On Fri, Feb 26, 2010 at 2:19 PM, Stuart Jansen <sjan...@buscaluz.org> wrote:

> On Fri, 2010-02-26 at 13:51 -0700, Jeff Anderson wrote:
> > Perhaps a shift in discussion would be appropriate. What about the people
> who
> > are doing the scamming themselves? What drives them to do it? What gain
> are
> > they looking for? Why are they targeting university departments?
> Understanding
> > why these people do what they do may be beneficial in understanding why
> BYU
> > does monitoring in the first place.
>
> You did a decent job of outlining the heart of the problem, namely: BYU
> has a tendency to implement well intentioned policies without regard for
> alternatives, or consequences.
>
> So why try to change the topic? I think we can all agree that BYU's
> network is constantly under attack. What we don't agree on is the
> appropriate response.
>
>
> I think this is where we can suggest to OIT what can be done to improve the
situation. If agreeable, then I am willing to talk with the security guys to
implement the additional privacy measures I asked about in my last e-mail. I
think it would give a good balance between both sides. No human reads your
e-mail until you give them permission.

Robert LeBlanc
Life Sciences & Undergraduate Education Computer Support
Brigham Young University
--------------------
BYU Unix Users Group 
http://uug.byu.edu/ 

The opinions expressed in this message are the responsibility of their
author.  They are not endorsed by BYU, the BYU CS Department or BYU-UUG. 
___________________________________________________________________
List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list

Reply via email to