In <[EMAIL PROTECTED]>,
on 06/20/2005
   at 12:00 AM, Ted MacNEIL <[EMAIL PROTECTED]> said:

>The issue has never been who tried, rather who succeeded.

An unauthorized attempt is already a security violation.

>BTW, since the disk, programmes, & data belonged to the company,
>they have never been  my datasets , and it should never matter who
>within the company  tried .

It should matter if installation policy says that it matters. It's
your responsibility to report it if installation policy says that it's
your responsibility. There are shops with such p0olicy, and I see
nothing wrong with them.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to