From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: fd1cf76149e8656036080975236b5b2c465af9917a2fdc7e6677b81adbb6435d
Message ID: <199604212212.SAA11991@pipe2.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-04-22 02:01:39 UTC
Raw Date: Mon, 22 Apr 1996 10:01:39 +0800
From: John Young <jya@pipeline.com>
Date: Mon, 22 Apr 1996 10:01:39 +0800
To: cypherpunks@toad.com
Subject: GAW_ker
Message-ID: <199604212212.SAA11991@pipe2.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Security Management, published by the American Society for
Industrial Security, has two articles on computer security
in its April, 1996, issue:
"Legal Lessons in the Computer Age," by Mark D. Rasch,
J.D., director of information security law and policy with
SAIC, and former DoJ prosecutor of Robert Tappan Morris. A
tabloid on tabloiding computer crime to hacker-phobics.
This snapshot of current law and court rulings gives
security professionals a glimpse into the evolving legal
landscape that companies must be prepared to negotiate
when pursuing those who might attempt to steal or damage
computerized systems or information. (30kb)
"E-Mail Policy By the Letter," by Fred L. Trickey, an
information security officer at Columbia University. An
account of good e-mail policies and procedures, with
salient references, and a sidebar on E-mail gawking.
(24kb)
GAW_ker (for both)
-----
For info on security management see:
http://www.securitymanagement.com
Return to April 1996
Return to “John Young <jya@pipeline.com>”
1996-04-22 (Mon, 22 Apr 1996 10:01:39 +0800) - GAW_ker - John Young <jya@pipeline.com>