Discussion about this post

User's avatar
Dave Marney's avatar

The difference between "illegally monitoring traffic that flows through the servers stored at your site that you maintain for them" and "illegally monitoring traffic that flows through the servers stored at their site but you maintain for them" is almost nil. It's a technicality.

Certainly nothing LIKE enough of a difference to accuse someone of "liar, liar, pants on fire."

When you focus on technicalities, it sounds like you have something to hide. Just sayin'.

Expand full comment
Jeff Guarino's avatar

By misusing the data, It was now an infiltration. This company did not respect the data they were gathering and had a contract to gather this data.. The infiltration happened years ago when they were first hired and then they executed it by handing the data to unauthorized parties. This is like putting malware on your computer and years later it executes itself and steals your sensitive data. The firm was corrupt from the git go.

Expand full comment
14 more comments...

No posts