29 May 1998
Date: Fri, 29 May 1998 17:57:13 -0400
From: Dan L Burk <BURKDANL@SHU.EDU>
Subject: Workshop Announcement -- Campus Computer Policies & The Law
To: CYBERIA-L@LISTSERV.AOL.COM
COMPUTER POLICY & LAW
--------------------------------------------------------------
Annual Seminar 1998
July 8-10, 1998
Ithaca, New York
WHO SHOULD ATTEND:
--------------------------------------------------------------
* University Attorneys
* Judicial Officers
* Technology Administrators
* Risk Managers
* Webmasters
* Publications Directors
* Public Relations Administrators
Spring, 1998
--------------------------------------------------------------
Dear Colleague,
You are cordially invited to join us at Cornell University in July,
1998, for the third Computer Policy and Law Annual Seminar. Once again,
we have invited a group of distinguished technologists and legal
experts to help us examine new computing technologies and the legal
implications of their widespread availability on campus. Within the
context of recent legislation and judicial decisions, we will evaluate
the existing computer-use policies of a number of colleges and
universities and explore how to cope with and avoid liability for the
inappropriate use of electronic communications.
Based on our experiences here at Cornell, and on our conversations with
representatives from dozens of other colleges and universities around
the country, we are convinced that the development of effective and
appropriate computer-use policies depends on active and ongoing
collaboration between technology specialists and legal counsel. Our
annual Computer Policy and Law seminar provides these two groups
with a chance to initiate and strengthen such collaborative efforts.
Technologists and legal experts participate side by side in the
program, sharing insights, updating and developing skills and
knowledge, and evaluating the implications of the timely and practical
presentations-a rare opportunity indeed.
Winner of the 1995 CAUSE award for Excellence in Campus Networking,
Cornell is an acknowledged leader in putting information resources into
the hands of all members of the university community. We are proud of
Cornell's leadership role, particularly because our experiences show
us that all too often computer-use policies are developed in reaction
to computer-abuse crises. The Computer Policy and Law Annual Seminar
provides participants with the tools they need to develop a proactive
approach to these crucial issues-a goal to which we all can aspire.
We hope you'll join us in Ithaca!
Cordially,
Marjorie W. Hodges, JD
Program Director
Computer Policy and Law
and Policy Advisor
Office of Information Technologies
Cornell University
Steven L. Worona
Program Director
Computer Policy and Law
and Assistant to the Vice President
for Information Technologies
Cornell University
PROGRAM SESSIONS
--------------------------------------------------------------
* On-line Privacy
* Developing Computer-Use Policies
* Applications of Public-Key Technology
* Handling Computer Abuse
* Internet Service Provider Liability
* Intellectual Property in Cyberspace
* Jurisdiction in a Virtual World
* The Future of Copyright
* Computer-Abuse Case Study
PROGRAM PRESENTERS
--------------------------------------------------------------
Dan L. Burk
Assistant Professor of Law
Seton Hall University
Marjorie W. Hodges
Policy Advisor, Office of
Information Technologies
Cornell University
Kathleen Kimball
Computer, Network,
and Information Security Officer
The Pennsylvania State University
Philip E. Long
Director of Academic Computing
Yale University
David Lytel
President, NYSERNet
Steven J. McDonald
Associate Legal Counsel
The Ohio State University
David G. Post
Associate Professor of Law
Temple University Law School
Co-Director, Cyberspace Law Institute
Brian B. Shaw
Partner, Cumpston and Shaw
Barbara Skoblick
Assistant Audit Director
Information Technologies
Cornell University
Oren Sreebny
Assistant Director for Client Services,
Computing, & Communications
University of Washington
Steven L. Worona
Assistant to the Vice President
for Information Technologies
Cornell University
NOTEWORTHY PUBLICATIONS
BY PROGRAM PRESENTERS
--------------------------------------------------------------
Dan L. Burk "Ownership of Electronic Course Materials in Higher
Education." CAUSE/EFFECT 20, no. 3 (Fall 1997).
Dan L. Burk "Challenges to Copyright Law and Fair Use by New
Information Technology." 1998 AAAS Science and Technology Policy
Yearbook, edited by A. Teich, S. Nelson, and C. McEnaney, 1998.
Marjorie W. Hodges "Institutional Liability for Student Expression on
College Computer Networks." Synthesis: Law and Policy in Higher
Education 9, no. 3 (Winter 1998).
Marjorie W. Hodges and Steven L. Worona "The First Amendment in
Cyberspace." CAUSE/EFFECT 20, no. 3 (Fall 1997): 4-8, and "Legal
Underpinnings for Creating Campus Computer Policy." CAUSE/EFFECT
19,
no. 4 (Winter 1996): 5-9.
Steven J. McDonald "The Laws of Cyberspace: What Colleges Need to
Know." Chronicle of Higher Education (October 31, 1997).
Steven J. McDonald "Governing Cyberspace." Wayne Law Review 43
(1997):
155.
David G. Post "And How Shall the Net Be Governed? A Meditation on the
Relative Virtues of Decentralized, Emergent Law." Coordinating the
Internet, edited by Brian Kahin and James Keller, MIT Press, 1997.
PROGRAM SESSIONS
--------------------------------------------------------------
ON-LINE PRIVACY
The institution may own the computers and the networks, but who owns
the information on them? What on-line privacy rights do computer users
have, and does the answer vary according to an individual's status as a
student, faculty member, or staff member? This session focuses on
formulating answers to these questions and creating a basis for
developing policies pertaining to on-line privacy rights. Participants
examine open records laws, the Electronic Communications Privacy Act,
the Family Educational Rights and Privacy Act, the Freedom of
Information Act, and discovery issues surrounding records retention
policies.
DEVELOPING COMPUTER-USE POLICIES
Developing and reviewing computer-use policies are among the many
challenges facing colleges and universities today. This presentation
outlines models for developing such policies as well as for creating
educational programs. In addition, the presenter will evaluate existing
institutional computer-use policies in the context of several concerns,
such as acceptable use, data access, and privacy.
APPLICATIONS OF PUBLIC-KEY TECHNOLOGY
Public-key technology allows for private messages, digital signatures,
anti-forgery mechanisms, personal authentication, authority validation,
and a host of other capabilities. This session provides a nontechnical
description of public-key technology and its applications.
HANDLING COMPUTER ABUSE
College and university administrators are called upon with increasing
frequency to respond to computer-abuse complaints, many involving
such emotionally charged issues as harassment and discrimination. During
this session, representatives from a variety of institutions talk about
what it's like to handle these computer-abuse cases day in and day
out. Panelists address how they receive complaints and direct them
to
the appropriate individuals, how their institutions handle and
coordinate investigations, and what resources they require to
effectively manage the growing volume of cases. They also discuss
their attempts to prevent computer abuse by implementing related policies,
holding educational programs, and promoting awareness of the issue.
INTERNET SERVICE PROVIDER LIABILITY
Allan A. Ryan, Jr., Harvard University's in-house counsel, states that
"Colleges and universities are just Internet service providers that
charge tuition." Whether or not you agree with this, it is undeniably
important to understand the issues surrounding college and university
liability for Internet services. This session focuses on these topics
and examines the legislation and case law that determine Internet
service provider liability for material posted by third parties
(students, faculty, staff, alumni, families, and non-affiliates). In
addition, the presenter analyzes existing college and university
policies addressing Internet service provider liability and identifies
options for future policy development.
INTELLECTUAL PROPERTY IN CYBERSPACE
Current case law and legislation provide mixed signals about the thin
line between permissible and actionable use of intellectual property in
cyberspace. This session helps participants identify potential safe
harbors in view of such uncertainty in the application of trademark and
copyright laws. The presentation reviews the intellectual property
framework that institutions must accommodate when developing policies
in this arena; covers trademark law, including strategies for
protecting institutional logos and domain names; and examines
jurisdictional issues, including the steps necessary to avoid being
sued.
JURISDICTION IN A VIRTUAL WORLD
On-line interactions and transactions raise particularly difficult
questions about personal jurisdiction, a court's power to compel a
defendant to appear and to defend against a claim of unlawful conduct.
This session reviews a number of recent cases involving cutting-edge
jurisdictional issues and attempts to assess whether or not
Internet-specific jurisdictional rules are emerging to address this
topic.
THE FUTURE OF COPYRIGHT
In response to the increasing difficulty of applying existing
intellectual property law to the Internet, legislators in the U.S.
Congress and abroad are proposing new laws to tackle this problem. But
even as they do so, technologies continue to evolve for manipulating
and transmitting digital content of all types. In the context of this
rapidly changing field, this session examines these trends and
speculates on the future of copyrights in cyberspace.
COMPUTER-ABUSE CASE STUDY
Presenters for this session use role play to illustrate some of the
best and worst ways in which colleges and universities respond to
computer-abuse cases. In the featured scenario, presenters portray
a complainant, the accused, a university president, a vice-president
for university relations, university counsel, a dean of students, and
campus police responding to a case of computer abuse.
PROGRAM INFORMATION
--------------------------------------------------------------
PROGRAM CHARGE
The program charge for Computer Policy and Law is $925, which includes
the full program; course materials; a Cornell University certificate of
completion; lunch and dinner on Wednesday and lunch on Thursday and
Friday; and refreshment breaks throughout the program. Continuing
Education Units (CEUs) are available to program participants. Persons
whose cancellations are received in writing by June 8 will receive a
full refund. Cancellations received after June 8 are subject to a $200
cancellation fee. Substitutions may be made prior to July 6.
ACCOMMODATIONS
A wide variety of housing options are available at local hotels,
motels, bed-and-breakfasts, and the first-class Statler Hotel located
on the central Cornell campus. Rooms have been reserved at reduced
rates at the following locations: Statler Hotel, 800 541-2501,
$108/single and $118/double; Best Western University Inn, 607 272-6100,
$69/single or double; and Holiday Inn, 607 272-1000, $77/single or
double. To make reservations, please contact the hotels directly,
mentioning the program by name to receive the reduced rate. Room
availability and rates cannot be guaranteed after June 16.
REGISTRATION INFORMATION
Registration will begin at the Statler Hotel and Conference Center (on
the central Cornell campus) at 8 a.m. on Wednesday, July 8. The program
will begin at 9 a.m. on Wednesday, July 8, and end at 5 p.m. on Friday,
July 10. Program sessions will be held in the Statler Hotel. Dress
is
casual for all program sessions, including dinner.
TRAVEL
The Ithaca airport (ten minutes from the campus) is served by US
Airways. Syracuse, Binghamton, and Elmira airports are approximately
one hour's drive through scenic country. Syracuse is served by most
major airlines including American, Continental, Delta, United, and US
Airways.
THE FINGER LAKES
You may wish to stay on in Ithaca the weekend after the program (or to
arrive early). Cornell University is located in the heart of the Finger
Lakes vacation region, one of the most attractive and scenic areas of
New York State. Summer activities include sailing on Cayuga Lake,
swimming, fishing, picnicking, and hiking. A small cosmopolitan city,
Ithaca has many inviting restaurants, caf=E9s, and shops of all kinds.
FURTHER INFORMATION
Computer Policy and Law, Cornell University
B20 Day Hall, Ithaca, NY 14853-2801
Telephone: 607 255-7259
Fax: 607 255-9697
E-mail: cusp@cornell.edu
Web:
www.sce.cornell.edu/html/cpl.html
The program herein described may be changed or cancelled by Cornell
University School of Continuing Education and Summer Sessions. Cornell
University is an equal opportunity, affirmative action educator and
employer.