Quote:
Originally Posted by Brian.Pearson
How about Hushmail?
Or if you use Keyscrambler.
|
One could find ways to secure communication, but keep in mind that that isn't the important point here. The security person could circumvent your security if they needed to, but most don't need to. They would note an unsecured connection on the network (unsecured as in not operating within their security sandbox) and they would seek out the offender. At that point breech of policy would be established. That is, the acceptable use policy of your company would most likely cover this violation and action would be taken against you. It might be something as simple as a warning or it might mean the loss of a job. Also, if any damage was caused by breaking that policy, you might be held liable for it as well.
Strictly put, only do authorized company use of the network and computers. If a person doesn't know what is authorized, they need to ask. Ive seen millions of cases like these and they ALL end badly for the user.