Skip to main content
EFFecting Change Livestream Series: How to Protest with Privacy in Mind

EFFector - Volume 9, Issue 14 - US Supreme Court Schedules CDA Appeal: The Showdown Begins in Jan

EFFECTOR

EFFector - Volume 9, Issue 14 - US Supreme Court Schedules CDA Appeal: The Showdown Begins in Jan

=========================================================================
     ________________          _______________        _______________
    /_______________/\        /_______________\      /\______________\
    \\\\\\\\\\\\\\\\\/        |||||||||||||||||     / ////////////////
     \\\\\________/\          |||||________\       / /////______\
      \\\\\\\\\\\\\/____      ||||||||||||||      / /////////////
       \\\\\___________/\     |||||              / ////
        \\\\\\\\\\\\\\\\/     |||||              \////

=========================================================================
EFFector Online Volume 09 No. 14      Dec. 10, 1996       editors@eff.org
A Publication of the Electronic Frontier Foundation        ISSN 1062-9424

IN THIS ISSUE:

US Supreme Court Schedules CDA Appeal: The Showdown Begins in Jan.
EFF Analysis of Draft "Database Protection" Treaty
NewsNybbles
   EFF's "Know Your CyberRights Sweepstakes" - Spread the Word!
   EFF Hosts anon.penet.fi Defense Fund
   SPA Drops ISP Lawsuits - "Code of Conduct" Still Advanced
Upcoming Events
Quote of the Day
What YOU Can Do
Administrivia

* See http://www.eff.org/Alerts/ or ftp.eff.org, /pub/Alerts/ for more
information on current EFF activities and online activism alerts! *

----------------------------------------------------------------------


Subject: US Supreme Court Schedules CDA Appeal: The Showdown Begins in Jan.
---------------------------------------------------------------------------

The US Supreme Court on Friday scheduled briefing in the government's 
appeal of the 3-judge Philadelphia federal court ruling that the 
Communications Decency Act provisions of the Telecommunications Act of 
1996 are unconstitutional, in the merged ACLU v. Reno and ALA v. Dept. 
of Justice cases against the recent Internet censorship law.


* Briefing Schedule for Supreme Court Appeal of CDA Constitutionality 
  Challenge (ACLU v. Reno, ALA v. DoJ merged case), as of Dec. 1996:

  Jan. 21, 1997 - Appellant (government) brief due

  Feb. 20, 1997 - Appellee (EFF, ACLU, ALA, CIEC, et al.) brief due

  Mar. 7, 1997 - Appellant reply brief due.

  Mar-Apr., 1997 - Oral arguments in the case will be scheduled


It is important to note the announcement was not about whether the Supreme 
Court has chosen to review the lower court's decision in ACLU v. Reno -- 
the Court has *no choice* as to whether it will review that decision, so 
long as the government's appeal is not a frivolous one.  According to 
Article III of the U.S. Constitution, the Supreme Court can be compelled 
by Congress to hear certain kinds of appeals, even though normally 
Congress lets the Court set its own docket. Pursuant to Article III, the 
Telecom Act, like the Voting Rights Act and certain other legislative 
measures, grants the government an "appeal as of right" whenever a 
provision of the act is found unconstitutional by a lower court . This 
is very different from the normal petition-for-certiorari process by 
which cases normally come before the Court.  Congress intended that the
contentious provisions of the Telecom Act be settled quickly, and wrote 
provisions into the law itself to ensure this.

More importantly, the Court's announcement is not any indication, 
despite CDA supporters' claims, that the Supreme Court wants to overturn
the lower court's ruling.

What is significant about the news is that the Supreme Court has 
expressed 1) an interest in hearing oral arguments as well as 2) an
interest in speaking *directly* to the issues raised by the case (as
distinct from deciding the case summarily).

Legal teams from both of the original, now merged, cases will continue to 
work cooperatively on countering the Justice Department's appeal.

EFF remains very optimistic of the outcome of this case, as the CDA fails 
not one but *all* constitutionality tests.

Previous documents from cases are available at:
http://www.eff.org/pub/Legal/Cases/EFF_ACLU_v_DoJ/

More information about the CDA and similar Internet censorship measures:
http://www.eff.org/pub/Censorship/Internet_censorship_bills/

------------------------------


Subject: EFF Analysis of Draft "Database Protection" Treaty
-----------------------------------------------------------

Having failed to win the day in Congress, the US Administration is 
strongly pushing for international treaties to "reform" copyright law -
in ways that favor not the public interest, but a handful of commercial 
interests concerned with grabbing a property right to information itself 
- some of it information owned by you, the taxpayer. Patent and Trademark 
Commissioner Bruce Lehman, the primary architect of the would-be 
rewiring of global intellectual property law has brushed aside almost all
criticism of these measures, even from the industrial interests he 
claims would most benefit from the changes.

EFF, in response to a US Commerce Dept. "Request for Comments" has analyzed
the likely effects of the GII copyright overhaul, which range from making 
it impossible to obtain public information under the Freedom of 
Information Act if that data was processed by contractors, to making it 
illegal to browse a publicly accessible web page without explicit 
permission.  EFF's response to the Commerce Dept. RFC are appended below.
EFF also submitted additional comments, as a member of the Digital Future 
Coalition. The DFC analysis is available at http://www.dfc.org


* Background

The PTO's theory has been that investment in information and communication
technology such as the Internet will be stimulated by granting more explicit 
copyright protection to online media, including an all-new, sweeping 
protection of databases that amounts to granting ownership over facts to 
those who catalog them.  The Computer and Communications Industry 
Association, which includes AT&T and Sun, begs to differ, saying that the 
draft treaties would produce a liability morass that would-be investors 
will scramble to steer clear of.  

The provisions were first proposed in a Commerce Dept. "Green Paper", later 
surfacing in a "White Paper" with virtually no substantive fixes despite 
criticism from virtually all corners (see IPWG papers and critiques, 
http://www.eff.org/pub/Intellectual_property), then proposed as 
the doomed NII Copyright Act of 1996 and related US legislation (see 
http://www.eff.org/pub/Intellectual_property/NII_copyright_bill).

At all stages, researchers and public interest organizations have drawn close
attention to the fact that the proposals would directly undermine the 
public's fair use rights, important educational excemptions, Supreme Court
precedent, and even the ability to test encryption systems. Hardly the 
way to foster increased online commerce.

According to a Dec. 5 USIA report, Lehman is "mildly optimistic" that his 
end-run around Congress will succeed.  The Commissioner's single-minded 
zeal in turning controversial ideas of how copyright should be "reformed" 
for the Information Age into international law may be flagging. Lehman 
admits that the database-related provision have raised "legitimate concerns"
and appears to be taking seriously the research community's complaints 
that it would make their work difficult if not impossible.  However, the 
Administration appears completely blind to fair use concerns in their 
rush to grant businesses ownership of facts themselves.

The World Intellectual Property Organization (WIPO) considering the 
language of the draft treaties is not readily reachable by citizen advocacy.
However, should WIPO fail to heed the warnings and accept these shoddy
efforts at appeasing the database lobby at the expense of the rest of the 
world, remember that Congress rejected these proposals once. As treaties 
have to be ratified before they take effect, Congress can reject them 
again.  Please take a few moments to contact your legislators, and urge
them to reject both the WIPO Literary and Artistic Works Treaty and the 
WIPO Treaty on Intellectual Property in Respect of Databases, should either
survive the Dec. WIPO conference and be presented to Congress for 
ratification.  Copyright may indeed need some updating, but ramrodding 
ill-conceived and already-rejected proposals down the throat of the world 
is not the way to do it.

More information on the WIPO copyright "reform" is available at 
http://www.eff.org/pub/Intellectual_property/WIPO for the basics, or 
http://www.public-domain.org/ for a large amount of background material.


* EFF Analysis of WIPO Online Intellectual Property Draft Treaties


Mr. Keith M. Kupferschmid
Commissioner of Patents and Trademarks
Box 4, Patent and Trademark Office
Washington, DC  20231

November 22, 1996


Dear Mr. Kupferschmid,

I am writing in response to your request for comments on the Chairman's Text
of the Diplomatic Conference on Certain Copyright and Neighboring Rights 
Questions.  The Electronic Frontier Foundation (EFF) is a civil liberties 
organization that works on issues involving personal rights and freedoms in 
digital technologies.  We are very concerned about several aspects of the 
current proposals, and we appreciate the opportunity to provide you with our 
views.


Problems With the Database Treaty Proposal

There are many problems with the "Sui Generis Protection of Databases"
treaty proposal.  This treaty should be taken off the agenda in Geneva 
until interested parties within the United States have had the opportunity 
to discuss and debate the serious implications of its passage.  There have 
been no public hearings on this proposal.  It is premature to take any
official U.S. stance at this time.

This treaty would completely undermine the 1991 U.S. Supreme Court decision
in Feist Publications, Inc. v. Rural Telephone Service.  In Feist, the Court 
rejected a claim of copyright for data from a telephone directory's white 
pages, finding that facts cannot be copyrighted and that obvious items, such 
as listing names, addresses, and telephone numbers in alphabetical order, 
are not sufficiently creative to qualify for copyright protection.

The Feist decision was based on the grounds that facts cannot be copyrighted
or otherwise removed from the public domain.  By creating a new property 
right for facts, the treaty will impose regulations on the use of facts.  
Under the treaty, private monopolies for the maintenance of public data will 
be sanctioned, and individuals will have to pay for facts in the public 
domain.

This is particularly troubling because in the United States many government
databases are maintained by private contractors.  The pieces of information 
contained within those databases rightfully are part of the public domain; 
there is no other source for this information.  The private vendors who 
receive government contracts to maintain information owned by the people 
should not be given a property interest in that government information.
Furthermore, under the proposed database treaty, the government will be 
permitted to avoid compliance with the Freedom of Information Act (FOIA) 
if it uses private contractors, since the contractors will be said to have 
property rights to the public information.

In addition, there are problems with several definitions contained within
the treaty.  The definition of "database" is all-encompassing and will 
include many things that are not traditionally considered to be databases, 
such as collections of government documents.  The term "substantial" is 
troubling, in that it takes into account the database maintainer's 
perceived lost value in the marketplace.  Under this definition, it is 
reasonable to assume that even small portions of information used from a 
database would be considered a substantial portion of the database and 
would constitute violation of the treaty.  With no fair use rights, database
users would be precluded from using any bits of information they receive 
from a database if the database maintainer has charged for that information.

It is also unclear as to when the term of protection begins to start again.  
It seems from the language of the treaty that any changes to a database 
(i.e., any addition of data) will reset the clock for protection purposes.  
This will give database maintainers an infinite copyright in their databases.

The treaty also includes strong civil and criminal penalties for third-party
disseminators of this information.   Internet service providers and others 
who merely provide the conduit for communications should not be held liable 
for any unauthorized actions of their users.  Yet this treaty attempts to 
establish system operator liability under international law.

Finally, as in the proposed "Protection of Literary and Artistic
Works" treaty, the database proposal is accompanied by very strict
prohibitions against the "importation, manufacture or distribution of
protection-defeating devices . . . by any person knowing or having
reasonable grounds to know that the device" may be used for
circumventing the rights created in the treaty.  This turns current
Supreme Court law (See Sony Corp. of America v. Universal City Studios, 
Inc., 464 U.S. 417 (1984)) on its head; today a technology is 
legitimate to make, import and distribute if it has ANY legitimate uses 
-- not if ALL of its uses are legitimate.  Under this novel theory, 
common office supplies like correction fluid and scissors could be 
outlawed because they can be used to eliminate copyright markings on 
documents.  The Supreme Court made the correct call for society; the 
social good of an entire technology should not be suppressed merely 
because it causes quantifiable or alleged harm to one party.

Furthermore, the "protection-defeating device" restriction obviously 
covers both reverse-engineering tools and encryption technology.  
Reverse engineering is the process of discovering exactly what a 
competitor has built by detailed examination of an end-user product.
Eliminating the legal right to reverse-engineer makes it much easier
to establish monopolies enforced by the state.  This harms society by
slowing the flow of improved products, benefiting the few at the
expense of the many.  The restriction also makes it illegal to
"crack" or seek to crack encryption systems, an essential part of 
building real security into encryption systems (including copy 
protection systems).  Only if a security system is constantly open to 
public testing and scrutiny can its worth be assured and its security 
be improved.  It's clear that this part of the law would not stop 
criminals from circumventing technical copy protection systems; the 
much larger crime they are involved in is the theft of the 
intellectual property itself.  But it would stop professors, students, 
and competitors from studying copy protection systems to analyze their 
flaws and propose improvements.  And it would prohibit consumers from 
being able to obtain products which they would use in completely legal 
and legitimate ways; for example, to recover access to their own 
encrypted files.


Problems with the Literary and Artistic Works Treaty Proposal

As with the "Sui Generis Protection of Databases" treaty proposal, EFF has
many concerns about the "Protection of Literary and Artistic Works" treaty 
proposal to be considered by the diplomatic conference.

The way it is currently written, Article 7 would inhibit browsing on the
World Wide Web.  Article 7 requires signatories to treat temporary copies, 
such as the ephemeral random access memory (RAM) copies made on servers 
as a piece of information moves through the Internet, as a "reproduction" 
that could violate the exclusive reproduction right.  Temporary 
reproduction for technological purposes should not be given copyright 
protection.  All electronic communications would be copyright violations 
under this provision.

Article 10 would substantially expand the exposure of online service
providers.  Article 10 creates a new exclusive right of communication to 
the public, which appears to be broader than either the distribution right 
or public performance right now granted by the U.S. Copyright Act.  This 
new right, when combined with Article 7's treatment of RAM copies as
reproductions, significantly increases the likelihood that an online 
service provider would be found directly liable for a subscriber's 
infringement.

Article 12 would undermine many of the exceptions of the U.S. Copyright Act.
Article 12 would apparently eliminate exceptions that currently permit the 
use of copyrighted works for distance learning and performance of music in 
religious ceremonies.  These are but two examples.  It may also narrow the 
application of the fair use doctrine with respect to both commercial and 
non-commercial uses. 

Article 13 contains the exact same troubling language as the proposed "Sui
Generis Protection of Databases" treaty (discussed above) that would make 
reverse-engineering and the cracking of encryption illegal.

In conclusion, the Electronic Frontier Foundation believes that it is
premature for the United States to take a public stance on the issues
involved in the "Sui Generis Protection of Databases" treaty proposal.
If the United States does take a stance, we strongly urge that it
propose the rejection of the current draft.  We hope that the U.S.
delegation will pull that proposal from discussion in Geneva until a
national debate has taken place.  EFF has the same level of
reservations about the "Protection of Literary and Artistic Works"
treaty proposal in its current form.

Thank you for consideration of our views on these important issues.  Please
feel free to contact me if I can provide you with any additional information.

Sincerely,

[sig]

Shari Steele, Staff Attorney
Electronic Frontier Foundation		ssteele@eff.org
P.O. Box 649				301/375-8856 (voice)
Bryans Road, MD  20616			301/283-5337 (fax)

------------------------------


Subject: NewsNybbles
--------------------

* EFF's "Know Your CyberRights Sweepstakes" - Spread the Word!

As part of its educational and public awareness mission, EFF has launched 
a sweepstakes based on a series of online civil liberties questions and 
answers. Winners will receive a variety of prizes, including a Gibson 
guitar signed by UK recording artists The Cure.  The guitar was signed at 
Eden MusicFest, a 3-day mega-concert EFF helped organize to raise 
awareness of Internet privacy and free speech.

EFF members might not find the challenges very tough, but perhaps you'll 
consider passing around the following contest announcement to your 
favorite online haunts, posting it on your web page, etc.  Please feel 
free to simply create links to the sweepstakes' official web page at 
http://www.eff.org/sweeps/


[Please redistribute widely in appropriate places, but no later than Dec.
16, 1996.]

               EFF's "KNOW YOUR CYBERRIGHTS SWEEPSTAKES"

Play EFF's "Know Your CyberRights Sweepstakes," and win one of the 60+
great prizes we're giving away - maybe even the the Gibson guitar
autographed by the Cure!

Every day, decisions are being made that will affect your life online.
Since 1990, The Electronic Frontier Foundation has been looking out for you
- and your Constitutional rights.

EFF's "Know Your CyberRights" Sweepstakes is your chance to pick up
pointers while you earn chances to win great prizes. Just by answering one
multiple choice question in each of the four rounds, entering your e-mail
address and clicking on "Submit answer," you could win the guitar, an EFF
T-shirt signed by The Spin Doctors, one of 10 EFF T-shirts, or one of 50
Blue Ribbon pins!

To participate in EFF's "Know Your CyberRights Sweepstakes," go to
http://www.eff.org/sweeps.  Answers to Round 1's free speech question are
due Monday, December 16, at 11:59 a.m. Eastern Standard Time (EST).  So,
enter now, know your cyberrights, and play to win!

The "Know Your CyberRights Sweepstakes" is organized by the Electronic 
Frontier Foundation, and nonprofit public interest organization devoted 
to protecting civil liberites and promoting responsibility in new media,
and Yoyodyne Entertainment, a privacy-conscious and innovative Internet 
company specializing in free online games. 

[end announcement]

             ********************************************


* EFF Hosts anon.penet.fi Defense Fund

As reported in previous issues of EFFector, Johan Helsingius, operator
of the (former) pseudonymous remailer anon.penet.fi will appeal a Finnish 
court ruling that Penet's thousands of users, who depended on the remailer
to protect their privacy, have no expectation of privacy under Finnish law,
in response to Church of Scientology legal actions to gain access to
the real identity of a Penet user accused of copyright infringement.  
Helsingius is also considering legal action against a UK newspaper who 
slandered the remailer and it its operator in an attempt to paint yet 
another "Internet is an evil den of child pornographers" schlock stories.
Helsingius, who has long had a policy against illegal abuse of the 
remailers services was needlessly investigated for child pornography as a 
result of the unfounded accusations - and cleared of any wrongdoing.

As the US is the largest aggregate of Net users who may wish to support
Helsingius's appeal of the Finnish court's anti-privacy ruling and 
recovery of damages for defamation (of not just himself but essentially 
all privacy advocates and Internet users by implication), EFF will serve
as a clearinghouse for US donations to the Penet Legal Defense Fund.

Donations may be made by sending checks or money orders to:
Electronic Frontier Foundation
attn: Penet Fund
1550 Bryant St., Suite 725
San Francisco CA 94103

IMPORTANT! Checks/MOs should be made out to "EFF" or "Electronic Frontier 
Foundation", and clearly marked "Penet Fund" or "Penet Legal Defense Fund"
in the note space at the bottom.  Otherwise they could be mistaken for
donations to EFF itself.  

WE CANNOT PROCESS DRAFTS MADE OUT TO "PENET FUND". We would have to have 
a business license and a new account in that name.  Please also note that 
small donations such as $5 would be consumed by currency conversion fees 
and such. Please be generous. Consider it a holiday spirit gift to 
Internet privacy.  If you wish to send non-US funds (or even, better for 
Penet, Finnish funds), your best bet is to contact Helsingius directly at 
julf@penet.fi and make arrangements, so the donation is not reduced by
the US-to-Finland exchange and transfer process.


* SPA Drops ISP Lawsuits - Code of Conduct Still Advanced

In late Nov., the Software Publishers Association dropped two suits
against internet service providers (ISPs). SPA had intended to hold the 
ISPs liable for the alleged coyright infringments of users. SPA had also 
been advancing an "ISP Code of Conduct" demanding, among other things, 
the appointing of a staff member to monitor and censor not only what all 
of the ISPs customers said and posted online, but also to screen all 
pass-through Net traffic being routed through their sites.

Though SPA had already dropped suit against one service provider, 
Community ConneXion, by mid-Nov., and backpeddaled from one of the other
suits so forcefully as to give the access provider what amounts a lot
of free advertising in an SPA press release about settling 
the case, the industry group curiously still proposes it's "Code" 
(renamed "ISP Guidelines for Intellectual Property Protection", 
apparently in the hope to make it sound more attractive. Industry likes 
"guidelines" it can subscribe to but bridles at being force-fed a "code 
of conduct").

The ISP industry just isn't going for this ostensible carrot, and the 
SPA's stick has no sting.  The Association of Online Professionals issued
a warning to Internet access companies to avoid the SPA "Code" like the 
plague, as it undermines the ISP raison d'etre (to provide open access to 
communications) and would greatly increase ISP liability for user actions, 
with no return.  EFF analyzed the problems inherent in the "Code", and 
also criticized SPA's "kill the messenger" legal tactic of suing 
providers for the actions users beyond their control - and for such 
"crimes" as making WWW links to pages that might be infringing or even 
providing information about software cracking.  Electronic Frontiers 
Georgia proposed a counter-policy addressing the SPA document's
complete lack of any requirement that copyright infringement complainants
show any evidence that they actually have a valid claim.  

As of e-press time, SPA has yet to respond to any of the above, though
their dropping of the remaining suits against ISPs is certainly a good sign.

The above documents may all be found at:
http://www.eff.org/pub/Legal/Cases/SPA_cases/

------------------------------


Upcoming Events
---------------

This schedule lists EFF events, and those we feel might be of interest to
our members.  EFF events (those sponsored by us or featuring an EFF speaker)
are marked with a "*" instead of a "-" after the date.  Simlarly, government
events (such as deadlines for comments on reports or testimony submission,
or conferences at which government representatives are speaking) are marked
with "!" in place of the "-" ("!?" means a govt. speaker may appear, but
we don't know for certain yet.)  And likewise, "+" in place of "-"
indicates a non-USA event.  If it's a foreign EFF event with govt. people,
it'll be "*!+" instead of "-".  You get the idea.

The latest version of the full EFF calendar is available from:

ftp: ftp.eff.org, /pub/EFF/calendar.eff
gopher: gopher.eff.org, 1/EFF, calendar.eff
http://www.eff.org/pub/EFF/calendar.eff

See also our new Now-Up-to-Date HTML calendar at:
http://events.eff.org


1996
----

Dec. 18 - MOUNTAIN VIEW, CA - first meeting of the Bay Area Chapter of 
	  the Webmasters' Guild; The Webmasters' Guild is an organization 
	  dedicated to providing industry education and business networking 
	  opportunities for web site professionals.
	  6:30 PM; Netscape Communications, 487 E. Middlefield Rd., 
	  Mountain View, CA; Customer Briefing Center (Mozilla room); 
	  Registration will begin at 6:30 PM with the meeting starting 
	  promptly at 7:00 PM.  
	  URL http://www.webmaster.org
	  R.S.V.P. to the Bay Area Chapter President, Bob Koche, at 
	  bkoche@cruzio.com


1997
----
Jan. 10 - PHILADELPHIA - CALL FOR PAPERS!! - SIGIR '97 seeks original 
	  contributions (i.e. never before published) in the broad field 
	  of information storage and retrieval, covering the handling of 
	  all types of information, people's behavior in information
	  systems, and theories, models and implementations of information 
	  retrieval systems. Subscribe now to SIGIR '97 mailing list by 
	  writing to   Information on 
	  SIGIR '97 will periodically be sent to the mailing list as well as 
	  posted at http://www.acm.org/sigir/conferences/sigir97/index.html
	  The conference will be held at the DoubleTree Hotel in 
	  Philadelphia, PA, USA, July 27 -- July 31, 1997

Jan. 13 + LANCASTER, UK - ECSCW'97, the Fifth European Conference on
          Computer Supported Cooperative Work; deadline for paper
          submissions is January 13, 1997; papers must contain an abstract
          of not more than 100 words and not exceed 16 pages in length; full
          formatting instructions are available from
          http://www.comp.lancs.ac.uk/computing/research/cseg/ecscw97/papers/
          queries: ecscw97-papers@comp.lancs.ac.uk
          for more information:
          snail mail: ECSCW'97 Conference Office
                      Computing Department
                      Lancaster University
                      Lancaster  LA1 4YR  UK
          URL: http://www.comp.lancs.ac.uk/computing/research/cseg/ecscw97/
          email: ecscw97@comp.lancs.ac.uk

Jan. 15-
     17 - WASHINGTON, DC - Universal Service '97: Redefining Universal 
	  Telecommunications Service for the Emerging Competitive
	  Environment; for more information contact:
	  tel: +1 800 822 MEET
	       +1 202 842 3022 x317
	  URL: http://brp.com

Jan. 16-
     17 - ARLINGTON, VA - NCSA International Virus Prevention Conference '97;
	  event will investigate "the continuing, worrisome, costly 
	  problem of computer virus attacks, disasters and recovery; 
	  Crystal Gateway Marriott (+1 703 271 5212);
	  more information:
	  tel: +1 717 258 1816
	  email: ivpc97@ncsa.com

Jan. 19-
     21 - PALM SPRINGS, CA - Upside Technology Summit; "Managing Digital 
	  Mania: An Extreme Sport for Technology Executives"; examining 
	  effective business models and strategies in the booming world of 
	  e-commerce; Al Franken has been invited to give a closing speech;
	  La Quinta Resort & Club, Palm Springs, CA; for more info contact:
	  URL: http://www.upside.com
	  tel: +1 888 33 UPSIDE
	  
Jan. 23-
     25 - CAMBRIDGE, MA
	  The Economics of Digital Information and Intellectual Property
	  Harvard University symposium to broaden and deepen understanding 
	  of emerging economic and business models for global publishing 
	  and information access and the attendant transformation of 
	  international information markets, institutions, and businesses.
	  First Announcement and Call for Papers; Prospective authors should 
	  submit short abstracts for review and comment as soon as possible. 
	  Acceptances of abstracts and outlines are conditional pending 
	  receipt of a satisfactory draft by December 15, 1996. Sponsored by
	  Harvard Law School.
	  email: iip@harvard.edu
	  regular mail: Tim Leshan, Information Infrastructure Project, 
		John F. Kennedy School of Government, 79 John F. Kennedy St., 
		Cambridge, MA 02138
	  tel: 617-496-1389
	  fax: 617-495-5776

Jan. 28-
     31 - RSA Cryptography Conference - Computerworld called last year's 
	  event the sine qua non event of the crypto community; at various 
	  facilities atop Nob Hill in San Francisco, the luminaries of 
	  cryptography will gather; Right now, preparations for this 
	  conference are underway. There are many exciting ways for 
	  corporations and individuals to participate. Read on for 
	  information about presenting, exhibiting, or just attending
	  http://www.rsa.com/conf97/

Feb. 10-
     11 - Internet Society Symposium on Network and Distributed System 
	  Security; for those interested in the practical aspects of network 
	  and distributed system security, focusing on actual system design 
	  and implementation, rather than theory. Dates, final call for
          papers, advance program, and registration information will be
	  available at the URL: http://www.isoc.org/conferences/ndss97

Feb. 18-
     20 - SAN JOSE, CA - DCI Internet Expo; the world's largest Internet, 
	  Web and email conference and exposition; comprehensive program 
	  will cover Web-enabled marketing, best practices for e-commerce 
	  and application development; San Jose Convention Center; also
	  will be held April 22-24 at McCormick Place in Chicago, IL;
	  email: ExpoReg@dciexpo.com
	  URL: http://www.dciexpo.com

Feb. 24-
     28 + ANGUILLA, BRITISH WEST INDIES
	  Financial Cryptography '97 - CALL FOR PAPERS; this is a new 
	  conference on the security of digital financial transactions.
	  FC97 aims to bring together persons involved in both the
	  financial and data security fields to foster cooperation and 
	  exchange of ideas. Send a cover letter and 9 copies of an extended 
	  abstract to be received by November 29, 1996 to the Program Chair 
	  at the address given below:
	  Rafael Hirschfeld
	  FC97 Program Chair
	  CWI
	  Kruislaan 413
	  1098 SJ Amsterdam
	  The Netherlands
	  email: ray@cwi.nl
	  phone: +31 20 592 4169
	  fax: +31 20 592 4199
	  URL: http://www.cwi.nl/conferences/FC97

Mar. 1-
     5 -  ACM97: The Next 50 Years of Computing; San Jose Convention 
	  Center, March 1-5, 1997; Registration information: 
	  URL: http://www.acm.org/acm97
	  tel: +1 800 342 6626		

Mar. 3-
     5 -  NEW YORK CITY - Consumer Online Services TV; Jupiter 
	  Communications conference featuring Steve Case of AOL and 
	  Steve Perlman of WebTV; for more information contact:
	  tel: +1 800 488 4345
	  URL: http://www.jup.com

Apr. 8-
     11 - FRACTAL 97: Fractals in the Natural & Applied Sciences 4th 
          International Working Conference; Denver Colorado.  Sponsored by
          IFIP; paper submissions due by Aug. 5, 1996.
          Contact: Miroslav Novak, +44 181 547 2000 (voice), 
                   +44 181 547 7562 or 7419 (fax)
          Email: novak@kingston.ac.uk   

Apr. 22-
     24 - CHICAGO, IL - DCI Internet Expo; the world's largest Internet,
          Web and email conference and exposition; comprehensive program
          will cover Web-enabled marketing, best practices for e-commerce
          and application development; San Jose Convention Center; also
          will be held February 18-20 at the San Jose Convention Center;
          email: ExpoReg@dciexpo.com
          URL: http://www.dciexpo.com

June 2-
     4  - American Society for Information Science 1997 Mid-Year Conference;  
          gathering will focus on privacy and security issues online; 
          Scottsdale Arizona; paper submissions due Nov. 1, 1996.
	  Contacts:
		Gregory B. Newby, Co-Chair GSLIS/UIUC
	  	 Tel: (217) 244-7365; Email: gbnewby@uiuc.edu
		Mark H. Needleman, Co chair UCOP
		 Tel: (510) 987-0530; Email: mhn@stubbs.ucop.edu
		Karla Petersen, Panel  Sessions
		 Tel: (312) 508-2657; Email: kpeter1@luc.edu
		Richard Hill, Executive Director, ASIS
		 Tel: (301) 495-0900; Email: rhill@cni.org
	  URL: http://www.asis.org

June 14-
     19 + CALGARY, CANADA
	  ED-MEDIA/ED-TELECOM 97--World Conference on Educational 
	  Multimedia and Hypermedia and World Conference on Educational 
	  Telecommunications are jointly held international conferences, 
	  organized by the Association for the Advancement of Computing 
	  in Education (AACE). These annual conferences serve as multi-
	  disciplinary forums for the discussion and dissemination of 
	  information on the research, development, and applications on all 
	  topics related to multimedia/hypermedia and distance education.  
	  We invite you to attend ED-MEDIA/ED-TELECOM 97 and submit proposals 
	  for papers, panels, roundtables, tutorials, workshops, 
	  demonstrations/posters, and SIG discussions. Proposals may be 
	  submitted in either hard copy (send 5 copies or fax 1 copy) 
	  or in electronic form.  Electronic proposals in the form of 
	  URL addresses or ASCII files (uncoded) are preferred.
	  Submission Deadline: Oct. 25, 1996; Send to:
	  Program Chairs
	  ED-MEDIA 97/AACE
	  P.O. Box 2966
	  Charlottesville, VA 22902, USA
	  E-mail: AACE@virginia.edu; Phone: 804-973-3987; Fax: 804-978-7449
	  URL: http://www.aace.org/conf/edmedia

June 19-
     20 - WASHINGTON, DC - CyberPayments '97
	  Conference will investigate issues of online commerce including
	  electronic cash and checks, credit cards, encryption systems 
	  and security products; Sheraton Washington Hotel, Washington, DC
	  For more information contact:
	  email: vinceiaboni@msn.com
	  tel: +1 216 464 2618 x228
	       +1 800 529 7375

July 13-
     17 - ACUTA 26th Annual Conference; Atlanta, Georgia.
          Contact: +1 606 278 3338 (voice)

Sep. 7 -
     11 + LANCASTER, UK - ECSCW'97, the Fifth European Conference on 
	  Computer Supported Cooperative Work; deadline for paper 
	  submissions is January 13, 1997; papers must contain an abstract 
	  of not more than 100 words and not exceed 16 pages in length; full 
	  formatting instructions are available from
	  http://www.comp.lancs.ac.uk/computing/research/cseg/ecscw97/papers/
	  queries: ecscw97-papers@comp.lancs.ac.uk
	  for more information:
	  snail mail: ECSCW'97 Conference Office
		      Computing Department
		      Lancaster University
		      Lancaster  LA1 4YR  UK
	  URL: http://www.comp.lancs.ac.uk/computing/research/cseg/ecscw97/
	  email: ecscw97@comp.lancs.ac.uk

Sep. 12-
     14   SAN DIEGO - Association of Online Professionals Annual 
	  Conference; sysop trade association's yearly gathering to 
	  discuss issues of relevance to the industry
	  URL: http://www.aop.org/confrnc.html

Oct. 28-
     31 - EDUCOM '97; Minneapolis-St. Paul, Minnesota.
          Contact: +1 202 872 4200 (voice)
          Email: conf@educom.edu

Dec. 1  - Computer Security Day (started by Washington DC chapter of the
          Assoc. for Computing Machinery, to "draw attention to computer
          security during the holdiay season when it might otherwise become
          lax."   

------------------------------


Subject: Quote of the Day
-------------------------

"Censorship, like charity, should begin at home; but, unlike charity, it 
should end there."
  - Clare Boothe Luce

Find yourself wondering if your privacy and freedom of speech are safe 
when bills to censor the Internet are swimming about in a sea of of 
surveillance legislation and anti-terrorism hysteria?  Worried that in 
the rush to make us secure from ourselves that our government 
representatives may deprive us of our essential civil liberties? 
Concerned that legislative efforts nominally to "protect children" will 
actually censor all communications down to only content suitable for 
the playground?  Alarmed by commercial and religious organizations abusing
the judicial and legislative processes to stifle satire, dissent and 
criticism?

Join EFF!   
http://www.eff.org/EFFdocs/join_eff.html (or send any message to info@eff.org).

Even if you don't live in the U.S., the anti-Internet hysteria will soon 
be visiting a legislative body near you.  If it hasn't already.

------------------------------


Subject: What YOU Can Do
------------------------

* The Communications Decency Act & Other Censorship Legislation

The Communications Decency Act and similar legislation pose serious 
threats to freedom of expression online, and to the livelihoods of system 
operators.  The legislation also undermines several crucial privacy 
protections.  The CDA is likely to be found unconstitutional by the 
Supreme Court. But, bowing to pressure from theocratic organization,
Congress is likely to introduce and attempt to pass a slightly modified 
version.  Let your legislators know you will not stand for censorship,
nor for the wasting of millions of tax dollars on years of Supreme Court 
litigation over laws that should never have even been proposed much less 
passed in a democracy.

Business/industry persons concerned should alert their corporate govt.
affairs office and/or legal counsel about such censorship measures, 
TODAY, while there is still time to plan.

Join in the Blue Ribbon Campaign - see http://www.eff.org/blueribbon.html

Support the EFF Cyberspace Legal Defense Fund:
http://www.eff.org/pub/Alerts/cyberlegal_fund_eff.announce

If you do not have full internet access (e.g. WWW), send your request
for information to ask@eff.org.

IMPORTANT! KEEP AN EYE ON YOUR LOCAL LEGISLATURE.  All kinds of wacky
censorious legislation is turning up at the US state and non-US 
national levels.  Don't let it sneak by you - or by the online activism 
community. Without locals on the look out, it's very difficult for the 
Net civil liberties community to keep track of what's happening locally 
as well as globally.


* Find Out Who Your Congresspersons Are

Writing letters to, faxing, and phoning your representatives in Congress
is one very important strategy of activism, and an essential way of
making sure YOUR voice is heard on vital issues.

If you are having difficulty determining who your US legislators are,
try contacting your local League of Women Voters, who maintain a great 
deal of legislator information, or consult the free ZIPPER service
that matches Zip Codes to Congressional districts with about 85%
accuracy at:
http://www.stardot.com/~lukeseem/zip.html

Computer Currents Interactive has provided Congress contact info, sorted 
by who voted for and against the Communications Decency Act:
http://www.currents.net/congress.html (NB: Some of these folks have, 
fortunately, been voted out of office.)


* Join EFF!

You *know* privacy, freedom of speech and ability to make your voice heard
in government are important. You have probably participated in our online
campaigns and forums.  Have you become a member of EFF yet?  The best way to
protect your online rights is to be fully informed and to make your
opinions heard.  EFF members are informed and are making a difference.  Join
EFF today!

For EFF membership info, send queries to membership@eff.org, or send any
message to info@eff.org for basic EFF info, and a membership form.

------------------------------


Administrivia
=============

EFFector Online is published by:

The Electronic Frontier Foundation
1550 Bryant St., Suite 725
San Francisco CA 94103 USA
+1 415 436 9333 (voice)
+1 415 436 9993 (fax)
Membership & donations: membership@eff.org
Legal services: ssteele@eff.org
General EFF, legal, policy or online resources queries: ask@eff.org

Editor: Stanton McCandlish, Online Activist, Webmaster (mech@eff.org)

This newsletter is printed on 100% recycled electrons.

Reproduction of this publication in electronic media is encouraged.  Signed
articles do not necessarily represent the views of EFF.  To reproduce
signed articles individually, please contact the authors for their express
permission. Press releases and EFF announcements may be reproduced individ-
ually at will.

To subscribe to EFFector via email, send message body of "subscribe
effector-online" (without the "quotes") to listserv@eff.org, which will add
you to a subscription list for EFFector.

Back issues are available at:
ftp.eff.org, /pub/EFF/Newsletters/EFFector/
gopher.eff.org, 1/EFF/Newsletters/EFFector
http://www.eff.org/pub/EFF/Newsletters/EFFector/

To get the latest issue, send any message to effector-reflector@eff.org (or
er@eff.org), and it will be mailed to you automagically.  You can also get
the file "current" from the EFFector directory at the above sites at any 
time for a copy of the current issue.  HTML editions available at:
http://www.eff.org/pub/EFF/Newsletters/EFFector/HTML/ 
at EFFweb.  HTML editions of the current issue sometimes take a day or 
longer to prepare after issue of the ASCII text version.

------------------------------





End of EFFector Online v09 #14 Digest
*************************************

$$

Back to top

JavaScript license information