Langa Letter: That's The Company's PC - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Hardware & Infrastructure
Commentary
2/25/2002
06:20 PM
Fred Langa
Fred Langa
Commentary
50%
50%

Langa Letter: That's The Company's PC

To what degree can an employee modify or add software to a company-supplied computer? Fred Langa examines the ethics and issues.

Q. Can using a freely available PC utility get you fired?

A. Yes, if you choose the wrong tool, or if you use it in the wrong context.

In a recent article, we discussed various utilities that can let you recover a forgotten password. One such tool was "Snadboy," an ancient Windows 95-style "password revealer." Snadboy turns the text-obscuring asterisks or dots in a password dialogue-box back into plain text, so you can write down the forgotten password and store it in a safe place.

That seems innocuous enough, but check out this horror story.

Fred: I have a bit of a problem. I was hurt doing my job and went on workman's compensation. While I was recovering, I was given modified work in the office. During this time, the office secretary told me she often forgot her passwords and had difficulty in accessing her data. I told her about Snadboy, a password revealer that changes asterisks into readable letters.

After a lot of trouble with the company, I was laid off. The reason I was given was that I told the secretary about the password-revealing software; they suspected I was an underhanded thief and would attempt to steal the office passwords and sensitive data. Now, based on that suspicion, they are trying to recover the pittance of compensation I was paid.

OK, this is my question: is Snadboy (and other software like it) legal software?

Herb

With few exceptions, most software is neither inherently legal nor illegal. It's the use of the software that's legal or illegal.

Let me use an analogy to clarify the issue. Let's say you lock yourself out of your car, but you have access to a slim-jim--a slender, flat hook used to open locked car doors without a key. It's perfectly legal to use a slim-jim on your own car. For that matter, it's legal to use it on someone else's car, with his full knowledge and permission. But you can't go around using it on strangers' cars without their consent. Possessing a lock-beating tool may give you the technical ability to access property that's not your own, but that doesn't give you the legal right to do so.

Now consider this: at work, "your" PC is really the company's PC--you're just allowed to use it. The company gets to set the rules for what is and isn't allowable behavior. The company decides what constitutes acceptable use of its equipment.

Sense And Nonsense
A company can outlaw Snadboy and all similar tools via a blanket policy, if it so chooses. But I believe that would be foolish, especially if this policy were applied rigidly, without thought and without regard to context and intent.

In the case of Snadboy, it takes no great imagination or technical expertise to see that a simple password-revealer has totally legitimate uses. Who hasn't forgotten a password at one time or another?

Plus, Snadboy-type password-revealers are useless against any but the simplest forms of password protection. If a company is using ultra-simple protection for highly sensitive corporate data, they have bigger problems than those posed by a childishly simple tool like Snadboy.

Common sense should apply. (Am I a dreamer, or what?) A reasonably savvy and caring manager should be able to discern between legitimate and nefarious intent in the use of software.

In this case, as a manager, if I found an employee using a simple, Snadboy-class tool, I'd certainly want to have a discussion with the employee to find out what the issues really were, to verify a benign intent, and to review privacy and security policies. But absent any additional evidence to suggest malicious intent on the part of the employee, it would be just that--a discussion--and not a disciplinary matter.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
Register for InformationWeek Newsletters
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll