On Fri, Feb 26, 2010 at 2:19 PM, Stuart Jansen <sjan...@buscaluz.org> wrote:
> On Fri, 2010-02-26 at 13:51 -0700, Jeff Anderson wrote: > > Perhaps a shift in discussion would be appropriate. What about the people > who > > are doing the scamming themselves? What drives them to do it? What gain > are > > they looking for? Why are they targeting university departments? > Understanding > > why these people do what they do may be beneficial in understanding why > BYU > > does monitoring in the first place. > > You did a decent job of outlining the heart of the problem, namely: BYU > has a tendency to implement well intentioned policies without regard for > alternatives, or consequences. > > So why try to change the topic? I think we can all agree that BYU's > network is constantly under attack. What we don't agree on is the > appropriate response. > > > I think this is where we can suggest to OIT what can be done to improve the situation. If agreeable, then I am willing to talk with the security guys to implement the additional privacy measures I asked about in my last e-mail. I think it would give a good balance between both sides. No human reads your e-mail until you give them permission. Robert LeBlanc Life Sciences & Undergraduate Education Computer Support Brigham Young University
-------------------- BYU Unix Users Group http://uug.byu.edu/ The opinions expressed in this message are the responsibility of their author. They are not endorsed by BYU, the BYU CS Department or BYU-UUG. ___________________________________________________________________ List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list