On Tue, 10 Oct 2000, Ton Diening wrote:

> a) Trust that the vendor just looks at what is necessary and isn't there to
> pull coporate knowledge.

a') Monitor and log the connections.

> 1) Security waiver from the security group.

1') This type of access should be covered under the security policy- the
idea of a waiver means you expect the policy not to be followed.

Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to