In an earlier thread I told you I would publish the names of e-mail accounts monitored by A. Dvorak and SFT during the debacle, this is not a complete list but here it is:
Michale Forster
Rebecca Woodrick
Clyde Ginn
Cynthia Moore
Susan Sanders
Myron Henry
William Scarborough
Stephen Judd
Tim Hudson
Joe Paul
James Greene
Gary Stringer
Mary Ann Stringer
Frank Glamser
Amy Young
Ann Mitchelle
Doug Chambers
other members of the AAUP, Polymer Science and Faculty Sentate
It is highly probable that the whole thing was set in motion when a group sought legal advice to respond to Hanbury's drug and alcohol policy. I don't know what that date was, but they had some of Stringer's email messages from almost a year before. The only way they could have gotten those is by breaking into his office and taking them off his personal computer. Someone in computer science was able to look at the way they were saved and printed and could tell they didn't come from the main frame (?)--is that the term?
There were flagrant,ugly crimes being commited. Thank God someone was awake. I don't want people tossing my social security number around like a piece of trash.
There were flagrant,ugly crimes being commited. Thank God someone was awake. I don't want people tossing my social security number around like a piece of trash.
Please tell us, "Due Vigilance", what "ugly crimes" were commited and by whom. Thank you.
Due vigilance wrote: There were flagrant,ugly crimes being commited. Thank God someone was awake. I don't want people tossing my social security number around like a piece of trash.
Oh, you mean publishing the number like the Hattiesburg American did? Oh wait, that's not a crime, is it?
So, what specific, real-life crimes are you refering to?
If this list is true, think about the broad net it cast----how many people's privacy was invaded--the emails to our students, colleagues at other universities, faculty we were trying to hire. Absolutely horrible.
Dvorak's husband ran HR at the time and scoured everyone's complete files (have you checked yours since then?), Hanbury ran the legal interference, and PILEUM (aka Jill Beneke, ex-Worldcom employee) was running iTech at the time and set up the email monitoring mechanisms. Evil crowd. And as non-academic in purpose as they come.
Missing in Action wrote: Do you think the Chief was trying to find out the identy of Guru Nuberg, my favorite poster? I've often wondered about the Guru. Maybe he went underground and is still among us.
The original and chief rumormonger? Still here but a lot less funny after last month's over the top sabotage of a colleague. Should be doing some "breech of confidentiality" penance now but a severe lack of personal responsibility probably interferes.
Clique et Claque wrote: Strange Basement Sounds wrote: Missing in Action wrote: Do you think the Chief was trying to find out the identy of Guru Nuberg, my favorite poster? I've often wondered about the Guru. Maybe he went underground and is still among us. The original and chief rumormonger? Still here but a lot less funny after last month's over the top sabotage of a colleague. Should be doing some "breech of confidentiality" penance now but a severe lack of personal responsibility probably interferes.
Sorry, Charlie. I'm still watching, though mostly from a greater distance. Nice try, though.
If this list is true, think about the broad net it cast----how many people's privacy was invaded--the emails to our students, colleagues at other universities, faculty we were trying to hire. Absolutely horrible.
If you are under the impression that a USM e-mail account is private you are sadly mistaken. The account belongs to USM, not the individual using it. The case law on this is very clear as this issue is often raised in the corporate world when an employee finds out that their employer has read an e-mail sent via the employee’s company e-mail address. In the case of USM, one should assume that the USM e-mail accounts for faculty and staff are even less private (if that is possible) as the USM IT system is state (public) property. A student may be able to claim some reasonable expectation of privacy on the grounds that they pay for their e-mail account as part of their tuition. This claim however may be negated if the student has been provided with a copy of the university’s rules and policies and said rules and policies clearly inform the student that their university provided e-mail account is subject to monitoring. This issue has been beaten to death before. Please move on to something more important. The issue is not that Thames et al read e-mails but how they acted upon what they read.
If you are under the impression that a USM e-mail account is private you are sadly mistaken. The account belongs to USM, not the individual using it. The case law on this is very clear as this issue is often raised in the corporate world when an employee finds out that their employer has read an e-mail sent via the employee’s company e-mail address. In the case of USM, one should assume that the USM e-mail accounts for faculty and staff are even less private (if that is possible) as the USM IT system is state (public) property. A student may be able to claim some reasonable expectation of privacy on the grounds that they pay for their e-mail account as part of their tuition. This claim however may be negated if the student has been provided with a copy of the university’s rules and policies and said rules and policies clearly inform the student that their university provided e-mail account is subject to monitoring. This issue has been beaten to death before. Please move on to something more important. The issue is not that Thames et al read e-mails but how they acted upon what they read.
You are correct on the law. Monitoring of university e-mail traffic is both legal and commonplace, just as it is in the corporate world. The legitimate concerns here are well summarized in your last sentence. You would be well advised to funnel all confidential communications through your personal e-mail accounts, using your personal computer.
Coast Resident, you are correct that we have beaten this issue to death, and also that a case can be made that employees should not reasonably expect privacy on the employer's computer system.
I also agree that the issue is more one of what was done with the information? For instance, no student would expect to have their private email to a faculty member read aloud at a public hearing, as was done to Rachel Quinlivin.
But I think there is another issue as well -- how was the information actually obtained? If it was obtained by breaking into the faculty members' offices at night, as appears to have been done in some cases, then that certainly exceeds any employee's reasonable expectations of privacy.
Any of you who still use USM computers for ANYTHING other than strictly work related matters should be out shopping for your own computer. You probably should not be posting to this board from your USM computer. If you have to post from campus, you should use a library computer.
Of course, my son (systems security analyst) tells me that there is not really any privacy on the web anymore.
Coast resident--I know that our USM email was/is not private. Nevertheless, I would like to hold the university to a higher standard of conduct than I do the corporate world. Idealistic? Ivory tower? Yes. But if I dump that dream, I believe that the way the monitored email was used (the email off the server) and that breaking into offices to get emails sent before the monitoring began is wrong, wrong, wrong.
You are correct on the law. Monitoring of university e-mail traffic is both legal and commonplace
Please don't think I'm seeking free legal advice, counsel, but how an off-the-record comment about this: You said that Coast Resident is legally correct. Granted. But the written USM policy promulgated at the time stated that emails would only be monitored under extraordinary circumstances, among other things. While the monitoring may have been legal, did it violate the university's own written policy at the time?
Coast resident--I know that our USM email was/is not private. Nevertheless, I would like to hold the university to a higher standard of conduct than I do the corporate world. Idealistic? Ivory tower? Yes. But if I dump that dream, I believe that the way the monitored email was used (the email off the server) and that breaking into offices to get emails sent before the monitoring began is wrong, wrong, wrong.
Retiree 3, I would certainly agree that Thames’ management style has much to be desire and his past actions are not the way to win friends and influence people. My disagreement is with statements posted like: “There were flagrant, ugly crimes being committed” and “how many people's privacy was invaded” and “breaking into the faculty members' offices at night.” Faculty offices are also state (public) property and are subject to inspection at will. I would say doing so with out good cause and in the absence of the faculty member is bad form but it is not “breaking into” (this phrase suggest an illegal act) their office. To often on this board extreme statements are made and positions taken that do nothing to benefit (if not harm) the purpose of this board.
Coast Resident wrote: Faculty offices are also state (public) property and are subject to inspection at will. I would say doing so with out good cause and in the absence of the faculty member is bad form but it is not “breaking into” (this phrase suggest an illegal act) their office. To often on this board extreme statements are made and positions taken that do nothing to benefit (if not harm) the purpose of this board.
If it was ok, why was it done secretly and at night? If it was ok, iTech or whomever could have just walked in in the middle of the afternoon and said, "Scuse me, Prof, I gotta look at your hard drive. Won't be a sec." If it was ok, why was someone fired for refusing to do it? And no, I won't say the name.