![]() ![]() ![]() With a cloud/vpa (integrator created) based solution, it is possible that authorization came from someone with no competency to make this decision (facility mangers, public safety). This may not be the case if you are accessing a client workstation or server connected to a live monitor in use. With a customer provided VPN, this provides events, logs, and access by the customer and owner of the system/network, so I assume that this will assume consent. With the use of remote access applications as mentioned above, what kind of disclosure agreement is signed by the end user and who is the authorized user at the customer site that is required to sign this? When accessing, what are the guidelines to notify the customer or end-user (server/workstation) that you are accessing? Aren't cloud access products (and integrator created VPNs) a form of surveillance (possibly illegal), with guidelines under the CSPCA (Computer Software Privacy Control Act) and other federal/state regulations? ![]()
0 Comments
Leave a Reply. |