home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Nov 8, 1995 Volume 7 : Issue 88
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #7.88 (Wed, Nov 8, 1995)
-
- File 1--CORRECTION in CuD SUB/UNSUB Policy (address change)
- File 2--Computer Security Day
- File 3--Call for Papers (fwd)
- File 4--ART Technology to be included in Frontier's browser
- File 5--Riddler is looking for home pages...
- File 6--Re: Web Site Ratings (fwd)
- File 7--Last Chance to register for "Computers & the Law II"
- File 8--The Computer Law Report (Nov 6, 1995: #13)
- File 9--Cu Digest Header Info (unchanged since 5 Nov, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 8 Nov 1995 21:32:45 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 1--CORRECTION in CuD SUB/UNSUB Policy (address change)
-
- In a previous message we printed the wrong address for subs
- and unsubs to CuD. Here is the corrected version:
-
- ++++++++++++++
-
- CHANGES IN CuD SUBSCRIPTION POLICY:
-
- Sadly, the size of the CuD mailing list has become to large to
- manage manually. Therefore, after November 5, we WILL NO LONGER
- ACCEPT MANUAL SUBS.
- So, please DO NOT SEND sub requests to the moderators. Instead:
-
- To SUBSCRIBE to CuD, send this message:
-
- sub cudigest firstname lastname
-
- (where "firstname" and "lastname" is YOUR first and last name)
-
- Send this message to: listserv@vmd.cso.uiuc.edu
-
- We strongly encourage readers to obtain CuD from USENET as
- comp.society.cu-digest. Or, obtain it from any of the CuD web or ftp
- sites (the CuD homepage is:
- http://www.soci.niu.edu/~cudigest
-
- To UNSUB from CuD, send this message: unsub cudigest
- to: listserv@vmd.cso.uiuc.edu
-
- The UIUC listserv will change addresses in January, '96, so
- we will notify readers when the change occurs.
-
- We apologize for any inconvenience this causes, but we're simply
- unable to keep up with the demands.
-
- Jim and Gordon
-
- ------------------------------
-
- From: rxm8@PO.CWRU.EDU(Ron Moritz)
- Subject: File 2--Computer Security Day
- Date: 30 Oct 1995 18:24:30 GMT
-
- ++++++++++++++++++++++++++++++++++++++++++++++++
- Security, Electronic Commerce, and the Internet:
- Impact on Industry
-
- CWRU & ISSA North Coast Chapter
- International Computer Security Day Symposium
- Thursday, November 30, 1995
- ++++++++++++++++++++++++++++++++++++++++++++++++
-
-
- Companies can no longer overlook the role that electronic
- commerce will play in their business. Those with systems on the
- Internet must think about how to protect what they put up.
-
- On Thursday, November 30, 1995, Case Western Reserve University
- and the North Coast Chapter of the Information Systems Security
- Association will be observing International Computer Security Day
- with a unique symposium designed to help you understand the
- electronic marketplace.
-
- Whether your goals include enhancing customer service, increasing
- marketing effectiveness, or promoting products and services, you
- will want to join us as we explore the Internet as an emerging
- force on industry.
-
- "If you think that technology will suddenly make the world more
- secure, you're wrong." (Tim Berners-Lee, Director, W3 Consortium)
-
-
- ++++++++++++++++++++++++++++++++++++++++++++++++
- Security, Electronic Commerce, and the Internet:
- Impact on Industry
-
- CWRU & ISSA North Coast Chapter
- International Computer Security Day Symposium
- Thursday, November 30, 1995
- ++++++++++++++++++++++++++++++++++++++++++++++++
-
-
- This symposium will bring together industry leaders and technology
- revolutionaries who will share their vision of the maturation of
- the Internet as a tool for commerce; and it will teach you how to
- participate in this revolution in a rational, professional, and
- secure way. Our speakers include:
-
- Dr. Vijay Ahuja, Product Manager, Network Security Products
- IBM (Research Triangle Park, NC)
- Dr. Frederick B. Cohen, Ph.D., President
- Management Analytics (Hudson, OH)
- Mr. John Gage, Director, Science Office
- Sun Microsystems Computer Corp. (Mountain View, CA)
- Dr. Erik Grimmelmann, Marketing Vice President, Gateway Services
- AT&T
- Mr. Leo A. McCloskey, networkMCI Consulting Group
- MCI Telecommunications Corporation (Pittsburgh, PA)
- Mr. Daniel E. White, Partner, IS Security Effectiveness Series
- Ernst & Young LLP (Chicago, IL)
-
- Objective: Today's Internet is a business tool that lets
- information cross geographical and functional
- boundaries. Everyone is talking about it, you've
- read about it in the newspapers, and you've watched
- it on television news programs. You want to
- establish a business presence on the Internet, you
- want to take advantage of this capability, and you
- want to use the Internet for electronic commerce;
- but you're concerned about your exposure. After
- all, everyone from The New York Times to The Los
- Angeles Times has told you that flaws in network
- technologies threaten the security of commercial
- transactions over the global Internet. What do you
- do?
-
- Who: This symposium is designed for corporate
- strategists, policy makers, marketing executives,
- and information technology professionals (including
- technology planners, communications and network
- managers, information security managers, and
- technology auditors). Others interested in the
- worldwide adoption of the Internet for commercial
- use are also invited to attend.
-
- When: Thursday, November 30, 1995, 8:00 a.m. - 5:00 p.m.
-
- Where: Thwing Center, Case Western Reserve University,
- 11111 Euclid Avenue, Cleveland, Ohio.
-
- Lunch: Grand Foyer, Severance Hall, 11001 Euclid Avenue,
- Cleveland, Ohio.
-
- Lunch Panel: Network Security: Do You Know Who's Breaking in
- Right Now?
-
- Polls, newspaper articles, and professionals have
- all suggested that the primary concern of Internet
- users world wide is the potential for unauthorized
- access to their potential or proprietary
- information. This issue threatens to slow or limit
- the worldwide adoption of the Internet for
- commercial use. The lack of security touches all
- of those who are concerned about copyright,
- individual privacy, and personal freedom. What
- progress has been made? Is this a solvable
- problem? Do Internet users have to sacrifice their
- open, freewheeling culture in order to provide
- necessary security for the Net? Does this
- commercialization work in the current architecture
- of the Internet? Do we have a choice? These are
- the questions our moderator will pose to our
- distinguished group of industry and technology
- leaders, each of whom has a large stake in the
- outcome of this debate. This should be a fiery
- discussion!
-
- Information: Ron Moritz, CWRU/ISSA CSD Symposium Chair,
- rxm8@po.cwru.edu or 216.368.6643.
-
-
- ++++++++++++++++++++++++++++++++++++++++++++++++
- Security, Electronic Commerce, and the Internet:
- Impact on Industry
-
- CWRU & ISSA North Coast Chapter
- International Computer Security Day Symposium Registration Form
- Thursday, November 30, 1995
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
-
- Name: ______________________________________________________
-
- Title: ______________________________________________________
-
- Company: ______________________________________________________
-
- Address: ______________________________________________________
-
- City/State/Zip: ________________________________________________
-
- e-mail address: ________________________________________________
-
- Business Phone: _____________________ Fax: _____________________
-
- ======================================
- THERE WILL BE NO WALK-IN REGISTRATION!
- =======================================
- REGISTRATION DEADLINE: NOVEMBER 27, 1995
- =========================================
-
- Pre-register before November 15, 1995, and receive a
- 1995 ACM Computer Security Day Poster
-
- Seminar Fees (check all boxes that apply):
-
- __ Seminar fee (includes facility costs, lunch, breaks,
- and parking). . . . . . . . . . . . . . . . . . . . . . . . . $95.00
- __ Less CWRU faculty/staff, ISSA member discount . . . . . . . ($10.00)
-
- Amount Enclosed: $____________
-
- ==========================================================
- [Make Checks Payable to: Case Western Reserve University]
- ==========================================================
-
- Lunch selection (check only one box):
-
- __ Chicken breast stuffed with apple hazelnut dressing on
- a Chardonnay cream sauce
- __ Vegetable lasagna with wild mushrooms and Italian
- cheeses layered with roasted garlic marinara
- __ Cold marinated shrimp, scallop and New Zealand mussel
- salad with artichokes and mushrooms
-
- MAIL REGISTRATION & PAYMENT TO:
-
- Dean E. Fear, CPA
- Office of Internal Audits
- c/o Case Western Reserve University
- 10900 Euclid Avenue, Baker 120
- Cleveland, OH 44106-7007
-
- For additional information:
-
- Ron Moritz
- CWRU/ISSA CSD Symposium Chair
- by telephone: (216) 368-6643
- by facsimile: (216) 368-5466
- by e-mail: rxm8@po.cwru.edu
-
-
- ++++++++++++++++++++++++++++++++++++++++++++++++
- Security, Electronic Commerce, and the Internet:
- Impact on Industry
-
- CWRU & ISSA North Coast Chapter
- International Computer Security Day Symposium Agenda
- Thursday, November 30, 1995
- ++++++++++++++++++++++++++++++++++++++++++++++++++++
-
-
- 8:00 - 8:30 Registration & Continental Breakfast (Thwing
- Student Center, Ballroom)
- 8:30 - 8:35 Opening Welcome - Mr. Ron Moritz, CWRU/ISSA CSD
- Symposium Chair
- 8:35 - 8:45 CWRU Welcome
- 8:45 - 9:00 Dr. Raymond K. Neff, Vice President for
- Information Services, CWRU
- 9:00 - 9:45 Mr. John Gage, Director, Science Office, Sun
- Microsystems Computer Corporation
- 9:45 - 10:30 Mr. Daniel E. White, Partner, Ernst & Young LLP
- 10:30 - 11:00 Stretch Break / Vendor Room Open
- 11:00 - 12:00 Dr. Frederick B. Cohen, Ph.D., President,
- Management Analytics
- 12:00 - 2:00 Lunch (Sammy's Catering, Grand Foyer, Severance
- Hall)
- 1:00 - 1:45 Lunch Panel Discussion Moderated by Mr. John Gage
- (Grand Foyer, Severance Hall)
- 2:00 - 2:45 Dr. Vijay Ahuja, Product Manager, Network Security
- Products, IBM
- 2:45 - 3:30 Dr. Erik Grimmelmann, Marketing Vice President,
- AT&T Gateway Services
- 3:30 - 3:45 Stretch Break / Vendor Room Open
- 3:45 - 4:30 Mr. Leo A. McCloskey, networkMCI Consulting Group,
- MCI Telecommunications
- 4:30 - 4:35 Closing Remarks - Mr. Ron Moritz, CWRU/ISSA CSD
- Symposium Chair
- 4:35 - 5:00 Vendor Room Open
-
-
- ++++++++++++++++++++++++++++++++++++++++++++++++
- Security, Electronic Commerce, and the Internet:
- Impact on Industry
-
- CWRU & ISSA North Coast Chapter
- International Computer Security Day Symposium Speakers
- Thursday, November 30, 1995
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
-
- Dr. Vijay Ahuja, IBM
-
- Vijay Ahuja holds Master's and Doctoral degrees in Computer Science
- from the University of North Carolina. He has worked with IBM in
- various positions, related to data communications, networking and
- networking architecture. He is currently the Product Manager for
- Network Security Products in the Network Software Division of IBM.
- Dr. Ahuja has product responsibility as well as responsibilities
- relating to IBM direction for security related products. He has
- written several papers on networking, and has authored a text book
- on Data Network published by McGraw-Hill. Dr. Ahuja has spoken on
- network security, single signon, firewalls, NetSP and DCE and how
- they all fit together. He will talk about Internet security and
- secure commerce on the Internet. In addition, he will discuss
- security issues for the Internet and describe the technologies to
- address them.
-
-
- Dr. Frederick B. Cohen, Ph.D., Management Analytics
-
- Frederick B. Cohen is world renowned for his ground breaking work
- on information systems and networks. He has authored over 50
- scientific articles and several widely read books, and in 1989, he
- won the prestigious international Information Technology Award for
- his work. As a nationally recognized authority on information
- infrastructure, he regularly provides consulting services for top
- management. His clients include many Fortune 500 companies,
- government agencies, universities, and other organizations. He has
- participated in studies ranging from designing the next generation
- of cable television and telephone systems, to securing global
- financial institutions as they attach to the National Information
- Infrastructure. Dr. Cohen will discuss the why and how of
- organizational information protection by describing dependencies on
- information and information systems, exploring modern risks
- associated with these dependencies, discussing causes of
- protection-related failures and motivation behind malicious attacks
- on information technology, and suggesting ways organizations can
- meet the challenges.
-
-
- Mr. John Gage, Sun Microsystems Computer Corporation
-
- John Gage works for Bill Joy, the Chief Technical Officer of Sun,
- and is responsible for Sun's relationships with the world
- scientific and public policy communities, international scientific
- institutions and groups developing new forms of scientific research
- involving computing. He is on the scientific and advisory panels
- of the United States National Science Foundation, the US Congress
- Office of Technology Assessment, the European Institute of
- Technology and the United States National Academy of Sciences. He
- has recently been appointed to the US National Research Council
- Mathematical Sciences Education Board. He attended the Harvard
- Business School and the Harvard Graduate School of Public Policy.
- He did doctoral work in economics and mathematics at the University
- of Berkeley at the same time as Bill Joy. Gage subsequently left
- Berkeley with Joy to start Sun in 1982.
-
-
- Dr. Erik K. Grimmelmann, AT&T Gateway Services
-
- Erik K. Grimmelmann is Marketing Vice President, Gateway Services
- with the AT&T Communications Services Group. He has product
- management and marketing responsibilities both for the AT&T NetWare
- Connect Service and for directory and security services for AT&T's
- Internet and On-Line Services. He was one of the architects and
- early implementors of the strategy of using the AT&T network as an
- applications hosting environment. As part of that effort, he
- helped craft the agreements with Lotus and Novell that led to the
- AT&T Network Notes and AT&T NetWare Connect Services offerings.
- Dr. Grimmelmann joined AT&T Bell Laboratories in 1978 as a
- post-doctoral research fellow in the Environmental Chemistry
- Research Department in Murray Hill. In 1979 he left the Research
- Area for systems engineering where his first assignment was
- performing economic analyses of the impacts of the then potential
- divestiture of AT&T. Over the next nine years in Bell Labs, he had
- such diverse positions as Supervisor of the Nuclear Weapons Effects
- Group and Head of the Air Traffic Control Systems Department. In
- 1989 he joined AT&T Computer Systems where he was product manager
- of the AT&T Rhapsody System, the first groupware offering that
- included workflow automation. While at AT&T Computer Systems he
- also had responsibility for AT&T's LAN and PC-based messaging
- software. When AT&T and NCR merged in 1991, he joined AT&T
- Business Communications Services, focusing on the Internet and on
- developing and implementing initiatives related to creating a "new"
- National Information Infrastructure (NII). He also participated in
- joint government/industry efforts to develop a national industrial
- policy for information infrastructure. Dr. Grimmelmann's Internet
- related activities include serving as Principal Investigator for
- AT&T's Cooperative Agreement with the National Science Foundation
- to provide InterNIC Directory and Database Services for users of
- the Internet from the research and education communities. Dr.
- Grimmelmann holds a Ph.D. and M.S. from The University of Michigan
- and a B.A. from Haverford College.
-
-
- Mr. Leo A. McCloskey, MCI Telecommunications Corporation
-
- Leo A. McCloskey is an Internet and electronic commerce expert for
- the networkMCI Consulting Group of MCI Telecommunications
- Corporation. His areas of specialization concern process and
- information management as they relate to electronic media, mainly
- the Internet. He has a background in International Studies as well
- as publishing and data systems. His time is mainly occupied with
- customer presentations and application design for networkMCI
- customers.
-
-
- Mr. Daniel E. White, Ernst & Young LLP
-
- Daniel (Dan) E. White is an Ernst & Young Partner in Chicago and
- National Director of the Information Security Effectiveness Series
- of services. His focus of expertise is in the areas of information
- security and overall system controls from both a business
- application and data center perspective. Dan also focuses on
- business continuity planning from both the overall corporate as
- well as the computing and communications perspectives. He is a
- frequent speaker on these subjects at both national and
- international meetings and has an MBA and BBA from Loyola
- University in Chicago. Dan will be discussing the Third Annual
- Ernst & Young / InformationWeek Information Security Survey.
- --
- Ron Moritz, CISA, CISSP / Associate Director for Information Technology
- Office of Internal Audits & Management Advisory Services
- Case Western Reserve University / Cleveland, Ohio 44106-7007
- e-mail: 'rxm8@po.CWRU.Edu' / (216) 368-6643 / Fax: (216) 368-5466
-
- ------------------------------
-
- Date: Fri, 03 Nov 1995 21:23:11 -0500
- From: Peter Grimes <p34d3611@jhu.edu>
- Subject: File 3--Call for Papers (fwd)
-
- --- fwd ---
-
- Date--Fri, 3 Nov 1995 09:23:47 -0500
- From--Carl H.A. Dassbach <dassbach@mtu.edu>
-
-
- Theme: The Internet and Social Change
- Where: 91st Annual Meeting of the American Sociological Association
- New York City, August 16-20, 1996.
-
- Papers are being solicited for a session or sessions on the theme "The
- Internet and Social Change." The theme is loosely defined in order to
- accommodate all types of concerns and perspectives on the Internet and its
- social impact.
-
- Papers will be reprinted in a special issue of the Electronic Journal of
- Sociology and possibly an edited volume.
-
- Send abstracts, proposals or completed papers to Carl H.A. Dassbach at the
- address below.
- -----------------------------------------------------------------
- Carl H.A. Dassbach E-mail: DASSBACH@MTU.EDU
- Dept. of Social Sciences Phone: (906)487-2115
- Michigan Technological University Fax: (906)487-2468
- Houghton, MI 49931 USA
-
- ------------------------------
-
- Date: Mon, 30 Oct 1995 17:51:48 cst
- Subject: File 4--ART Technology to be included in Frontier's browser
-
- Hello!
-
- Frontier Technologies will be releasing this information on Business
- Wire first thing Monday morning, Oct.30. However, both Ann and I
- wanted you to have heads-up on this information. We will be
- demonstrating this new technology at Internetworld in Boston, Oct. 30 -
- Nov. 1 (booth # 564). If you are interested, and you would like an
- interview, feel free to contact either one of us to arrange a time.
-
- Best regards,
- Ann M. Krauss
- Marketing Communications Manager
- 520-797-0583
- Ann@Frontiertech.com
-
-
- Nicole E. Rogers
- Public Relations Specialist
- 414-241-4555 ext.293
- NicoleR@Frontiertech.com
-
-
-
- News - For Immediate Release
- Contacts:
- Ann M. Krauss
- Nicole E. Rogers
-
- Johnson-Grace Contacts:
- Cherie Ciotti-Roco
- CCiotti-Roco@jgc.com
- Geoff LeBlond
- LeBlond@jgc.com
- 714-759-0700
-
- Frontier Technologies Leads The Pack In Supporting New Internet Graphic
- & Sound Compression Technology
- Johnson-Grace's High speed publishing technology to be integrated into
- Frontier's Internet Browser
-
- MEQUON, WI -- October 30, 1995 -- Frontier Technologies Corporation, an
- industry leader in Internet technology, and Johnson-Grace Company
- announced that Frontier Technologies' award-winning Internet browser
- now supports Johnson-Grace's ART 2.0 (TM) file compression technology.
-
- ART technology compresses graphic images and sound into one file,
- allowing users to rapidly download files over even slow Internet
- connections, and simultaneously display graphics and play back sound as
- the file downloads. Users of Frontier's ART-enabled Internet browser
- will be able to download sound and graphic files three times faster
- than with ordinary browsers and will be able to simultaneously hear
- broadcast-quality sound. For example, a 24KB .BMP file and a 335KB
- .WAV file can compress into a 14KB .ART file.
-
- A beta version of Frontier's new ART-enabled Internet browser is
- available for immediate download from http://www.frontiertech.com.
- Frontier has also set up an "ART Gallery" on its web site, including
- several ART files. The ART Gallery provides links to several other
- Internet sites containing ART files, including the electronic Gourmet
- Guide, iGOLF, and LAN Magazine. Web page designers wishing to embed
- ART files in their own HTML documents can download Johnson-Grace's ART
- Press (TM) authoring tool from both the Frontier and Johnson-Grace web
- sites.
-
- Internet users wishing to experience the new ART Technology may access
- several World Wide Web sites after downloading Frontier's new Internet
- browser. The electronic Gourmet Guide, Inc. ("the eGG")
- (http://www.2way.com/food/egg) iGOLF (http://wwwigolf.com), and LAN
- Magazine (http://www.lanmag.com)are among the first World Wide Web
- sites to provide ART images and sound.
-
- Frontier and Johnson-Grace will be presenting the new ART technology in
- special demonstration at Internet World on October 30 - November 1.
- The demonstrations will take place at Frontier's booth (# 564).
-
- If you would like more information, please feel free to call or email
- Ann or Nicole.
-
-
-
- ****************************************************
- Nicole Rogers
- Frontier Technologies Corporation
- 10201 N. Port Washington Road
- Mequon, WI 53092
- E-Mail: NicoleR@FrontierTech.Com
- ****************************************************
-
-
-
-
-
- ------------------------------
-
- Date: Tue, 31 Oct 1995 06:40:23 GMT
- From: davet@Riddler.COM
- Subject: File 5--Riddler is looking for home pages...
-
-
- On Friday 8/18/95, Interactive Imaginations launched a completely
- new version of Riddler. The game, now called Quibbler, is a free
- contest that gives people on the Web the opportunity to win cash
- prizes by solving a variety of riddles and puzzles. The game is
- accessible via www.riddler.com.
-
- We are looking for home pages to hide some of the clues that are
- needed to solve the riddles, and believe your page would be ideal.
- Your site will be seamlessly integrated into a specific game. For
- example, if we were to hide a clue on the Stephen King home page,
- contestants would get a hint leading them to that page. To facilitate
- the player's search, Infoseek and Yahoo will be incorporated locally
- on our site.
-
- Upon figuring out that the page in question was the Stephen King
- page, contestants would locate that page on the Web and find one of
- four clues needed to solve the main riddle.
-
- Since your participation is also free, the benefits of your
- participation are tremendous. Since a link to our game can be
- maintained for a duration, you will have the opportunity to promote
- the subject of your page to all participants of our game. In
- addition, you will have an opportunity to participate in the up and
- coming Riddler Network events such as the much-anticipated Riddler's
- Choice 10K race around the web. Remember, there is absolutely no cost
- to you or the players.
-
- If you are interested in participating in an upcoming game or have
- questions or want more information about the game, please respond to
- davet@riddler.com.
-
- In your response e-mail please include the following information for
- scheduling purposes:
-
- **********************************************************************
-
- URL of your Home Page to be used:
-
- Name of page:
-
- Contact Name:
-
- Company Name (if any):
-
- Work Phone #: (for scheduling /emergencies)
-
- Home Phone #: (for scheduling /emergencies)
-
- E-mail Address:
-
- Your State or Country: (so I know the time zone differences)
-
- What key words can one use to search for your site, along with the
- search engine to be used. For example: Riddler Network- yahoo,
- Interactive Games - Infoseek.
-
- When is the best time to reach you? (very important)
-
- Do you have other pages with direct links through search engines?
- If so, please provide the URL's and keywords which would locate them
- directly via a search engine.
-
- **********************************************************************
-
- Again, if you have any questions or concerns, please feel free to
- contact me.
-
- Looking forward to your participation,
-
- David Tom
-
- Interactive Imaginations
- davet@riddler.com
- 212-598-9455
-
- ------------------------------
-
- Date: Sun, 5 Nov 1995 20:21:24 -0800
- From: Chris Kerchum <ckerchum@habit.com>
- Subject: File 6--Re: Web Site Ratings (fwd)
-
- Thought this article might interest you, since it seems to be an answer to
- having the cybergardians breathing down ones neck. Since it's not my
- article, you probably have to get permission to publish from the Internet
- Filtering Systems. Well worth the trouble though.
-
- > @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
- >
- > FOR IMMEDIATE RELEASE
- >
- > Contact: Ron Warris, President, Internet Filtering Systems, Inc.
- > phone: 1-403-258-5804, email: warrisr@colt.t8000.com
- > Web: www.tenagra.com/ifsi
- >
- > DEMOCRATIC WORLD-WIDE WEB SELF-REGULATION ANNOUNCED
- >
- > CALGARY, ALBERTA, CANADA -- October 30, 1995 -- Internet Filtering
- > Systems, Inc. (IFSI) today announced Net Shepherd, the first product
- > designed to democratically rate and filter World Wide Web sites and
- > selectively supervise access.
- >
- > Net Shepherd is the first PICS-compliant rating and filtering
- > solution. Under the auspices of The World Wide Web Consortium, PICS
- > (Platform for Internet Content Selection) is a cross-industry working
- > group whose goal is to facilitate the development of technologies to
- > give users control over the kinds of material to which they and their
- > children have access.
- >
- > According to Ron Warris, president of IFSI, "There are a number of
- > companies offering filtering solutions. What is really needed is a
- > rating solution. How do you go about reviewing and rating 8.5 million
- > volatile documents on the Internet? Our approach will allow the people
- > who surf the Internet to be the people who rate the Internet. With Net
- > Shepherd, parents, educators and other concerned organizations will be
- > able to voluntarily participate in the rating process.
- >
- > Mr. Warris continues, "Net Shepherd will also provide parents with the
- > ability to selectively filter documents viewed by their
- > children. Parents can choose from a variety of rating databases that
- > represent the accumulated ratings from others who hold similar views
- > and philosophies. Organizations that wish to create rating databases
- > for their subscribers will also be able to use Net Shepherd. You'll be
- > able to subscribe to the Good Housekeeping database or the Lutheran
- > Church database or the ACLU database. Take your pick.
- >
- > "The Internet has always been self-regulating and
- > special-interest-group oriented. Now the World Wide Web can be as
- > well."
- >
- > IFSI's mission is to become the preferred and premier provider of
- > Internet rating systems and services for individual consumers,
- > concerned groups and associations, as well as other filter software
- > developers. A World-Wide Web site currently contains basic information
- > about IFSI, and will evolve over the coming weeks into an extensive
- > resource for those interested in Internet content filtering. It is
- > located at URL http://www.tenagra.com/ifsi/.
-
- ------------------------------
-
- Date: Thu, 2 Nov 1995 15:00:32 -0500 (EST)
- From: John <john@SUG.ORG>
- Subject: File 7--Last Chance to register for "Computers & the Law II"
-
- THE REGISTRATION DEADLINE IS FAST APPROACHING! REGISTER TODAY!
-
-
- SUN USER GROUP
- Second Annual Technical Symposium
- "Computers & The Law"
- November 12-15, 1995
- Tampa, FL
-
-
-
- As computers are utilized in more and more aspects of everyday life,
- the once distinct areas of technology, legislature, and law
- enforcement draw closer together. This unique technical conference
- provides a forum in which members of these three fields can meet to
- share experiences and ideas. The four day technical program (a day of
- tutorials, two days of talks, and another day of tutorials) will
- provide you with essential knowledge, whether your field is technical,
- legal, or law enforcement.
-
- Copies of this information are available via email at
- conference@sug.org or on the World Wide Web at http://sug.org.
-
- If you have further questions, contact the Sun User Group at
- (617)232-0514.
-
- ------------------------------
-
- Date: Tue, 7 Nov 1995 14:31:10 -0500
- From: Galkin@AOL.COM
- Subject: File 8--The Computer Law Report (Nov 6, 1995: #13)
-
- *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
- THE COMPUTER LAW REPORT
- *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
- November 6, 1995 [#13]
-
- =====================================
- GENERAL INFO: The Computer Law Report is distributed (usually) weekly for
- free and is prepared by William S. Galkin, Esq. The Report is designed
- specifically for the non-lawyer. To subscribe, send e-mail to galkin@aol.com.
- All information contained in The Computer Law Report is for the benefit of
- the recipients, and should not be relied on or considered as legal advice.
- Copyright 1995 by William S. Galkin.
- =====================================
- ABOUT THE AUTHOR: Mr. Galkin is an attorney in private practice in Owings
- Mills, Maryland (which is a suburb of Baltimore), and he is also an adjunct
- professor of Computer Law at the University of Maryland School of Law. Mr.
- Galkin has concentrated his private practice in the Computer Law area since
- 1986. He represents small startup, midsized and large companies, across the
- U.S. and internationally, dealing with a wide range of legal issues
- associated with computers and technology, such as developing, marketing and
- protecting software, purchasing and selling complex computer systems, and
- launching and operating a variety of online business ventures. He also enjoys
- writing about computer law issues!
-
- ===> Mr. Galkin is available for consultation with individuals and companies,
-
- wherever located, and can be reached as follows: E-MAIL:
- galkin@aol.com/TELEPHONE: 410-356-8853/FAX: 410-356-8804/MAIL: 10451 Mill Run
- Circle, Suite 400, Owings Mills, Maryland 21117
-
- ^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
- Articles in The Report are available to be published as columns in both print
- and electronic publications. Please contact Mr. Galkin for the terms of such
- usage.
- ^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
-
- *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
- JUMPING THE GUN ON SYSOP LIABILITY
- *+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
-
- [This is the third of a series of articles discussing recommendations made in
- the report issued September 5, 1995 by President Clinton's Information
- Infrastructure Task Force. The report is entitled "Intellectual Property and
- the National Information Infrastructure (NII)," and is commonly referred to
- as the White Paper.]
-
- The White Paper makes various recommendations for legislative changes which
- it hopes will grease the onramps to the Information Highway. Besides these
- overt recommendations, the White Paper also expends considerable effort to
- analyze the current state of the law.
-
- This analysis of the current state of the law, though presented as objective,
- often represents the Administration's desired interpretation of legal issues
- that are as yet unsettled in the courts. In presenting this analysis, the
- Administration hopes that its interpretations will be adopted by the courts,
- and affect the outcomes of some cases currently pending.
-
- One area where the White Paper's analysis rises to the level of
- "recommendation" relates to whether a sysop or online provider should be held
- liable for unknowingly facilitating the distribution of materials that
- infringe someone's copyright. This infringment occurs when users of the
- system upload and download material without permission from the copyright
- holder.
-
- Where such infringement is occurring, the online operator, theoretically,
- could be found liable for direct infringement, vicarious infringement, or
- contributory infringement. Or, the online operator could also be found not
- liable at all.
-
- Direct infringement is where the defendant directly causes the infringement
- to occur. The court in Playboy Enterprises Inc. v. Frena found the BBS
- operator to be directly liable for the display and distribution of Playboy
- photographs, which were uploaded and downloaded by subscribers, without the
- knowledge of the operator. If direct infringement is found, then there is
- strict liability. That means that there will be liability even where the
- "infringer-operator" had no knowledge that the infringement was occurring.
-
- Vicarious infringement would occur where someone has the "right and ability"
- to supervise the infringing action of another, even though the supervisor has
- no knowledge of the infringement. Accordingly, an operator could be found to
- be vicariously liable if a court determines that it has the right and ability
- to supervise the activities of the users.
-
- Contributory infringement may be found when one who, with knowledge of the
- infringing activity, contributes to the infringing conduct of another. An
- online operator could be found to be a contributory infringer based on the
- provision of online services and equipment facilitating the direct
- infringement of the users.
-
- Although the Playboy case found the operator to be directly liable for the
- infringement, the type of liability, or whether there would even be
- liability, is currently an unsettled and unclear issue. However, the White
- Paper gives the impression that this issue is settled and that operators will
- be directly infringing when subscribers upload and download copyrighted
- material without their knowledge. The White Paper states affirmatively that
- "[a]ltering the standards of liability for infringement [for online
- operators] would be a significant departure from current copyright principles
- and law and would result in a substantial derogation of the right of
- copyright owners."
-
- Taking the position that operators will be held to be direct infringers, the
- White Paper dismisses the following arguments in favor holding operators to a
- different standard than others: (1) the volume of material on a service
- provider's system is too large to monitor or screen; (2) even if a service
- provider is willing and able to monitor the material on its system, it cannot
- always identify infringing material; (3) failure to shield online service
- providers will impair communication and availability of information; (4)
- exposure to liability for infringement will drive service providers out of
- business, causing the NII to fail; and (5) the law should impose liability
- only on those who assume responsibility for the activities their subscribers
- engage in on their system, and not on operators who allow the system to
- operate without content supervision.
-
- The position that the White Paper promotes, that operators should be strictly
- liable as direct infringers for the uploading and downloading of copyrighted
- material, as mentioned, is currently unsettled. By assuming this position,
- the Administration has been viewed as seeking to influence the following
- currently pending cases to adopt this position. In one (Sega Enterprises
- Ltd. v. MAPHIA), the court issued a preliminary injunction against a BBS for
- allowing and facilitating the unauthorized uploading of Sega's copyrighted
- video games. In a second case (Frank Music Corp. v. CompuServe), CompuServe
- is being sued for allegedly allowing the unauthorized uploading and
- downloading of musical recordings. In third case (Religious Technology Center
- v. NETCOM), the Church of Scientology is suing a BBS operator and an Internet
- access provide for allowing the unauthorized uploading of copyrighted
- materials.
-
- In situations where an operator is truly innocent regarding infringement
- resulting from the uploading and downloading of copyrighted material, law
- makers have to determine who should bear the responsibility for and loss of
- this infringement: the copyright holders, the online operators or the users
- committing the infringement. The position that the White Paper promotes
- sides with the copyright holder in the sense that it places the burden on
- those other than the copyright holder to expend time and effort to protect
- the copyright holder's interests.
-
- ------------------------------
-
- Date: Sun, 5 Nov 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 9--Cu Digest Header Info (unchanged since 5 Nov, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.88
- ************************************
-
-