Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Just Whos Computer is this Anyway? > NetSparsh - Viral Content you Love & Share

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is.

Here's the scoop. Over the last few weeks the company I work for has been going through a massive systems upgrade. And as part of that roll out, they upgraded everyone's computer with new versions of software via the network. Announcements were made everyday that the changes were coming and to save everything that you didn't want to lose.

This upgrade, like I said before, was massive. In some cases the software was completely changed over to a new package that the end user had not seen before. There were also security upgrades that allow for remote uploads of patches and system inventories of computers. In short, about the only thing that was the same was the physical computer itself and the files we had saved on our hard drives.

Access levels were changed, passwords were changed, unauthorized software and any related files were deleted, desktop options were locked, Internet access was throttled down (and a content proxy server brought online) and a whole host of other changes implemented. (IMHO, it was about time. The network was slow and the system about 5 years out of date. Here's kudos to one company trying to make it easier for it's employees to do their jobs...)

Boy, the wailing and gnashing of teeth I heard around the office would have made an IRS agent proud! Comments like, "Who said they could upgrade my computer" or "I didn't give them permission to access my computer" were common. I was floored!

Ok, I'm going to clear this issue up in short order (and I apologize for the "YELLING" below...)

Unless you purchased the computer you work on or you made a deal with your boss or you work for yourself, IT'S NOT YOUR COMPUTER! That's right. Take a deep breath and say the following with me, It's not my computer... It's not my computer... It's not my computer...

Write that phrase out on a sticky note and stick it to the monitor. Write it in ink on the back of your hand or set up a daily pop up reminder. Do something, anything you need to do to remember that the computer you do work on for your boss does NOT belong to you. This will save you a ton of grief in the future. Why? Well it's about privacy - your privacy.

Your employer has the right to do anything they want to the computers they have bought with their own money and connected to their network.

And if you connect a computer you do own to their network, they also have rights pertaining to the intellectual property that may be generated by or stored on your machine.

So what does this mean to you? Well, for starters, don't load anything on the computer that you don't want to be made public. Also, don't use company assets for personal stuff. In other words, don't load any banking software on the machine and balance your checkbook at work. You may lose your data files or you may even run the risk of having your bank balance exposed to the public. Or if you have any "questionable" surfing habits, surf at home. Most company networks today record and store everything, including all the places you go to on the Internet.

Want to see a good example of this? Just recently, a link was posted on the Internet that allowed anyone to go search through the complete email files of everyone from Enron. Enron, since they owned all the email that goes through their servers, decided that it was too much trouble to isolate individual emails for the SEC (that's the Securities and Exchange Commission, a GOVERNMENT agency. The IRS Agent crack above may not be a joke to some...) so they released ALL the emails stored or archived on their system.

Every email, whether it pertained to company business, the hemorrhoid problems of the guy in HR or how many times someone slept with someone else during lunch breaks is now out there for the whole world to see. (I don't know about you but that guy in HR better go see the doctor quick!)

I bet you are thinking that this kind of thing will never happen to you. Right, just wait. Employers are monitoring you at every turn. And if you don't watch out, you could get fired over some email you sent to your Great Aunt Sophie about your dog's coming surgery or a picture that got downloaded to your hard drive from some web page you visited.

Scary, right? You bet it is.

Ok, now that I have gotten my point across, lets take a more realistic look. Most employers don't have some dude sitting in a closet somewhere pouring over every email sent through the system or looking at every file on every employee's computer. The sheer number of people this would take is daunting.

However, what they usually do is use automated tools to look for patterns of abuse. Like multiple hits on an adult Internet site from the same user. They may scrub emails to look for offensive words, etc. Then once a pattern is identified, the employee is contacted and warned to stop. Rarely is someone fired straight out.

In today's world of increased scrutiny, it behooves you to play it straight with the computer at work. Leave the personal stuff at home. Who knows, you may be surprised by the increase in your productivity. At the very least, you won't have to worry over some person reading about your hemorrhoids on the Internet.

It's something to think about.

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit to see his latest work.

He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit to subscribe.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at


In security update, Apple backports Meltdown fix to older macOS versions
Meltdown-Spectre: A reminder to the IT industry that security is a mirage. Apple has rolled out a security fix to older Macs in an effort to mitigate the risk from a vulnerability in modern chips. The technology giant on Tuesday released a fix for ...
Apple releases security update, fixes Meltdown on macOS Sierra and El Capitan9to5Mac
Apple Addresses Meltdown and Spectre in macOS Sierra and OS X El Capitan With New Security UpdateMac Rumors

all 32 news articles »


Amazon's cloud business acquires Sqrrl, a security start-up with NSA roots
Amazon's cloud business has acquired Sqrrl, a cybersecurity start-up that spun out of the National Security Agency. The deal, which Sqrrl confirmed on Tuesday, comes as Amazon Web Services aims to pick up more business from U.S. intelligence agencies ...
Amazon Web Services catches Sqrrl, a security startup founded by ex-NSA staffersGeekWire

all 5 news articles »

New York Times

France's New Labor Laws: 'Flexibility, and No Security'
New York Times
PARIS — The announcements came in a steady drumbeat. Around 1,300 job cuts at France's biggest automaker. At least 2,500 at France's largest supermarket chain. Over 200 sought at a major clothing retailer. And thousands more are on the way. Just weeks ...

Anti-piracy firm Denuvo acquired by digital security outfit Irdeto
Denuvo's anti-piracy tech has been divisive in the gaming world, with some complaining that it restricts their gaming habits or stifles modding communities. But few will dispute that it has been unusually successful in its main goal of preventing ...

and more »


Swiss marchers protest against Trump, break through Davos security cordon
ZURICH/DAVOS (Reuters) - Anti-capitalists marched through Swiss cities on Tuesday to protest a planned visit by U.S. President Donald Trump to the World Economic Forum (WEF) and broke through a security cordon in Davos. Leftists organizers called for ...
Soldiers, snipers and security at Davos: Protecting the world's rich and powerfulCNBC

all 1,001 news articles »


Sumo Logic expands security toolset with FactorChain acquisition
The companies would not disclose the purchase price, but indicated the acquisition closed at the end of Q4 and all 12 FactorChain employees have joined Sumo Logic, including CEO Dave Frampton and CTO Ken Tidwell,. Sumo is broadly a cloud-based log ...

and more »

Do armed security guards make hospitals safer? Shooting at Barnes-Jewish spurs debate
Several local hospital officials declined to be interviewed on the subject of security. An informal tally shows that aside from Barnes-Jewish, BJC HealthCare hospitals do not equip their guards with guns. Guards at SSM Health hospitals carry Tasers but ...


Afghan hotel attack stirs fresh debate on private security firms
On Tuesday, security officials were meeting in the hotel, as guards of the Kabul Balkh Safety and Security Organisation (KBSS) stood outside, with rifles slung across their chests. KBSS won the contract to guard the hotel three weeks ago, the ...
Kabul hotel guests describe lax security before deadly attackGeo News, Pakistan

all 266 news articles »

Buffalo News

Former Buffalo police commissioner lands job in private security, including City Hall
Buffalo News
Daniel Derenda – who retired last week as Buffalo police commissioner – has started work for one of the world's largest private security firms that provides security at Buffalo City Hall. Derenda, 58, is the general manager for G4S Security Solutions ...
Former Buffalo Police commissioner Daniel Derenda takes new position at security

all 4 news articles »
Google News

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero Superhero watches your computer for changes,... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More