It's also an occasion for celebration, because I refused to authorize Inhuman Resources to do a criminal check on me, so this is my last p-card, and from now on my attempts to get purchases refunded will take on a still more voluminous paperwork form. I was hoping for something more in the tradition of Anglo-Saxon jurisprudence (Magna Carta, presumption of innocence, stuff like that) when I immigrated to these shores from "them" (the comrades of former communist Yugoslavia).
Gowd, I must be turning Libertarian? It's something they are adding to Virginia-Highlands water.
But having all administration (financial offices, grant office, computer people) turn from supporting us in our work to running interference and policing us is getting increasingly tedious, so I'm getting edgy. This is what happened. First a secretary somewhere embezzled tens of thousands of dollars (our annual budget is 1.2 billion dollars). Then another secretary posted naked pictures of herself using work computer. The level of wrongdoing remains the same. To cite Patrick Jenkins, senior Information Systems Auditor (Whistle, April 2010):
It's important to remember that it's a very small minority involved in questionable activity. [...] The problems we run across are easily 0.01 percent or less of what we look at, overall.Total 2010 GaTech budget is $1.2B, so we are talking about $120K in questionable spending. School of physics alone has about 4 people using most of their time generating paperwork related to faculty purchases. My wild guess is that we are spending between $1M and $10M to prevent faculty from initiating potentially questionable spending in $100K range. Would it not be much cheaper to assume that the faculty and staff consists of upright citizens, and criminally prosecute the few that stray from the straight path?
Nevertheless - transition took only couple of years - we have been kidnapped by a locust cloud of liability lawyers, who construe the purpose of the Flagship of Technology and Science of Southeast to be preventing people who work here from doing anything that could become a criminal liability for the institution.
In the old time my computer would greet me like this:
--- welcome to "zero", the CNS linux network server ---
--- ubuntu/dapper linux 2.6 2 amd86x64 ---
Now that KBG has taken over, it greets us like this:
This system is for the use of authorized users only. Individuals using this computer system without authority, or in excess of their authority, are subject to having their activities on this system monitored and recorded. Be advised that if such monitoring reveals possible evidence of criminal activity, system personnel may provide the evidence to law enforcement officials.Well thank you so much. In my innate state of moral turpitude the thought that criminal activity might lead me to law enforcement officials never crossed my mind. Now I'll be doubly vigilant while engaging in it. And while we are at it, can you please hang a sign around the neck of every child entering the campus saying:
plus rest of the penal code, lest we forget. So now we are recruiting top talent by whispering sweet nothings in their ears while a job offer that reads like incarceration papers is in the mail.
Georgia Civil Code Secs. 19-7-5/19-15- 1/49-5-180 and Georgia Criminal Code Secs. § 16-3-20. Parent or person in loco parentis reasonably disciplining of a minor has a justification for a criminal prosecution based on that conduct.
As an added security measure, an unattended computer on my desk locks up every 15 (fifteen) minutes and pops up the above winged greeting. Then you press [ctrl][alt][del] and type in your user ID and your password, and voila! you can continue your criminal activities. Really improves your productivity while keeping you out of the jail. So everybody is lugging their laptops to work, and waiting for the day when a G4 wireless connection will liberate us. Part of our research is already running on John's off-campus server, and I'll have to move the rest as well.
The stupidities our IT Security Organs impose in their very effective work on preventing us from working... For example, CNS network Tzar and I could not [shut down] the Center communal W7 PC, so we had to request the KGB administrator to come, log in as administrator. What goes through IT people's heads I cannot fathom. My instinct is that if you give people a chance, they'll do the right thing. Why would they be doing science otherwise?
I'm writing pointless letters of protest, like to our telephone police. "They" just informed us that from now on they will erase any voice mail older than 30 days. So I'm trying to figure how to move all my voice mail to google.com/voice. They are not technology powerhouse, like us, but they seem to be able to keep voicemail for more than 30 days. If the locust cloud of liability lawyers does this to our emails - and - for added computer security - to all our computer files, the life will become so much simpler again. As secure as the death itself.
Followup: What I wrote above was in the morning. Since then I got this email: "You have turned in your January p-card statement. However, you have not signed it on the cardholder signature line. Please come by the Finance Office as soon as possible to sign your statement."
I'm fairly sure I signed that piece of paper, but not on the right dotted line. The world will collapse and both our departmental Financial Officers and I will be taken away in ball and chains if I do not "come by the Finance Office as soon as possible to sign". But I feel too fragile to attempt such a thing in my present condition.
Nobody said that life here would be a bed of roses.
1 comment:
And I was feeling guilty about having been the cause of your sitting through the "film" What the $#@^ Do We Know. After seeing all of the other stuff you go through, my feelings of guilt for that have now been assuaged.
Post a Comment