-
10 -
reasons for doing so were twofold: first to enable them to discover through the legal process what other data or programs Hershman might have altered or erased; and secondly to deter other people, still working for the organization, who might at some future point become tempted to take similar destructive steps. Leeds and Northrup asked for $10 000 in damages, but withdrew the financial claim in an out-of-court settlement. This seems to us to be exactly the right approach to any fraud; the certainty of detection, publicity and punishment is a important deterrent, particularly in systems where total prevention is impossible. The fact that Leeds and Northrup was so prompt in erasing Mr Hershman's password is also unusual, but the case might provide a lesson for computer users: to remove the employee's password immediately before he is told of his dismissal
SEARCHING CRIMINAL
FOR RECORDS
The Official Secrets Act makes it an offence in the UK for a Government Employee to hand out any confidential information. Both the giver and receiver of information are at risk. Thus the law makes it impossible in the UK for an employer or a potential employer to obtain detailed information about a person they suspect of having a criminal record. An employer in the UK contemplating the recruitment of a person into a highly sensitive job is walking a tightrope. On one hand he could let into the organization the very person most likely to harm him; and on the other, if he seeks to make unofficial checks, he could face the risk of prosecution for violating the Official Secrets Act.
Screening checks
In previous editions we have discussed legal ways in which thorough pre-employment screening checks can be made and we would recommend to any employer that if he has not already done so, he should review his methods of recruitment most carefully. He would also be prudent to make similar checks before vital contracts are entered into with suppliers, customers, agents and other third parties. A little bit of care can prevent problems later on. One extremely useful source of such information is the Newspaper Library of the British Library at Colindale Avenue, London NW9 5HE (Tel: 01 200 5515). The library contains about half a million volumes and parcels of daily and weekly newspapers and periodicals. The collection dates back to 1700, which should be enough to cover the backgrounds of most computer staff. There is a name and subject index, a photograph and microfilm service and a reading room. Similar libraries exist in most big cities. In some - New York, Boston and Los Angeles, for examples - the full text of certain newspapers and journals are held in computers, permitting very rapid search and retrieval of items.
ADVERTISING THEFT
You are a leading supplier in what is becoming an increasingly competitive market. How do you get your message across that your product is better, faster, more secure or cheaper? One answer appears to be to have your system stolen by the Russians. Software AG who produce the Data Base Management System 'Adabas', which Andre Mark De Guyter (COMPUTER FRAUD & SECURITY, Vol 2, No 9, p 13) stole, allegedly for the Russians, has produced what must be
COHPUTEB~~IQ@ID&SECWlTYB~ Vol2 No12
Elsev~er Sequola
SA. Lausanne.
Swtrerland