[misc.handicap] Computer Privacy

34AEJ7D@CMUVM.BITNET (Bill Gorman) (12/10/90)

Index Number: 12422

Considering how vital computers are becoming to the disABLED community,
I thought this might be of interest.
BILL: If this is wide of the mark, just trash it.
------------------------------------------------------------------------
(forwarded by permission)
from: Jim Warren (jwarren@well.sf.ca.us)
subject: First Conference on Computers, Freedom & Privacy
Date: Undated

********************************************************************
***  CuD #2.13: File 4 of 5: Computers Freedom and Privacy Conf. ***
********************************************************************

{One good consequence of Operation Sun Devil has been the increased
awareness of the need to address issues of ethics, computer rights, and
computer abuse. The following conference is an attempt to bring a variety
of individuals and groups together to exchange information and
opinions--moderators}.

FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY
------------------------------------------------
March 25-28, 1991, Monday-Thursday
SFO Marriott Hotel, reservations: 800-228-9290
San Francisco Airport, 1800 Old Bayshore Hwy, Burlingame CA 94010

COOPERATING ORGANIZATIONS
-------------------------
Electronic Networking Association
Videotex Industry Association
Electronic Frontier Foundation
The WELL, Portal Communications
[as of 11/23/90, more expected shortly]
Sponsor: Computer Professionals for Social Responsibility

PLANNED CONFERENCE SESSIONS
---------------------------
1.  The Constitution in the Information Age [opening session]
coordinator: Jim Warren;  Chair: Jim Warren
  Introductory remarks; then, major policy proposal regarding electronic
communications and Constitutional rights.
speaker:  Professor Lawrence Tribe, Harvard Law School

2.  Trends in Computers & Networks
coordinator: Peter Denning;  Chair: Peter Denning
  Overview and prognosis of computing capabilities and networking as they
impact personal privacy, confidentiality, security, one-to-one & many-to-one
communication, and access to information about government, business & society.

3.  Public-Sector Information About Individuals
coordinators: Les Earnest, Bruce Koball;  Chair:
  Collection, verification, use, sharing and protection of, and access to and
responsibility for personal information, by government agencies, such as
census, voter, tax,  license, permit and criminal records.

4.  Private-Sector Information About Individuals
coordinators: Les Earnest, Bruce Koball;  Chair:
  Collection, marketing, verification, use and protection of, and access to
and responsibility for personal information, by private organizations, such as
banking, credit, health, consumer, employment, family & lifestyle information.

5.  International Perspectives & Impacts
coordinator: Mark Graham;  Chair:
  Other nations' models for protecting personal information and communication,
and granting access to government information; existing and developing laws;
requirements on trans-national dataflow, personal expression & accountability.

6.  Law Enforcement Practices and Problems
coordinators: Dorothy Denning, Glenn Tenney;  Chair:
  Issues relating to investigation, prosecution, due process and deterrence
of computer crimes, now and in the future; using computers to aid law
enforcement.

7.  Law Enforcement and Civil Liberties
coordinators: Dorothy Denning, Glenn Tenney;  Chair:
  Interaction of computer crime, law enforcement, and civil liberties; issues
of search and seizure, sanctions, and shared or networked equipment, software
and information.

8.  Legislation & Regulation
coordinators: Marc Rotenberg, Elliot Fabric;  Chair:
  Legislative and regulatory roles in protecting privacy and insuring access;
legal problems posed by computing and computer networks; approaches to
improving related government decision-making.

9.  Computer-Based Surveillance of Individuals
coordinators: Les Earnest, Bruce Koball;  Chair:
  Monitoring electronic-mail, public & private teleconferences, electronic
bulletin boards, publications and subscribers; tracking individuals' location,
work performance, buying habits & lifestyles; pattern recognition & profiling

10. Ethics and Education
coordinators: Dorothy Denning, Glenn Tenney;  Chair:
  Ethical principles for individuals, system administrators, organizations,
corporations, and government; copying data, copying software, distributing
confidential information; relations to computer education and computer law.

11. Electronic Speech, Press and Assembly
coordinators: Marc Rotenberg, Elliot Fabric;  Chair:
  Freedoms and responsibilities regarding electronic speech, public and
private electronic assembly, electronic publishing, prior restraint and
chilling effects of monitoring.

12. Access to Government Information
coordinator: Mark Graham;  Chair:
  Implementing individual and corporate access to federal, state & local
information about communities, corporations, legislation, administration, the
courts and public figures; allowing access while protecting confidentiality.

13. Where Do We Go From Here? [closing session]
coordinator: Jim Warren;  Chair: Jim Warren
  Perspectives and recommendations of participating groups, proposed next
steps to protect person privacy, protect fundamental freedoms and encourage
responsible policies and action.

********************************************************************

Ann.Parsons@f207.n260.z1.fidonet.org (Ann Parsons) (04/16/91)

Index Number: 14989

Hi Bill,

I was interested to see your message on the upcoming conference on Computers
and Privacy. I really don't  know why there has to be a conference on such an
issue. Let me explain. As an amateur Radio Operator, I am well aware that
others can hear what I broadcast over the air, so I keep that in mind when
broadcasting. I do not mention my exact address, I do not say when I am going
to be away, I just keep that thought in my head at all times. Even "private"
messages can be read by sys-ops, so I keep my "private" communications within
bounds that I think are reasonable. I'm a prety open person, so don't mind
discussing my feelings about issues in a private message. I think that the
conferees in San Francisco could do well to take a lesson from the Hams.

Admittedly, you're going to get some abuses, but I think that maybe the way to
solve this is to have a new telecommunicattor given a simple message that
clues him/her into the fact that the information given over a computer net,
even a "private" one, isn't as "private" as a face to face meeting or even a
phone call. It might be a good idea to give out such a communication in a
modem's packaging.So, if you keep to some common sense rules, you should be
ok.

I would like to mention here, that our new Adaptive Equipment Information
Chain's policy concerning those who fill out our form is that any info given
is kept in the data base and only released to persons seeking info with the
person's permission. We wouldn't dream of doing it any other way.

Incidently, if any one wants info about Adaptive Equipment Information Chain,
let me know. Thanks.

Dunnow if you were asking for opinions, but that's mine, for what it's worth.
<smile>

Ann P.

--
Uucp: ..!{decvax,oliveb}!bunker!hcap!hnews!260!207!Ann.Parsons
Internet: Ann.Parsons@f207.n260.z1.fidonet.org