From Our Blog - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News
Commentary
9/29/2006
04:40 PM
Commentary
Commentary
Commentary
50%
50%

From Our Blog

Where Did HP Cross The Line?

The leaker didn't publicize or sell HP's plans for new products, etc. He did leak very general information on corporate direction. While that may be a breach of his director's responsibilities, that's a civil matter. What HP did to find him may very well be a criminal matter under the laws of California. Yes, everything going into or out of HP on its phone lines, computers, etc., is fair game. People's personal phone records are not. --EB

HP didn't do the unethical things, the company hired to find the perpetrator did. I can assure you it didn't ask HP for permission to cross the line ... ever heard of plausible deniability? No, I don't have HP stock, nor do I work for it. I'm just sick of the double standards of the media. They'd sell their mother to get a story about how you should be hanged for selling your mother. --Critique

Why didn't they just ask board members or anyone else who had access to the leaked information? Didn't the accused board member say he would've told them he was the leaker? And did they really think that outsourcing the investigation would let them avoid prosecution? Everyone involved should be prosecuted and, at a minimum, resign. But they won't. Ms. Dunn is the sacrificial lamb. Let's face it: Business ethics are dead. --John

Quick, Encrypt Everything!

We need to make it much more expensive to lose data than it is to take care of it. It's more likely that encryption is a great immediate stopgap solution, until somebody figures out something better. But nothing will get done, because losing personal data doesn't cost enough yet. The extra cost of security in IT processes is still a lot higher than sending out those "mea culpa" letters and bogus "credit watching" services. --Ted

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll