On Sun, Aug 05, 2012 at 12:38:47AM -0400, James Black wrote:
> So write your own server to interface with the mail server, which could be
> behind a firewall, then this app is what can be used.
>
> Basically, if pop/imap is used then the OP is out of luck, but, if other
> approaches are allowed the problem can be solved
> On Aug 4, 2012 10:21 PM, "Kristopher Micinski" <[email protected]>
> wrote:
First, I'm assuming that the purpose here is a corporate security type
deal, wanting to prevent departing (now former) employees from taking
corporate secrets and/or compromising e-mail with them.
Even if you create your own server, and a client which only allows the
user to view the e-mail on that server, you still have to deal with
issues like cut/past, saving the e-mail to a file, screenshots, copying
by hand (more for secret stuff...useless for blackmail, etc.), and so on.
As is the case in cases where you're working with classified, the best
solution is to ensure that people with clearance, authorization, and
need to know are trustworthy enough to have access in the first place.
If you can't trust an employee, don't give them access in the first
place, because if they're determined to get information out, they'll
find a way, no matter how much you try to lock it down. Those are
cases where someone should not have had access in the first place.
If you're REALLY dealing with sensitive stuff, you could even not allow
any personal two-way radios, pagers, cell phones, cameras or other video
recording devices, etc., and in extreme cases, you could make it the
equivalent of TPI (Two Person Integrity), where NOBODY is allowed to
be alone with whatever it is, the material is kept in a TPI safe, with
two combinations, and NOBODY is allowed to know both, and the combos
are changed whenever anyone with one of them leaves, and so on.
Even then, it's not perfectly secure, but....
Oh, and do you allow employees to leave with their Android device? Can
you control access to it when they're not in the office? If anything
that compromises proprietary information is saved on that device, you've
already failed.
It all comes down to this: how damaging is [whatever], and how much
expense and extra effort on the part of employees is it worth to protect
it?
I realize most of this is off-topic, but it's here to point out that
just removing all corporate e-mail from a departing employee's Android
alone is not going to do much.
Later,
--jim
PS: Yes, when I was in intelligence, I was, when it came to protecting
classified (especially when we had uncleared working in our area
and those big flashing red lights on the ceilings were on), the
"bulldog". I was often the one assigned as their escort, too. I
got one guy tossed out on his ass and forbidden to ever return
(then our NCOIC called his boss, and this guy lost his clearance and
his job before he even got back to the comm squadron building---he
was bitching and whining about having to follow all this "security
bs"...a SURE way to lose both your clearance and your job in a
heartbeat).
--
THE SCORE: ME: 2 CANCER: 0
73 DE N5IAL (/4) MiSTie #49997 < Running Mac OS X Lion >
[email protected] ICBM/Hurr.: 30.44406N 86.59909W
Saw something on TV about Psych-os.
Hmmmm, Psych OS. Perhaps the next freeware OS.... --me
Android Apps Listing at http://www.jstrack.org/barcodes.html
--
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en