Correct. But some of these tasks might show up in almost any business if a crime has occurred. For example, I know a few examples of the technical staff of software development companies doing research to support software piracy investigations.
Richard -----Original Message----- From: David Harley [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 02, 2008 12:25 PM To: 'Richard M. Smith'; 'FunSec [List]' Subject: RE: [funsec] I suppose it is a fake thing or a misunderstanding :? > I don't see it. Which clause do you think applies? I don't suppose Larry was suggesting that these clauses really apply. But I can see how many tasks I remember being set during my time in support might have been seen as falling into one or more of these categories. -- David Harley, ESET Research Author AVIEN COO: http://www.avien.org http://www.smallblue-greenworld.co.uk _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
