Forgot your password?
typodupeerror

Comment Re:In my corporate environment.... (Score 1) 1307

Fine - IT is reasonably concerned that a vulnerability in my setup is a hole into the network. Patient information is on other networks and machines, and above my pay-grade to make sure it is compliant with policies and security is kept up to date. I would just like to point out: 1. There are more low-hanging fruit for security holes, such as all the unpatched Windows XP machines at the nurses stations. 2. How is giving the IT tech a non-root account onto my OpenBSD machine going to work - is he really going to know how to probe it from the command line? If he wants to control (shutdown) my machine - wouldn't he need root or sudo? (Truth be told - my suspicion was that he just wants to learn how I did it, so he can implement it for other depts and look the hero) Lastly - your point about when I leave - please leave that to some other post/question - its off-point. If I left, my colleagues would know better than to expect IT to take over the server of Dr "Dorian".

Comment Re:In my corporate environment.... (Score 2) 1307

Okay - original poster here. To clear up some issues: 1. I assure you - I'm not a troll - though the name is obviously fake. Real honest question. 2. Having servers on the network is not unprecedented. It is a medical school. Several labs have UNIX (even old Solaris machines) in their lab, that they have websites on. A simple email request to IT allowed port 80 and 443 to be unblocked. 3. HIPAA - very important. But no patient information will be on this machine. Only "May 7-8: on-call Dr X" 4. I'm perplexed by the paradox of half the people being up in arms about HIPAA, but many posters simply advocating Google calendars. Make up your mind - it could be super-sensitive but we should let it be on the cloud?

Submission + - Do I give IT a login on our Dept server? (slashdot.org) 7

jddorian writes: I am head of a clinical division at an academic hospital (not Radiology, but similarly tech oriented). My fellow faculty (dozen or so) want to switch from paper calendar to electronic (night and weekend on-call schedule). Most have an iPhone or similar, so I envisaged a CalDAV server. The Hospital IT dept doesn't offer any iPhone compatible calendar tool, so I bought (my cash) a tiny server, installed a BSD, OpenLDAP for accounts, and installed and configured DAViCal. After I tested it out, I emailed IT to ask to allow port 8443 through the hospital firewall to this server. The tech (after asking what port 8443 was for), said he would unblock the port after I provide him with a login account on the machine (though "I don't need root access"). I was taken aback, and after considering it, I am still leaning toward opposing this request, possibly taking this up the chain. I'm happy to allow any scan, to ensure it has no security issues, but I'd rather not let anyone else have a login account. What do the readers of Slashdot think? Should I give IT a login account on a server that is not owned or managed by them?

Slashdot Top Deals

Nothing is finished until the paperwork is done.

Working...