灵灵气2006-03-25 11:48:02
严重警告:不要用Google Desktop

Hello Everyone,

Please read the information below. This is a very important issue and
I highly recommend you do not install this on any computer you use or
own. In addition, xxxx does not want you to install on xxxxx computers
unless you have a very compelling reason.

xxxx

-----Original Message-----
From: xxxxx, xxxxx Chief IT Security Officer
[mailto:mais.inform@xxxx.edu]
Sent: Thursday, March 23, 2006 9:50 AM
To: "xxxx Deans, Directors and Department Heads"
Subject: Google Desktop Tool Exposes Sensitive Information

Important Information: Please share with your IT Department

Sensitive and confidential information, including human subject research
data, could be exposed through an application called Google Desktop. As
a result, we strongly recommend that it not be deployed on workstations
that process sensitive data. Exposure of sensitive or confidential data
could violate both xxxx policy (xxxx) and federal privacy
laws (HIPAA, FERPA, GLBA).

If there is a strong business need for this application, it can be
configured to restrict the transmission and storage of restricted data.
See http://xxxxx/ for instructions.

Google Desktop contains features that raise serious security and privacy
concerns. For example, the "Search Across Computers" feature (available
in version 3), creates an index of all the files on your computer,
copies them to Google's servers, and updates them as changes are made.
You can then retrieve and update your files stored on Google's servers
from another computer you use that also has Google Desktop installed on
it. Google stores Word documents, Excel spreadsheets, PowerPoint
presentations, PDF files, text files, and except for secure (https)
sites, Google also stores the web sites that you've viewed.

There is a real possibility that sensitive, research, and confidential
information stored on a home or office computer could be accessed by
others when Google Desktop is installed and incorrectly configured. IT
professionals should seriously consider prohibiting its use and
individuals should take care not to install it on university or home
computers that store sensitive or research data.

To help protect the privacy and security of xxxx data, we ask that
you please share this information broadly. xxx and others are also
taking steps to distribute this information immediately, as noted in the
Activities section below. IT professionals should reference the
Technical Paper prepared by ITSS at
http://xxx/tools/download/xxxx.pdf

Reference documents are included below to provide you with additional
information, but if you have questions regarding this message, please
contact me at xxxxx.