year of the Bill of Rights
|
||
|
||
Tutorials & Invitational Conference, Limited to 600 Participants
|
||
|
||
Monday-Thursday, March 25-28, 1991
|
||
|
||
Airport SFO Marriott Hotel, Burlingame, California (San Francisco <20>
|
||
Peninsula)
|
||
|
||
Co-sponsors & cooperating organizations include
|
||
Institute of Electrical and Electronics Engineers-USA
|
||
Association for Computing Machinery
|
||
Electronic Networking Association
|
||
Electronic Frontier Foundation
|
||
Videotex Industry Association
|
||
Cato Institute
|
||
American Civil Liberties Union
|
||
ACM Special Interest Group on Software
|
||
IEEE-USA Intellectual Property Committee
|
||
ACM Special Interest Group on Computers and Society
|
||
ACM Committee on Scientific Freedom and Human Rights
|
||
IEEE-USA Committee on Communications and Information Policy
|
||
Autodesk, Inc.
|
||
The WELL
|
||
Portal Communications
|
||
|
||
Sponsored by the Computer Professionals for Social Responsibility
|
||
A nonprofit educational corporation
|
||
(415)322-3778, e-mail: cfp@well.sf.ca.us. fax: (415)851-2814
|
||
|
||
|
||
ABOUT COMPUTERS, FREEDOM & PRIVACY
|
||
----------------------------------
|
||
|
||
We are at a crossroads as individuals, organizations and<6E>
|
||
governments depend more and more on computers and computer<65>
|
||
networks. Within ten years, most global information will be<62>
|
||
collected and utilized electronically. The 1990's are the pivotal<61>
|
||
decade in which statutes, policies and judicial precedents will<6C>
|
||
be developed for controlling access, use -- and abuse -- of<6F>
|
||
computerized information and electronic mail.
|
||
|
||
Current government and private-sector policies are an<61>
|
||
uncoordinated jumble, created as each group evolves ways to<74>
|
||
collect, manipulate, extract, share and protect computerized and<6E>
|
||
networked information and services.
|
||
|
||
Data on individuals and groups is being computerized by numerous<75>
|
||
agencies, organizations and special interests, often without the<68>
|
||
knowledge or approval of those it concerns, and with varying<6E>
|
||
degrees of accuracy.
|
||
|
||
Computers can greatly assist individuals, organizations and<6E>
|
||
government in making sound decisions based on efficient access to<74>
|
||
adequate information -- for personal benefit, business<73>
|
||
improvement and national well-being.
|
||
|
||
Or, inappropriate use and regulation can seriously threaten<65>
|
||
fundamental freedoms, personal privacy, and the democratic<69>
|
||
processes that are at the very foundation of this nation and of<6F>
|
||
any free society.
|
||
|
||
ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday, March 26th-28th)
|
||
-----------------------------------------------------------------
|
||
|
||
PLENARY SPEAKERS:
|
||
|
||
* Laurence H. Tribe, Professor of Constitutional Law, Harvard Law<61>
|
||
School, offering major policy proposals in the opening Conference<63>
|
||
session, "The Constitution in Cyberspace: Law & Liberty Beyond<6E>
|
||
the Electronic Frontier".
|
||
|
||
* Eli M. Noam, Director of the Center for Telecommunications and<6E>
|
||
Information Studies, Columbia University, and a recognized leader<65>
|
||
in telecommunications regulation, international communications<6E>
|
||
policies and economics, will discuss, "Network Environments of<6F>
|
||
the Future: Reconciling Free Speech and Freedom of Association."
|
||
|
||
* William A. Bayse, Assistant Director, FBI Technical Services<65>
|
||
Division, Washington DC, providing perspectives on "Balancing<6E>
|
||
Computer Security Capabilities with Privacy and Integrity" at the<68>
|
||
Wednesday evening banquet.
|
||
|
||
|
||
THE CONFERENCE SESSIONS offer diverse speakers & panel<65>
|
||
discussions:
|
||
|
||
Trends in Computers & Networks.
|
||
Overview and prognosis of computing capabilities and networking<6E>
|
||
as they impact personal privacy, confidentiality, security,
|
||
one-to-one & many-to-one communications, and access to<74>
|
||
information about government, business and
|
||
society.
|
||
|
||
International Perspectives & Impacts.
|
||
Other nationsU models for protecting personal information and<6E>
|
||
communications, and granting access to government information;<3B>
|
||
existing and developing laws; requirements for trans-national<61>
|
||
dataflow and their implications; impacts on personal expression;<3B>
|
||
accountability.
|
||
|
||
Personal Information & Privacy.
|
||
Government and private collection, sharing, marketing,<2C>
|
||
verification, use, protection of, access to and responsibility<74>
|
||
for personal data, including buying patterns, viewing habits,<2C>
|
||
lifestyle, work, health, school, census, voter, tax, financial<61>
|
||
and consumer information.
|
||
|
||
Law Enforcement Practices & Problems.
|
||
Issues relating to investigation, prosecution, due process and<6E>
|
||
deterring computer crimes, now and in the future; use of<6F>
|
||
computers to aid law enforcement.
|
||
|
||
Law Enforcement & Civil Liberties.
|
||
Interaction of computer crime, law enforcement and civil<69>
|
||
liberties; issues of search, seizure and sanctions, especially as<61>
|
||
applied to shared or networked information, software and<6E>
|
||
equipment.
|
||
|
||
Legislation & Regulation.
|
||
Legislative and regulatory roles in protecting privacy and<6E>
|
||
insuring access; legal problems posed by computing and computer<65>
|
||
networks; approaches to improving related government processes.
|
||
|
||
Computer-based Surveillance of Individuals.
|
||
Monitoring electronic-mail, public & private teleconferences,<2C>
|
||
electronic bulletin boards, publications and subscribers;<3B>
|
||
monitoring individuals, work performance, buying habits and<6E>
|
||
lifestyles.
|
||
|
||
Electronic Speech, Press & Assembly.
|
||
Freedoms and responsibilities regarding electronic speech,<2C>
|
||
public and private electronic assembly, electronic publishing,<2C>
|
||
prior restraint and chilling effects of monitoring.
|
||
|
||
Access to Government Information.
|
||
Implementing individual and corporate access to federal, state &<26>
|
||
local information about communities, corporations, legislation,<2C>
|
||
administration, the courts and public figures; allowing access<73>
|
||
while protecting confidentiality.
|
||
|
||
Ethics & Education.
|
||
Ethical principles for individuals, system administrators,<2C>
|
||
organizations, corporations and government; copying of data,<2C>
|
||
copying of software, distributing confidential information;<3B>
|
||
relations to computer education and computer law.
|
||
|
||
Where Do We Go From Here? [closing session]
|
||
Perspectives, recommendations and commitments of participants<74>
|
||
from the major interest groups, proposed next steps to protect<63>
|
||
personal privacy, protect fundamental freedoms and encourage<67>
|
||
responsible policies and action.
|
||
|
||
Also:
|
||
Tuesday and Wednesday will include structured opportunities for<6F>
|
||
attendees to identify groups with whom they want to establish<73>
|
||
contact and, if they wish, announce topics they would like to<74>
|
||
discuss, one on one.
|
||
|
||
|
||
ABOUT THIS PREMIER EVENT
|
||
------------------------
|
||
|
||
This is an intensive, multi-disciplinary survey Conference for<6F>
|
||
those concerned with computing, teleconferencing, electronic<69>
|
||
mail, computerized personal information, direct marketing<6E>
|
||
information, government data, etc. -- and those concerned with<74>
|
||
computer-related legislation, regulation, computer security, law<61>
|
||
enforcement and national and international policies that impact<63>
|
||
civil liberties, responsible exercise of freedom and equitable<6C>
|
||
protection of privacy in this global Information Age.
|
||
|
||
For the first time, this four-day invitational event will bring<6E>
|
||
together representatives from all of these groups and more, all<6C>
|
||
in one place, all at one time.
|
||
|
||
Many of the recognized leaders and strongest advocates<65>
|
||
representing the various groups having an interest in the issues<65>
|
||
of the conference will discuss their concerns and proposals.
|
||
|
||
A maximum of 600 applicants will be invited to attend. Balanced<65>
|
||
representation from the diverse groups interested in these issues<65>
|
||
is being encouraged. Please see the enclosed Invitation<6F>
|
||
Application for details.
|
||
|
||
To inform participants about topics beyond their specialties,<2C>
|
||
half-day seminars are scheduled for the first day (Monday, March<63>
|
||
25th). These parallel tutorials will explore relevant issues in<69>
|
||
computing, networking, civil liberties, regulation, the law and<6E>
|
||
law enforcement. Each tutorial is designed for those who are<72>
|
||
experienced in one area, but are less knowledgeable in the<68>
|
||
subject of that tutorial.
|
||
|
||
To explore the interactions and ramifications of the issues,<2C>
|
||
conference talks and panel discussions are scheduled for the<68>
|
||
remaining three days (Tuesday-Thursday, March 26th-28th). These<73>
|
||
will emphasize balanced representation of all major views,<2C>
|
||
especially including probing questions and discussion.
|
||
|
||
Explicit Conference events to foster communication across<73>
|
||
disciplines are planned. Working luncheons, major breaks and two<77>
|
||
evening banquets will further encourage individual and small
|
||
group discussions.
|
||
|
||
|
||
ABOUT JUST *SOME* OF THE SPEAKERS IN THE 3-DAY CONFERENCE
|
||
---------------------------------------------------------
|
||
|
||
Ken Allen, Senior Vice President for Governmental Relations,<2C>
|
||
Information Industries Association (IIA).
|
||
|
||
Sharon Beckman, civil rights and criminal defense attorney and<6E>
|
||
Electronic Frontier Foundation litigation counsel, Silverglate &<26>
|
||
Good.
|
||
|
||
Jerry Berman, Director of the ACLU's Project on Information<6F>
|
||
Technology and Communications Policy Fellow, Benton Foundation.
|
||
|
||
Paul Bernstein, columnist, Trial magazine; Electronic Bar Assn.<2E>
|
||
Legal Info. Network administrator; LawMUG BBS sysop; edits on
|
||
line lawyers' newsletter.
|
||
|
||
Sally Bowman, promotes responsible computing practices through<67>
|
||
school teaching units; Director, Computer Learning Foundation.
|
||
|
||
David Burnham, author, *Rise of the Computer State*; former *New<65>
|
||
York Times* investigative reporter; specialist in IRS & Freedom<6F>
|
||
of Information Act.
|
||
|
||
Mary Culnan, co-authored major credit reporting policies<65>
|
||
presented to Congress; School of Business Administration,<2C>
|
||
Georgetown University.
|
||
|
||
Peter Denning, Editor, 1990 *Computers Under Attack*; past Pres.,<2C>
|
||
ACM; founding Director, RIACS; editor, *Communications of the<68>
|
||
ACM*.
|
||
|
||
Dorothy Denning, received Aerospace's 1990 Distinguished Lecturer<65>
|
||
in Computer Security award; author, *Cryptography & Data<74>
|
||
Security*.
|
||
|
||
Dave Farber, co-founder, CSNET; member, National Research<63>
|
||
Council's Computer Science & Telecommunications Board; University<74>
|
||
of Pennsylvania.
|
||
|
||
Cliff Figallo, Chief Executive Officer and Director of the WELL<4C>
|
||
(the Whole Earth 'Lectronic Link).
|
||
|
||
David Flaherty, Canadian surveillance expert, Professor of<6F>
|
||
History & Law at the University of Western Ontario.
|
||
|
||
John Ford, Public Relations Director for Equifax, one of the<68>
|
||
nation's largest maintainers of information on individuals.
|
||
|
||
Bob Gellman, Chief Counsel, U.S. House of Representatives<65>
|
||
Governmental Information Subcommittee.
|
||
|
||
Janlori Goldman, Director, ACLU Project on Privacy & Technology,<2C>
|
||
Washington, DC.
|
||
|
||
Harry Hammit, Editor, *Access Reports*, focusing on access to<74>
|
||
information.
|
||
|
||
Martin Hellman, identified potential hazards in federal DES<45>
|
||
national encryption standard; co-invented public-key encryption;<3B>
|
||
Stanford University.
|
||
|
||
Evan Hendricks, Editor & Publisher of *Privacy Times* newsletter.
|
||
|
||
Lance Hoffman, public policy researcher and Professor of<6F>
|
||
Electrical Engineering & Computer Science at George Washington<6F>
|
||
University.
|
||
|
||
Don Ingraham, wrote the first-ever search warrant for magnetic<69>
|
||
media, computer crime prosecutor; Asst. District Attorney,<2C>
|
||
Alameda County.
|
||
|
||
Bob Jacobson, former Principal Consultant, Calif. State Assembly<6C>
|
||
Utilities and Commerce Committee; drafted landmark comp.<2E>
|
||
communications legislation.
|
||
|
||
Mitch Kapor, co-founder, Electronic Frontier Foundation; founder,<2C>
|
||
Lotus Corp.; received DPMA's 1990 Distinguished Information<6F>
|
||
Science Award.
|
||
|
||
Tom Mandel, Director of the Leading Edge Values & Lifestyles<65>
|
||
Program at SRI International.
|
||
|
||
John McMullen, well-known on-line journalist; co-authors<72>
|
||
"Newsbytes" column on GEnie and Online America.
|
||
|
||
Peter Neumann, member, National Research Council's 1990<39>
|
||
*Computers at Risk* committee; Chair, ACM Comm.on Computers &<26>
|
||
Public Policy; hosts RISKS Forum.
|
||
|
||
Donn Parker, perhaps the best-known international consultant and<6E>
|
||
author on information security and computer crime, SRI<52>
|
||
International.
|
||
|
||
Ron Plesser, former majority party congressional committee<65>
|
||
counsel; privacy expert; attorney, Piper & Marbury.
|
||
|
||
John Quarterman, author, Digital Press' definitive *The Matrix:<3A>
|
||
Computer Networks and Conferencing Systems Worldwide*; networking<6E>
|
||
consultant.
|
||
|
||
Jack Rickard, Editor of *Boardwatch* magazine, perhaps the best<73>
|
||
news source about computer bulletin boards; Online Information<6F>
|
||
Service.
|
||
|
||
Tom Riley, Canadian specialist in international computing and<6E>
|
||
privacy issues; Riley & Associates.
|
||
|
||
Lance Rose, co-author of *Syslaw*, about the law applied to
|
||
on-line situations; attorney, Wallace & Rose.
|
||
|
||
Marc Rotenberg, expert in federal computer and privacy law;<3B>
|
||
Computer Professionals for Social Responsibility, Washington<6F>
|
||
office Director.
|
||
|
||
Noel Shipman, attorney for plaintiffs in electronic-mail privacy<63>
|
||
landmark 1990 litigation against Epson America.
|
||
|
||
Harvey Silverglate, Electronic Frontier Foundation litigation<6F>
|
||
counsel, specialist in criminal defense and civil rights,<2C>
|
||
Silverglate & Good.
|
||
|
||
Gail Thackeray, computer crime prosecutor; involved in Secret<65>
|
||
Service's 1990 "Operation Sun Devil", Arizona Asst. State<74>
|
||
Attorney General.
|
||
|
||
Robert Veeder, Acting Chief, Information Policy Branch, Office of<6F>
|
||
Information Regulatory Affairs, OMB (Office of Management &<26>
|
||
Budget).
|
||
|
||
Willis Ware, computer security expert; Fellow, RAND Corporation.
|
||
|
||
Sheldon Zenner, former federal prosecutor in Chicago; defended<65>
|
||
*Phrack* electronic publisher, Craig Neidorf; Katten, Muchin &<26>
|
||
Zavis.
|
||
|
||
|
||
ABOUT THE LOW-COST TUTORIALS (Monday, March 25th)
|
||
-------------------------------------------------
|
||
|
||
Seminars on the first day offer introductions to the different<6E>
|
||
disciplines that intersect in this conference. These are surveys<79>
|
||
for individuals not already expert in the topics presented. <20>
|
||
These half-day tutorials are scheduled in four parallel tracks:
|
||
|
||
Global Communications & the Worldwide Computer Matrix. <20>
|
||
[morning*]
|
||
Survey of electronic-mail & teleconferencing services, global<61>
|
||
information access, remote services and the matrix of networks.
|
||
|
||
Low-Cost Computer Networking & Computer Bulletin Board Systems. <20>
|
||
[afternoon*]
|
||
Reviews e-mail, bulletin board and teleconferencing alternatives<65>
|
||
on personal computers; outlines low-cost PC-based networks and<6E>
|
||
their gateways to the global matrix. -- Mark Graham*, co-founder<65>
|
||
of Institute for Global Communications, PeaceNet and EcoNet;<3B>
|
||
Pandora Systems
|
||
|
||
Current & Proposed International Policies. [morning*]
|
||
Law and regulation that will or may impact trans-border
|
||
data-flow and computer communications, impacting U.S. information<6F>
|
||
practices and international business.
|
||
|
||
Federal Legislation Impacting Computer Use. [afternoon*]
|
||
Detailed review of landmark federal statutes impacting access to<74>
|
||
information, privacy of information, computer security and<6E>
|
||
computer crime. -- Marc Rotenberg*, former congressional counsel<65>
|
||
and expert on federal legislation, CPSR, Washington DC.
|
||
|
||
How Computer Crackers Crack! [morning*]
|
||
Suggested by a deputy district attorney specializing in
|
||
high-tech crime, this is for law enforcement officials,<2C>
|
||
prosecutors, systems administrators and Bulletin Board System<65>
|
||
(BBS) sysops. -- Russell Brand*, computer security specialist;<3B>
|
||
programmer with Reasoning Systems, Palo Alto CA.
|
||
|
||
How Computer Crime is Investigated.
|
||
[afternoon*] This reviews investigation, search, seizure and<6E>
|
||
evidence requirements for pursuing computer crime. It is for<6F>
|
||
computer users, computer owners, BBS sysops and investigators<72>
|
||
unfamiliar with computer crime practices.
|
||
|
||
Information Security. [afternoon*]
|
||
Survey for systems managers of internal and external threats,<2C>
|
||
security measures, alternatives and other computer and data<74>
|
||
security issues. -- Donn Parker*, a leading consultant in<69>
|
||
information security and computer crime, SRI International.
|
||
|
||
* - Lecturers, descriptions and times were confirmed as of<6F>
|
||
1/8/91, but may be subject to change.
|
||
|
||
|
||
CONFERENCE CHAIR
|
||
Jim Warren, Autodesk, Inc. & *MicroTimes*
|
||
415-851-7075, jwarren@well.sf.ca.us / e-mail
|
||
|
||
PROGRAM COMMITTEE
|
||
Dorothy Denning, Digital Equipment Corporation
|
||
Peter Denning, Research Institute for Advanced Computer Science
|
||
Les Earnest, SF Peninsula ACLU & Stanford University, ret.
|
||
Elliot Fabric, Attorney at Law
|
||
Mark Graham, Pandora Systems
|
||
Don Ingraham, Alameda County District AttorneyUs Office
|
||
Bruce Koball, Motion West
|
||
Marc Rotenberg, Computer Professionals for Social Responsibility
|
||
Glenn Tenney, Fantasia Systems & Hacker's Conference
|
||
|
||
ADVISORS
|
||
Ron Anderson, ACM SIGCAS & University of Minnesota
|
||
John Perry Barlow, Electronic Frontier Foundation
|
||
Jerry Berman, ACLU & Benton Foundation
|
||
Dave Caulkins, USSR GlasNet
|
||
Vint Cerf, Corporation for National Research Initiatives
|
||
Margaret Chambers, Electronic Networking Association
|
||
Steve Cisler, Apple Computer, Inc.
|
||
Whit Diffie, Northern Telecom
|
||
Mary Eisenhart, *MicroTimes*
|
||
Dave Farber, University of Pennsylvania
|
||
Cliff Figallo, The WELL
|
||
John Gilmore, Cygnus Support
|
||
Adele Goldberg, ParcPlace Systems
|
||
Terry Gross, Rabinowitz, Boudin, Standard, et al
|
||
Keith Henson, consultant & Alcor
|
||
Lance Hoffman, George Washington University
|
||
Dave Hughes, Chariot Communications
|
||
Bob Jacobson, Human Interface Technology Laboratory
|
||
Mitch Kapor, Electronic Frontier Foundation
|
||
Roger Karraker, Santa Rosa College
|
||
Tom Mandel, SRI International
|
||
John McMullen, NewsBytes
|
||
Peter Neumann, SRI International
|
||
Dave Redell, Digital Equipment Corporation
|
||
Ken Rosenblattt, Santa Clara County District Attorney's Office
|
||
Paul Saffo, Institute for the Future
|
||
Gail Thackeray, Arizona Attorney GeneralUs Office
|
||
Jay Thorwaldson, Palo Alto Medical Foundation
|
||
Terry Winograd, CPSR & Stanford University
|
||
Sheldon Zenner, Katten, Muchin, & Zavis
|
||
|
||
Affiliations listed only for identification
|
||
|
||
============================
|
||
= Request for Invitation =
|
||
============================
|
||
First Conference on Computers, Freedom & Privacy
|
||
March 25-28, 1991
|
||
Monday: Tutorials, Tuesday-Thursday: Conference Sessions
|
||
SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010
|
||
For hotel reservations at Conference rates, call: (800)228-9290<39>
|
||
#3
|
||
|
||
** Invitational Conference, limted to 600 participants. ** To<54>
|
||
facilitate useful dialogue and balanced participation by<62>
|
||
representatives from all of the diverse groups interested in<69>
|
||
these issues, attendance is limited. (The capacity of the<68>
|
||
Conference facility is similarly limited).
|
||
|
||
All interested individuals are encouraged to request an<61>
|
||
invitation. Invitations will be primarily issued on a first-come,<2C>
|
||
first-served basis within each major interest group.
|
||
|
||
Fees if payment is received by: Jan.31 -Mar.15 after Mar.15
|
||
Tutorials (full day) $ 95 $ 145 $ 195
|
||
Conference (3 days) $ 295 $ 350 $ 400
|
||
|
||
Conference Registration fee includes three luncheons, two banquet<65>
|
||
meetings and selected handouts. Please make checks payable to<74>
|
||
"Computers, Freedom & Privacy/CPSR". Please don't send cash. <20>
|
||
Invitations will be promptly issued, or the uncashed check will<6C>
|
||
be voided and promptly returned.
|
||
|
||
Please type or print. Thank ye, kindly.
|
||
name:
|
||
title:
|
||
organization:
|
||
mailing address:
|
||
city, state ZIP:
|
||
phone(s):
|
||
fax:
|
||
e-mail:
|
||
|
||
Comments to assist in evaluating this request:
|
||
|
||
|
||
|
||
To aid in balancing participation among groups,
|
||
please check all significantly applicable items.
|
||
[ ] user of computers or computer networking
|
||
[ ] user of electronic-mail services
|
||
[ ] user of teleconferencing services
|
||
[ ] user of direct marketing services
|
||
[ ] user of computerized personal information
|
||
[ ] user of government information
|
||
[ ] computer professional
|
||
[ ] BBS sysop (bulletin board system operator)
|
||
[ ] systems administrator / infosystems manager
|
||
[ ] network administrator
|
||
[ ] computer / communications security specialist
|
||
[ ] provider of data communications services
|
||
[ ] provider of electronic-mail services
|
||
[ ] provider of teleconferencing services
|
||
[ ] provider of direct marketing services
|
||
[ ] provider of computerized personal information
|
||
[ ] provider of government information
|
||
[ ] legislative official [ ] federal [ ] state
|
||
[ ] regulatory official or staff [ ] federal [ ] state
|
||
[ ] law enforcement offi [ ] federal [ ] state [ ] local
|
||
[ ] prosecutor [ ] federal [ ] state [ ] local
|
||
[ ] judicial representat [ ] federal [ ] state [ ] local
|
||
[ ] criminal defense attorney
|
||
[ ] corporate or litigation attorney
|
||
[ ] civil liberties specialist
|
||
[ ] journalist [ ] newspaper [ ] television [ ] radio [ ] other
|
||
[ ] other:
|
||
[ ] other:
|
||
<<1/7/91>>
|
||
|
||
Please mail form and payment to:
|
||
CFP Conference, 345 Swett Road, Woodside CA 94062
|
||
|
||
Privacy Notice: This information will not be sold, rented,<2C>
|
||
loaned, exchanged or used for any purpose other than official<61>
|
||
CPSR activity. CPSR may elect to send information about other<65>
|
||
activities, but such mailings will always originate with CPSR.
|
||
|
||
Sponsor: Computer Professionals for Social Responsibility,<2C>
|
||
(415)322-3778 A nonprofit, educational corporation [ Internal<61>
|
||
Revenue Code 501(c)(3) ]
|
||
e-mail: cfp@well.sf.ca.us; fax: (415)851-2814
|
||
Chair: Jim Warren, (415)851-7075
|
||
|
||
Please copy, post & circulate!
|