1996-04-22 - GAW_ker

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: fd1cf76149e8656036080975236b5b2c465af9917a2fdc7e6677b81adbb6435d
Message ID: <199604212212.SAA11991@pipe2.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-04-22 02:01:39 UTC
Raw Date: Mon, 22 Apr 1996 10:01:39 +0800

Raw message

From: John Young <jya@pipeline.com>
Date: Mon, 22 Apr 1996 10:01:39 +0800
To: cypherpunks@toad.com
Subject: GAW_ker
Message-ID: <199604212212.SAA11991@pipe2.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   Security Management, published by the American Society for
   Industrial Security, has two articles on computer security
   in its April, 1996, issue:

   "Legal Lessons in the Computer Age," by Mark D. Rasch,
   J.D., director of information security law and policy with
   SAIC, and former DoJ prosecutor of Robert Tappan Morris. A
   tabloid on tabloiding computer crime to hacker-phobics.

      This snapshot of current law and court rulings gives
      security professionals a glimpse into the evolving legal
      landscape that companies must be prepared to negotiate
      when pursuing those who might attempt to steal or damage
      computerized systems or information. (30kb)

   "E-Mail Policy By the Letter," by Fred L. Trickey, an
   information security officer at Columbia University. An
   account of good e-mail policies and procedures, with
   salient references, and a sidebar on E-mail gawking.
   (24kb)

   GAW_ker (for both)

   -----

   For info on security management see:

      http://www.securitymanagement.com







Thread