× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



> E-Mail is a corporate property and if you want private
> e-mail go use hotmail, yahoo or the like.

Like all tools provided by the employer sometimes it is more trouble than it's
worth to police, other times there must be security and audit trails.

If my company runs an ERP system would you as an employee expect to be able to
utilise that ERP system to run your AMWAY (R) business through it as well.

Companies often provide resources with the expectation that those resources will
be used for company business yet sometimes we still use company pens to write
personal cheques and company telephones for personal reasons.

No longer is there a need to physically smuggle company sensitive data out of
the office, just email it.

Most companies aren't going to police the use of a pen for personal use but some
will police telephone and email usage.

Privacy will always be a contentious issue and will always create a casualty.

Norm



----- Original Message -----
From: "Nathan M. Andelin" <nandelin@relational-data.com>
To: <midrange-l@midrange.com>
Sent: Thursday, 27 September 2001 6:11
Subject: Re: Gartner Group: DO NOT USE IIS!


> E-Mail is a corporate property and if you want private
> e-mail go use hotmail, yahoo or the like.

I know a lot of companies claim this.  But it makes some employees mad.  If
the company owns the network, and holds the license to the software, does it
also own the content?  Or is it that employees give up their rights to
personal privacy (or authorship) when they accept the paycheck?  Cameras
hovering the cubicles?  Wire taps on the phone lines?  Where do the rights
of corporations end?

If Yahoo owns the server, does it also own the content?  Or do they have a
fiduciary obligation to protect their users?

Thanks,

Nathan M. Andelin
www.relational-data.com


_______________________________________________
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@midrange.com
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l
or email: MIDRANGE-L-request@midrange.com
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.





As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.