Maintain your old Siemens Hipath system

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is.

Here's the scoop. Over the last few weeks the company I work for has been going through a massive systems upgrade. And as part of that roll out, they upgraded everyone's computer with new versions of software via the network. Announcements were made everyday that the changes were coming and to save everything that you didn't want to lose.

This upgrade, like I said before, was massive. In some cases the software was completely changed over to a new package that the end user had not seen before. There were also security upgrades that allow for remote uploads of patches and system inventories of computers. In short, about the only thing that was the same was the physical computer itself and the files we had saved on our hard drives.

Access levels were changed, passwords were changed, unauthorized software and any related files were deleted, desktop options were locked, Internet access was throttled down (and a content proxy server brought online) and a whole host of other changes implemented. (IMHO, it was about time. The network was slow and the system about 5 years out of date. Here's kudos to one company trying to make it easier for it's employees to do their jobs...)

Boy, the wailing and gnashing of teeth I heard around the office would have made an IRS agent proud! Comments like, "Who said they could upgrade my computer" or "I didn't give them permission to access my computer" were common. I was floored!

Ok, I'm going to clear this issue up in short order (and I apologize for the "YELLING" below...)

Unless you purchased the computer you work on or you made a deal with your boss or you work for yourself, IT'S NOT YOUR COMPUTER! That's right. Take a deep breath and say the following with me, It's not my computer... It's not my computer... It's not my computer...

Write that phrase out on a sticky note and stick it to the monitor. Write it in ink on the back of your hand or set up a daily pop up reminder. Do something, anything you need to do to remember that the computer you do work on for your boss does NOT belong to you. This will save you a ton of grief in the future. Why? Well it's about privacy - your privacy.

Your employer has the right to do anything they want to the computers they have bought with their own money and connected to their network.

And if you connect a computer you do own to their network, they also have rights pertaining to the intellectual property that may be generated by or stored on your machine.

So what does this mean to you? Well, for starters, don't load anything on the computer that you don't want to be made public. Also, don't use company assets for personal stuff. In other words, don't load any banking software on the machine and balance your checkbook at work. You may lose your data files or you may even run the risk of having your bank balance exposed to the public. Or if you have any "questionable" surfing habits, surf at home. Most company networks today record and store everything, including all the places you go to on the Internet.

Want to see a good example of this? Just recently, a link was posted on the Internet that allowed anyone to go search through the complete email files of everyone from Enron. Enron, since they owned all the email that goes through their servers, decided that it was too much trouble to isolate individual emails for the SEC (that's the Securities and Exchange Commission, a GOVERNMENT agency. The IRS Agent crack above may not be a joke to some...) so they released ALL the emails stored or archived on their system.

Every email, whether it pertained to company business, the hemorrhoid problems of the guy in HR or how many times someone slept with someone else during lunch breaks is now out there for the whole world to see. (I don't know about you but that guy in HR better go see the doctor quick!)

I bet you are thinking that this kind of thing will never happen to you. Right, just wait. Employers are monitoring you at every turn. And if you don't watch out, you could get fired over some email you sent to your Great Aunt Sophie about your dog's coming surgery or a picture that got downloaded to your hard drive from some web page you visited.

Scary, right? You bet it is.

Ok, now that I have gotten my point across, lets take a more realistic look. Most employers don't have some dude sitting in a closet somewhere pouring over every email sent through the system or looking at every file on every employee's computer. The sheer number of people this would take is daunting.

However, what they usually do is use automated tools to look for patterns of abuse. Like multiple hits on an adult Internet site from the same user. They may scrub emails to look for offensive words, etc. Then once a pattern is identified, the employee is contacted and warned to stop. Rarely is someone fired straight out.

In today's world of increased scrutiny, it behooves you to play it straight with the computer at work. Leave the personal stuff at home. Who knows, you may be surprised by the increase in your productivity. At the very least, you won't have to worry over some person reading about your hemorrhoids on the Internet.

It's something to think about.

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit to see his latest work.

He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit to subscribe.

In The News:

Undersea 'blasts' recorded at same time Russia-Germany gas pipelines damaged
Tue, 27 Sep 2022 09:39:00 +0100
Mysterious leaks in the Nord Stream gas pipe network began with "powerful subsea blasts" and may have resulted from an "act of sabotage".

Qatar 'conscripting civilians and summoning diplomats from abroad' to do World Cup security
Tue, 27 Sep 2022 11:31:00 +0100
Qatar has called up hundreds of civilians - and summoned back diplomats from overseas - for mandatory military service to operate security checkpoints at World Cup stadiums.

Eleven children among 17 killed in Russia school shooting as wounded to be taken to Moscow
Tue, 27 Sep 2022 13:15:00 +0100
More than a dozen children wounded in a school shooting in central Russia are being transferred to Moscow for further treatment.

Shakira to face trial over alleged £13m tax fraud
Tue, 27 Sep 2022 12:16:00 +0100
Shakira is set to go on trial for tax fraud after a Spanish judge approved proceedings against the pop megastar.

Lawyer facing charges in case linked to Kenya's president found dead
Tue, 27 Sep 2022 11:31:00 +0100
A lawyer facing charges at the International Criminal Court (ICC) in a previous case linked to Kenya's recently elected president has been found dead.

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, Or have you... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More