Copy Link
Add to Bookmark
Report

EFFector Online Volume 9 Number 14

eZine's profile picture
Published in 
EFFector
 · 5 years ago

 
=========================================================================
________________ _______________ _______________
/_______________/\ /_______________\ /\______________\
\\\\\\\\\\\\\\\\\/ ||||||||||||||||| / ////////////////
\\\\\________/\ |||||________\ / /////______\
\\\\\\\\\\\\\/____ |||||||||||||| / /////////////
\\\\\___________/\ ||||| / ////
\\\\\\\\\\\\\\\\/ ||||| \////

=========================================================================
EFFector Online Volume 09 No. 14 Dec. 10, 1996 editors@eff.org
A Publication of the Electronic Frontier Foundation ISSN 1062-9424

IN THIS ISSUE:

US Supreme Court Schedules CDA Appeal: The Showdown Begins in Jan.
EFF Analysis of Draft "Database Protection" Treaty
NewsNybbles
EFF's "Know Your CyberRights Sweepstakes" - Spread the Word!
EFF Hosts anon.penet.fi Defense Fund
SPA Drops ISP Lawsuits - "Code of Conduct" Still Advanced
Upcoming Events
Quote of the Day
What YOU Can Do
Administrivia

* See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more
information on current EFF activities and online activism alerts! *

----------------------------------------------------------------------


Subject: US Supreme Court Schedules CDA Appeal: The Showdown Begins in Jan.
---------------------------------------------------------------------------

The US Supreme Court on Friday scheduled briefing in the government's
appeal of the 3-judge Philadelphia federal court ruling that the
Communications Decency Act provisions of the Telecommunications Act of
1996 are unconstitutional, in the merged ACLU v. Reno and ALA v. Dept.
of Justice cases against the recent Internet censorship law.


* Briefing Schedule for Supreme Court Appeal of CDA Constitutionality
Challenge (ACLU v. Reno, ALA v. DoJ merged case), as of Dec. 1996:

Jan. 21, 1997 - Appellant (government) brief due

Feb. 20, 1997 - Appellee (EFF, ACLU, ALA, CIEC, et al.) brief due

Mar. 7, 1997 - Appellant reply brief due.

Mar-Apr., 1997 - Oral arguments in the case will be scheduled


It is important to note the announcement was not about whether the Supreme
Court has chosen to review the lower court's decision in ACLU v. Reno --
the Court has *no choice* as to whether it will review that decision, so
long as the government's appeal is not a frivolous one. According to
Article III of the U.S. Constitution, the Supreme Court can be compelled
by Congress to hear certain kinds of appeals, even though normally
Congress lets the Court set its own docket. Pursuant to Article III, the
Telecom Act, like the Voting Rights Act and certain other legislative
measures, grants the government an "appeal as of right" whenever a
provision of the act is found unconstitutional by a lower court . This
is very different from the normal petition-for-certiorari process by
which cases normally come before the Court. Congress intended that the
contentious provisions of the Telecom Act be settled quickly, and wrote
provisions into the law itself to ensure this.

More importantly, the Court's announcement is not any indication,
despite CDA supporters' claims, that the Supreme Court wants to overturn
the lower court's ruling.

What is significant about the news is that the Supreme Court has
expressed 1) an interest in hearing oral arguments as well as 2) an
interest in speaking *directly* to the issues raised by the case (as
distinct from deciding the case summarily).

Legal teams from both of the original, now merged, cases will continue to
work cooperatively on countering the Justice Department's appeal.

EFF remains very optimistic of the outcome of this case, as the CDA fails
not one but *all* constitutionality tests.

Previous documents from cases are available at:
http://www.eff.org/pub/Legal/Cases/EFF_ACLU_v_DoJ/

More information about the CDA and similar Internet censorship measures:
http://www.eff.org/pub/Censorship/Internet_censorship_bills/

------------------------------


Subject: EFF Analysis of Draft "Database Protection" Treaty
-----------------------------------------------------------

Having failed to win the day in Congress, the US Administration is
strongly pushing for international treaties to "reform" copyright law -
in ways that favor not the public interest, but a handful of commercial
interests concerned with grabbing a property right to information itself
- some of it information owned by you, the taxpayer. Patent and Trademark
Commissioner Bruce Lehman, the primary architect of the would-be
rewiring of global intellectual property law has brushed aside almost all
criticism of these measures, even from the industrial interests he
claims would most benefit from the changes.

EFF, in response to a US Commerce Dept. "Request for Comments" has analyzed
the likely effects of the GII copyright overhaul, which range from making
it impossible to obtain public information under the Freedom of
Information Act if that data was processed by contractors, to making it
illegal to browse a publicly accessible web page without explicit
permission. EFF's response to the Commerce Dept. RFC are appended below.
EFF also submitted additional comments, as a member of the Digital Future
Coalition. The DFC analysis is available at http://www.dfc.org


* Background

The PTO's theory has been that investment in information and communication
technology such as the Internet will be stimulated by granting more explicit
copyright protection to online media, including an all-new, sweeping
protection of databases that amounts to granting ownership over facts to
those who catalog them. The Computer and Communications Industry
Association, which includes AT&T and Sun, begs to differ, saying that the
draft treaties would produce a liability morass that would-be investors
will scramble to steer clear of.

The provisions were first proposed in a Commerce Dept. "Green Paper", later
surfacing in a "White Paper" with virtually no substantive fixes despite
criticism from virtually all corners (see IPWG papers and critiques,
http://www.eff.org/pub/Intellectual_property), then proposed as
the doomed NII Copyright Act of 1996 and related US legislation (see
http://www.eff.org/pub/Intellectual_property/NII_copyright_bill).

At all stages, researchers and public interest organizations have drawn close
attention to the fact that the proposals would directly undermine the
public's fair use rights, important educational excemptions, Supreme Court
precedent, and even the ability to test encryption systems. Hardly the
way to foster increased online commerce.

According to a Dec. 5 USIA report, Lehman is "mildly optimistic" that his
end-run around Congress will succeed. The Commissioner's single-minded
zeal in turning controversial ideas of how copyright should be "reformed"
for the Information Age into international law may be flagging. Lehman
admits that the database-related provision have raised "legitimate concerns"
and appears to be taking seriously the research community's complaints
that it would make their work difficult if not impossible. However, the
Administration appears completely blind to fair use concerns in their
rush to grant businesses ownership of facts themselves.

The World Intellectual Property Organization (WIPO) considering the
language of the draft treaties is not readily reachable by citizen advocacy.
However, should WIPO fail to heed the warnings and accept these shoddy
efforts at appeasing the database lobby at the expense of the rest of the
world, remember that Congress rejected these proposals once. As treaties
have to be ratified before they take effect, Congress can reject them
again. Please take a few moments to contact your legislators, and urge
them to reject both the WIPO Literary and Artistic Works Treaty and the
WIPO Treaty on Intellectual Property in Respect of Databases, should either
survive the Dec. WIPO conference and be presented to Congress for
ratification. Copyright may indeed need some updating, but ramrodding
ill-conceived and already-rejected proposals down the throat of the world
is not the way to do it.

More information on the WIPO copyright "reform" is available at
http://www.eff.org/pub/Intellectual_property/WIPO for the basics, or
http://www.public-domain.org/ for a large amount of background material.


* EFF Analysis of WIPO Online Intellectual Property Draft Treaties


Mr. Keith M. Kupferschmid
Commissioner of Patents and Trademarks
Box 4, Patent and Trademark Office
Washington, DC 20231

November 22, 1996


Dear Mr. Kupferschmid,

I am writing in response to your request for comments on the Chairman's Text
of the Diplomatic Conference on Certain Copyright and Neighboring Rights
Questions. The Electronic Frontier Foundation (EFF) is a civil liberties
organization that works on issues involving personal rights and freedoms in
digital technologies. We are very concerned about several aspects of the
current proposals, and we appreciate the opportunity to provide you with our
views.


Problems With the Database Treaty Proposal

There are many problems with the "Sui Generis Protection of Databases"
treaty proposal. This treaty should be taken off the agenda in Geneva
until interested parties within the United States have had the opportunity
to discuss and debate the serious implications of its passage. There have
been no public hearings on this proposal. It is premature to take any
official U.S. stance at this time.

This treaty would completely undermine the 1991 U.S. Supreme Court decision
in Feist Publications, Inc. v. Rural Telephone Service. In Feist, the Court
rejected a claim of copyright for data from a telephone directory's white
pages, finding that facts cannot be copyrighted and that obvious items, such
as listing names, addresses, and telephone numbers in alphabetical order,
are not sufficiently creative to qualify for copyright protection.

The Feist decision was based on the grounds that facts cannot be copyrighted
or otherwise removed from the public domain. By creating a new property
right for facts, the treaty will impose regulations on the use of facts.
Under the treaty, private monopolies for the maintenance of public data will
be sanctioned, and individuals will have to pay for facts in the public
domain.

This is particularly troubling because in the United States many government
databases are maintained by private contractors. The pieces of information
contained within those databases rightfully are part of the public domain;
there is no other source for this information. The private vendors who
receive government contracts to maintain information owned by the people
should not be given a property interest in that government information.
Furthermore, under the proposed database treaty, the government will be
permitted to avoid compliance with the Freedom of Information Act (FOIA)
if it uses private contractors, since the contractors will be said to have
property rights to the public information.

In addition, there are problems with several definitions contained within
the treaty. The definition of "database" is all-encompassing and will
include many things that are not traditionally considered to be databases,
such as collections of government documents. The term "substantial" is
troubling, in that it takes into account the database maintainer's
perceived lost value in the marketplace. Under this definition, it is
reasonable to assume that even small portions of information used from a
database would be considered a substantial portion of the database and
would constitute violation of the treaty. With no fair use rights, database
users would be precluded from using any bits of information they receive
from a database if the database maintainer has charged for that information.

It is also unclear as to when the term of protection begins to start again.
It seems from the language of the treaty that any changes to a database
(i.e., any addition of data) will reset the clock for protection purposes.
This will give database maintainers an infinite copyright in their databases.

The treaty also includes strong civil and criminal penalties for third-party
disseminators of this information. Internet service providers and others
who merely provide the conduit for communications should not be held liable
for any unauthorized actions of their users. Yet this treaty attempts to
establish system operator liability under international law.

Finally, as in the proposed "Protection of Literary and Artistic
Works" treaty, the database proposal is accompanied by very strict
prohibitions against the "importation, manufacture or distribution of
protection-defeating devices . . . by any person knowing or having
reasonable grounds to know that the device" may be used for
circumventing the rights created in the treaty. This turns current
Supreme Court law (See Sony Corp. of America v. Universal City Studios,
Inc., 464 U.S. 417 (1984)) on its head; today a technology is
legitimate to make, import and distribute if it has ANY legitimate uses
-- not if ALL of its uses are legitimate. Under this novel theory,
common office supplies like correction fluid and scissors could be
outlawed because they can be used to eliminate copyright markings on
documents. The Supreme Court made the correct call for society; the
social good of an entire technology should not be suppressed merely
because it causes quantifiable or alleged harm to one party.

Furthermore, the "protection-defeating device" restriction obviously
covers both reverse-engineering tools and encryption technology.
Reverse engineering is the process of discovering exactly what a
competitor has built by detailed examination of an end-user product.
Eliminating the legal right to reverse-engineer makes it much easier
to establish monopolies enforced by the state. This harms society by
slowing the flow of improved products, benefiting the few at the
expense of the many. The restriction also makes it illegal to
"crack" or seek to crack encryption systems, an essential part of
building real security into encryption systems (including copy
protection systems). Only if a security system is constantly open to
public testing and scrutiny can its worth be assured and its security
be improved. It's clear that this part of the law would not stop
criminals from circumventing technical copy protection systems; the
much larger crime they are involved in is the theft of the
intellectual property itself. But it would stop professors, students,
and competitors from studying copy protection systems to analyze their
flaws and propose improvements. And it would prohibit consumers from
being able to obtain products which they would use in completely legal
and legitimate ways; for example, to recover access to their own
encrypted files.


Problems with the Literary and Artistic Works Treaty Proposal

As with the "Sui Generis Protection of Databases" treaty proposal, EFF has
many concerns about the "Protection of Literary and Artistic Works" treaty
proposal to be considered by the diplomatic conference.

The way it is currently written, Article 7 would inhibit browsing on the
World Wide Web. Article 7 requires signatories to treat temporary copies,
such as the ephemeral random access memory (RAM) copies made on servers
as a piece of information moves through the Internet, as a "reproduction"
that could violate the exclusive reproduction right. Temporary
reproduction for technological purposes should not be given copyright
protection. All electronic communications would be copyright violations
under this provision.

Article 10 would substantially expand the exposure of online service
providers. Article 10 creates a new exclusive right of communication to
the public, which appears to be broader than either the distribution right
or public performance right now granted by the U.S. Copyright Act. This
new right, when combined with Article 7's treatment of RAM copies as
reproductions, significantly increases the likelihood that an online
service provider would be found directly liable for a subscriber's
infringement.

Article 12 would undermine many of the exceptions of the U.S. Copyright Act.
Article 12 would apparently eliminate exceptions that currently permit the
use of copyrighted works for distance learning and performance of music in
religious ceremonies. These are but two examples. It may also narrow the
application of the fair use doctrine with respect to both commercial and
non-commercial uses.

Article 13 contains the exact same troubling language as the proposed "Sui
Generis Protection of Databases" treaty (discussed above) that would make
reverse-engineering and the cracking of encryption illegal.

In conclusion, the Electronic Frontier Foundation believes that it is
premature for the United States to take a public stance on the issues
involved in the "Sui Generis Protection of Databases" treaty proposal.
If the United States does take a stance, we strongly urge that it
propose the rejection of the current draft. We hope that the U.S.
delegation will pull that proposal from discussion in Geneva until a
national debate has taken place. EFF has the same level of
reservations about the "Protection of Literary and Artistic Works"
treaty proposal in its current form.

Thank you for consideration of our views on these important issues. Please
feel free to contact me if I can provide you with any additional information.

Sincerely,

[sig]

Shari Steele, Staff Attorney
Electronic Frontier Foundation ssteele@eff.org
P.O. Box 649 301/375-8856 (voice)
Bryans Road, MD 20616 301/283-5337 (fax)

------------------------------


Subject: NewsNybbles
--------------------

* EFF's "Know Your CyberRights Sweepstakes" - Spread the Word!

As part of its educational and public awareness mission, EFF has launched
a sweepstakes based on a series of online civil liberties questions and
answers. Winners will receive a variety of prizes, including a Gibson
guitar signed by UK recording artists The Cure. The guitar was signed at
Eden MusicFest, a 3-day mega-concert EFF helped organize to raise
awareness of Internet privacy and free speech.

EFF members might not find the challenges very tough, but perhaps you'll
consider passing around the following contest announcement to your
favorite online haunts, posting it on your web page, etc. Please feel
free to simply create links to the sweepstakes' official web page at
http://www.eff.org/sweeps/


[Please redistribute widely in appropriate places, but no later than Dec.
16, 1996.]

EFF's "KNOW YOUR CYBERRIGHTS SWEEPSTAKES"

Play EFF's "Know Your CyberRights Sweepstakes," and win one of the 60+
great prizes we're giving away - maybe even the the Gibson guitar
autographed by the Cure!

Every day, decisions are being made that will affect your life online.
Since 1990, The Electronic Frontier Foundation has been looking out for you
- and your Constitutional rights.

EFF's "Know Your CyberRights" Sweepstakes is your chance to pick up
pointers while you earn chances to win great prizes. Just by answering one
multiple choice question in each of the four rounds, entering your e-mail
address and clicking on "Submit answer," you could win the guitar, an EFF
T-shirt signed by The Spin Doctors, one of 10 EFF T-shirts, or one of 50
Blue Ribbon pins!

To participate in EFF's "Know Your CyberRights Sweepstakes," go to
http://www.eff.org/sweeps. Answers to Round 1's free speech question are
due Monday, December 16, at 11:59 a.m. Eastern Standard Time (EST). So,
enter now, know your cyberrights, and play to win!

The "Know Your CyberRights Sweepstakes" is organized by the Electronic
Frontier Foundation, and nonprofit public interest organization devoted
to protecting civil liberites and promoting responsibility in new media,
and Yoyodyne Entertainment, a privacy-conscious and innovative Internet
company specializing in free online games.

[end announcement]

********************************************


* EFF Hosts anon.penet.fi Defense Fund

As reported in previous issues of EFFector, Johan Helsingius, operator
of the (former) pseudonymous remailer anon.penet.fi will appeal a Finnish
court ruling that Penet's thousands of users, who depended on the remailer
to protect their privacy, have no expectation of privacy under Finnish law,
in response to Church of Scientology legal actions to gain access to
the real identity of a Penet user accused of copyright infringement.
Helsingius is also considering legal action against a UK newspaper who
slandered the remailer and it its operator in an attempt to paint yet
another "Internet is an evil den of child pornographers" schlock stories.
Helsingius, who has long had a policy against illegal abuse of the
remailers services was needlessly investigated for child pornography as a
result of the unfounded accusations - and cleared of any wrongdoing.

As the US is the largest aggregate of Net users who may wish to support
Helsingius's appeal of the Finnish court's anti-privacy ruling and
recovery of damages for defamation (of not just himself but essentially
all privacy advocates and Internet users by implication), EFF will serve
as a clearinghouse for US donations to the Penet Legal Defense Fund.

Donations may be made by sending checks or money orders to:
Electronic Frontier Foundation
attn: Penet Fund
1550 Bryant St., Suite 725
San Francisco CA 94103

IMPORTANT! Checks/MOs should be made out to "EFF" or "Electronic Frontier
Foundation", and clearly marked "Penet Fund" or "Penet Legal Defense Fund"
in the note space at the bottom. Otherwise they could be mistaken for
donations to EFF itself.

WE CANNOT PROCESS DRAFTS MADE OUT TO "PENET FUND". We would have to have
a business license and a new account in that name. Please also note that
small donations such as $5 would be consumed by currency conversion fees
and such. Please be generous. Consider it a holiday spirit gift to
Internet privacy. If you wish to send non-US funds (or even, better for
Penet, Finnish funds), your best bet is to contact Helsingius directly at
julf@penet.fi and make arrangements, so the donation is not reduced by
the US-to-Finland exchange and transfer process.


* SPA Drops ISP Lawsuits - Code of Conduct Still Advanced

In late Nov., the Software Publishers Association dropped two suits
against internet service providers (ISPs). SPA had intended to hold the
ISPs liable for the alleged coyright infringments of users. SPA had also
been advancing an "ISP Code of Conduct" demanding, among other things,
the appointing of a staff member to monitor and censor not only what all
of the ISPs customers said and posted online, but also to screen all
pass-through Net traffic being routed through their sites.

Though SPA had already dropped suit against one service provider,
Community ConneXion, by mid-Nov., and backpeddaled from one of the other
suits so forcefully as to give the access provider what amounts a lot
of free advertising in an SPA press release about settling
the case, the industry group curiously still proposes it's "Code"
(renamed "ISP Guidelines for Intellectual Property Protection",
apparently in the hope to make it sound more attractive. Industry likes
"guidelines" it can subscribe to but bridles at being force-fed a "code
of conduct").

The ISP industry just isn't going for this ostensible carrot, and the
SPA's stick has no sting. The Association of Online Professionals issued
a warning to Internet access companies to avoid the SPA "Code" like the
plague, as it undermines the ISP raison d'etre (to provide open access to
communications) and would greatly increase ISP liability for user actions,
with no return. EFF analyzed the problems inherent in the "Code", and
also criticized SPA's "kill the messenger" legal tactic of suing
providers for the actions users beyond their control - and for such
"crimes" as making WWW links to pages that might be infringing or even
providing information about software cracking. Electronic Frontiers
Georgia proposed a counter-policy addressing the SPA document's
complete lack of any requirement that copyright infringement complainants
show any evidence that they actually have a valid claim.

As of e-press time, SPA has yet to respond to any of the above, though
their dropping of the remaining suits against ISPs is certainly a good sign.

The above documents may all be found at:
http://www.eff.org/pub/Legal/Cases/SPA_cases/

------------------------------


Upcoming Events
---------------

This schedule lists EFF events, and those we feel might be of interest to
our members. EFF events (those sponsored by us or featuring an EFF speaker)
are marked with a "*" instead of a "-" after the date. Simlarly, government
events (such as deadlines for comments on reports or testimony submission,
or conferences at which government representatives are speaking) are marked
with "!" in place of the "-" ("!?" means a govt. speaker may appear, but
we don't know for certain yet.) And likewise, "+" in place of "-"
indicates a non-USA event. If it's a foreign EFF event with govt. people,
it'll be "*!+" instead of "-". You get the idea.

The latest version of the full EFF calendar is available from:

ftp: ftp.eff.org, /pub/EFF/calendar.eff
gopher: gopher.eff.org, 1/EFF, calendar.eff
http://www.eff.org/pub/EFF/calendar.eff

See also our new Now-Up-to-Date HTML calendar at:
http://events.eff.org


1996
----

Dec. 18 - MOUNTAIN VIEW, CA - first meeting of the Bay Area Chapter of
the Webmasters' Guild; The Webmasters' Guild is an organization
dedicated to providing industry education and business networking
opportunities for web site professionals.
6:30 PM; Netscape Communications, 487 E. Middlefield Rd.,
Mountain View, CA; Customer Briefing Center (Mozilla room);
Registration will begin at 6:30 PM with the meeting starting
promptly at 7:00 PM.
URL http://www.webmaster.org
R.S.V.P. to the Bay Area Chapter President, Bob Koche, at
bkoche@cruzio.com


1997
----
Jan. 10 - PHILADELPHIA - CALL FOR PAPERS!! - SIGIR '97 seeks original
contributions (i.e. never before published) in the broad field
of information storage and retrieval, covering the handling of
all types of information, people's behavior in information
systems, and theories, models and implementations of information
retrieval systems. Subscribe now to SIGIR '97 mailing list by
writing to <sigir97@potomac.ncsl.nist.gov> Information on
SIGIR '97 will periodically be sent to the mailing list as well as
posted at http://www.acm.org/sigir/conferences/sigir97/index.html
The conference will be held at the DoubleTree Hotel in
Philadelphia, PA, USA, July 27 -- July 31, 1997

Jan. 13 + LANCASTER, UK - ECSCW'97, the Fifth European Conference on
Computer Supported Cooperative Work; deadline for paper
submissions is January 13, 1997; papers must contain an abstract
of not more than 100 words and not exceed 16 pages in length; full
formatting instructions are available from
http://www.comp.lancs.ac.uk/computing/research/cseg/ecscw97/papers/
queries: ecscw97-papers@comp.lancs.ac.uk
for more information:
snail mail: ECSCW'97 Conference Office
Computing Department
Lancaster University
Lancaster LA1 4YR UK
URL: http://www.comp.lancs.ac.uk/computing/research/cseg/ecscw97/
email: ecscw97@comp.lancs.ac.uk

Jan. 15-
17 - WASHINGTON, DC - Universal Service '97: Redefining Universal
Telecommunications Service for the Emerging Competitive
Environment; for more information contact:
tel: +1 800 822 MEET
+1 202 842 3022 x317
URL: http://brp.com

Jan. 16-
17 - ARLINGTON, VA - NCSA International Virus Prevention Conference '97;
event will investigate "the continuing, worrisome, costly
problem of computer virus attacks, disasters and recovery;
Crystal Gateway Marriott (+1 703 271 5212);
more information:
tel: +1 717 258 1816
email: ivpc97@ncsa.com

Jan. 19-
21 - PALM SPRINGS, CA - Upside Technology Summit; "Managing Digital
Mania: An Extreme Sport for Technology Executives"; examining
effective business models and strategies in the booming world of
e-commerce; Al Franken has been invited to give a closing speech;
La Quinta Resort & Club, Palm Springs, CA; for more info contact:
URL: http://www.upside.com
tel: +1 888 33 UPSIDE

Jan. 23-
25 - CAMBRIDGE, MA
The Economics of Digital Information and Intellectual Property
Harvard University symposium to broaden and deepen understanding
of emerging economic and business models for global publishing
and information access and the attendant transformation of
international information markets, institutions, and businesses.
First Announcement and Call for Papers; Prospective authors should
submit short abstracts for review and comment as soon as possible.
Acceptances of abstracts and outlines are conditional pending
receipt of a satisfactory draft by December 15, 1996. Sponsored by
Harvard Law School.
email: iip@harvard.edu
regular mail: Tim Leshan, Information Infrastructure Project,
John F. Kennedy School of Government, 79 John F. Kennedy St.,
Cambridge, MA 02138
tel: 617-496-1389
fax: 617-495-5776

Jan. 28-
31 - RSA Cryptography Conference - Computerworld called last year's
event the sine qua non event of the crypto community; at various
facilities atop Nob Hill in San Francisco, the luminaries of
cryptography will gather; Right now, preparations for this
conference are underway. There are many exciting ways for
corporations and individuals to participate. Read on for
information about presenting, exhibiting, or just attending
http://www.rsa.com/conf97/

Feb. 10-
11 - Internet Society Symposium on Network and Distributed System
Security; for those interested in the practical aspects of network
and distributed system security, focusing on actual system design
and implementation, rather than theory. Dates, final call for
papers, advance program, and registration information will be
available at the URL: http://www.isoc.org/conferences/ndss97

Feb. 18-
20 - SAN JOSE, CA - DCI Internet Expo; the world's largest Internet,
Web and email conference and exposition; comprehensive program
will cover Web-enabled marketing, best practices for e-commerce
and application development; San Jose Convention Center; also
will be held April 22-24 at McCormick Place in Chicago, IL;
email: ExpoReg@dciexpo.com
URL: http://www.dciexpo.com

Feb. 24-
28 + ANGUILLA, BRITISH WEST INDIES
Financial Cryptography '97 - CALL FOR PAPERS; this is a new
conference on the security of digital financial transactions.
FC97 aims to bring together persons involved in both the
financial and data security fields to foster cooperation and
exchange of ideas. Send a cover letter and 9 copies of an extended
abstract to be received by November 29, 1996 to the Program Chair
at the address given below:
Rafael Hirschfeld
FC97 Program Chair
CWI
Kruislaan 413
1098 SJ Amsterdam
The Netherlands
email: ray@cwi.nl
phone: +31 20 592 4169
fax: +31 20 592 4199
URL: http://www.cwi.nl/conferences/FC97

Mar. 1-
5 - ACM97: The Next 50 Years of Computing; San Jose Convention
Center, March 1-5, 1997; Registration information:
URL: http://www.acm.org/acm97
tel: +1 800 342 6626

Mar. 3-
5 - NEW YORK CITY - Consumer Online Services TV; Jupiter
Communications conference featuring Steve Case of AOL and
Steve Perlman of WebTV; for more information contact:
tel: +1 800 488 4345
URL: http://www.jup.com

Apr. 8-
11 - FRACTAL 97: Fractals in the Natural & Applied Sciences 4th
International Working Conference; Denver Colorado. Sponsored by
IFIP; paper submissions due by Aug. 5, 1996.
Contact: Miroslav Novak, +44 181 547 2000 (voice),
+44 181 547 7562 or 7419 (fax)
Email: novak@kingston.ac.uk

Apr. 22-
24 - CHICAGO, IL - DCI Internet Expo; the world's largest Internet,
Web and email conference and exposition; comprehensive program
will cover Web-enabled marketing, best practices for e-commerce
and application development; San Jose Convention Center; also
will be held February 18-20 at the San Jose Convention Center;
email: ExpoReg@dciexpo.com
URL: http://www.dciexpo.com

June 2-
4 - American Society for Information Science 1997 Mid-Year Conference;
gathering will focus on privacy and security issues online;
Scottsdale Arizona; paper submissions due Nov. 1, 1996.
Contacts:
Gregory B. Newby, Co-Chair GSLIS/UIUC
Tel: (217) 244-7365; Email: gbnewby@uiuc.edu
Mark H. Needleman, Co chair UCOP
Tel: (510) 987-0530; Email: mhn@stubbs.ucop.edu
Karla Petersen, Panel Sessions
Tel: (312) 508-2657; Email: kpeter1@luc.edu
Richard Hill, Executive Director, ASIS
Tel: (301) 495-0900; Email: rhill@cni.org
URL: http://www.asis.org

June 14-
19 + CALGARY, CANADA
ED-MEDIA/ED-TELECOM 97--World Conference on Educational
Multimedia and Hypermedia and World Conference on Educational
Telecommunications are jointly held international conferences,
organized by the Association for the Advancement of Computing
in Education (AACE). These annual conferences serve as multi-
disciplinary forums for the discussion and dissemination of
information on the research, development, and applications on all
topics related to multimedia/hypermedia and distance education.
We invite you to attend ED-MEDIA/ED-TELECOM 97 and submit proposals
for papers, panels, roundtables, tutorials, workshops,
demonstrations/posters, and SIG discussions. Proposals may be
submitted in either hard copy (send 5 copies or fax 1 copy)
or in electronic form. Electronic proposals in the form of
URL addresses or ASCII files (uncoded) are preferred.
Submission Deadline: Oct. 25, 1996; Send to:
Program Chairs
ED-MEDIA 97/AACE
P.O. Box 2966
Charlottesville, VA 22902, USA
E-mail: AACE@virginia.edu; Phone: 804-973-3987; Fax: 804-978-7449
URL: http://www.aace.org/conf/edmedia

June 19-
20 - WASHINGTON, DC - CyberPayments '97
Conference will investigate issues of online commerce including
electronic cash and checks, credit cards, encryption systems
and security products; Sheraton Washington Hotel, Washington, DC
For more information contact:
email: vinceiaboni@msn.com
tel: +1 216 464 2618 x228
+1 800 529 7375

July 13-
17 - ACUTA 26th Annual Conference; Atlanta, Georgia.
Contact: +1 606 278 3338 (voice)

Sep. 7 -
11 + LANCASTER, UK - ECSCW'97, the Fifth European Conference on
Computer Supported Cooperative Work; deadline for paper
submissions is January 13, 1997; papers must contain an abstract
of not more than 100 words and not exceed 16 pages in length; full
formatting instructions are available from
http://www.comp.lancs.ac.uk/computing/research/cseg/ecscw97/papers/
queries: ecscw97-papers@comp.lancs.ac.uk
for more information:
snail mail: ECSCW'97 Conference Office
Computing Department
Lancaster University
Lancaster LA1 4YR UK
URL: http://www.comp.lancs.ac.uk/computing/research/cseg/ecscw97/
email: ecscw97@comp.lancs.ac.uk

Sep. 12-
14 SAN DIEGO - Association of Online Professionals Annual
Conference; sysop trade association's yearly gathering to
discuss issues of relevance to the industry
URL: http://www.aop.org/confrnc.html

Oct. 28-
31 - EDUCOM '97; Minneapolis-St. Paul, Minnesota.
Contact: +1 202 872 4200 (voice)
Email: conf@educom.edu

Dec. 1 - Computer Security Day (started by Washington DC chapter of the
Assoc. for Computing Machinery, to "draw attention to computer
security during the holdiay season when it might otherwise become
lax."

------------------------------


Subject: Quote of the Day
-------------------------

"Censorship, like charity, should begin at home; but, unlike charity, it
should end there."
- Clare Boothe Luce

Find yourself wondering if your privacy and freedom of speech are safe
when bills to censor the Internet are swimming about in a sea of of
surveillance legislation and anti-terrorism hysteria? Worried that in
the rush to make us secure from ourselves that our government
representatives may deprive us of our essential civil liberties?
Concerned that legislative efforts nominally to "protect children" will
actually censor all communications down to only content suitable for
the playground? Alarmed by commercial and religious organizations abusing
the judicial and legislative processes to stifle satire, dissent and
criticism?

Join EFF!
http://www.eff.org/EFFdocs/join_eff.html (or send any message to info@eff.org).

Even if you don't live in the U.S., the anti-Internet hysteria will soon
be visiting a legislative body near you. If it hasn't already.

------------------------------


Subject: What YOU Can Do
------------------------

* The Communications Decency Act & Other Censorship Legislation

The Communications Decency Act and similar legislation pose serious
threats to freedom of expression online, and to the livelihoods of system
operators. The legislation also undermines several crucial privacy
protections. The CDA is likely to be found unconstitutional by the
Supreme Court. But, bowing to pressure from theocratic organization,
Congress is likely to introduce and attempt to pass a slightly modified
version. Let your legislators know you will not stand for censorship,
nor for the wasting of millions of tax dollars on years of Supreme Court
litigation over laws that should never have even been proposed much less
passed in a democracy.

Business/industry persons concerned should alert their corporate govt.
affairs office and/or legal counsel about such censorship measures,
TODAY, while there is still time to plan.

Join in the Blue Ribbon Campaign - see http://www.eff.org/blueribbon.html

Support the EFF Cyberspace Legal Defense Fund:
http://www.eff.org/pub/Alerts/cyberlegal_fund_eff.announce

If you do not have full internet access (e.g. WWW), send your request
for information to ask@eff.org.

IMPORTANT! KEEP AN EYE ON YOUR LOCAL LEGISLATURE. All kinds of wacky
censorious legislation is turning up at the US state and non-US
national levels. Don't let it sneak by you - or by the online activism
community. Without locals on the look out, it's very difficult for the
Net civil liberties community to keep track of what's happening locally
as well as globally.


* Find Out Who Your Congresspersons Are

Writing letters to, faxing, and phoning your representatives in Congress
is one very important strategy of activism, and an essential way of
making sure YOUR voice is heard on vital issues.

If you are having difficulty determining who your US legislators are,
try contacting your local League of Women Voters, who maintain a great
deal of legislator information, or consult the free ZIPPER service
that matches Zip Codes to Congressional districts with about 85%
accuracy at:
http://www.stardot.com/~lukeseem/zip.html

Computer Currents Interactive has provided Congress contact info, sorted
by who voted for and against the Communications Decency Act:
http://www.currents.net/congress.html (NB: Some of these folks have,
fortunately, been voted out of office.)


* Join EFF!

You *know* privacy, freedom of speech and ability to make your voice heard
in government are important. You have probably participated in our online
campaigns and forums. Have you become a member of EFF yet? The best way to
protect your online rights is to be fully informed and to make your
opinions heard. EFF members are informed and are making a difference. Join
EFF today!

For EFF membership info, send queries to membership@eff.org, or send any
message to info@eff.org for basic EFF info, and a membership form.

------------------------------


Administrivia
=============

EFFector Online is published by:

The Electronic Frontier Foundation
1550 Bryant St., Suite 725
San Francisco CA 94103 USA
+1 415 436 9333 (voice)
+1 415 436 9993 (fax)
Membership & donations: membership@eff.org
Legal services: ssteele@eff.org
General EFF, legal, policy or online resources queries: ask@eff.org

Editor: Stanton McCandlish, Online Activist, Webmaster (mech@eff.org)

This newsletter is printed on 100% recycled electrons.

Reproduction of this publication in electronic media is encouraged. Signed
articles do not necessarily represent the views of EFF. To reproduce
signed articles individually, please contact the authors for their express
permission. Press releases and EFF announcements may be reproduced individ-
ually at will.

To subscribe to EFFector via email, send message body of "subscribe
effector-online" (without the "quotes") to listserv@eff.org, which will add
you to a subscription list for EFFector.

Back issues are available at:
ftp.eff.org, /pub/EFF/Newsletters/EFFector/
gopher.eff.org, 1/EFF/Newsletters/EFFector
http://www.eff.org/pub/EFF/Newsletters/EFFector/

To get the latest issue, send any message to effector-reflector@eff.org (or
er@eff.org), and it will be mailed to you automagically. You can also get
the file "current" from the EFFector directory at the above sites at any
time for a copy of the current issue. HTML editions available at:
http://www.eff.org/pub/EFF/Newsletters/EFFector/HTML/
at EFFweb. HTML editions of the current issue sometimes take a day or
longer to prepare after issue of the ASCII text version.

------------------------------





End of EFFector Online v09 #14 Digest
*************************************

$$

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT