From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: d66b677edfa20b120ec0b392b012f531bb03ccdd10c2af9ad842bb0e0946491f
Message ID: <199511201509.KAA03155@pipe4.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1995-11-21 02:35:53 UTC
Raw Date: Tue, 21 Nov 1995 10:35:53 +0800
From: John Young <jya@pipeline.com>
Date: Tue, 21 Nov 1995 10:35:53 +0800
To: cypherpunks@toad.com
Subject: HOR_mel
Message-ID: <199511201509.KAA03155@pipe4.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
11-20-95. Washrag:
"It's the Spam You Read That's Making Many Interneters
Queasy."
It's squarely at odds with Internet culture. And an on-
line mass mailer is drafting a lawsuit against a
spammer, advised by Stewart A. Baker, former general
counsel to the NSA. Having taken plenty of flak on the
Internet for defending a Clinton administration proposal
on encryption, Baker is pleased to be working on an
issue so dear to the heart of the 'Net community. "It's
not every day that you come to the office humming a
tune," Baker said. "But working on this case, I do."
11-20-95. W$Joker:
"Why Many Businesses Can't Keep Their Secrets."
Personal computers are the biggest contributors to the
security headaches of companies. "Computer technology
has enhanced the control and power of the individual
employee to a level that transcends what was customary
in the traditional workplace." Many experts see a
correlation between recent leaks and the decline in
workers' loyalty to employers, falling job security and
increased workloads. The media have played a part as
well by becoming more aggressive over the past three
decades about challenging institutions and exposing
scandal. This makes it "more possible for an employee to
have his 15 minutes of fame" by waving his boss's
victorias.
Just what suffices legally as a reasonable precaution in
a frontier developing as rapidly as computer technology
isn't clear yet. For instance, requiring passwords for
access to a computer system, once considered a
reasonable precaution, now isn't enough. That's why
consultants are recommending periodic internal audits to
test for computer-system penetration and compliance with
documented security policies.
2: HOR_mel (14 kb)
Return to November 1995
Return to “John Young <jya@pipeline.com>”
1995-11-21 (Tue, 21 Nov 1995 10:35:53 +0800) - HOR_mel - John Young <jya@pipeline.com>