Members Login
Username 
 
Password 
    Remember Me  
Post Info TOPIC: Glamser/Stringer/Dvorak
Student Biz

Date:
Glamser/Stringer/Dvorak
Permalink Closed


In an earlier thread I told you I would publish the names of e-mail accounts monitored by A. Dvorak and SFT during the debacle, this is not a complete list but here it is:


Michale Forster


Rebecca Woodrick


Clyde Ginn


Cynthia Moore


Susan Sanders


Myron Henry


William Scarborough


Stephen Judd


Tim Hudson


Joe Paul


James Greene


Gary Stringer


Mary Ann Stringer


Frank Glamser


Amy Young


Ann Mitchelle


Doug Chambers


other members of the AAUP, Polymer Science and Faculty Sentate


and more to come!


Who was in charge of I-tech during this time?



__________________
Stranger than Fiction

Date:
Permalink Closed

Good Night, and Good Luck.

__________________
LVN

Date:
Permalink Closed

When you say "A. Dvorak and SFT" do you mean AND or do you mean AND/OR?

If it's AND, then some of those names don't make sense. If it's AND/OR then you're telling a whole different story.

__________________
More than a rumor

Date:
Permalink Closed

It is highly probable that the whole thing was set in motion when a group sought legal advice to respond to Hanbury's drug and alcohol policy. I don't know what that date was, but they had some of Stringer's email messages from almost a year before. The only way they could have gotten those is by breaking into his office and taking them off his personal computer. Someone in computer science was able to look at the way they were saved and printed and could tell they didn't come from the main frame (?)--is that the term?

__________________
Student Biz

Date:
Permalink Closed

LVN:


I mean "AND" and this was an attempted to minize the issue!  The names my not make sense but they were monitored!



__________________
Tony Soprano's risk manager

Date:
Permalink Closed

At that time it is probable that the Kentucky mafia was running everything at USM.

__________________
Due vigilance

Date:
Permalink Closed

There were flagrant,ugly crimes being commited. Thank God someone was awake. I don't want people tossing my social security number around like a piece of trash.

__________________
Q&A time

Date:
Permalink Closed

How was this list obtained? 

__________________
LeftASAP

Date:
Permalink Closed

Due vigilance wrote:


There were flagrant,ugly crimes being commited. Thank God someone was awake. I don't want people tossing my social security number around like a piece of trash.

Please tell us, "Due Vigilance", what "ugly crimes" were commited and by whom.  Thank you.

__________________
Round the Mulberry Bush

Date:
Permalink Closed


Due vigilance wrote:

There were flagrant,ugly crimes being commited. Thank God someone was awake. I don't want people tossing my social security number around like a piece of trash.



Oh, you mean publishing the number like the Hattiesburg American did? Oh wait, that's not a crime, is it?

So, what specific, real-life crimes are you refering to?

__________________
Missing in Action

Date:
Permalink Closed

Do you think the Chief was trying to find out the identy of Guru Nuberg, my favorite poster?

__________________
Ha Ha

Date:
Permalink Closed

Or WDAM--where it was in plain view of all of south Mississippi?

__________________
Irony

Date:
Permalink Closed

and that document was released to WDAM by none other than Ms. Mader Math herself.

__________________
Strange Basement Sounds

Date:
Permalink Closed

Missing in Action wrote:


Do you think the Chief was trying to find out the identy of Guru Nuberg, my favorite poster?

I've often wondered about the Guru. Maybe he went underground and is still among us.

__________________
Retiree 3

Date:
Permalink Closed

If this list is true, think about the broad net it cast----how many people's privacy was invaded--the emails to our students, colleagues at other universities, faculty we were trying to hire. Absolutely horrible.

__________________
Andy

Date:
Permalink Closed

The Printz accounts were also monitored (Maggie Williams, Rachel Quinlivan), including non-USM accounts.

More that a rumor, does your friend in computer science know how that was done? Wouldn't it have to have been through the USM server?

__________________
Angeline

Date:
Permalink Closed

A little history:


Dvorak's husband ran HR at the time and scoured everyone's complete files (have you checked yours since then?), Hanbury ran the legal interference, and PILEUM (aka Jill Beneke, ex-Worldcom employee) was running iTech at the time and set up the email monitoring mechanisms.  Evil crowd.  And as non-academic in purpose as they come.



__________________
Clique et Claque

Date:
Permalink Closed

Strange Basement Sounds wrote:


Missing in Action wrote: Do you think the Chief was trying to find out the identy of Guru Nuberg, my favorite poster? I've often wondered about the Guru. Maybe he went underground and is still among us.

The original and chief rumormonger?  Still here but a lot less funny after last month's over the top sabotage of a colleague.  Should be doing some "breech of confidentiality" penance now but a severe lack of personal responsibility probably interferes.

__________________
gurunuberg

Date:
Permalink Closed


Clique et Claque wrote:

Strange Basement Sounds wrote:
Missing in Action wrote: Do you think the Chief was trying to find out the identy of Guru Nuberg, my favorite poster? I've often wondered about the Guru. Maybe he went underground and is still among us.
The original and chief rumormonger?  Still here but a lot less funny after last month's over the top sabotage of a colleague.  Should be doing some "breech of confidentiality" penance now but a severe lack of personal responsibility probably interferes.




Sorry, Charlie. I'm still watching, though mostly from a greater distance. Nice try, though.

__________________
oops

Date:
Permalink Closed

It's been so long, I even misspelled my own name. gurunuburg

__________________
Coast Resident

Date:
Permalink Closed

Retiree 3 wrote:


If this list is true, think about the broad net it cast----how many people's privacy was invaded--the emails to our students, colleagues at other universities, faculty we were trying to hire. Absolutely horrible.


If you are under the impression that a USM e-mail account is private you are sadly mistaken. The account belongs to USM, not the individual using it. The case law on this is very clear as this issue is often raised in the corporate world when an employee finds out that their employer has read an e-mail sent via the employee’s company e-mail address. In the case of USM, one should assume that the USM e-mail accounts for faculty and staff are even less private (if that is possible) as the USM IT system is state (public) property. A student may be able to claim some reasonable expectation of privacy on the grounds that they pay for their e-mail account as part of their tuition. This claim however may be negated if the student has been provided with a copy of the university’s rules and policies and said rules and policies clearly inform the student that their university provided e-mail account is subject to monitoring. This issue has been beaten to death before. Please move on to something more important. The issue is not that Thames et al read e-mails but how they acted upon what they read.  



__________________
Communications Attorney

Date:
Permalink Closed

Coast Resident wrote:


If you are under the impression that a USM e-mail account is private you are sadly mistaken. The account belongs to USM, not the individual using it. The case law on this is very clear as this issue is often raised in the corporate world when an employee finds out that their employer has read an e-mail sent via the employee’s company e-mail address. In the case of USM, one should assume that the USM e-mail accounts for faculty and staff are even less private (if that is possible) as the USM IT system is state (public) property. A student may be able to claim some reasonable expectation of privacy on the grounds that they pay for their e-mail account as part of their tuition. This claim however may be negated if the student has been provided with a copy of the university’s rules and policies and said rules and policies clearly inform the student that their university provided e-mail account is subject to monitoring. This issue has been beaten to death before. Please move on to something more important. The issue is not that Thames et al read e-mails but how they acted upon what they read.  

You are correct on the law.  Monitoring of university e-mail traffic is both legal and commonplace,  just as it is in the corporate world. The legitimate concerns here are well summarized in your last sentence.  You would be well advised to funnel all confidential communications through your personal e-mail accounts,  using your personal computer.

__________________
LVN

Date:
Permalink Closed

Coast Resident, you are correct that we have beaten this issue to death, and also that a case can be made that employees should not reasonably expect privacy on the employer's computer system.

I also agree that the issue is more one of what was done with the information?
For instance, no student would expect to have their private email to a faculty member read aloud at a public hearing, as was done to Rachel Quinlivin.

But I think there is another issue as well -- how was the information actually obtained? If it was obtained by breaking into the faculty members' offices at night, as appears to have been done in some cases, then that certainly exceeds any employee's reasonable expectations of privacy.

Any of you who still use USM computers for ANYTHING other than strictly work related matters should be out shopping for your own computer. You probably should not be posting to this board from your USM computer. If you have to post from campus, you should use a library computer.

Of course, my son (systems security analyst) tells me that there is not really any privacy on the web anymore.



__________________
wondering

Date:
Permalink Closed

Would someone be kind enough to identify Susan Sanders and Ann Mitchelle whose names appeared on the above list.



__________________
Retiree 3

Date:
Permalink Closed

Sanders was Bud Ginn's secretary for a bit. Don't know if she still is.

__________________
Retiree 3

Date:
Permalink Closed

Coast resident--I know that our USM email was/is not private. Nevertheless, I would like to hold the university to a higher standard of conduct than I do the corporate world. Idealistic? Ivory tower? Yes. But if I dump that dream, I believe that the way the monitored email was used (the email off the server) and that breaking into offices to get emails sent before the monitoring began is wrong, wrong, wrong.

__________________
Gumshoe

Date:
Permalink Closed

Communications Attorney wrote:


You are correct on the law.  Monitoring of university e-mail traffic is both legal and commonplace.

I don't doubt you for a minute, counsel, but just because something is legal doesn't make it ethical.

__________________
Gumshoe

Date:
Permalink Closed

Communications Attorney wrote:


 You are correct on the law.  Monitoring of university e-mail traffic is both legal and commonplace

Please don't think I'm seeking free legal advice, counsel, but how an off-the-record comment about this: You said that Coast Resident is legally correct. Granted. But the written USM policy promulgated at the time stated that emails would only be monitored under extraordinary circumstances, among other things. While the monitoring may have been legal, did it violate the university's own written policy at the time?



__________________
Coast Resident

Date:
Permalink Closed

Retiree 3 wrote:


Coast resident--I know that our USM email was/is not private. Nevertheless, I would like to hold the university to a higher standard of conduct than I do the corporate world. Idealistic? Ivory tower? Yes. But if I dump that dream, I believe that the way the monitored email was used (the email off the server) and that breaking into offices to get emails sent before the monitoring began is wrong, wrong, wrong.


Retiree 3, I would certainly agree that Thames’ management style has much to be desire and his past actions are not the way to win friends and influence people. My disagreement is with statements posted like: “There were flagrant, ugly crimes being committed” and “how many people's privacy was invaded” and “breaking into the faculty members' offices at night.” Faculty offices are also state (public) property and are subject to inspection at will. I would say doing so with out good cause and in the absence of the faculty member is bad form but it is not “breaking into” (this phrase suggest an illegal act) their office. To often on this board extreme statements are made and positions taken that do nothing to benefit (if not harm) the purpose of this board.



__________________
LVN

Date:
Permalink Closed


Coast Resident wrote:


Faculty offices are also state (public) property and are subject to inspection at will. I would say doing so with out good cause and in the absence of the faculty member is bad form but it is not “breaking into” (this phrase suggest an illegal act) their office. To often on this board extreme statements are made and positions taken that do nothing to benefit (if not harm) the purpose of this board.




If it was ok, why was it done secretly and at night? If it was ok, iTech or whomever could have just walked in in the middle of the afternoon and said, "Scuse me, Prof, I gotta look at your hard drive. Won't be a sec."
If it was ok, why was someone fired for refusing to do it? And no, I won't say the name.

__________________
1 2 3  >  Last»  | Page of 3  sorted by
 
Quick Reply

Please log in to post quick replies.

Tweet this page Post to Digg Post to Del.icio.us


Create your own FREE Forum
Report Abuse
Powered by ActiveBoard