(
日期:][
下一个日期][
线程:][
线程下][
日期索引][
线程索引]
再保险:最终稿?
时间延迟在我访问电子邮件让我潜伏到目前为止,但我想添加支持。我非常喜欢这封信。比尔戴夫·曼写道:清单写道:> >“自”是指“时间”这个词,而不是因果关系。> >好抓! ! !> >新变化:> > *取代“自”这个词成为建议> -见aragraphs 2和5 > > *进一步加强2日森泰斯在第二段>——取代”的教育……专家可能阻碍”>“的教育…专家将会阻碍”> > Spaf提供:> >我不相信这封信需要进一步缩短。我认为> >它是准备好了。> >我同意。> > - - > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = >戴夫·曼| |电子邮件:dmann@bos.bindview.com >高级安全分析师| |电话:508-485-7737 x254 > BindView公司| |传真:508-485-0737 > = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = > >问候:> >主要安全从业人员、教育工作者、供应商,和>用户信息安全,我们希望注册我们的疑虑>欧洲委员会起草条约犯罪在网络空间。 > > We are concerned that portions of the proposed treaty may result in > criminalizing techniques and software commonly used to make computer > systems resistant to attack. Signatory states passing legislation to > implement the treaty may endanger the security of their computer > systems because computer users in those countries will not be able to > adequately protect their computer systems and the education of > information protection specialists will be hindered. > > Critical to the protection of computer systems and infrastructure is > the ability to > * Test software for weaknesses > * Verify the presence of defects in computer systems > * Exchange vulnerability information > > System administrators, researchers, consultants and companies all > routinely develop, use, and share software designed to exercise known > and suspected vulnerabilities. Academic institutions use these > tools to educate students and in research to develop improved > defenses. Our combined experience suggests that it is impossible > to reliably distinguish software used in computer crime from that > used for these legitimate purposes. In fact, they are often > identical. > > Currently, article 6 of the draft treaty is vague regarding the use, > distribution, and possession of software that could be used to > violate the security of computer systems. We agree that damaging or > breaking into computer systems is wrong and we unequivocally support > laws against such inappropriate behavior. We affirm that a goal of the > treaty and resulting legislation should be to permit the development > and application of good security measures. However, legislation that > criminalizes security software development, distribution and use > is counter to that goal, as it would adversely impact security > practitioners, researchers, and educators. > > Therefore, we respectfully request that the treaty drafters remove > section a.1 from article 6, and modify section b accordingly; the > articles on computer intrusion and damage (viz., articles 1-5) are > already sufficient to proscribe any improper use of security-related > software or information. > > Please do not hesitate to call on us for technical advice in your > future deliberations. > > Signed, > > > > > > "Organizational affiliations are listed for identification purposes > only, and do not necessarily reflect the official opinion of the > affiliated organization."
开始:名片n:希尔,威廉电话;工作:703-883-6416 x-mozilla-html:真正的组织:公司adr冠冕:;;多利·麦迪逊大街182manbetx客户端首页0,麦克莱恩;弗吉尼亚州;22102;版本:2.1邮件;互联网:bill@mitre.org标题:信息安全工程师fn:比尔山结束:名片
S / MIME加密签名