--------------------------------<snip>--------------------------------------
The presumption seems to be that no "outsider" would have the ability to put a program into APF authorized libraries. Well, what about 3rd party vendors? We certainly provide the motivation to induce "insiders" to place our programs into authorized libraries. But what are we? "Insiders"? "Outsiders"?

(As mentioned in my prior post, one technical way to partially address this exposure would be for IBM to reduce the number of reasons requiring a program to run authorized.)
--------------------------------<unsnip>------------------------------------
I've always required that 3rd party vendors include penalty clauses in their contracts, such that it their software contributes to a security breach, then they pay penalties that are downright Draconian. Failing that, I want to review all authorized source code, as well as any mechanisms that communitcate to unauthorized code. I would be happy to execute, and abide by, a non-disclosure agreement if that was required. If the vendor won't agree to one or the other of those terms, we looked somewhere else. I only had one vendor refuse and they blew a $200,000 deal just that quickly.

(I even got a look at some serious IBM code, but as far as I know, the NDA is still in effect so I can't go into details.)

"You want to play in my yard, you play by my rules. Period."

Rick

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to