Security statement

Robert Hsiung (dr-bob@uchicago.edu)
Mon, 1 Dec 1997 18:12:40 -0600 (CST)


Listmates,

Here's what I've drafted for a research protocol of ours. It's meant to
address both email and CU-SeeMe security. We would only be connecting
point-to-point. Would you consider this both accurate and understandable?

Thanks,

Bob

>>>>
Copies of e-mail might be saved on computers en route, and though it is
understood that the privacy of e-mail should be respected, people with
access (authorized or not) to those files would have access to the contents
of those e-mails. Logs of the senders and recipients of e-mail may also be
kept. With CU-SeeMe, however, data is not saved en route and logs of
transmissions are not kept.

Regular mail and telephone conversations might potentially be intercepted
during the process of transmission. This is also true of Internet-based
communications, even when they are not saved en route. Access to
intermediary computers, as well as relatively sophisticated software,
would, however, be required. Videoconferences must be segmented and
digitized in order to be transmitted, so even if intercepted, they still
would need to be re-transformed into audiovisual data and re-assembled in
the correct sequence.
<<<<