Date:       Sat, 09 Jan 93 16:58:33 EST
Errors-To:  Comp-privacy Error Handler <comp-privacy-request@PICA.ARMY.MIL>
From:       Computer Privacy Digest Moderator  <comp-privacy@PICA.ARMY.MIL>
To:         Comp-privacy@PICA.ARMY.MIL
Subject:    Computer Privacy Digest V2#004

Computer Privacy Digest Sat, 09 Jan 93              Volume 2 : Issue: 004

Today's Topics:				Moderator: Dennis G. Rears

                       CFP'93 Electronic Brochure

   The Computer Privacy Digest is a forum for discussion on the
  effect of technology on privacy.  The digest is moderated and
  gatewayed into the USENET newsgroup comp.society.privacy
  (Moderated).  Submissions should be sent to
  comp-privacy@pica.army.mil and administrative requests to
  comp-privacy-request@pica.army.mil.
   Back issues are available via anonymous ftp on ftp.pica.army.mil
  [129.139.160.133].
----------------------------------------------------------------------

Date: Tue, 5 Jan 1993 18:53:05 -0800
From: Bruce R Koball <bkoball@well.sf.ca.us>
Subject: CFP'93 Electronic Brochure

  The Third Conference on Computers, Freedom and Privacy -- CFP'93
9-12 March 1993, San Francisco Airport Marriott Hotel, Burlingame, CA

Sponsored by: Association for Computing Machinery, 
              Special Interest Groups on:
              Communications (SIGCOMM)
              Computers and Society (SIGCAS)
              Security, Audit and Control (SIGSAC)

Co-Sponsors and Cooperating Organizations:

      American Civil Liberties Union
      American Library Association
      Asociacion de Technicos de Informatica
      Commission for Liberties and Informatics
      Computer Professionals for Social Responsibility
      Electronic Frontier Foundation
      Freedom to Read Foundation
      IEEE Computer Society
      IEEE-USA Committee on Communications and Information Policy
      Internet Society
      Library and Information Technology Association
      Privacy International
      USD Center for Public Interest Law
      U.S. Privacy Council
      The WELL (Whole Earth 'Lectronic Link)

Patrons and Supporters (as of 24 December 1992):

      American Express Corp.
      Apple Computer, Inc.
      Dun & Bradstreet Corp.
      Equifax, Inc.
      Information Resource Service Company
      Mead Data Central, Inc.
      National Science Foundation (pending)
      RSA Data Security, Inc.


CFP'93 Electronic Brochure 1.3


SCOPE:

The advance of computer and telecommunications technologies holds great 
promise for individuals and society. From convenience for consumers and 
efficiency in commerce to improved public health and safety and 
increased participation in democratic institutions, these technologies 
can fundamentally transform our lives.

At the same time these technologies pose threats to the ideals of a free 
and open society. Personal privacy is increasingly at risk from invasion 
by high-tech surveillance and eavesdropping. The myriad databases 
containing personal information maintained in the public and private 
sectors expose private life to constant scrutiny.

Technological advances also enable new forms of illegal activity, posing 
new problems for legal and law enforcement officials and challenging the 
very definitions of crime and civil liberties. But technologies used to 
combat these crimes can pose new threats to freedom and privacy.

Even such fundamental notions as speech, assembly and property are being 
transformed by these technologies, throwing into question the basic 
Constitutional protections that have guarded them. Similarly, 
information knows no borders; as the scope of economies becomes global 
and as networked communities transcend international boundaries, ways 
must be found to reconcile competing political, social and economic 
interests in the digital domain.

The Third Conference on Computers, Freedom and Privacy will assemble 
experts, advocates and interested people from a broad spectrum of 
disciplines and backgrounds in a balanced public forum to address the 
impact of computer and telecommunications technologies on freedom and 
privacy in society. Participants will include people from the fields of 
computer science, law, business, research, information, library science, 
health, public policy, government, law enforcement, public advocacy and 
many others.


General Chair
 -------------
Bruce R. Koball
CFP'93
2210 Sixth Street
Berkeley, CA 94710
510-845-1350 (voice)
510-845-3946 (fax)
bkoball@well.sf.ca.us

Steering Committee
 ------------------
John Baker                          Mitch Ratcliffe
Equifax                             MacWeek Magazine

Mary J. Culnan                      Peter G. Neumann
Georgetown University               SRI International

Dorothy Denning                     David D. Redell
Georgetown University               DEC Systems Research Center

Les Earnest                         Marc Rotenberg
GeoGroup, Inc.                      Computer Professionals
                                    for Social Responsibility
Mike Godwin
Electronic Frontier Foundation      C. James Schmidt
                                    San Jose State University
Janlori Goldman
American Civil Liberties Union      Barbara Simons
                                    IBM
Mark Graham
Pandora Systems                     Lee Tien
                                    Attorney
Lance J. Hoffman
George Washington University        George Trubow
                                    John Marshall Law School
Donald G. Ingraham
Office of the District Attorney     Willis Ware
Alameda County, CA                  Rand Corp.

John McMullen                       Jim Warren
NewsBytes                           MicroTimes & Autodesk, Inc.

Simona Nass
Student - Cardozo Law School

Affiliations are listed for identification only.


Pre-Conference Tutorials:
On Tuesday 9 March, the day before the formal conference begins, CFP'93
is offering a number of in-depth tutorials on a wide variety of subjects
on four parallel tracks. These presentations will range from interesting
and informative to thought-provoking and controversial. The tutorials
are available at a nominal additional registration cost.

Conference Reception:
Following the Tutorials on Tuesday evening, you are invited to meet new 
and old friends and colleagues at an opening reception. 

Single Track Main Program:
The technological revolution that is driving change in our society has
many facets and we are often unaware of the way they all fit together,
especially the parts that lie outside of our own expertise and interest.
The primary goal of CFP'93 is to bring together individuals from
disparate disciplines and backgrounds, and engage them in a balanced
discussion of all CFP issues. To this end our main program, starting on
Wednesday 10 March, is on a single track enabling our attendees to take
part in all sessions.

Registration is Limited:
CFP'93 registration will be limited to 550 attendees, so we advise you 
to register as early as possible and take advantage of the early 
registration discounts.

Luncheons and Banquets:
A key component of the CFP conferences has been the interaction between
the diverse communities that constitute our attendees. To promote this
interaction CFP'93 is providing three luncheons and evening two banquets
with the cost of conference registration.

EFF Pioneer Awards
All conference attendees are invited to the Awards Reception sponsored 
by the Electronic Frontier Foundation (EFF) on Wednesday evening, 10 
March. These, the second annual EFF Pioneer Awards, will be given to 
individuals and organizations that have made distinguished contributions 
to the human and technological realms touched by computer-based 
communications.

Birds of a Feather Sessions:
CFP'93 will provide a limited number of meeting rooms to interested 
individuals for special Birds of a Feather sessions after the formal 
program each evening. These sessions will provide an opportunity for 
special interest discussions that were not included in the formal 
program and will be listed in the conference materials. For further 
information contact CFP'93 BoF Chair:

      C. James Schmidt
      University Librarian
      San Jose State University
      One Washington Square
      San Jose, CA 95192-0028
      voice        408-924-2700
      voice mail   408-924-2966
      e-mail       schmidtc@sjsuvm1.sjsu.edu


CFP'93 Featured Speakers:

Nicholas Johnson 

Nicholas Johnson was appointed head of the Federal Communications 
Commission by President Johnson in 1966, serving a seven year term. In 
his role as commissioner, he quickly became an outspoken consumer 
advocate, attacking network abuses and insisting that those who use the 
frequencies under the FCC license are the public's trustees. He has been 
a visiting professor of law at the College of Law at the University of 
Iowa since 1981 and is currently co-director of the Institute for 
Health, Behavior and Environmental Policy at the University of Ohio.

Willis H. Ware
 
Willis H. Ware has devoted his career to all aspects of computer 
science--hardware, software, architectures, software development, public 
policy and legislation. He chaired the "HEW committee" whose report was 
the foundation for the Federal Privacy Act of 1974. President Ford 
appointed him to the Privacy Protection Study Commission whose report 
remains the most extensive examination of private sector record-keeping 
practices.  Dr. Ware is a member of the National Academy of Engineering, 
a Fellow of the Institute of Electronic and Electrical Engineers, and a 
Fellow of the American Association for Advancement of Science.

John Perry Barlow 

John Perry Barlow is a retired Wyoming cattle rancher, a lyricist for 
the Grateful Dead, and a co-founder of the Electronic Frontier 
Foundation. He graduated from Wesleyan University with an honors degree 
in comparative religion. He writes and lectures on subjects relating to 
digital technology and society, and is a contributing editor of numerous 
publications, including Communications of the ACM, NeXTworld, 
MicroTimes, and Mondo 2000.

Cliff Stoll

Cliff Stoll is best known for tracking a computer intruder across the 
international networks in 1987; he told this story in his book, "The 
Cuckoo's Egg" and on a Nova television production. He is less known for 
having a PhD in planetary science, piecing quilts, making plum jam, and 
squeezing lumps of bituminous coal into diamonds.


CFP'93 Tutorials:

Tuesday 9 March - Morning Tutorials

Information Use in the Private Sector
Jack Reed, Information Resource Service Company
Diane Terry, TransUnion Corp.    Dan Jones, D.Y. Jones & Assoc.

This tutorial will deal with the use of personal information from the
point of view of some private sector information vendors and users. It
will include a discussion of the Fair Credit Reporting Act and the
"Permissible Purposes" for obtaining a consumer credit report.
Information used for purposes outside the FCRA will be discussed in
relationship to privacy and societal needs for businesses and
individuals.

Access to Government Information:
James Love, Director, Taxpayer Assets Project

The tutorial will examine a wide range of problems concerning citizen 
access to government information, including how to ask for and receive 
information under the federal Freedom of Information Act, what types of 
information government agencies store on computers, what the barriers 
are to citizen access to these information resources, and how citizens 
can change government information policy to expand access to taxpayer-
funded information resources.

Exploring the Internet -- a guided journey
Mark Graham, Pandora Systems	Tim Pozar, Late Night Software

This tutorial will give participants a practical introduction to the 
most popular and powerful applications available via the world's largest 
computer network, the Internet.  There will be hands-on demonstrations 
of communications tools such as e-mail, conferencing, Internet Relay 
Chat, and resource discovery and navigation aids such as Gopher, WAIS, 
Archie and World Wide Web. Extensive documentation will be provided.

Constitutional Law for Non-lawyers (1/2 session):
Mike Godwin, Staff Counsel, Electronic Frontier Foundation

This tutorial is designed to inform non-lawyers about the Constitutional 
issues that underlie computer-crime and computer civil-liberties cases.  
The tutorial focuses on the First and Fourth Amendments, but includes a 
discussion of the Fifth Amendment and its possible connection to the 
compelled disclosure of cryptographic keys. It also includes a 
discussion of the appropriateness of "original intent" as a method for 
applying the Constitution in the modern era.

Civil Liberties Implications of Computer Searches & Seizures (1/2 ses.):
Mike Godwin, Staff Counsel, Electronic Frontier Foundation

This tutorial assumes only a very basic knowledge of Constitutional law 
(the prior tutorial provides an adequate background), and outlines how 
searches and seizures of computers may raise issues of First and Fourth 
Amendment rights, as well as of federal statutory protections. It 
includes a discussion of what proper search-and-seizure techniques in 
such cases may be. 


Tuesday 9 March - Afternoon Tutorials

Practical Data Inferencing: What we THINK we know about you.
Russell L. Brand, Senior Computer Scientist, Reasoning Systems

What do your transaction trails reveal about you?  Are you a good risk 
to insure?  Are you worth kidnapping, auditing or suing?  Which products 
should I target at you?  Are you a member of one of those groups that I 
would want to harass or discriminate against? This tutorial will be a 
hands-on approach to digging for data and to piecing it back together.  
Time will be divided between malicious personal invasions and sweeping 
searches that seek only profit, followed by a brief discussion about 
improper inferences and their practical impact on innocent files and 
lives. Legal and moral issues will not be addressed.

Telecommunications Fraud
Donald P. Delaney, Senior Investigator, New York State Police

Illegal call sell operations in New York City are estimated to be a 
billion dollar industry. This tutorial will provide an overview of the 
problem, from finger hacking to pay phone enterprises, and will include 
an up-to-date assessment of the computer cracker/hacker/phone phreak 
impact on telephone company customer losses. Also discussed will be 
unlawful access of telephone company switches; unlawful wiretapping and 
monitoring; cards, codes and 950 numbers; New York State law and police 
enforcement; methods of investigation and case studies.

Private Sector Marketplace and Workplace Privacy 
Ernest A. Kallman, Bentley College, H. Jeff Smith, Georgetown University

This tutorial will give participants a general overview of privacy 
issues affecting uses of personal information (e.g., medical 
information, financial information, purchase histories) in the 
marketplace as well as privacy concerns in the workplace (e.g., privacy 
of electronic and voice mail, work monitoring).  The tutorial will also 
set the boundaries for privacy arguments in the middle and latter 1990s.

SysLaw
Lance Rose, Attorney and Author "SysLaw"

The SysLaw tutorial session will explore in depth the freedom and
privacy issues encountered by computer bulletin boards (BBS), their
system operators and their users.  BBSs are estimated to number over
45,000 today (not counting corporate systems), and range from small,
spare-time hobby systems to systems with thousands of users, grossing
millions of dollars.  BBSs are a grassroots movement with an entry cost
of $1,000 or less, and the primary vehicles for new forms of electronic
communities and services. Subjects covered will include: First Amendment
protection for the BBS as publisher/distributor; data freedom and
property rights on the BBS; how far can sysops control BBS user
activities?; and user privacy on BBSs today.

Note: Tutorial presenters will offer expert opinions and information.
Some may advocate particular viewpoints and thus may put their own
"spin" on the issues. Caveat Listener. 


CFP'93 Main Program Sessions: 

Wednesday 10 March

Electronic Democracy
Chair - Jim Warren, MicroTimes and Autodesk, Inc.

The effects of computer and telecommunications technologies on 
democratic processes and institutions are increasing dramatically. This 
session will explore their impacts on political organizing, campaigning, 
access to representatives and agencies, and access to government 
information that is essential for a free press and an informed 
electorate.

Electronic Voting -- Threats to Democracy
Chair - Rebecca Mercuri, University of Pennsylvania

This panel session will invite representatives covering a broad spectrum 
of involvement with the controversial subject of electronic vote 
tallying to address such issues as: Is a secure and reliable electronic 
voting system feasible? What threats to these systems are identifiable? 
Should electronic voting systems be open for thorough examination? Can 
auditability be assured in an anonymous ballot setting? Can voting by 
phone be practical and confidential? Did Congress exempt voting machines 
from the Computer Security Act?

Censorship and Free Speech on the Networks
Chair - Barbara Simons, IBM

As online forums become increasingly pervasive, the notion of "community 
standards" becomes harder to pin down. Networks and BBSs will link--or 
create--diverse, non-geographic communities with differing standards, 
laws, customs and mores. What may be frank discussion in one forum may 
be obscenity or defamation or sexual harassment in another. This session 
will explore the questions of what kinds of freedom-of-speech problems 
face us on the Net and what kinds of legal and social solutions we need.

Portrait of the Artist on the Net
Chair - Anna Couey, Arts Wire

Computer forums and networks make possible both new artforms and new 
ways of remote collaboration and exhibition. The growth of the Net 
creates opportunities for the blossoming of dynamic and interactive 
artforms and of artistic cultures -- provided that networks become 
widely accessible and remain open to artistic expression without 
political interference. This session will examine the potentials and the 
problems of art and artists on the Net.



Thursday 11 March

Digital Telephony and Crypto Policy
Chair - John Podesta, Podesta and Associates

The increasingly digital nature of telecommunications potentially 
threatens the ability of law enforcement agencies to intercept them when 
legally authorized to do so. In addition, the potential widespread use 
of cryptography may render the ability to intercept a communication 
moot. This session will examine these issues and the proposals that 
have been put before Congress by law enforcement agencies to address 
these perceived problems.

Health Records and Confidentiality
Chair - Janlori Goldman, American Civil Liberties Union

As the new Administration and Congress consider proposals to reform the 
United States health care system, it is imperative that confidentiality 
and security safeguards be put in place to protect personal information. 
Currently, no comprehensive legislation exists on the confidentiality of 
health information. This session will explore the current and potential 
uses of health care information, and proposals to safeguard the 
information.

The Many Faces of Privacy
Chair  - Willis Ware, Rand Corp.

Privacy at any cost is foolish, unwise and an untenable position, and 
privacy at zero cost is a myth. This two-part session will explore the 
balancing act between the two extremes and the costs and benefits that 
accrue. The first part will present several examples of systems and 
applications in the public and private sectors that stake out a position 
in this continuum.   The second part will be a panel discussion 
exploring the issues raised by the examples previously presented.

The Digital Individual
Chair - Max Nelson-Kilger, San Jose State University

We are all represented by personal records in countless databases. As 
these records are accumulated, disseminated and coalesced, each of us is 
shadowed by an ever larger and more detailed data alter-ego, which 
increasingly stands in for us in many situations without our permission 
or even awareness. How does this happen? How does it affect us? How will 
it develop in the future? What can we do? This session will investigate 
these questions.


Friday 12 March

Gender Issues in Computing and Telecommunications
Chair - Judi Clark, Bay Area Women in Telecommunications

Online environments are largely determined by the viewpoints of their
users and programmers, still predominantly white men. This panel will
discuss issues of freedom and privacy that tend to affect women -- such
as access, identity, harassment, pornography and online behavior -- and
provide recommendations for gender equity policies to bulletin board
operators and system administrators.

The Hand That Wields the Gavel
Chair - Don Ingraham, Asst. District Attorney, Alameda County, CA

An inevitable result of the settlement of Cyberspace is the adaptation
of the law to its particular effects. In this session  a panel of
criminal lawyers addresses the fallout from a hypothetical computer
virus on the legal responsibilities of system managers and operators.
The format will be a simulated court hearing. Attendees will act as
advisory jurors in questioning and in rendering a verdict.

The Power, Politics, and Promise of Internetworking
Chair- Jerry Berman, Electronic Frontier Foundation

This session will explore the development of internetworking 
infrastructures, domestically and worldwide. How will this 
infrastructure and its applications be used by the general public?  What 
will the global network look like to the average user from Kansas to 
Kiev?  How will politics, technology and legislation influence the 
access to, and cost of, the Net?  How can the potential of this powerful 
medium be fully realized?

International Data Flow
Chair - George Trubow, John Marshall Law School

The trans-border flow of information on international computer networks 
has been a concern for governments and the private sector. In addition 
to concerns for privacy and data security, the economic and national 
security implications of this free flow of information among scientists, 
engineers and researchers around the world are also cause for concern. 
This session will assemble a number of speakers to compare the various 
perspectives on the problem 



Some of the Speakers in the CFP'93 Main Program: 

Philip E. Agre, Dept. of Communication, Univ. of California, San Diego
Jonathan P. Allen, Dept. of Information & Computer Science, 
      University of California, Irvine
Sheri Alpert, Policy Analyst, author: "Medical Records, Privacy, and 
      Health Care Reform"
William A. Bayse, Assistant Director, Federal Bureau of Investigation
William Behnk, Coordinator, Legislative Information System, State of 
      California
Paul Bernstein, Attorney
Kate Bloch, Hastings College of the Law
Anita Borg, DEC Network Systems Lab
Richard Civille, Computer Professionals for Social Responsibility
Roger Clarke, Reader in Information Systems, Department of Commerce, 
      Australian National University
Dorothy Denning, Chair, Computer Science Department, Georgetown 
      University
Janet Dixon, Stanford Linear Accelerator Center
Robert Edgar, Simon and Schuster Technology Group
Kathleen Frawley, American Health Information Management Association
Emmanuel Gardner, District Manager, Government Affairs, AT&T 
Mike Godwin, Staff Counsel, Electronic Frontier Foundation
Joe Green, University of Minnesota
Sarah Grey, Computer Department, We The People, Brown presidential 
      campaign organization (invited)
Will Hill, Bellcore
Carl Kadie, Co-editor, Computers and Academic Freedom News newsletter
Mitch Kapor, Chairman, Electronic Frontier Foundation
David Lewis, Deputy Registrar, Department of Motor Vehicles, 
      Commonwealth of Massachusetts
James Love, Director, Taxpayers Assets Project
Judy Malloy, Associate Editor, Leonardo Electronic News
Irwin Mann, Mathematician, New York University
David McCown, Attorney
Rob Mechaley, Vice President, Technology Development, McCaw Cellular 
      Communications, Inc.
Robert Naegele, Granite Creek Technology Inc., Voting Machine Examiner, 
      consultant to NY State
Barbara Peterson, Staff Attorney, Joint Committee on Information 
      Technology Resources, Florida Legislature
Jack Reed, Chairman, Information Resource Service Company
Virginia E. Rezmierski, Assistant for Policy Studies to the Vice 
      Provost for Information Technology, University of Michigan
Jack Rickard, Editor, Boardwatch Magazine
Randy Ross, American Indian Telecommunications
Roy Saltman, National Institute of Standards and Technology
Robert Ellis Smith, Publisher, Privacy Journal
David Sobel, Computer Professionals for Social Responsibility
Ross Stapleton, Research Analyst, Central Intelligence Agency
Jacob Sullum, Associate Editor, Reason Magazine
Greg Tucker, Coordinator, David Syme Faculty of Business, 
      Monash University, Australia
Joan Turek-Brezina, Chair, Health and Human Services Task Force on 
      Privacy of Private-Sector Health Records


Registration:
Register for the conference by returning the Conference Registration
Form along with the appropriate payment. The registration fee includes
conference materials, three luncheons (Wednesday, Thursday and Friday),
two banquet dinners (Wednesday and Thursday) and evening receptions
(Tuesday, Wednesday and Thursday). Payment must accompany registration.

Registration Fees are: 
      If mailed by:       7 February        8 March         on site 
      Conference Fees:      $300             $355             $405
      Tutorial Fees:        $135             $165             $195
      Conference & Tutorial $435             $520             $600

Registration is limited to 550 participants, so register early and save!

By Mail:                               By Fax:
(with Check or Credit Card)            (with Credit Card only)
CFP'93 Registration                    Send Registration Form
2210 Sixth Street                      (510) 845-3946
Berkeley, CA 94710                     Available 24 hours

By Phone:                              By E-Mail:
(with Credit Card only)                (with Credit Card only)
(510) 845-1350                         cfp93@well.sf.a.us
10 am to 5 pm Pacific Time

CFP'93 Scholarships:
The Third Conference on Computers, Freedom and Privacy (CFP'93) will 
provide a limited number of full registration scholarships for students 
and other interested individuals. These scholarships will cover the full
costs of registration, including three luncheons, two banquets, and all
conference materials. Scholarship recipients will be responsible for
their own lodging and travel expenses. Persons wishing to apply for one
of these fully-paid registrations should contact CFP'93 Scholarship
Chair, John McMullen at:  mcmullen@mindvox.phantom.com

Hotel Accommodations:
The Third Conference on Computers, Freedom and Privacy will be held at 
the San Francisco Airport Marriott Hotel in Burlingame, CA. This 
facility is spacious and comfortable, and is easily accessible from the 
airport and surrounding cities. Because of the intensive nature of the 
conference, we encourage our attendees to secure their lodging at the 
conference facility. Special conference rates of $99/night, single or 
multiple occupancy, are available. Our room block is limited and these 
conference rates are guaranteed only until 9 February 1993, so we urge 
you to make your reservations as early as possible. When calling for 
reservations, please be sure to identify the conference to obtain the 
conference rate. Hotel Reservations: (415) 692-9100 or (800) 228-9290. 

Refund Policy:
Refund requests received in writing by February 19, 1993 will be 
honored. A $50 cancellation fee will be applied. No refunds will be made 
after this date; however, you may send a substitute in your place.

Registration Form

Name (Please print):__________________________________________________

Title:________________________________________________________________

Affiliation:__________________________________________________________

Mailing Address:______________________________________________________

City, State, Zip:_____________________________________________________

Country:______________________________________________________________

Telephone:_____________________________Fax:___________________________

E-mail:_______________________________________________________________

Privacy Locks:
We will not sell, rent, loan, exchange or use this information for any 
purpose other than official Computers, Freedom and Privacy Conference 
activities. A printed roster containing this information will be
distributed to attendees. Please indicate if you wish any information
to be excluded from the roster:
      __Print only name, affiliation and phone number 
      __Print name only
      __Omit all information about me in the roster

Registration Fees  (please indicate your selections):
      If mailed by:       7 February         8 March         on site 
      Conference Fees:      $300__            $355__          $405__
      Tutorial Fees         $135__            $165__          $195__
      Conference & Tutorial $435__            $520__          $600__

If you have registered for the Tutorials, select one from each group:
9:00 AM - 12:00 Noon 
      __Information Use in Private Sector
      __Constitutional Law for Non-lawyers & Civil-liberties 
          Implications of Computer Searches and Seizures
      __Access to Government Information
      __Exploring the Internet

1:30 PM - 4:30 PM
      __Practical Data Inferencing: What we THINK we know about you.
      __Telecommunications Fraud
      __Private Sector Marketplace and Workplace Privacy 
      __SysLaw

Payments:        Total Amount____________

Please indicate method of payment:     __Check (payable to CPF'93)
(payment must accompany registration)  __VISA
                                       __MasterCard

Credit card #______________________________Expiration date____________

Name on card__________________________________________________________

Signature_____________________________________________________________


------------------------------


End of Computer Privacy Digest V2 #004
******************************