Personal tools

brochure.html

CFP'92 - Brochure/Program

First Announcement of

THE SECOND CONFERENCE ON COMPUTERS, FREEDOM, AND PRIVACY

L'Enfant Plaza Hotel, Washington DC

March 18-20, 1992


The rush of computers into our workplaces, homes, and institutions is drastically altering how we work and live, how we buy and sell, and with whom we communicate. Computers are obliterating traditional political and organizational boundaries, making time zones irrelevant, and bridging diverse cultures. They are fundamentally changing our culture, values, laws, traditions, and identities.

The turmoil of the changes calls into question many old assumptions about privacy, freedom of speech, search and seizure, access to personal and governmental information, professional responsibilities, ethics, criminality, law enforcement, and more. The only way to sort out these issues and arrive at a consensus for action is to acknowledge that we don't know the answers -- and then, with reason and good will, to find the answers through discussion and education. That's why the Conference on Computers, Freedom, and Privacy was founded in 1991.

The Computers, Freedom, and Privacy Conference is unique. It has no "agenda for change". It seeks only to bring together people from all the major communities and interest groups that have a stake in the new world being shaped by information technology, so that they may share their ideas, ideals, concerns and experiences.

At the first conference, hundreds of people from the fields of law, computer science, law enforcement, business, public policy, government, education, research, marketing, information providing, advocacy and a host of others met for several days. It was the first time such a diverse group had ever assembled, and the exchange of ideas and points of view was electric.

The conference is "single-track" -- all participants attend all the sessions. A morning of tutorials at the beginning of the conference will help participants get up to speed in specific "hot" areas. The conference sessions themselves take up timely and, at times, thorny issues. Each session aims for a balance of perspectives in order to assist diverse groups appreciate the views of others. A brief examination of the long list of sponsoring and supporting organizations will reveal that this respect for diverse outlooks is built into the conference from the ground up.

The question is no longer whether information technologies will change our world. They are, now. The real question is how we, as citizens and professionals, will respond to and manage that change. Those at the Second Conference on Computers, Freedom, and Privacy will lead the way.


Sponsor:
Association for Computing Machinery
Special Interest Groups on
Computers and Society
Communications
Security, Audit, and Control

Host:
Department of Electrical Engineering and Computer Science
The George Washington University

Patrons:
Bell Atlantic
Computer Security Institute
Department of Energy*
Dun & Bradstreet
Equifax
Hayes Microcomputer Products, Inc.
John Gilmore
Mitchell Kapor
National Institutes of Health*
National Science Foundation*

*applied for

Co-sponsors and cooperating organizations:
American Civil Liberties Union
Association for Computing Machinery
Special Interest Group on Software Engineering
Association of Research Libraries
Computer Professionals for Social Responsibility
Electronic Frontier Foundation
Federal Library and Information Center Committee
First Amendment Congress
Institute for Electrical and Electronics Engineers-USA
Committee on Communications and Information Policy
Library and Information Technology Association
Privacy International
U. S. Privacy Council
The WELL (Whole Earth 'Lectronic Link)


WHAT'S UNIQUE ABOUT CFP-2?

What isn't unique? The diverse mixture of expertise and interest; the depth and breadth of information presented; the unusual networking opportunities. CFP-2 provides an opportunity to learn from the mistakes of the past and to plan intelligently and humanely for the information-rich future. It's equivalent to inviting several hundred of the best information age experts in the world into one place just to help you understand the most important emerging issues in technology, business, and policy.


WHO SHOULD ATTEND CFP-2?

Computer hardware and software development officers and managers
Privacy advocates
Law enforcement officials
Computer security specialists
Direct marketers
Designers and users of databases with personal information
Local, state, and federal prosecutors or members of their staffs
Concerned computer users
Librarians
Computer bulletin board operators
Government officials
Attorneys
Congressional staff members
Civil libertarians
Specialists in those application areas where future conflicts of values are foreseen (medical databases, credit reporting systems, criminal justice, etc.)


PROGRAM HIGHLIGHTS


Featured Speakers

Allen Neuharth

Allen Neuharth, the founder of USA Today, retired two years ago as chairman of the Gannett Company, and has recently become chairman of the Freedom Forum, which is, according to an article in The New York Times, "the flashy new incarnation of what had been the Gannett Foundation". The Freedom Forum's mission is to set the agenda on issues involving press freedom and the First Amendment. Its goal is to foster free press, free speech, and free spirit at home and abroad.

Bruce Sterling

Bruce Sterling, author, journalist, editor, and critic, was born in 1954 and lives in Austin, Texas. He is the author of four science fiction novels: Involution Ocean (1977), The Artificial Kid (1980), Schismatrix (1985), and Islands in the Net (1988). His short stories appeared in the collections Crystal Express (1990) and Globalhead (1991), and in the Japanese collection Semi no Jo-o. He edited the collection Mirrorshades: The Cyberpunk Anthology (1986), and co-authored the novel The Difference Engine (1990) with William Gibson. His first nonfiction work is The Hacker Crackdown, a book about computer crime and civil liberties issues.


Conference Reception

At the conference reception Wednesday evening, you will have the opportunity to meet old friends and colleagues and to make new ones. One attendee last year said "everybody who was anybody" was there. Enlarge your old circle or create a new (human and/or computer-based) network of experts in different disciplines.


EFF Awards Reception

All conference attendees are invited to the Awards Reception sponsored by the Electronic Frontier Foundation (EFF) on Thursday evening. The first annual EFF Pioneer Awards will be given out, to individuals and organizations that have made distinguished contributions to the human and technological realms touched by computer-based communications. It's another great opportunity to rub elbows with leaders in your own or related fields.


Birds of a Feather Sessions

For those spur-of-the-moment meetings, or for planned gatherings of those with common interests, CFP-2 is providing "birds of a feather" rooms where small groups can gather in an informal environment to meet and talk. Groups should contact the conference chair to reserve meeting space.


WEDNESDAY, MARCH 18, 1992


Pre-Conference Tutorials


Group A: 9:00 a.m.


Making Information Law and Policy

Information policy is made (or not made) by a bewildering array of
government officials and agencies. This tutorial gives a road map
through this maze of laws, regulations, practices, etc.
Jane Bortnick, Congressional Research Service,
Library of Congress


Getting on the Net

Practical issues of access to the Internet for the nontechnical end-user,
including basic services (email, USENET, ftp), PC and Mac-based network
applications, and net-speak.
Mitchell Kapor, Electronic Frontier Foundation


Communications and Network Evolution

The underlying technical infrastructure for the Internet, for persons
not deeply immersed in the technology. Possible future technologies
and projects, and what privacy and freedom problems they may bring.
Sergio Heker, JVNCNet


Private Sector Privacy

An introduction to laws, rules, and practices regarding personal information
gathered and stored by private organizations such as direct marketers,
hospitals, etc.
Jeff Smith, Georgetown University


Group B: 10:30 a.m.


Constitutional Law for Nonlawyers

An overview of Constitutional law with special emphasis on the First,
Fourth, and Fifth Amendments and the application of their principles
in the information age.
Harvey Silverglate, Silverglate & Good


Computer Crime

Investigation, search, seizure, and evidence requirements for pursuing
computer crime. For computer users, owners, sysops, and investigators
and attorneys unfamiliar with computer crime practices.
Don G. Ingraham, Alameda County District Attorney's Office


Modern Telecommunications: Life after Humpty Dumpty

Roles and relationships of the key players in telecommunications, developments
in communications technology, and new services. Signaling System 7,
ISDN, and advanced intelligent network features.
Richard S. Wolff, Bellcore


International Privacy Developments

Privacy-related developments within the European community, OECD,
and the United Nations, and how they affect the United States. Comparison
of privacy regulations here and abroad.
David Flaherty, University of Western Ontario


CONFERENCE PROGRAM


1:00-2:00 p.m.

KEYNOTE ADDRESS:

"Freedom in Cyberspace: New Wine in Old Flasks?"

The differing legal and regulatory constraints on publishers of newspapers,
owners of television stations, and the telephone service providers
imply that some dogfights will occur and some tough decisions will
have to be made to balance privacy and freedom in the coming decade,
since the old wine of 1970's-era regulation will not fit into the new
flasks of 21st Century. Mr. Neuharth, a self-proclaimed S.O.B., will
give us a peek at his vision of what the future holds.
Al Neuharth, Chairman, The Freedom Forum and Founder, USA Today


2:30 pm - 4 pm

Who logs on?

High capacity optical fiber into the home is a likely in the next decade,
bringing a range of new services from video telephones to on-line
shopping. How will decisions being taken today affect this possible
future? Who will pay? Who will benefit? Here's a taste of the debate.

Chair: Robert Lucky, AT&T Bell Laboratories

Panel:
Linda Garcia, Office of Technology Assessment
Alfred Koeppe, New Jersey Bell
Brian Kahin, Kennedy School of Government, Harvard University


4:30 pm - 6 pm

Ethics, Morality, and Criminality

In a two-part dialogue with representatives of the affected constituencies,
we will explore: What is acceptable moral behavior in a computer
network? How do victims feel about intrusions, viruses, frauds, and
other criminal behaviors? When do you call law enforcement and
whatshould they do?

Chair: J. Michael Gibbons, Federal Bureau of Investigation

Panel:
Scott Charney, U. S. Dept. of Justice
James Settle, Federal Bureau of Investigation
Mike Godwin, Electronic Frontier Foundation
Emory Hackman, Esq. (former president, Capital Area Sysops Association)
Don Delaney, New York State Police


6:00 pm - 7:30 pm

RECEPTION


9:00 pm

BIRDS OF A FEATHER SESSIONS


THURSDAY, MARCH 19, 1992


9:00 am - 10:30 am

For Sale: Government Information

Electronic information alters the way he government can locate and
supply information, because the government can add value during
collection, processing, and dissemination. The forum will explore relations
between governments and businesses in providing information and services.

Chair: George Trubow, John Marshall Law School

Panel:
Dwight Morris, Los Angeles Times Washington Bureau
Ken Allen, Information Industry Association
Patricia Glass Schuman, American Library Association
Evan Hendricks, Privacy Times
Fred Weingarten, Computing Research Association
Franklin S. Reeder, Office of Management and Budget
Costas Torreagas, Public Technology, Inc.
Robert R. Belair, Kirkpatrick and Lockhart


10:45 am - 12:15 pm

Free Speech and the Public Telephone Network

How will free speech principles of open access, diversity, and nondiscrimination
prevail if telcos become information providers? What are the
rules for safeguards and local loop competition? How can good infrastructure
design advance First Amendment values?

Chair: Jerry Berman, ACLU Information Technology Project

Panel:
Henry Geller, The Markle Foundation
Eli Noam, Columbia University
John Podesta, Podesta Associates


12:15 pm - 1:45 pm

Luncheon with Address: Bruce Sterling

"Speaking for the Unspeakable"

Mr. Sterling will gamely attempt to publicly present the points of view
of certain elements of the "computer community" who are not represented
at CFP-2. He will speak up for those who, in his words, are too "venal,
violent, treacherous, power-mad, suspicious or meanspirited to receive
(or accept) an invitation to attend.


2:00 pm - 3:30 pm

Who's in Your Genes?

After an overview of genetic data banking, the panelists will discuss
the tension between an individual's right to privacy and the interests
of third parties. DNA forensic data banks and use of genetic data by
insurers will be explored.
Chair: Phil Reilly, Shriver Center for Mental Retardation

Panel:
John Hicks, FBI Laboratory
Tom Marr, Cold Spring Harbor Laboratory
Paul Mendelsohn, Neurofibromatosis, Inc.
Peter Neufeld, Esq.
Madison Powers, Kennedy Center for Ethics, Georgetown University


3:45 pm - 5:15 pm

Private Collection of Personal Information

We will explore the types of collections of personal information in
the private sector, examining how and when they are used and linked,
and what are the associated consumer rights. This will be part of a mock
legislative debate about the establishment of a data protection board.

Chair: Ron Plesser, Piper and Marbury

Panel:
Janlori Goldman, Privacy and Technology Project, ACLU
John Baker, Equifax
James D. McQuaid, Metromail
James Rule, SUNY-Stony Brook
Mary Culnan, Georgetown University
P. Michael Neugent, Citicorp


5:15 pm - 6:45 pm

EFF Awards Reception


9:00 pm

Birds of a Feather Sessions


FRIDAY, MARCH 20, 1992


9:00 am - 10:30 am

Privacy and intellectual freedom in the digital library

Who wants to know what you want to know? How are your privacy
rights protected when you seek information? How do libraries protect
your right of access to electronic information? How can automation
vendors help? How can library practices that protect intellectual freedom
be applied to emerging information networks?

Chair: Marc Rotenberg, Computer Professionals for Social Responsibility

Panel:

Robert A. Walton, CLSI, Inc.
Gordon M. Conable, Monroe (MI) County Library System
Jean Armour Polly, Liverpool (NY) Public Library


10:45 am - 12:15 pm

Computers in the Workplace: Elysium or Panopticon?

Computer technology provide new opportunities for employee communication
as well as for employee surveillance. How should these interests
be weighed? Should employees have a right of privacy in the workplace?

Chair: Alan F. Westin, Columbia University

Panel:
Gary Marx, MIT
Mark DiBernardo, National Association of Manufacturers
Kristina Zahorik, Subcommittee on Employment and Productivity, U. S. Senate Labor Committee


12:15 pm - 1:30 pm

Lunch (on your own)


1:30 pm - 3:00 pm

Who Holds the Keys?

Cryptography is the process of translating a message into a secret
code. Cryptography has become a battleground for personal privacy
and national security. Should the government be permitted to restrict
the use of cryptography, or to restrict export of products that use cryptography?
What legal protections should exist for enciphered communications?
Who will provide the "keys" and how will users recover lost keys?

Chair: Dorothy Denning

Panel:
Jim Bidzos, RSA Data Security
David Bellin, Pratt Institute
John Gilmore, Cygnus Support
Whitfield Diffie, SunSoft, Inc.


3:00 pm - 4:15 pm

Public Policy for the 21st Century

What will the world be like in a decade or two? We know that information
technologies will alter work, institutions, wealth, value, political boundaries,
and identities drastically and in ways that we cannot foresee. What
are the desirable characteristics of this world? What public policies
now exist that may pull the opposite direction from the economic momentum
and will lead to social tension and breakage if not addressed properly?
A panel of visionaries will make short presentations and will then
be interviewed by a skilled questioner.

Co-chairs:

Peter J. Denning, George Mason University
Lance J. Hoffman, George Washington University


STEERING COMMITTEE

Lance J. Hoffman (General Chair)
The George Washington University

Michael F. Brewer
Dun and Bradstreet

Paul Clark (chair, Operations Committee)
Trusted Information Systems

Dorothy Denning (chair, Tutorials Committee)
Georgetown University

Peter Denning (chair, Program Committee)
George Mason University

David Farber
University of Pennsylvania

Craig Feied
The George Washington University Medical Center

Mike Gibbons
FBI

Mitchell Kapor
Electronic Frontier Foundation

Jane Kirtley
Reporters Committee for Freedom of the Press

Lu Kleppinger (chair, Finance Committee)
The George Washington University

C. Dianne Martin
The George Washington University

John McMullen (chair, Scholarship Committee)
McMullen & McMullen, Inc.

Lynn McNulty
NIST

Ronald Plesser
Piper and Marbury

Molly Raphael
D.C. Public Library

Mark Rotenberg
CPSR Washington Office

James Sylvester
Bell Atlantic

Jim Warren
Autodesk and MicroTimes

Fred Weingarten
Computing Research Association


ADVISORS

Allan Adler
Cohn and Marks

Ron Anderson
University of Minnesota

John Baker
Equifax

John Perry Barlow
Electronic Frontier Foundation

Robert R. Belair
Kirkpatrick & Lockhart

Jerry Berman
American Civil Liberties Union

Vint Cerf
Corporation for National Research Initiatives

Margaret A. Chambers
Meta Technologies Associates

Philip Chapnick
Computer Security Institute

Steve Cisler
Apple Computer

Mary Culnan
Georgetown University

Donald Delaney
New York State Police

Les Earnest
Consultant

Mary Eisenhart
MicroTimes

Clifford Figallo
The Well

Dahl Gerberick
Gerberick & Associates

John Gilmore
Cygnus Support

Janlori Goldman
American Civil Liberties Union

Mark Graham
Pandora Systems

Evan Hendricks
Privacy Times

Donald G. Ingraham
District Attorney's Office,
Alameda County, CA

Robert Jacobson
Washington Technology Center

Linda Knutson
Library & Information Technology Association

Bruce R. Koball
Motion West

Mary Berghaus Levering
Federal Library and Information Center Committee, Library of Congress

Craig Neidorf
Electronic Frontier Foundation

Peter G. Neumann
SRI International

Donn B. Parker
SRI International

John Podesta
Podesta Associates

David Redell
DEC Systems Research Center

Dennis Reynolds
CAPCON

Eric S. Roberts
CPSR

Paul Saffo
Institute for the Future

Harvey A. Silverglate
Silverglate and Good

Bruce Sterling
Author

Richard Taylor
University of California at Irvine

Gail Thackeray, Esq.

Jay E. Thorwaldson
Palo Alto Medical Foundation

George Trubow
John Marshall Law School

Willis H. Ware
RAND Corporation

Alan F. Westin
Columbia University

Bob Wilson
MCI


DID YOU MISS THE FIRST CONFERENCE ON COMPUTERS, FREEDOM, AND PRIVACY?


While we can't remedy that, we can help you experience some of the electricity at that event.

Audiotapes (great drive-time listening) and videotapes (the next best thing to being there), and the complete verbatim transcript (edited for clarity only) of the First Conference on Computers, Freedom & Privacy are now available.

Sessions covered are:

  1. The Constitution in the Information Age
  2. Trends in Computers and Networks
  3. International Perspectives and Impacts
  4. Personal Information and Privacy-I
  5. Personal Information and Privacy-II
  6. Networks Environments of the Future
  7. Law Enforcement Practices and Problems
  8. Law Enforcement and Civil Liberties
  9. Legislation and Regulation
  10. Computer-Based Surveillance of Individuals
  11. Security Capabilities, Privacy and Integrity
  12. Electronic Speech, Press and Assembly
  13. Access to Government Information
  14. Ethics and Education
  15. Where Do We Go From Here?

TO ORDER AUDIOTAPES:

Recording, Etc./Soper (415)327-9344
633 Cowper Street (800)227-9980 [for calls from beyond California]
Palo Alto CA 94301 (415)321-9261 by fax

PRICES & SHIPPING:

any one audio-tape ( 1 tape ) $14.95 +sales tax* + (for Canada delivery) $2.50 US, or + (for international delivery) $5.00 US five-tape set ( 5 tapes) $34.95 +sales tax* + (for Canada delivery) $5.00 US or + (for international delivery) $10.00 US

Set A: tapes 2, 3, 4, 5 and 6
Set B: tapes 7, 8, 9, 10 and 11
Set C: tapes 12, 13, 14, 15 and 1

full-Conference set (15 tapes) $59.95 +sales tax* + (for Canada delivery) $7.50 US or + (for international delivery) $20.00 US

* - include 6.5% for sales tax to Cal.addresses; prices include U.S. shipping Make checks to *Recording, Etc.*; MasterCharge, Visa & American Express OK.

TO ORDER THE WRITTEN TRANSCRIPT:

First Conference on Computers, Freedom and Privacy
IEEE Computer Society Press
PO Box 3014
Los Alamitos, CA 90720-1264

outside CA - (800) 272-6657
inside CA - (714) 821-8380
fax - (714) 821-4010

ISBN 0-8186-2565-1
IEEE-CS Catalog #2565

Price:
members of IEEE-CS or CPSR: $29.00
All others................: $39.00

All orders add $4.00 handling charge CA residents add 7.75% sales tax

TO ORDER THE VIDEOTAPES:

$480 per 15 volume set, plus $15 shipping/handling (in California, please add $39.60 sales tax). Individual sessions $55 each plus $4 shipping/handling per session. In California, please add 8.25% sales tax.) Send purchase order, check, or money order to

Sweet Pea Productions
P. O. Box 912
1673 Happy Trail
Topanga, CA 90290

or call (800) 235-4922 or (213) 455-3915 with your Visa/Mastercard ready. (A more detailed brochure on the videotapes is available from Sweet Pea.)


GENERAL INFORMATION


Registration

Please register for the conference by returning the Conference Registration Form (below) along with the appropriate payment -- check, Visa, or Mastercard. Registration fee includes conference materials, Thursday luncheon, and receptions. The registration is $295 for ACM members and $350 for nonmembers, $65 for full-time students. Tutorials, $95 ($35 students).

Premium for Early Registration

While they last, a limited number of premiums are available to early registrants on a first-come, first-served basis. Early registrants will receive by mail a voucher which they can exchange at the conference for one of a number of premiums. These include:

  • Videotapes of CFP-1 sessions
  • Audiotapes of CFP-1 sessions
  • Proceedings of CFP-1
  • Computers Under Attack: Intruders, Worms, and Viruses by Peter Denning, editor
  • Rogue Programs: Viruses, Worms, and Trojan Horses by Lance Hoffman, editor
  • "Citizen Rights and Access to Electronic Information" by Dennis Reynolds, editor
  • The Cuckoo's Egg by Cliff Stoll
  • The Difference Engine by Bruce Sterling and William Gibson
  • Confessions of an S.O.B. by Al Neuharth
  • Cyberpunk by Katie Hafner and John Markoff

CONSIDER REGISTERING BY FAXING THE REGISTRATION FORM BELOW OR TELEPHONING IF YOU ARE INTERESTED IN ONE OF THESE PREMIUMS. THEY WON'T LAST LONG!

Registration Scholarships

Full-time students and others wishing to apply for one of a limited number of registration scholarships should send a request (no more than two typewritten pages) to arrive no later than January 15, 1992 to

John F. McMullen
CFP-2 Scholarship Committee
Perry Street
Jefferson Valley, NY 10535

or email: mcmullen@well.sf.ca.us

The request should concisely contain the following information:

  1. personal data -- name, address, phones, email address, etc.
  2. category and supporting information -- student, law enforcement official, "hacker", etc. We are particularly interested in providing support to undergraduate and graduate students majoring in computer or information science, journalism, law, law enforcement, political science, and related disciplines as well as "hackers", law enforcement officials, librarians, etc., who could otherwise not attend the conference.
  3. a statement saying specifically that you will attend the entire conference and that you will be responsible for your own transportation and lodging expenses
  4. a paragraph explaining why you are interested in attending the conference and what use you expect to make of the information obtained there
  5. a paragraph explaining the need for financial assistance

Hotel Accomodations

The 1992 Computers, Freedom, and Privacy Conference will be held at the Loew's L'Enfant Plaza Hotel, Washington, DC. One of the finest hotels in the city, it is just ten minutes from Washington National Airport, five minutes from Capitol Hill. The world-renowned Smithsonian Institution Museums are located within a few blocks.

To qualify for the conference rate of $105 single or $110 double, call the hotel reservation line (below) and identify yourself as a CFP-2 participant. To ensure a room at the L'Enfant Plaza, reservations should be made by February 10, 1992. After this date, rooms will be released to the public. Hotel reservations: (800) 243-1166; (202) 484-1000 (local).

Transportation

As a participant in CFP-2, you are eligible for discounted rates as follows: 40% off unrestricted coach fares and 5% off the lowest available fares on specified carriers (all rules and restrictions apply). To receive the best rate available call GW Travel (below) and make your reservations early. Seats may be limited. Please mention that you are attending the CFP-2 Conference. (Code C-6) GW Travel: (800) 222-1223; (301) 897-8001 (local).

Accreditation

The Second Conference on Computers, Freedom, and Privacy has been approved by The George Washington University Medical Center for Category One Continuing Medical Education Units.

Refund Policy

Refund requests received in writing by February 28, 1992 will be honored. A $50 cancellation fee will apply. No refunds will be made after this date; however, you may send a substitute in your place.


REGISTRATION FORM


YOU CAN NOT REGISTER BY ELECTRONIC MAIL. YOU MAY REGISTER BY MAIL, BY FAX, OR BY PHONE. YOU CAN PRINT THIS REGISTRATION FORM OUT, FILL IT IN, AND MAIL OR FAX IT. OR YOU CAN REQUEST A PRINTED BROCHURE FROM THE "BY MAIL" ADDRESS BELOW, WHICH WILL HAVE A PRINTED ONE-PAGE REGISTRATION FORM IN IT. YOU CAN ALSO OBTAIN THIS PRINTED BROCHURE BY ELECTRONICALLY MAILING A SHORT REQUEST WITH YOUR NAME AND (POSTAL) MAIL ADDRESS TO cfp2@seas.gwu.edu.


By mail: Conferences & Institutes, The George Washington University,
     2003 G St. N.W., Washington, D. C. 20052
By fax (24 hrs., with credit card): Send registration form to (202)
994-7048
By phone (with credit card): (202) 994-7238 (9 a.m. to 5 p.m., EST)   
Name:______________________________________________________
Title:_____________________________________________________
Affiliation: ______________________________________________
Mailing address: __________________________________________
City ____________________________ State _____ Zip _________
Country (if not USA): _____________________________________
Telephone: ________________________________________________
FAX number: _______________________________________________
E-Mail address: ___________________________________________

PRIVACY NOTE: This information will not be sold, rented, loaned, exchanged,
or used for any purpose other than official CFP-2 activities.  A roster
will be distributed to attendees.  Please indicate your preference:
____ Print all information above          ______ Print name only
____ Print only name, affiliation,        ______ Omit all above information
     city, state, zip

REGISTRATION FEES:
  Conference fee (check one)   ___ ACM member ($295)  ___ Non-member ($350)
   [includes conference materials, Thursday luncheon, and receptions]
 
  ____ Student (full-time/valid ID):___ $65 (no lunch)  ___ $30 (lunch)    
         
                
  Tutorial fee            _____ Tutorial (half-day, 1 or 2 sessions, $95)
  (Pick 2, 75 min. each)  _____ Student  (half-day, 1 or 2 sessions, $35)

      Group A  9:00 a.m.
     ____ T(1) Making Information Law and Policy
     ____ T(2) Getting on the Net
     ____ T(3) Communications and Network Evolution
     ____ T(4) Private Sector Privacy

      Group B  10:30 a.m.
     ____ T(5) Constitutional Law for Non-lawyers
     ____ T(6) Computer Crime
     ____ T(7) Modern Telecommunications
     ____ T(8) International Privacy Developments

Please check method of payment:              Amount enclosed: $________
      ____ Visa     _____ MasterCard     ____ Check (payable to
                                         The George Washington University)
      Credit card number: ______________________________________
      Expiration date: _________________________________________
      Name on card: ____________________________________________
      Signature: _______________________________________________
For Continuing Medical Education accreditation, give state and medical #: 



Return to CPSR conferences page.


Return to the CPSR home page.


Send mail to webmaster.

Archived CPSR Information
Created before October 2004
Announcements

Sign up for CPSR announcements emails

Chapters

International Chapters -

> Canada
> Japan
> Peru
> Spain
          more...

USA Chapters -

> Chicago, IL
> Pittsburgh, PA
> San Francisco Bay Area
> Seattle, WA
more...
Why did you join CPSR?

Gain better understanding of the Information society.