Archive for May, 2007

Another Gene Pool Story!

Posted in Taz on May 29, 2007 by tazspaz

So, as you’ve no doubt read before, here is another story about the state of the Gene Pool.

This one comes to us from the fine state of Wisconsin *shivers*:

http://www.msnbc.msn.com/id/18914479/?GT1=9951

Privacy in the work place.

Posted in Taz, Technical on May 21, 2007 by tazspaz

Is there really such a “beast” allowed in the work place any longer?  Is privacy something you only get at home locked in a closet now a days? 

Today I ran across a post in a forum that I felt obliged to reply to in hopes of helping a Network Administrator out with a bosses demand.  Herein I will copy and paste the post as well as link back to it and my profile on the site in case there is someone out there that would like to read more of my “drivel” as my ex-wife would likely call it.  :p

Link to post on site:   http://www.neowin.net/forum/index.php?showtopic=560851&pid=588569307&st=15&#entry588569307

My Profile on www.neowin.net forums:  http://www.neowin.net/forum/index.php?showuser=153115

“I would have to say there was one thing I didn’t see anyone of you state in this email. As a consultant and IT manager I’ve had to deal with this in the past and have spoken with several peers. It is common to hear this type of request coming from a company looking for either a) to much control or b) paranoid (be it legal or personal reasons) and c) that do not have a clear understanding of the law and recent court standings.

This boils down to a privacy issue. The information, as you have found through this post, is readily available to anyone with administrative access to the systems in question. Be it a file, data table, email, or many other items; this is the point of Administrative Access.

Here is something to think about, please keep in mind it is only from the Federal Perspective and does not include potential local statutes you may have to deal with:

“The Electronic Communications Privacy Act (ECPA) (18 U.S.C. §§ 2510-20; 2701-2711), is the only federal statute relevant to claims of workplace invasions of privacy by electronic means. The ECPA prohibits (1) unauthorized and intentional “interception” of wire, oral, and electronic communications during the transmission phase, and (2) unauthorized “accessing” of electronically stored wire or electronic communications.

For purposes of interpreting the Act, it is important to note that an e-mail is an “electronic communication” as that phrase is defined in § 2510. In the specific context of e-mails, it is also important to determine whether an employer “intercepted” the e-mail while it was being transmitted, or whether he/she “accessed” it minutes, days, or weeks after it was stored in an employee’s computer. This distinction is important because different penalties apply:

• Section 2701 prohibits the unauthorized access of an e-mail that is stored in a computer. A violation of § 2701 subjects the violator to a fine of up to $10,000 and/or a sentence of up to one year in prison.

• Section 2511, on the other hand, prohibits the interception of an e-mail while the e-mail is being transmitted, and subjects the violator to penalties of up to a $10,000 fine and/or up to five years in prison.

The ECPA contains two exceptions that are pertinent to e-mail communications. First, under the system provider exception, the prohibitions on the interception, disclosure, or use of electronic communications do not apply to conduct by an officer, employee, or agent of a provider of electronic communication services if the interception occurs during an activity necessary to the rendition of the service or to the protection of the rights or property of the provider.”

For example, a Massachusetts court found that reviewing employees’ mail using a supervisor’s password violated state law against “unreasonable, substantial or serious” interference with privacy (Restuccia vs. Burk Technology).

Please note here that I only focused on email. The ECPA is far reaching as well as the state and local statutes. Some states even have vague ties in their state constitutional amendments. You’d have to check on your local and state laws to be sure.

In the end it comes down to having a sound monitoring policy in place. One in which everything is spelled out, is signed by the employee and counter-signed by the IT department and HR. Remember, even though the Federal laws are currently very vague on the privacy laws they, as well as state and local courts have found in favor of the employee in these situations on many more occasions than businesses have won.

Tread cautiously.

My two cents anyhow. ”

There is much more research an individual and corporation needs to do to understand these laws but hopefully I’ve helped to start you on the right road.  Please note that this is an “As Is” posting and is not meant nor intended as legal advise.  I highly recommend seeking legal counsel in matters such as these.  Boiler plate templates are usually not enough to cover you in legal matters such as these.

===============================================
Please note:  The following references and thoughts for the above caption(s) in the forum come from the ECPA, ABA (American Bar Association), Network Computing Article, CRN, and multiple talks with peers and previous questions and posts in the past several years.

Diversions

Posted in Poetry on May 14, 2007 by tazspaz

Life cant be dictated by words and phrases
because when we look closely they’ve created mazes
in our minds that contradict each other
and if we circle our paths too much
we lose our clutch on whats important and smother
the fires that burn with our passions
left in the dark and circling still
we always search to fill
our voids and feelings we cant displace
with anything we can find in this place
we stop at nothing to prove that we arent bluffing
when we say “I can handle it on my own”
knowing when we speak we are alone
this time what has lead us on this excursion
is nothing more than the same diversion
created by our words and paradoxes
ideas created by our own losses
we spew them like they matter
living faithfully by them ’till they shatter
pretending to know who we are
thinking we’ve learned
but we’ve learned nothing so far
more than to look strong to everyone else
we fake it to fool ourselves

Author: Ed Brady
Written: 1/31/2007

Kate Beckinsale

Posted in Taz with tags , on May 9, 2007 by tazspaz

Hey, I’m a single guy so these thoughts are okay right?

Kate has recently caught my eyes! If only I was a superstar, perhaps I’d at least get a smile from her! 😉 But alas, I am but a common guy toiling away in life. I digress….

Have you seen this woman’s eyes, smile, legs? I mean, come on! After both Underworlds, VanHelsing, and Pearl Harbor I’ve decided I have to find all the movies she is in and collect them! I don’t like to stare but come on now…who, in my shoes, could be blamed for staring?!?! 😉

Kate Beckinsale