home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!moe.ksu.ksu.edu!engr.uark.edu!mbox.ualr.edu!acs.harding.edu!LINDSTROM
- Newsgroups: comp.security.misc
- Subject: Re: CERT and the Dept. of Justice on keystroke monitoring
- Message-ID: <1992Dec14.133030.804@ualr.edu>
- From: lindstrom@acs.harding.edu
- Date: 14 Dec 92 13:30:29 -0500
- Reply-To: lindstrom@acs.harding.edu
- References: <1992Dec11.164849.3491@nic.csu.net>,<Bz9DB1.LHq@avalon.nwc.navy.mil>
- Organization: Harding University
- Nntp-Posting-Host: acs.harding.edu
- Lines: 42
-
- In article <Bz9DB1.LHq@avalon.nwc.navy.mil>, jd@parcival.nwc.navy.mil (John de la Garrigue) writes:
- >In article 3491@nic.csu.net, oleg@gd.cs.csufresno.edu () writes:
- >>In article <q50qgdg@dixie.com> jgd@dixie.com (John De Armond) writes:
- >>>strnlght@netcom.com (David Sternlight) writes:
- >>>
- > <stuff about keystroke monitoring notice deleted>
- >>
- >>Huh? If I work for company X, X automatically has full rights to read
- >>my mail or search my home? Or maybe only if it officially warns me
- >>about this on it's front entrance? :).
- >>
- >>Oleg
- >
- >No, and that's clearly not what the notice is saying. If you work for company X,
- >and use their equipment for whatever reason (notice many companies clearly state
- >*anything* done using their equipment/software/other resources is their
- >property, like it or no), the company has a right to make sure what you are doing
- >is legal and ethical. If you don't like this type of policy, the simple answer
- >is to not use someone else' machine.
-
- I agree. I run a small system for solar research and curious about the
- problem here. Our computer is for research use only. Period. The work
- all belongs to the school (as does the machine) and all of the users are
- willing to be monitored. This may be due to to a break-in a couple of
- months ago where some files were erased (no biggie.. I had back-ups), but
- I will take any action at my disposal to find out what is going on on this
- machine [Q: Is running "w" to see who is on an invasion of your "rights"?]
- and will drop every hammer I can find on an intruder.
-
- As for the phone, it is also for business. Sure, I use it for personal
- things (call my wife to find out what time to get home by) but if someone
- is making personal long distance calls, that's taking money from our
- already small budget and I want to know.
-
- Now I'm not for a police state, but it seems to me that those yelling
- about their "rights" are overlooking their responsibilaties. I have read
- alot about "they" (meaning the system, like me :-) should and should
- not do...what about users? What standards should a system user be held
- to, if any, and what measures should be allotted to insure compliance?
-
- Looking forward to *YOUR* reply,
- Greg-
-