home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.os.vms
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!moe.ksu.ksu.edu!mimbres.cs.unm.edu!constellation!geohub.gcn.uoknor.edu!dwight
- From: dwight@geohub.gcn.uoknor.edu (Dwight D. Moore)
- Subject: Re: Sysop checking mail
- Originator: usenet@kittyhawk.ecn.uoknor.edu
- Sender: usenet@constellation.ecn.uoknor.edu (Usenet Administrator)
- Message-ID: <BzEv57.CEq@constellation.ecn.uoknor.edu>
- Date: Thu, 17 Dec 1992 16:00:42 GMT
- Reply-To: dwight@geohub.gcn.uoknor.edu
- References: <1992Dec12.002018.20761@mnemosyne.cs.du.edu> <BzCA4I.903@bcstec.ca.boeing.com>
- Nntp-Posting-Host: kittyhawk.ecn.uoknor.edu
- Organization: Geosciences Computing Network, Univ. of Oklahoma
- Lines: 51
-
- In article <BzCA4I.903@bcstec.ca.boeing.com>, silverm@bcstec.ca.boeing.com (Jeff Silverman) writes:
- |>Newsgroups: comp.os.vms
- |>Path:
- |>constellation!mimbres.cs.unm.edu!ncar!elroy.jpl.nasa.gov!ames!haven.umd.edu!uunet!bcstec!silverm
- |>From: silverm@bcstec.ca.boeing.com (Jeff Silverman)
- |>Subject: Re: Sysop checking mail
- |>Message-ID: <BzCA4I.903@bcstec.ca.boeing.com>
- |>Organization: Boeing Computer Services
- |>References: <1992Dec12.002018.20761@mnemosyne.cs.du.edu>
- |>Date: Wed, 16 Dec 1992 06:31:30 GMT
- |>Lines: 25
- |>
- |>ctanski@nyx.cs.du.edu (Chris Tanski) writes:
- |>>Can somebody tell me when it's legal and when it's illegal for a sysop to
- |>>check another user's mail? Thanks and please reply directly to
- |>>ctanski@nyx.cs.du.edu.
- |>>Chris Tanski
- |>
- |>Chris and everybody else:
- |>
- |> You should consider electronic mail to be an "open channel". Therefore,
- |>you should take steps to ensure that any electronic mail messages is
- |>1) encrypted and 2) authenticated. Encryption ensures that the message can
- |>only be read by the recipient. Authentication ensures that the message can
- |>only be generated by the author.
- |> Legal/illegal is irrelevant. The sysops of the various machines
- |>have a "legal" right to examine any information contained on that machine.
- |>All of the privileges and protection systems are set up to enforce policies
- |>concerning who has access to data. Since the system manager may bypass those
- |>protection mechanisms, any data access policy must assume that the system
- |>manager, by virtue of his/her job, is authorized access. Further, the
- |>assumption is that management is watching the watchers watching the data, to
- |>prevent abuse.
- |> Bottom line: get PGP (Pretty Good Privacy)
- |>
- |> Jeff Silverman, Boeing.
- |>
- |>
- I believe therer is a 1986 (?) Law that addresses the privacy of electronic
- mail. It is illegal for a system manager, or anyone else for that matter, to
- read another person's mail. Mail, e-mail included, is considered private
- property, even if you do manage the system. I have misplaced the
- reference, maybe someone else has it handy?
- ----------------------------------------------------------------------------
- Dwight D. Moore
- Geosciences Computing Network
- University of Oklahoma
-
- dwight@geohub.gcn.uoknor.edu (129.15.40.10)
- These opinions do not necessarily represent the opinions of OU or the GCN.
- ----------------------------------------------------------------------------
-