Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News

      IT Cops: An Ugly Can of High-Tech Worms

      By
      eWEEK EDITORS
      -
      September 10, 2001
      Share
      Facebook
      Twitter
      Linkedin

        The South Carolina legislature recently modified an anti-pedophilia state law to require IT people discovering child pornography on a system to report the computers user to authorities. Sounds reasonable, right? After all, its pretty hard for a rational person to argue in favor of protecting those who buy or traffic in kiddie porn.

        But theres more to this legislation than meets the eye. A common tenet of non-Internet law is that evidence obtained during a search must at least withstand some test of nonrepudiation before it can be used against the accused.

        The wide variety of ways that data can be stored and transferred on computers, however, provides a more difficult road to presumed guilt. Therefore, IT professionals ought not be put in the position of reporting a co-worker when the evidence stands such a good chance of being misleading or fraudulent. Indeed, theres little chance that hard disk possession of illicit files would ever hold up in court as concrete evidence of guilt.

        This issue also puts employers in a terrible liability bind. Security professionals have for years been asserting company ownership of systems, networks and the information assets they engender in order to limit personal use of company resources by employees. The difficulty arises when laws, such as the one in South Carolina, put employers in the position of, on one hand, asserting ownership of systems and networks while on the other denying the same domain over the less savory things that may be found on company systems.

        And lets look at it from the suspects point of view. The underlying assumption in the South Carolina law is that the computer user or “owner” has ultimate control over his or her computer and exclusive permission to place files and directories on that system. This is untrue in almost every case. System administrators typically have the run of every office workstation and, certainly, if child porn is discovered on a hapless users network drive, there is nothing whatsoever to prove that an IT employee with sufficient privilege—and a grudge to exercise—didnt plant the explicit files.

        It creates a Catch-22 situation that companies should fight by opposing such legislation when it appears on the horizon. Its a no-win for companies and for the vast majority of employees, while doing nothing that will truly lead to a decrease in child pornography.

        The truly smart pedophile will simply use file encryption mechanisms to scramble and disguise kiddie porn so it will be very difficult to view or use as evidence if found.

        IT staff and their employers should resist being cast as pornography cops. And any legislation that suggests that this is a reasonable response to the issue is merely a smoke screen until a real solution can be found.

        Avatar
        eWEEK EDITORS

        MOST POPULAR ARTICLES

        Android

        Samsung Galaxy XCover Pro: Durability for Tough...

        Chris Preimesberger - December 5, 2020 0
        Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
        Read more
        Cloud

        Why Data Security Will Face Even Harsher...

        Chris Preimesberger - December 1, 2020 0
        Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
        Read more
        Cybersecurity

        How Veritas Is Shining a Light Into...

        eWEEK EDITORS - September 25, 2020 0
        Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
        Read more
        Big Data and Analytics

        How NVIDIA A100 Station Brings Data Center...

        Zeus Kerravala - November 18, 2020 0
        There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
        Read more
        Apple

        Why iPhone 12 Pro Makes Sense for...

        Wayne Rash - November 26, 2020 0
        If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
        Read more
        eWeek


        Contact Us | About | Sitemap

        Facebook
        Linkedin
        RSS
        Twitter
        Youtube

        Property of TechnologyAdvice.
        Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

        © 2021 TechnologyAdvice. All Rights Reserved

        Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

        ×