home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!destroyer!ncar!noao!arizona!ho
- From: ho@cs.arizona.edu (Hilarie Orman)
- Newsgroups: comp.security.misc
- Subject: Re: CERT and the Dept. of Justice on keystroke monitoring
- Message-ID: <28182@optima.cs.arizona.edu>
- Date: 14 Dec 92 23:26:16 GMT
- References: <1992Dec11.164849.3491@nic.csu.net>,<Bz9DB1.LHq@avalon.nwc.navy.mil> <1992Dec14.133030.804@ualr.edu>
- Sender: news@cs.arizona.edu
- Lines: 22
-
- In article <1992Dec14.133030.804@ualr.edu>, lindstrom@acs.harding.edu
- writes:
- |> As for the phone, it is also for business. ... if
- |> someone is making personal long distance calls, that's taking money
- |> from our already small budget and I want to know.
-
- The analogy with computer use rights would be if concern for
- enforcement extended to monitoring employee phone calls and turning
- over any suspicious information to the police. Certainly this has
- been done in some places, and I imagine sometimes this has raised
- civil rights issues that go beyond the ownership of the telephone.
-
- |> Now I'm not for a police state, ...
-
- It's worth considering if there will be much non-monitored space for
- us in the future. If we commit most of our lives to computer
- equipment and communication systems owned by others, and they are
- constantly keeping tabs on us to make sure we use their equipment only
- for legal, moral, and ethical purposes, then we may end up living in
- some sort of police state, even though no one really wanted to. Maybe
- not; but I think that's the specter that haunts some of the objections
- to monitoring.
-