1993-01-01 - CFP’93 Electronic Brochure 1.2 (fwd)

Header Data

From: yanek@novavax.nova.edu (Yanek Martinson)
To: cypherpunks@toad.com
Message Hash: 0dc76c739f7106ee0198a4e025334614003d73c090f8bc7a8abe6e76052fa7c9
Message ID: <9301010001.AA16211@novavax.nova.edu>
Reply To: N/A
UTC Datetime: 1993-01-01 00:02:03 UTC
Raw Date: Thu, 31 Dec 92 16:02:03 PST

Raw message

From: yanek@novavax.nova.edu (Yanek Martinson)
Date: Thu, 31 Dec 92 16:02:03 PST
To: cypherpunks@toad.com
Subject: CFP'93 Electronic Brochure 1.2 (fwd)
Message-ID: <9301010001.AA16211@novavax.nova.edu>
MIME-Version: 1.0
Content-Type: text/plain


Forwarded message:

> From: Bruce R Koball <bkoball@well.sf.ca.us>
> 
>   The Third Conference on Computers, Freedom and Privacy -- CFP'93
> 9-12 March 1993, San Francisco Airport Marriott Hotel, Burlingame, CA
> 
> Sponsored by: Association for Computing Machinery, 
>               Special Interest Groups on:
>               Communications (SIGCOMM)
>               Computers and Society (SIGCAS)
>               Security, Audit and Control (SIGSAC)
> 
> Co-Sponsors and Cooperating Organizations:
> 
>       American Civil Liberties Union
>       American Library Association
>       Asociacion de Technicos de Informatica
>       Commission for Liberties and Informatics
>       Computer Professionals for Social Responsibility
>       Electronic Frontier Foundation
>       Freedom to Read Foundation
>       IEEE Computer Society
>       IEEE-USA Committee on Communications and Information Policy
>       Internet Society
>       Library and Information Technology Association
>       Privacy International
>       USD Center for Public Interest Law
>       U.S. Privacy Council
>       The WELL (Whole Earth 'Lectronic Link)
> 
> Patrons and Supporters (as of 24 December 1992):
> 
>       American Express Corp.
>       Apple Computer, Inc.
>       Dun & Bradstreet Corp.
>       Equifax, Inc.
>       Information Resource Service Company
>       Mead Data Central, Inc.
>       National Science Foundation (pending)
>       RSA Data Security, Inc.
> 
> 
> CFP'93 Electronic Brochure 1.2
> 

> 
> SCOPE:
> 
> The advance of computer and telecommunications technologies holds great 
> promise for individuals and society. From convenience for consumers and 
> efficiency in commerce to improved public health and safety and 
> increased participation in democratic institutions, these technologies 
> can fundamentally transform our lives.
> 
> At the same time these technologies pose threats to the ideals of a free 
> and open society. Personal privacy is increasingly at risk from invasion 
> by high-tech surveillance and eavesdropping. The myriad databases 
> containing personal information maintained in the public and private 
> sectors expose private life to constant scrutiny.
> 
> Technological advances also enable new forms of illegal activity, posing 
> new problems for legal and law enforcement officials and challenging the 
> very definitions of crime and civil liberties. But technologies used to 
> combat these crimes can pose new threats to freedom and privacy.
> 
> Even such fundamental notions as speech, assembly and property are being 
> transformed by these technologies, throwing into question the basic 
> Constitutional protections that have guarded them. Similarly, 
> information knows no borders; as the scope of economies becomes global 
> and as networked communities transcend international boundaries, ways 
> must be found to reconcile competing political, social and economic 
> interests in the digital domain.
> 
> The Third Conference on Computers, Freedom and Privacy will assemble 
> experts, advocates and interested people from a broad spectrum of 
> disciplines and backgrounds in a balanced public forum to address the 
> impact of computer and telecommunications technologies on freedom and 
> privacy in society. Participants will include people from the fields of 
> computer science, law, business, research, information, library science, 
> health, public policy, government, law enforcement, public advocacy and 
> many others.
> 

> 
> General Chair
> -------------
> Bruce R. Koball
> CFP'93
> 2210 Sixth Street
> Berkeley, CA 94710
> 510-845-1350 (voice)
> 510-845-3946 (fax)
> bkoball@well.sf.ca.us
> 
> Steering Committee
> ------------------
> John Baker                          Mitch Ratcliffe
> Equifax                             MacWeek Magazine
> 
> Mary J. Culnan                      Peter G. Neumann
> Georgetown University               SRI International
> 
> Dorothy Denning                     David D. Redell
> Georgetown University               DEC Systems Research Center
> 
> Les Earnest                         Marc Rotenberg
> GeoGroup, Inc.                      Computer Professionals
>                                     for Social Responsibility
> Mike Godwin
> Electronic Frontier Foundation      C. James Schmidt
>                                     San Jose State University
> Janlori Goldman
> American Civil Liberties Union      Barbara Simons
>                                     IBM
> Mark Graham
> Pandora Systems                     Lee Tien
>                                     Attorney
> Lance J. Hoffman
> George Washington University        George Trubow
>                                     John Marshall Law School
> Donald G. Ingraham
> Office of the District Attorney     Willis Ware
> Alameda County, CA                  Rand Corp.
> 
> John McMullen                       Jim Warren
> NewsBytes                           MicroTimes & Autodesk, Inc.
> 
> Simona Nass
> Student - Cardozo Law School
> 
> Affiliations are listed for identification only.
> 

> 
> Pre-Conference Tutorials:
> On Tuesday 9 March, the day before the formal conference begins, CFP'93
> is offering a number of in-depth tutorials on a wide variety of subjects
> on four parallel tracks. These presentations will range from interesting
> and informative to thought-provoking and controversial. The tutorials
> are available at a nominal additional registration cost.
> 
> Conference Reception:
> Following the Tutorials on Tuesday evening, you are invited to meet new 
> and old friends and colleagues at an opening reception. 
> 
> Single Track Main Program:
> The technological revolution that is driving change in our society has
> many facets and we are often unaware of the way they all fit together,
> especially the parts that lie outside of our own expertise and interest.
> The primary goal of CFP'93 is to bring together individuals from
> disparate disciplines and backgrounds, and engage them in a balanced
> discussion of all CFP issues. To this end our main program, starting on
> Wednesday 10 March, is on a single track enabling our attendees to take
> part in all sessions.
> 
> Registration is Limited:
> CFP'93 registration will be limited to 550 attendees, so we advise you 
> to register as early as possible and take advantage of the early 
> registration discounts.
> 
> Luncheons and Banquets:
> A key component of the CFP conferences has been the interaction between
> the diverse communities that constitute our attendees. To promote this
> interaction CFP'93 is providing three luncheons and evening two banquets
> with the cost of conference registration.
> 
> EFF Pioneer Awards
> All conference attendees are invited to the Awards Reception sponsored 
> by the Electronic Frontier Foundation (EFF) on Wednesday evening, 10 
> March. These, the second annual EFF Pioneer Awards, will be given to 
> individuals and organizations that have made distinguished contributions 
> to the human and technological realms touched by computer-based 
> communications.
> 
> Birds of a Feather Sessions:
> CFP'93 will provide a limited number of meeting rooms to interested 
> individuals for special Birds of a Feather sessions after the formal 
> program each evening. These sessions will provide an opportunity for 
> special interest discussions that were not included in the formal 
> program and will be listed in the conference materials. For further 
> information contact CFP'93 BoF Chair:
> 
>       C. James Schmidt
>       University Librarian
>       San Jose State University
>       One Washington Square
>       San Jose, CA 95192-0028
>       voice        408-924-2700
>       voice mail   408-924-2966
>       e-mail       schmidtc@sjsuvm1.sjsu.edu
> 

> 
> CFP'93 Featured Speakers:
> 
> Nicholas Johnson 
> 
> Nicholas Johnson was appointed head of the Federal Communications 
> Commission by President Johnson in 1966, serving a seven year term. In 
> his role as commissioner, he quickly became an outspoken consumer 
> advocate, attacking network abuses and insisting that those who use the 
> frequencies under the FCC license are the public's trustees. He has been 
> a visiting professor of law at the College of Law at the University of 
> Iowa since 1981 and is currently co-director of the Institute for 
> Health, Behavior and Environmental Policy at the University of Ohio.
> 
> Willis H. Ware
>  
> Willis H. Ware has devoted his career to all aspects of computer 
> science--hardware, software, architectures, software development, public 
> policy and legislation. He chaired the "HEW committee" whose report was 
> the foundation for the Federal Privacy Act of 1974. President Ford 
> appointed him to the Privacy Protection Study Commission whose report 
> remains the most extensive examination of private sector record-keeping 
> practices.  Dr. Ware is a member of the National Academy of Engineering, 
> a Fellow of the Institute of Electronic and Electrical Engineers, and a 
> Fellow of the American Association for Advancement of Science.
> 
> John Perry Barlow 
> 
> John Perry Barlow is a retired Wyoming cattle rancher, a lyricist for 
> the Grateful Dead, and a co-founder of the Electronic Frontier 
> Foundation. He graduated from Wesleyan University with an honors degree 
> in comparative religion. He writes and lectures on subjects relating to 
> digital technology and society, and is a contributing editor of numerous 
> publications, including Communications of the ACM, NeXTworld, 
> MicroTimes, and Mondo 2000.
> 
> Cliff Stoll
> 
> Cliff Stoll is best known for tracking a computer intruder across the 
> international networks in 1987; he told this story in his book, "The 
> Cuckoo's Egg" and on a Nova television production. He is less known for 
> having a PhD in planetary science, piecing quilts, making plum jam, and 
> squeezing lumps of bituminous coal into diamonds.
> 

> 
> CFP'93 Tutorials:
> 
> Tuesday 9 March - Morning Tutorials
> 
> Information Use in the Private Sector
> Jack Reed, Information Resource Service Company
> Diane Terry, TransUnion Corp.    Dan Jones, D.Y. Jones & Assoc.
> 
> This tutorial will deal with the use of personal information from the
> point of view of some private sector information vendors and users. It
> will include a discussion of the Fair Credit Reporting Act and the
> "Permissible Purposes" for obtaining a consumer credit report.
> Information used for purposes outside the FCRA will be discussed in
> relationship to privacy and societal needs for businesses and
> individuals.
> 
> Access to Government Information:
> James Love, Director, Taxpayer Assets Project
> 
> The tutorial will examine a wide range of problems concerning citizen 
> access to government information, including how to ask for and receive 
> information under the federal Freedom of Information Act, what types of 
> information government agencies store on computers, what the barriers 
> are to citizen access to these information resources, and how citizens 
> can change government information policy to expand access to taxpayer-
> funded information resources.
> 
> Exploring the Internet -- a guided journey
> Mark Graham, Pandora Systems	Tim Pozar, Late Night Software
> 
> This tutorial will give participants a practical introduction to the 
> most popular and powerful applications available via the world's largest 
> computer network, the Internet.  There will be hands-on demonstrations 
> of communications tools such as e-mail, conferencing, Internet Relay 
> Chat, and resource discovery and navigation aids such as Gopher, WAIS, 
> Archie and World Wide Web. Extensive documentation will be provided.
> 
> Constitutional Law for Non-lawyers (1/2 session):
> Mike Godwin, Staff Counsel, Electronic Frontier Foundation
> 
> This tutorial is designed to inform non-lawyers about the Constitutional 
> issues that underlie computer-crime and computer civil-liberties cases.  
> The tutorial focuses on the First and Fourth Amendments, but includes a 
> discussion of the Fifth Amendment and its possible connection to the 
> compelled disclosure of cryptographic keys. It also includes a 
> discussion of the appropriateness of "original intent" as a method for 
> applying the Constitution in the modern era.
> 
> Civil Liberties Implications of Computer Searches & Seizures (1/2 ses.):
> Mike Godwin, Staff Counsel, Electronic Frontier Foundation
> 
> This tutorial assumes only a very basic knowledge of Constitutional law 
> (the prior tutorial provides an adequate background), and outlines how 
> searches and seizures of computers may raise issues of First and Fourth 
> Amendment rights, as well as of federal statutory protections. It 
> includes a discussion of what proper search-and-seizure techniques in 
> such cases may be. 
> 

> 
> Tuesday 9 March - Afternoon Tutorials
> 
> Practical Data Inferencing: What we THINK we know about you.
> Russell L. Brand, Senior Computer Scientist, Reasoning Systems
> 
> What do your transaction trails reveal about you?  Are you a good risk 
> to insure?  Are you worth kidnapping, auditing or suing?  Which products 
> should I target at you?  Are you a member of one of those groups that I 
> would want to harass or discriminate against? This tutorial will be a 
> hands-on approach to digging for data and to piecing it back together.  
> Time will be divided between malicious personal invasions and sweeping 
> searches that seek only profit, followed by a brief discussion about 
> improper inferences and their practical impact on innocent files and 
> lives. Legal and moral issues will not be addressed.
> 
> Telecommunications Fraud
> Donald P. Delaney, Senior Investigator, New York State Police
> 
> Illegal call sell operations in New York City are estimated to be a 
> billion dollar industry. This tutorial will provide an overview of the 
> problem, from finger hacking to pay phone enterprises, and will include 
> an up-to-date assessment of the computer cracker/hacker/phone phreak 
> impact on telephone company customer losses. Also discussed will be 
> unlawful access of telephone company switches; unlawful wiretapping and 
> monitoring; cards, codes and 950 numbers; New York State law and police 
> enforcement; methods of investigation and case studies.
> 
> Private Sector Marketplace and Workplace Privacy 
> Ernest A. Kallman, Bentley College, H. Jeff Smith, Georgetown University
> 
> This tutorial will give participants a general overview of privacy 
> issues affecting uses of personal information (e.g., medical 
> information, financial information, purchase histories) in the 
> marketplace as well as privacy concerns in the workplace (e.g., privacy 
> of electronic and voice mail, work monitoring).  The tutorial will also 
> set the boundaries for privacy arguments in the middle and latter 1990s.
> 
> SysLaw
> Lance Rose, Attorney and Author "SysLaw"
> 
> The SysLaw tutorial session will explore in depth the freedom and
> privacy issues encountered by computer bulletin boards (BBS), their
> system operators and their users.  BBSs are estimated to number over
> 45,000 today (not counting corporate systems), and range from small,
> spare-time hobby systems to systems with thousands of users, grossing
> millions of dollars.  BBSs are a grassroots movement with an entry cost
> of $1,000 or less, and the primary vehicles for new forms of electronic
> communities and services. Subjects covered will include: First Amendment
> protection for the BBS as publisher/distributor; data freedom and
> property rights on the BBS; how far can sysops control BBS user
> activities?; and user privacy on BBSs today.
> 
> Note: Tutorial presenters will offer expert opinions and information.
> Some may advocate particular viewpoints and thus may put their own
> "spin" on the issues. Caveat Listener. 
> 

> 
> CFP'93 Main Program Sessions: 
> 
> Wednesday 10 March
> 
> Electronic Democracy
> Chair - Jim Warren, MicroTimes and Autodesk, Inc.
> 
> The effects of computer and telecommunications technologies on 
> democratic processes and institutions are increasing dramatically. This 
> session will explore their impacts on political organizing, campaigning, 
> access to representatives and agencies, and access to government 
> information that is essential for a free press and an informed 
> electorate.
> 
> Electronic Voting -- Threats to Democracy
> Chair - Rebecca Mercuri, University of Pennsylvania
> 
> This panel session will invite representatives covering a broad spectrum 
> of involvement with the controversial subject of electronic vote 
> tallying to address such issues as: Is a secure and reliable electronic 
> voting system feasible? What threats to these systems are identifiable? 
> Should electronic voting systems be open for thorough examination? Can 
> auditability be assured in an anonymous ballot setting? Can voting by 
> phone be practical and confidential? Did Congress exempt voting machines 
> from the Computer Security Act?
> 
> Censorship and Free Speech on the Networks
> Chair - Barbara Simons, IBM
> 
> As online forums become increasingly pervasive, the notion of "community 
> standards" becomes harder to pin down. Networks and BBSs will link--or 
> create--diverse, non-geographic communities with differing standards, 
> laws, customs and mores. What may be frank discussion in one forum may 
> be obscenity or defamation or sexual harassment in another. This session 
> will explore the questions of what kinds of freedom-of-speech problems 
> face us on the Net and what kinds of legal and social solutions we need.
> 
> Portrait of the Artist on the Net
> Chair - Anna Couey, Arts Wire
> 
> Computer forums and networks make possible both new artforms and new 
> ways of remote collaboration and exhibition. The growth of the Net 
> creates opportunities for the blossoming of dynamic and interactive 
> artforms and of artistic cultures -- provided that networks become 
> widely accessible and remain open to artistic expression without 
> political interference. This session will examine the potentials and the 
> problems of art and artists on the Net.
> 
> 

> 
> Thursday 11 March
> 
> Digital Telephony and Crypto Policy
> Chair - John Podesta, Podesta and Associates
> 
> The increasingly digital nature of telecommunications potentially 
> threatens the ability of law enforcement agencies to intercept them when 
> legally authorized to do so. In addition, the potential widespread use 
> of cryptography may render the ability to intercept a communication 
> moot. This session will examine these issues and the proposals that 
> have been put before Congress by law enforcement agencies to address 
> these perceived problems.
> 
> Health Records and Confidentiality
> Chair - Janlori Goldman, American Civil Liberties Union
> 
> As the new Administration and Congress consider proposals to reform the 
> United States health care system, it is imperative that confidentiality 
> and security safeguards be put in place to protect personal information. 
> Currently, no comprehensive legislation exists on the confidentiality of 
> health information. This session will explore the current and potential 
> uses of health care information, and proposals to safeguard the 
> information.
> 
> The Many Faces of Privacy
> Chair  - Willis Ware, Rand Corp.
> 
> Privacy at any cost is foolish, unwise and an untenable position, and 
> privacy at zero cost is a myth. This two-part session will explore the 
> balancing act between the two extremes and the costs and benefits that 
> accrue. The first part will present several examples of systems and 
> applications in the public and private sectors that stake out a position 
> in this continuum.   The second part will be a panel discussion 
> exploring the issues raised by the examples previously presented.
> 
> The Digital Individual
> Chair - Max Nelson-Kilger, San Jose State University
> 
> We are all represented by personal records in countless databases. As 
> these records are accumulated, disseminated and coalesced, each of us is 
> shadowed by an ever larger and more detailed data alter-ego, which 
> increasingly stands in for us in many situations without our permission 
> or even awareness. How does this happen? How does it affect us? How will 
> it develop in the future? What can we do? This session will investigate 
> these questions.
> 

> 
> Friday 12 March
> 
> Gender Issues in Computing and Telecommunications
> Chair - Judi Clark, Bay Area Women in Telecommunications
> 
> Online environments are largely determined by the viewpoints of their
> users and programmers, still predominantly white men. This panel will
> discuss issues of freedom and privacy that tend to affect women -- such
> as access, identity, harassment, pornography and online behavior -- and
> provide recommendations for gender equity policies to bulletin board
> operators and system administrators.
> 
> The Hand That Wields the Gavel
> Chair - Don Ingraham, Asst. District Attorney, Alameda County, CA
> 
> An inevitable result of the settlement of Cyberspace is the adaptation
> of the law to its particular effects. In this session  a panel of
> criminal lawyers addresses the fallout from a hypothetical computer
> virus on the legal responsibilities of system managers and operators.
> The format will be a simulated court hearing. Attendees will act as
> advisory jurors in questioning and in rendering a verdict.
> 
> The Power, Politics, and Promise of Internetworking
> Chair- Jerry Berman, Electronic Frontier Foundation
> 
> This session will explore the development of internetworking 
> infrastructures, domestically and worldwide. How will this 
> infrastructure and its applications be used by the general public?  What 
> will the global network look like to the average user from Kansas to 
> Kiev?  How will politics, technology and legislation influence the 
> access to, and cost of, the Net?  How can the potential of this powerful 
> medium be fully realized?
> 
> International Data Flow
> Chair - George Trubow, John Marshall Law School
> 
> The trans-border flow of information on international computer networks 
> has been a concern for governments and the private sector. In addition 
> to concerns for privacy and data security, the economic and national 
> security implications of this free flow of information among scientists, 
> engineers and researchers around the world are also cause for concern. 
> This session will assemble a number of speakers to compare the various 
> perspectives on the problem 
> 
> 

> 
> Some of the Speakers in the CFP'93 Main Program: 
> 
> Phillip E. Agre, Dept. of Communication, Univ. of California, San Diego
> Jonathan P. Allen, Dept. of Information & Computer Science, 
>       University of California, Irvine
> Sheri Alpert, Policy Analyst, author: "Medical Records, Privacy, and 
>       Health Care Reform"
> William A. Bayse, Assistant Director, Federal Bureau of Investigation
> William Behnk, Coordinator, Legislative Information System, State of 
>       California
> Paul Bernstein, Attorney
> Kate Bloch, Hastings College of the Law
> Anita Borg, DEC Network Systems Lab
> Richard Civille, Computer Professionals for Social Responsibility
> Roger Clarke, Reader in Information Systems, Department of Commerce, 
>       Australian National University
> Dorothy Denning, Chair, Computer Science Department, Georgetown 
>       University
> Janet Dixon, Stanford Linear Accelerator Center
> Robert Edgar, Simon and Schuster Technology Group
> Kathleen Frawley, American Health Information Management Association
> Emmanuel Gardner, District Manager, Government Affairs, AT&T 
> Mike Godwin, Staff Counsel, Electronic Frontier Foundation
> Joe Green, University of Minnesota
> Sarah Grey, Computer Department, We The People, Brown presidential 
>       campaign organization (invited)
> Will Hill, Bellcore
> Carl Kadie, Co-editor, Computers and Academic Freedom News newsletter
> Mitch Kapor, Chairman, Electronic Frontier Foundation
> David Lewis, Deputy Registrar, Department of Motor Vehicles, 
>       Commonwealth of Massachusetts
> James Love, Director, Taxpayers Assets Project
> Judy Malloy, Associate Editor, Leonardo Electronic News
> Irwin Mann, Mathematician, New York University
> David McCown, Attorney
> Rob Mechaley, Vice President, Technology Development, McCaw Cellular 
>       Communications, Inc.
> Robert Naegele, Granite Creek Technology Inc., Voting Machine Examiner, 
>       consultant to NY State
> Barbara Peterson, Staff Attorney, Joint Committee on Information 
>       Technology Resources, Florida Legislature
> Jack Reed, Chairman, Information Resource Service Company
> Virginia E. Rezmierski, Assistant for Policy Studies to the Vice 
>       Provost for Information Technology, University of Michigan
> Jack Rickard, Editor, Boardwatch Magazine
> Randy Ross, American Indian Telecommunications
> Roy Saltman, National Institute of Standards and Technology
> Robert Ellis Smith, Publisher, Privacy Journal
> David Sobel, Computer Professionals for Social Responsibility
> Ross Stapleton, Research Analyst, Central Intelligence Agency
> Jacob Sullum, Associate Editor, Reason Magazine
> Greg Tucker, Coordinator, David Syme Faculty of Business, 
>       Monash University, Australia
> Joan Turek-Brezina, Chair, Health and Human Services Task Force on 
>       Privacy of Private-Sector Health Records
> 

> 
> Registration:
> Register for the conference by returning the Conference Registration
> Form along with the appropriate payment. The registration fee includes
> conference materials, three luncheons (Wednesday, Thursday and Friday),
> two banquet dinners (Wednesday and Thursday) and evening receptions
> (Tuesday, Wednesday and Thursday). Payment must accompany registration.
> 
> Registration Fees are: 
>       If mailed by:       7 February        8 March         on site 
>       Conference Fees:      $300             $355             $405
>       Tutorial Fees:        $135             $165             $195
>       Conference & Tutorial $435             $520             $600
> 
> Registration is limited to 550 participants, so register early and save!
> 
> By Mail:                               By Fax:
> (with Check or Credit Card)            (with Credit Card only)
> CFP'93 Registration                    Send Registration Form
> 2210 Sixth Street                      (510) 845-3946
> Berkeley, CA 94710                     Available 24 hours
> 
> By Phone:                              By E-Mail:
> (with Credit Card only)                (with Credit Card only)
> (510) 845-1350                         cfp93@well.sf.a.us
> 10 am to 5 pm Pacific Time
> 
> CFP'93 Scholarships:
> The Third Conference on Computers, Freedom and Privacy (CFP'93) will 
> provide a limited number of full registration scholarships for students 
> and other interested individuals. These scholarships will cover the full
> costs of registration, including three luncheons, two banquets, and all
> conference materials. Scholarship recipients will be responsible for
> their own lodging and travel expenses. Persons wishing to apply for one
> of these fully-paid registrations should contact CFP'93 Scholarship
> Chair, John McMullen at:  mcmullen@mindvox.phantom.com
> 
> Hotel Accommodations:
> The Third Conference on Computers, Freedom and Privacy will be held at 
> the San Francisco Airport Marriott Hotel in Burlingame, CA. This 
> facility is spacious and comfortable, and is easily accessible from the 
> airport and surrounding cities. Because of the intensive nature of the 
> conference, we encourage our attendees to secure their lodging at the 
> conference facility. Special conference rates of $99/night, single or 
> multiple occupancy, are available. Our room block is limited and these 
> conference rates are guaranteed only until 9 February 1993, so we urge 
> you to make your reservations as early as possible. When calling for 
> reservations, please be sure to identify the conference to obtain the 
> conference rate. Hotel Reservations: (415) 692-9100 or (800) 228-9290. 
> 
> Refund Policy:
> Refund requests received in writing by February 19, 1993 will be 
> honored. A $50 cancellation fee will be applied. No refunds will be made 
> after this date; however, you may send a substitute in your place.
> 

> Registration Form
> 
> Name (Please print):__________________________________________________
> 
> Title:________________________________________________________________
> 
> Affiliation:__________________________________________________________
> 
> Mailing Address:______________________________________________________
> 
> City, State, Zip:_____________________________________________________
> 
> Country:______________________________________________________________
> 
> Telephone:_____________________________Fax:___________________________
> 
> E-mail:_______________________________________________________________
> 
> Privacy Locks:
> We will not sell, rent, loan, exchange or use this information for any 
> purpose other than official Computers, Freedom and Privacy Conference 
> activities. A printed roster will be distributed to attendees. Please 
> indicate the information you wish to be excluded from the roster:
>       __Print only name, affiliation and phone number
>       __Print name only
>       __Omit all information about me in the roster
> 
> Registration Fees  (please indicate your selections):
>       If mailed by:       7 February         8 March         on site 
>       Conference Fees:      $300__            $355__          $405__
>       Tutorial Fees         $135__            $165__          $195__
>       Conference & Tutorial $435__            $520__          $600__
> 
> If you have registered for the Tutorials, select one from each group:
> 9:00 AM - 12:00 Noon 
>       __Information Use in Private Sector
>       __Constitutional Law for Non-lawyers & Civil-liberties 
>           Implications of Computer Searches and Seizures
>       __Access to Government Information
>       __Exploring the Internet
> 
> 1:30 PM - 4:30 PM
>       __Practical Data Inferencing: What we THINK we know about you.
>       __Telecommunications Fraud
>       __Private Sector Marketplace and Workplace Privacy 
>       __SysLaw
> 
> Payments:        Total Amount____________
> 
> Please indicate method of payment:     __Check (payable to CPF'93)
> (payment must accompany registration)  __VISA
>                                        __MasterCard
> 
> Credit card #______________________________Expiration date____________
> 
> Name on card__________________________________________________________
> 
> Signature_____________________________________________________________
> 

> 


--
Yanek Martinson    mthvax.cs.miami.edu!safe0!yanek     uunet!medexam!yanek
this address preferred -->> yanek@novavax.nova.edu <<-- this address preferred
Phone (305) 765-6300 daytime   FAX: (305) 765-6708  1321 N 65 Way/Hollywood
      (305) 963-1931 evenings       (305) 981-9812  Florida, 33024-5819





Thread