Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Just Whos Computer is this Anyway? > NetSparsh - Viral Content you Love & Share

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is.

Here's the scoop. Over the last few weeks the company I work for has been going through a massive systems upgrade. And as part of that roll out, they upgraded everyone's computer with new versions of software via the network. Announcements were made everyday that the changes were coming and to save everything that you didn't want to lose.

This upgrade, like I said before, was massive. In some cases the software was completely changed over to a new package that the end user had not seen before. There were also security upgrades that allow for remote uploads of patches and system inventories of computers. In short, about the only thing that was the same was the physical computer itself and the files we had saved on our hard drives.

Access levels were changed, passwords were changed, unauthorized software and any related files were deleted, desktop options were locked, Internet access was throttled down (and a content proxy server brought online) and a whole host of other changes implemented. (IMHO, it was about time. The network was slow and the system about 5 years out of date. Here's kudos to one company trying to make it easier for it's employees to do their jobs...)

Boy, the wailing and gnashing of teeth I heard around the office would have made an IRS agent proud! Comments like, "Who said they could upgrade my computer" or "I didn't give them permission to access my computer" were common. I was floored!

Ok, I'm going to clear this issue up in short order (and I apologize for the "YELLING" below...)

Unless you purchased the computer you work on or you made a deal with your boss or you work for yourself, IT'S NOT YOUR COMPUTER! That's right. Take a deep breath and say the following with me, It's not my computer... It's not my computer... It's not my computer...

Write that phrase out on a sticky note and stick it to the monitor. Write it in ink on the back of your hand or set up a daily pop up reminder. Do something, anything you need to do to remember that the computer you do work on for your boss does NOT belong to you. This will save you a ton of grief in the future. Why? Well it's about privacy - your privacy.

Your employer has the right to do anything they want to the computers they have bought with their own money and connected to their network.

And if you connect a computer you do own to their network, they also have rights pertaining to the intellectual property that may be generated by or stored on your machine.

So what does this mean to you? Well, for starters, don't load anything on the computer that you don't want to be made public. Also, don't use company assets for personal stuff. In other words, don't load any banking software on the machine and balance your checkbook at work. You may lose your data files or you may even run the risk of having your bank balance exposed to the public. Or if you have any "questionable" surfing habits, surf at home. Most company networks today record and store everything, including all the places you go to on the Internet.

Want to see a good example of this? Just recently, a link was posted on the Internet that allowed anyone to go search through the complete email files of everyone from Enron. Enron, since they owned all the email that goes through their servers, decided that it was too much trouble to isolate individual emails for the SEC (that's the Securities and Exchange Commission, a GOVERNMENT agency. The IRS Agent crack above may not be a joke to some...) so they released ALL the emails stored or archived on their system.

Every email, whether it pertained to company business, the hemorrhoid problems of the guy in HR or how many times someone slept with someone else during lunch breaks is now out there for the whole world to see. (I don't know about you but that guy in HR better go see the doctor quick!)

I bet you are thinking that this kind of thing will never happen to you. Right, just wait. Employers are monitoring you at every turn. And if you don't watch out, you could get fired over some email you sent to your Great Aunt Sophie about your dog's coming surgery or a picture that got downloaded to your hard drive from some web page you visited.

Scary, right? You bet it is.

Ok, now that I have gotten my point across, lets take a more realistic look. Most employers don't have some dude sitting in a closet somewhere pouring over every email sent through the system or looking at every file on every employee's computer. The sheer number of people this would take is daunting.

However, what they usually do is use automated tools to look for patterns of abuse. Like multiple hits on an adult Internet site from the same user. They may scrub emails to look for offensive words, etc. Then once a pattern is identified, the employee is contacted and warned to stop. Rarely is someone fired straight out.

In today's world of increased scrutiny, it behooves you to play it straight with the computer at work. Leave the personal stuff at home. Who knows, you may be surprised by the increase in your productivity. At the very least, you won't have to worry over some person reading about your hemorrhoids on the Internet.

It's something to think about.

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit to see his latest work.

He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit to subscribe.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

SB Nation

The Dolphins' dangerous stadium just caused a security guard to get hurt
SB Nation
The inexplicably close walls behind the end zones at Hard Rock Stadium have created dangerous situations in the past. On Sunday, it caused an injury to a security guard who got destroyed by Miami Dolphins wide receiver Kenny Stills. Stills caught a 5 ...
Kenny Stills cuts TD celebration short to check on security guard he ran overFor The Win
VIDEO: Dolphins Security Woman Gets Destroyed by Kenny Stills After TD Grab12up

all 18 news articles »


New Mexico districts to share funding for security upgrades
The State
More than 220 school campuses around New Mexico will be sharing state funding for security upgrades that will range from new doors and locks to fencing and security cameras. Forty-seven school districts applied for security improvements at 288 campuses.
Hundreds of New Mexico schools to get security upgradesKOB

all 4 news articles »


The Tiny Chip That Powers Up Pixel 3 Security
Having a secure, mobile hardware element isn't especially novel; the ARM chips that power most higher-end Android smartphones have something called TrustZone, a secure enclave within the main processor that sits apart from the operating system.

Fox News

Here's why Hillary Clinton losing her security clearance matters for the rest of us
Fox News
Hillary Clinton no longer has a security clearance. A letter released from the Department of State to Senator Chuck Grassley, a Republican from Iowa, says she lost her clearance on August 30 at her request. The State Department also withdrew security ...

and more »

Fox News

5 security settings to turn on your router before it's too late
Fox News
Suppose your house has a top-notch security system. There are locks on all the doors. Security cameras monitor from every angle. No one could get in – except for an open door that you completely forgot about and therefore leads to every room in the house.
Home Network Security in the Internet AgeTechSpective

all 2 news articles »


WANTED: Man breaks into home, accidentally takes selfie on security camera
BATON ROUGE, LA (WAFB) - Say Cheese! Police are asking for the public's assistance identifying and locating a burglary suspect. The East Baton Rouge Parish Sheriff's Office says on Oct. 8, they were called about a residential burglary in the 1000 block ...

and more »

Military Times

US commander confident in ability of Afghan security forces
Military Times
WASHINGTON — The assassination of Afghan leaders in Kandahar province won't lessen U.S. support for the war in Afghanistan or deter local security forces in the fight against the Taliban, the top U.S. military commander in the Middle East said Saturday.

and more »

Arizona Sports

Kenny Stills rewards security guard after sending her into endzone wall
Arizona Sports
Miami Dolphins wide receiver Kenny Stills (10) gives a football to a security woman he pushes to the ground after scoring a touchdown, during the first half of an NFL football game against the Detroit Lions, Sunday, Oct. 21, 2018, in Miami Gardens, Fla.
Kenny Stills hammers security guard after touchdown247Sports
Watch: Dolphins' Kenny Stills runs into security guard after TDYardbarker
Kenny Stills runs over security guard, gives her TD ballYahoo Sports
The Spun (blog)
all 821 news articles »

New York Post

Dolphins receiver accidentally blindsides security woman in brutal hit
New York Post
Miami Dolphins receiver Kenny Stills was shaken up when he ran into a female security officer as he caught a 5-yard touchdown pass in the corner of the end zone during the second quarter against Detroit. The woman was blindsided, tumbled to the ground ...

and more »

Sarasota Herald-Tribune

How anonymous is the state's new security app?
Sarasota Herald-Tribune
The Florida Legislature required the Florida Department of Law Enforcement and Florida Attorney General's Office to launch an app for anonymously reporting suspicious activity last March as part of the sweeping new school security law. Nearly seven ...

Google News

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More