home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!sdd.hp.com!think.com!spool.mu.edu!olivea!gossip.pyramid.com!pyramid!octopus!sjsumcs!rick
- From: rick@sjsumcs.sjsu.edu (Richard Warner)
- Newsgroups: comp.sys.novell
- Subject: Re: how do i stop 3rd par
- Message-ID: <1992Dec21.170824.3961@sjsumcs.sjsu.edu>
- Date: 21 Dec 92 17:08:24 GMT
- References: <1992Dec17.4946.13645@dosgate>
- Distribution: comp
- Organization: San Jose State University - Math/CS Dept.
- Lines: 47
-
- corey.groves@canrem.com (corey groves) writes:
-
- >What is the legal implication of playing big brother on somebody on a
- >school network. Say I put a floppy in a network computer and said
- >programs scan it (not that they could find anything past all the junk
- >their batch files already load onto the floppies). Is that legal?
- >Corey
-
- Our understanding here is that if we are upfront about it, and do it
- for a particular reason, then it is OK (no fishing expeditions, however).
- First off, these are OUR machines. If a student wants complete privacy
- and freedom, we suggest that they buy their own computers.
-
- Secondly, there are some very big threats. We scan ALL disks for
- known trojan horses, viri, etc. We have a responsibility to protect
- everyone from these, so a minor intrusion by scanning someones
- diskette in our computers is considered acceptable. Some other local
- colleges are even more restrictive; they will not let you in
- the door until the lab assistant has scanned your diskette!
-
- The only other scanning I do is a regular, but randomly timed, scan
- for illicit software. The scan is of network disk space (our property),
- so there is no intrusion into the students' disks. I have a database of
- keywords (file names from programs that I know of) that are used in
- a home-brew scanner of 'home' directories. We have notices posted
- (paper and electronic - at each login) explaining our policies and
- the reasons for it. We also have notices posted explaining that network
- disk space is temporary storage space for work files and anything else
- is fair game for deletion. If someone is caught violating this policy,
- the files are deleted and they are warned. Third warning and they
- lose their account.
-
- Do not misunderstand me. I NEVER scan e-mail, and I NEVER look into
- a file. But I do look at the files (by names, sizes, and types)
- and will delete any that should not be on our network.
-
-
-
-
- >Corey J. Groves | (416) 648-3711 | "Looking down you realize that
- >Mohawk College | corey.groves@canrem.com | your never too old to do
- >3yr Comp Systems | corey.groves@crs.com | something really stupid"-W.M.
- >---
- > ~ OLX 3.0 31-1580 ~ The language programmers know best is profanity
- >--
- >Canada Remote Systems - Toronto, Ontario
- >World's Largest PCBOARD System - 416-629-7000/629-7044
-