View Single Post
Old 13-06-2008, 18:31   #22
Escapee
cf.mega poster
 
Join Date: Jun 2003
Location: This Planet
Posts: 4,028
Escapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze array
Escapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze arrayEscapee has a bronze array
Re: Secret terrorism dossier left on train....

Quote:
Originally Posted by Xaccers View Post
Escorted visitors should never be left alone in the first place. I know I never was until my full pass arrived.

True, but some of these pesky visitors have a habit of wandering or seeing things they shouldn't.

Difficult to work on a document if it's locked away

You know I meant locked away when away from your desk, when we have had visitors in my previous employment all restricted documents had to be put out of sight.

We have software at work which prevents unauthorised access to the USB ports.
If people want files transferred they have to submit a request and we do it for them.

That would be a bit difficult for our IT department, because I wouldn't give them the administrator password to enable them access to the system. As design authority I am currently the only person in the UK with authorisation to use the password. The data I move from these systems is not restricted nor is it any use to anyone else.

I could just imagine how efficient it would be asking the IT department x amount of times a day when I need to put data on a memory stick. I had that fiasco in my last employment, I played their little game until they got fed up with visiting me a dozen times a day. In the end they just gave me the required access rights, it's all about balancing security against common sense.

Exactly, think about how people are going to use the system, and built the security around that to ensure no breaches.
As you've demonstrated, simply telling someone not to do something isn't good enough, you have to prevent them from doing it.
As above, prevent them and the whole system grinds to a halt unless you increase the IT department tenfold and have them running around. We had one customer who specified a non standard connector for the USB port, the users then simply purchased the connectors, worked out the pinout and used standard USB sticks.

Common sense needs to be taken into account in these cases.
Escapee is offline   Reply With Quote