Quoting AJ McKee (aj at nevermindthebollox.com):
> This is a very murky area of the law. In theory the company does have
> the right as it is their network. In tort there "could" be a remit for
> an offended party to take an action against a company who did not take
> "reasonable" steps to prevent their network from being misused by an
> employee. EG. User at company x hacks compy y from the network in
> company x.
>> Although once you sign a contract that states that observationis done,
> bang there goes any defence.
The law is what you have left, to resort to, after technical measures
fail. But, if you're technically adept, why should you allow them to
fail? To quote the old joke, Don't Do That, Then.
At $PRIOR_FIRM, we of the sysadmin staff had excellent reason to believe
that the new, possibly borderline-psychotic CIO was monitoring all
company network traffic at the ethernet switch, mostly in order to have
the inside track on corporate politics. After thinking over the
ramifications, the (remote, but non-zero) possibility of keyboard
sniffers, etc., I adopted the obvious comprehensive solution: I bought
a Sony VAIO laptop on eBay, loaded Debian, and then did the bulk of my
workplace computing via an SSH tunnel to my server at home.
After that was in place, the CIO and anyone like him were welcome to
monitor and sniff to their heart's content.
Rick Moen Emacs is a decent operating system,
rick at linuxmafia.com but it still lacks a good text editor.
Maintained by the ILUG website team. The aim of Linux.ie is to
support and help commercial and private users of Linux in Ireland. You can
display ILUG news in your own webpages, read backend
information to find out how. Networking services kindly provided by HEAnet, server kindly donated by
Dell. Linux is a trademark of Linus Torvalds,
used with permission. No penguins were harmed in the production or maintenance
of this highly praised website. Looking for the
Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!