home *** CD-ROM | disk | FTP | other *** search
/ The Hacker Chronicles - A…the Computer Underground / The Hacker Chronicles - A Tour of the Computer Underground (P-80 Systems).iso / cud2 / cud213d.txt < prev    next >
Text File  |  1992-09-26  |  5KB  |  119 lines

  1. ------------------------------
  2.  
  3. From: Jim Warren (jwarren@well.sf.ca.us)
  4. Subject: First Conference on Computers, Freedom & Privacy
  5. Date: Undated
  6.  
  7. ********************************************************************
  8. ***  CuD #2.13: File 4 of 5: Computers Freedom and Privacy Conf. ***
  9. ********************************************************************
  10.  
  11. {One good consequence of Operation Sun Devil has been the increased
  12. awareness of the need to address issues of ethics, computer rights, and
  13. computer abuse. The following conference is an attempt to bring a variety
  14. of individuals and groups together to exchange information and
  15. opinions--moderators}.
  16.  
  17. FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY
  18. ------------------------------------------------
  19. March 25-28, 1991, Monday-Thursday
  20. SFO Marriott Hotel, reservations: 800-228-9290
  21. San Francisco Airport, 1800 Old Bayshore Hwy, Burlingame CA 94010
  22.  
  23. COOPERATING ORGANIZATIONS
  24. -------------------------
  25. Electronic Networking Association
  26. Videotex Industry Association
  27. Electronic Frontier Foundation
  28. The WELL, Portal Communications
  29. [as of 11/23/90, more expected shortly]
  30. Sponsor: Computer Professionals for Social Responsibility
  31.  
  32. PLANNED CONFERENCE SESSIONS
  33. ---------------------------
  34. 1.  The Constitution in the Information Age [opening session]
  35. coordinator: Jim Warren;  Chair: Jim Warren
  36.   Introductory remarks; then, major policy proposal regarding electronic
  37. communications and Constitutional rights.
  38. speaker:  Professor Lawrence Tribe, Harvard Law School
  39.  
  40. 2.  Trends in Computers & Networks
  41. coordinator: Peter Denning;  Chair: Peter Denning
  42.   Overview and prognosis of computing capabilities and networking as they
  43. impact personal privacy, confidentiality, security, one-to-one & many-to-one
  44. communication, and access to information about government, business & society.
  45.  
  46. 3.  Public-Sector Information About Individuals
  47. coordinators: Les Earnest, Bruce Koball;  Chair:
  48.   Collection, verification, use, sharing and protection of, and access to and
  49. responsibility for personal information, by government agencies, such as
  50. census, voter, tax,  license, permit and criminal records.
  51.  
  52. 4.  Private-Sector Information About Individuals
  53. coordinators: Les Earnest, Bruce Koball;  Chair:
  54.   Collection, marketing, verification, use and protection of, and access to
  55. and responsibility for personal information, by private organizations, such as
  56. banking, credit, health, consumer, employment, family & lifestyle information.
  57.  
  58. 5.  International Perspectives & Impacts
  59. coordinator: Mark Graham;  Chair:
  60.   Other nations' models for protecting personal information and communication,
  61. and granting access to government information; existing and developing laws;
  62. requirements on trans-national dataflow, personal expression & accountability.
  63.  
  64. 6.  Law Enforcement Practices and Problems
  65. coordinators: Dorothy Denning, Glenn Tenney;  Chair:
  66.   Issues relating to investigation, prosecution, due process and deterrence
  67. of computer crimes, now and in the future; using computers to aid law
  68. enforcement.
  69.  
  70. 7.  Law Enforcement and Civil Liberties
  71. coordinators: Dorothy Denning, Glenn Tenney;  Chair:
  72.   Interaction of computer crime, law enforcement, and civil liberties; issues
  73. of search and seizure, sanctions, and shared or networked equipment, software
  74. and information.
  75.  
  76. 8.  Legislation & Regulation
  77. coordinators: Marc Rotenberg, Elliot Fabric;  Chair:
  78.   Legislative and regulatory roles in protecting privacy and insuring access;
  79. legal problems posed by computing and computer networks; approaches to
  80. improving related government decision-making.
  81.  
  82. 9.  Computer-Based Surveillance of Individuals
  83. coordinators: Les Earnest, Bruce Koball;  Chair:
  84.   Monitoring electronic-mail, public & private teleconferences, electronic
  85. bulletin boards, publications and subscribers; tracking individuals' location,
  86. work performance, buying habits & lifestyles; pattern recognition & profiling
  87.  
  88. 10. Ethics and Education
  89. coordinators: Dorothy Denning, Glenn Tenney;  Chair:
  90.   Ethical principles for individuals, system administrators, organizations,
  91. corporations, and government; copying data, copying software, distributing
  92. confidential information; relations to computer education and computer law.
  93.  
  94. 11. Electronic Speech, Press and Assembly
  95. coordinators: Marc Rotenberg, Elliot Fabric;  Chair:
  96.   Freedoms and responsibilities regarding electronic speech, public and
  97. private electronic assembly, electronic publishing, prior restraint and
  98. chilling effects of monitoring.
  99.  
  100. 12. Access to Government Information
  101. coordinator: Mark Graham;  Chair:
  102.   Implementing individual and corporate access to federal, state & local
  103. information about communities, corporations, legislation, administration, the
  104. courts and public figures; allowing access while protecting confidentiality.
  105.  
  106. 13. Where Do We Go From Here? [closing session]
  107. coordinator: Jim Warren;  Chair: Jim Warren
  108.   Perspectives and recommendations of participating groups, proposed next
  109. steps to protect person privacy, protect fundamental freedoms and encourage
  110. responsible policies and action.
  111.  
  112.  
  113. ********************************************************************
  114.                            >> END OF THIS FILE <<
  115. ***************************************************************************
  116.  
  117.  
  118. Downloaded From P-80 International Information Systems 304-744-2253 12yrs+
  119.