<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article10_01_14_0350216</id>
	<title>Only 27\% of Organizations Use Encryption</title>
	<author>samzenpus</author>
	<datestamp>1263457860000</datestamp>
	<htmltext>An anonymous reader writes <i>"According to a Check Point survey of 224 IT and security administrators, over 40\% of businesses in the last year have more remote users connecting to the corporate network from home or when traveling, compared to 2008. The clear majority (77\%) of businesses have up to a quarter of their total workforce consisting of regular remote users. Yet, regardless of the growth in remote users, <a href="http://www.net-security.org/secworld.php?id=8704">just 27\% of respondents say their companies currently use hard disk encryption</a> to protect sensitive data on corporate endpoints. In addition, only 9\% of businesses surveyed use encryption for removable storage devices, such as USB flash drives. A more mobile workforce carrying large amounts of data on portable devices leaves confidential corporate data vulnerable to loss, theft and interception."</i></htmltext>
<tokenext>An anonymous reader writes " According to a Check Point survey of 224 IT and security administrators , over 40 \ % of businesses in the last year have more remote users connecting to the corporate network from home or when traveling , compared to 2008 .
The clear majority ( 77 \ % ) of businesses have up to a quarter of their total workforce consisting of regular remote users .
Yet , regardless of the growth in remote users , just 27 \ % of respondents say their companies currently use hard disk encryption to protect sensitive data on corporate endpoints .
In addition , only 9 \ % of businesses surveyed use encryption for removable storage devices , such as USB flash drives .
A more mobile workforce carrying large amounts of data on portable devices leaves confidential corporate data vulnerable to loss , theft and interception .
"</tokentext>
<sentencetext>An anonymous reader writes "According to a Check Point survey of 224 IT and security administrators, over 40\% of businesses in the last year have more remote users connecting to the corporate network from home or when traveling, compared to 2008.
The clear majority (77\%) of businesses have up to a quarter of their total workforce consisting of regular remote users.
Yet, regardless of the growth in remote users, just 27\% of respondents say their companies currently use hard disk encryption to protect sensitive data on corporate endpoints.
In addition, only 9\% of businesses surveyed use encryption for removable storage devices, such as USB flash drives.
A more mobile workforce carrying large amounts of data on portable devices leaves confidential corporate data vulnerable to loss, theft and interception.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762846</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>Anonymous</author>
	<datestamp>1263476280000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext>So, your data is so important that you cannot deal with losing access to it, but not so important that you won't encrypt it.<br><br>You must be in sales.  Why are you reading slashdot?</htmltext>
<tokenext>So , your data is so important that you can not deal with losing access to it , but not so important that you wo n't encrypt it.You must be in sales .
Why are you reading slashdot ?</tokentext>
<sentencetext>So, your data is so important that you cannot deal with losing access to it, but not so important that you won't encrypt it.You must be in sales.
Why are you reading slashdot?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762372</id>
	<title>This is why China is beating America hands down</title>
	<author>Anonymous</author>
	<datestamp>1263469620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>I would go even further - What is the mathematical probability of someone stealing my [laptop] AND be interested enough in the data on the disk to bother trying to get access to it.</p></div><p>Two words you might want to consider...</p><p>"industrial" and  "espionage"</p><p>Software installed and versions for further hacking attempts on the rest of the infrastructure.<br>Sales, marketing, pricing information. Release timing information.<br>Source code in products.</p><p>You name it.</p><p>The information is almost certainly far more valuable than the hardware, to the right people.</p><p>
&nbsp;</p></div>
	</htmltext>
<tokenext>I would go even further - What is the mathematical probability of someone stealing my [ laptop ] AND be interested enough in the data on the disk to bother trying to get access to it.Two words you might want to consider... " industrial " and " espionage " Software installed and versions for further hacking attempts on the rest of the infrastructure.Sales , marketing , pricing information .
Release timing information.Source code in products.You name it.The information is almost certainly far more valuable than the hardware , to the right people .
 </tokentext>
<sentencetext>I would go even further - What is the mathematical probability of someone stealing my [laptop] AND be interested enough in the data on the disk to bother trying to get access to it.Two words you might want to consider..."industrial" and  "espionage"Software installed and versions for further hacking attempts on the rest of the infrastructure.Sales, marketing, pricing information.
Release timing information.Source code in products.You name it.The information is almost certainly far more valuable than the hardware, to the right people.
 
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762120</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30768578</id>
	<title>Re:While everyone is arguing over drive encryption</title>
	<author>Spykk</author>
	<datestamp>1263499020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>That is starting to go away though. Our last <a href="http://en.wikipedia.org/wiki/Value-added\_network" title="wikipedia.org">VAN</a> [wikipedia.org] transition required us to move from vanilla FTP to FTPS. Anything that falls under HIPAA, 835 remittance advice for example, can't be legally transmitted unencrypted either.</htmltext>
<tokenext>That is starting to go away though .
Our last VAN [ wikipedia.org ] transition required us to move from vanilla FTP to FTPS .
Anything that falls under HIPAA , 835 remittance advice for example , ca n't be legally transmitted unencrypted either .</tokentext>
<sentencetext>That is starting to go away though.
Our last VAN [wikipedia.org] transition required us to move from vanilla FTP to FTPS.
Anything that falls under HIPAA, 835 remittance advice for example, can't be legally transmitted unencrypted either.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762642</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30765374</id>
	<title>Re:Remote Desktop</title>
	<author>nprz</author>
	<datestamp>1263488640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Same with me.<br>The article doesn't really say whether the survey asked whether they needed disk encryption because all the data is still on the servers, not the laptop / home computer.<br>I don't have a USB thumb drive at home, so should I have to encrypt it? No, so I'm part of that 91\%?</p><p>And to connect to my work VPN, it is as simple as logged into a web site (with my RSA key) and it does the VPN connection.<br>Normal users from there get access to their web sites that they normally use. But I use my RDP, VNC, SSH to wherever I need to go.</p></htmltext>
<tokenext>Same with me.The article does n't really say whether the survey asked whether they needed disk encryption because all the data is still on the servers , not the laptop / home computer.I do n't have a USB thumb drive at home , so should I have to encrypt it ?
No , so I 'm part of that 91 \ % ? And to connect to my work VPN , it is as simple as logged into a web site ( with my RSA key ) and it does the VPN connection.Normal users from there get access to their web sites that they normally use .
But I use my RDP , VNC , SSH to wherever I need to go .</tokentext>
<sentencetext>Same with me.The article doesn't really say whether the survey asked whether they needed disk encryption because all the data is still on the servers, not the laptop / home computer.I don't have a USB thumb drive at home, so should I have to encrypt it?
No, so I'm part of that 91\%?And to connect to my work VPN, it is as simple as logged into a web site (with my RSA key) and it does the VPN connection.Normal users from there get access to their web sites that they normally use.
But I use my RDP, VNC, SSH to wherever I need to go.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761904</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762074</id>
	<title>that's because</title>
	<author>Anonymous</author>
	<datestamp>1263465000000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><tt>we geeks haven't made it easier to use.</tt></htmltext>
<tokenext>we geeks have n't made it easier to use .</tokentext>
<sentencetext>we geeks haven't made it easier to use.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30769384</id>
	<title>Re:While everyone is arguing over drive encryption</title>
	<author>ZZartin</author>
	<datestamp>1263501660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>thousands of businesses are using plain FTP and email to throw unencrypted files around to &amp; from other companies daily.</p></div><p>Entirely true and usually the information is just simple things like lists of customer names and addresses.

Payment information is pretty much always encrypted due to PCI compliance reasons but simple customer information is not.  And really unless you have a very exclusive clientele it really doesn't matter, after all who cares about the name of generic redneck #46576876 living in an apartment somewhere who happened to place an order for product XYZ?</p></div>
	</htmltext>
<tokenext>thousands of businesses are using plain FTP and email to throw unencrypted files around to &amp; from other companies daily.Entirely true and usually the information is just simple things like lists of customer names and addresses .
Payment information is pretty much always encrypted due to PCI compliance reasons but simple customer information is not .
And really unless you have a very exclusive clientele it really does n't matter , after all who cares about the name of generic redneck # 46576876 living in an apartment somewhere who happened to place an order for product XYZ ?</tokentext>
<sentencetext>thousands of businesses are using plain FTP and email to throw unencrypted files around to &amp; from other companies daily.Entirely true and usually the information is just simple things like lists of customer names and addresses.
Payment information is pretty much always encrypted due to PCI compliance reasons but simple customer information is not.
And really unless you have a very exclusive clientele it really doesn't matter, after all who cares about the name of generic redneck #46576876 living in an apartment somewhere who happened to place an order for product XYZ?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762642</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30770248</id>
	<title>you should start way further back</title>
	<author>Anonymous</author>
	<datestamp>1263461760000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>.... presumably "anonymous coward" works for ckeckpoint's marketing department?  there are so many issues that compromise security without letting checkpoint trouser your money.</p><p>like sending unencrypted tapes of customer details around. and letting outsourcers sell servers with hard drives containing your customer details.</p><p>the list goes on and on,  and will not stop going on. the truth is corporate greed will always end up with processes being compromised because there is the possibility of turning a profit</p></htmltext>
<tokenext>.... presumably " anonymous coward " works for ckeckpoint 's marketing department ?
there are so many issues that compromise security without letting checkpoint trouser your money.like sending unencrypted tapes of customer details around .
and letting outsourcers sell servers with hard drives containing your customer details.the list goes on and on , and will not stop going on .
the truth is corporate greed will always end up with processes being compromised because there is the possibility of turning a profit</tokentext>
<sentencetext>.... presumably "anonymous coward" works for ckeckpoint's marketing department?
there are so many issues that compromise security without letting checkpoint trouser your money.like sending unencrypted tapes of customer details around.
and letting outsourcers sell servers with hard drives containing your customer details.the list goes on and on,  and will not stop going on.
the truth is corporate greed will always end up with processes being compromised because there is the possibility of turning a profit</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762114</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>uuddlrlrab</author>
	<datestamp>1263465540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>In what office jobs I've held (mostly inbound customer service), I've never encountered an encryption program deployed company-wide to make sure data stays secure. I did see a lot of company propag-, I mean, materials referencing the need for encryption and good data protection practices. In other words, a lot of hot air.</p></htmltext>
<tokenext>In what office jobs I 've held ( mostly inbound customer service ) , I 've never encountered an encryption program deployed company-wide to make sure data stays secure .
I did see a lot of company propag- , I mean , materials referencing the need for encryption and good data protection practices .
In other words , a lot of hot air .</tokentext>
<sentencetext>In what office jobs I've held (mostly inbound customer service), I've never encountered an encryption program deployed company-wide to make sure data stays secure.
I did see a lot of company propag-, I mean, materials referencing the need for encryption and good data protection practices.
In other words, a lot of hot air.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766052</id>
	<title>Weighing up the risks.</title>
	<author>Geeky</author>
	<datestamp>1263490920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>In many cases, the real risk of someone accessing data is much less than the risk of losing encrypted data because you lose the means to decrypt it. I've seen users who've encrypted their own disks go to support when they forget the passphrase and insist that support decrypt it for them... er, no, sorry, you're screwed.</p><p>Or let's say you get a hard drive failure and lose data that isn't backed up (it happens, even if you think you're careful). With an unencrypted disk, depending on the failure, you have an outside chance of retrieving files because even a partial file might be usable. With an encrypted drive, you're screwed again. It's going to be all or nothing - at least at the file level, and possibly the entire drive.</p><p>Taking the balance of risk, performance and all the rest (sensitive data should only be stored centrally anyway), encrypting local drives seems like overkill.</p></htmltext>
<tokenext>In many cases , the real risk of someone accessing data is much less than the risk of losing encrypted data because you lose the means to decrypt it .
I 've seen users who 've encrypted their own disks go to support when they forget the passphrase and insist that support decrypt it for them... er , no , sorry , you 're screwed.Or let 's say you get a hard drive failure and lose data that is n't backed up ( it happens , even if you think you 're careful ) .
With an unencrypted disk , depending on the failure , you have an outside chance of retrieving files because even a partial file might be usable .
With an encrypted drive , you 're screwed again .
It 's going to be all or nothing - at least at the file level , and possibly the entire drive.Taking the balance of risk , performance and all the rest ( sensitive data should only be stored centrally anyway ) , encrypting local drives seems like overkill .</tokentext>
<sentencetext>In many cases, the real risk of someone accessing data is much less than the risk of losing encrypted data because you lose the means to decrypt it.
I've seen users who've encrypted their own disks go to support when they forget the passphrase and insist that support decrypt it for them... er, no, sorry, you're screwed.Or let's say you get a hard drive failure and lose data that isn't backed up (it happens, even if you think you're careful).
With an unencrypted disk, depending on the failure, you have an outside chance of retrieving files because even a partial file might be usable.
With an encrypted drive, you're screwed again.
It's going to be all or nothing - at least at the file level, and possibly the entire drive.Taking the balance of risk, performance and all the rest (sensitive data should only be stored centrally anyway), encrypting local drives seems like overkill.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761994</id>
	<title>Anonymous Coward</title>
	<author>Anonymous</author>
	<datestamp>1263463680000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Heh-heh. Which ones?</p></htmltext>
<tokenext>Heh-heh .
Which ones ?</tokentext>
<sentencetext>Heh-heh.
Which ones?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763710</id>
	<title>encryption is worthless</title>
	<author>Anonymous</author>
	<datestamp>1263483000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>What's the cost in losses from lost data that resides on lost disks?   It's not as if the threat agent that steals the laptop from the backseat of my car is going around looking for data.  I'm thinking they're going to sell that shit and buy some crack.  They certainly aren't going to sit around and sift through looking for data regarding Mergers and Acquisitions for Fortune 50 companies, and even if they did, how the hell is a thieving underachiever going to turn that into crack? I bet the losses from lost data (that would be protected through encryption) aren't even close to the losses from key management, password resets, accidental encryption and the cost of the software itself.</p></htmltext>
<tokenext>What 's the cost in losses from lost data that resides on lost disks ?
It 's not as if the threat agent that steals the laptop from the backseat of my car is going around looking for data .
I 'm thinking they 're going to sell that shit and buy some crack .
They certainly are n't going to sit around and sift through looking for data regarding Mergers and Acquisitions for Fortune 50 companies , and even if they did , how the hell is a thieving underachiever going to turn that into crack ?
I bet the losses from lost data ( that would be protected through encryption ) are n't even close to the losses from key management , password resets , accidental encryption and the cost of the software itself .</tokentext>
<sentencetext>What's the cost in losses from lost data that resides on lost disks?
It's not as if the threat agent that steals the laptop from the backseat of my car is going around looking for data.
I'm thinking they're going to sell that shit and buy some crack.
They certainly aren't going to sit around and sift through looking for data regarding Mergers and Acquisitions for Fortune 50 companies, and even if they did, how the hell is a thieving underachiever going to turn that into crack?
I bet the losses from lost data (that would be protected through encryption) aren't even close to the losses from key management, password resets, accidental encryption and the cost of the software itself.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762358</id>
	<title>Re:A lot of organisations just are not that import</title>
	<author>dltaylor</author>
	<datestamp>1263469440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Does Agnes Cleaners work for anyone with a medical condition that requires a cleaning support staff?  That service may even be paid for in whole or part by a public (Medicare) or private health insurer.</p><p>HIPAA!</p></htmltext>
<tokenext>Does Agnes Cleaners work for anyone with a medical condition that requires a cleaning support staff ?
That service may even be paid for in whole or part by a public ( Medicare ) or private health insurer.HIPAA !</tokentext>
<sentencetext>Does Agnes Cleaners work for anyone with a medical condition that requires a cleaning support staff?
That service may even be paid for in whole or part by a public (Medicare) or private health insurer.HIPAA!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762226</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763116</id>
	<title>Re:Disk encryption can be very useful sometimes</title>
	<author>cbhacking</author>
	<datestamp>1263479280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Indeed, the ability to fairly irrevocably destroy all data on the disk (by removing all recovery keys to the encryption) is one of many advantages to whole-disk encryption. Granted it's less secure than overwriting the platers with random data 17 times and then running a magnet over them for good measure, but it's a preventative measure and as you point out it's something that you can do before a disk dies, to ensure the data is irrecoverable even if you can't write to it anymore but somebody malicious with specilaized recovery hardware gets ahold of it.</p></htmltext>
<tokenext>Indeed , the ability to fairly irrevocably destroy all data on the disk ( by removing all recovery keys to the encryption ) is one of many advantages to whole-disk encryption .
Granted it 's less secure than overwriting the platers with random data 17 times and then running a magnet over them for good measure , but it 's a preventative measure and as you point out it 's something that you can do before a disk dies , to ensure the data is irrecoverable even if you ca n't write to it anymore but somebody malicious with specilaized recovery hardware gets ahold of it .</tokentext>
<sentencetext>Indeed, the ability to fairly irrevocably destroy all data on the disk (by removing all recovery keys to the encryption) is one of many advantages to whole-disk encryption.
Granted it's less secure than overwriting the platers with random data 17 times and then running a magnet over them for good measure, but it's a preventative measure and as you point out it's something that you can do before a disk dies, to ensure the data is irrecoverable even if you can't write to it anymore but somebody malicious with specilaized recovery hardware gets ahold of it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762156</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763060</id>
	<title>Re:Disk encryption can be very useful sometimes</title>
	<author>140Mandak262Jamuna</author>
	<datestamp>1263478620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>For servers, encrypt the disk, and keep the key in an USB drive always plugged into the server. If a disk breaks, I remove the disk, and send it for warranty replacement without worrying about the data.</p><p>For laptops, I use Ubuntu's disk encryption. It's even better there as laptops usually don't have RAID, and may break for multiple reasons that I can't personally fix.</p></div><p>Funny, you did not consider not downloading and storing porn in your hard disks.</p></div>
	</htmltext>
<tokenext>For servers , encrypt the disk , and keep the key in an USB drive always plugged into the server .
If a disk breaks , I remove the disk , and send it for warranty replacement without worrying about the data.For laptops , I use Ubuntu 's disk encryption .
It 's even better there as laptops usually do n't have RAID , and may break for multiple reasons that I ca n't personally fix.Funny , you did not consider not downloading and storing porn in your hard disks .</tokentext>
<sentencetext>For servers, encrypt the disk, and keep the key in an USB drive always plugged into the server.
If a disk breaks, I remove the disk, and send it for warranty replacement without worrying about the data.For laptops, I use Ubuntu's disk encryption.
It's even better there as laptops usually don't have RAID, and may break for multiple reasons that I can't personally fix.Funny, you did not consider not downloading and storing porn in your hard disks.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762156</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763006</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>VoiceOfSanity</author>
	<datestamp>1263478080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Let me state that at the company I work for, disk encryption is *MANDATORY* for all computer systems, including servers.  In addition, encryption is also mandatory for anything being saved to removable media (read thumb drives, portable hard drives, but not CD and DVD media), and that digital rights management is installed for email so that you can protect a message by restricting it to only those recipients and prevent (or at least mitigate) the ability to copy that message.
<br> <br>
Admittedly this does make my job of supporting the systems more complicated, as previously if the operating system suffered a failure, I could still access the user's data.  Today, the odds of being able to decrypt the drive (yes, there is a procedure for it) and recover data is slim... and if the user didn't install/use the company data backup software that is provided to them, then their data is lost.
<br> <br>
But all these requirements are for the company's safety, not necessarily the user's.</htmltext>
<tokenext>Let me state that at the company I work for , disk encryption is * MANDATORY * for all computer systems , including servers .
In addition , encryption is also mandatory for anything being saved to removable media ( read thumb drives , portable hard drives , but not CD and DVD media ) , and that digital rights management is installed for email so that you can protect a message by restricting it to only those recipients and prevent ( or at least mitigate ) the ability to copy that message .
Admittedly this does make my job of supporting the systems more complicated , as previously if the operating system suffered a failure , I could still access the user 's data .
Today , the odds of being able to decrypt the drive ( yes , there is a procedure for it ) and recover data is slim... and if the user did n't install/use the company data backup software that is provided to them , then their data is lost .
But all these requirements are for the company 's safety , not necessarily the user 's .</tokentext>
<sentencetext>Let me state that at the company I work for, disk encryption is *MANDATORY* for all computer systems, including servers.
In addition, encryption is also mandatory for anything being saved to removable media (read thumb drives, portable hard drives, but not CD and DVD media), and that digital rights management is installed for email so that you can protect a message by restricting it to only those recipients and prevent (or at least mitigate) the ability to copy that message.
Admittedly this does make my job of supporting the systems more complicated, as previously if the operating system suffered a failure, I could still access the user's data.
Today, the odds of being able to decrypt the drive (yes, there is a procedure for it) and recover data is slim... and if the user didn't install/use the company data backup software that is provided to them, then their data is lost.
But all these requirements are for the company's safety, not necessarily the user's.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761894</id>
	<title>That's what happens when using Windows.</title>
	<author>Anonymous</author>
	<datestamp>1263461760000</datestamp>
	<modclass>Flamebait</modclass>
	<modscore>-1</modscore>
	<htmltext><p>This isn't surprising. This is just what happens when using Windows, which doesn't enforce security over typical remote desktop connections. You have to resort to third-party (often very expensive!) solutions to get such basic functionality.</p><p>On the other hand, OpenSSH is pretty universal in the UNIX and Linux worlds now. Virtually nobody has used rsh for nearly 20 years. So anyone connecting remotely via X-over-SSH automatically gets at least some degree of encryption.</p><p>Organizations with remote users need to start moving away from Windows. With so many viable open source alternatives, virtually all of which handle remote users in a much more secure manner, it's time to start doing things right.</p></htmltext>
<tokenext>This is n't surprising .
This is just what happens when using Windows , which does n't enforce security over typical remote desktop connections .
You have to resort to third-party ( often very expensive !
) solutions to get such basic functionality.On the other hand , OpenSSH is pretty universal in the UNIX and Linux worlds now .
Virtually nobody has used rsh for nearly 20 years .
So anyone connecting remotely via X-over-SSH automatically gets at least some degree of encryption.Organizations with remote users need to start moving away from Windows .
With so many viable open source alternatives , virtually all of which handle remote users in a much more secure manner , it 's time to start doing things right .</tokentext>
<sentencetext>This isn't surprising.
This is just what happens when using Windows, which doesn't enforce security over typical remote desktop connections.
You have to resort to third-party (often very expensive!
) solutions to get such basic functionality.On the other hand, OpenSSH is pretty universal in the UNIX and Linux worlds now.
Virtually nobody has used rsh for nearly 20 years.
So anyone connecting remotely via X-over-SSH automatically gets at least some degree of encryption.Organizations with remote users need to start moving away from Windows.
With so many viable open source alternatives, virtually all of which handle remote users in a much more secure manner, it's time to start doing things right.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762924</id>
	<title>Encryption</title>
	<author>Ivan Stepaniuk</author>
	<datestamp>1263477240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Ncvxm fmnwo octef gaiwv gwrsl s</htmltext>
<tokenext>Ncvxm fmnwo octef gaiwv gwrsl s</tokentext>
<sentencetext>Ncvxm fmnwo octef gaiwv gwrsl s</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762956</id>
	<title>Re:Dont blame IT</title>
	<author>physburn</author>
	<datestamp>1263477600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I do blame  IT at least partially, a business IT center, might well see the wisdom
of data encryption everywhere, but competing against this is, how easy it
is to recover lost data (damaged disk, lost passwords or encyrption keys), plus
the add complexity of managing the system. If it was built into windows i'm
sure many more companies would us it. It is built into linux, but not exactly
visable, or well known. Better support in OS would i'm sure make encryption
much more commonly used.
<p>
---
</p><p>
<a href="http://www.feeddistiller.com/blogs/Cryptography/feed.html" title="feeddistiller.com">Cryptography</a> [feeddistiller.com] Feed @ <a href="http://www.feeddistiller.com/" title="feeddistiller.com">Feed Distiller</a> [feeddistiller.com]</p></htmltext>
<tokenext>I do blame IT at least partially , a business IT center , might well see the wisdom of data encryption everywhere , but competing against this is , how easy it is to recover lost data ( damaged disk , lost passwords or encyrption keys ) , plus the add complexity of managing the system .
If it was built into windows i 'm sure many more companies would us it .
It is built into linux , but not exactly visable , or well known .
Better support in OS would i 'm sure make encryption much more commonly used .
--- Cryptography [ feeddistiller.com ] Feed @ Feed Distiller [ feeddistiller.com ]</tokentext>
<sentencetext>I do blame  IT at least partially, a business IT center, might well see the wisdom
of data encryption everywhere, but competing against this is, how easy it
is to recover lost data (damaged disk, lost passwords or encyrption keys), plus
the add complexity of managing the system.
If it was built into windows i'm
sure many more companies would us it.
It is built into linux, but not exactly
visable, or well known.
Better support in OS would i'm sure make encryption
much more commonly used.
---

Cryptography [feeddistiller.com] Feed @ Feed Distiller [feeddistiller.com]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762096</id>
	<title>Come on now</title>
	<author>Frogbert</author>
	<datestamp>1263465360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>There is no way it is that high.</p></htmltext>
<tokenext>There is no way it is that high .</tokentext>
<sentencetext>There is no way it is that high.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762366</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>badevlad</author>
	<datestamp>1263469500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I have had remote work in foreign IT company. As one of standard requirements was having encrypted disk with all working materials.

Except for this one case, I never encountered any user at any company encrypting anything.</htmltext>
<tokenext>I have had remote work in foreign IT company .
As one of standard requirements was having encrypted disk with all working materials .
Except for this one case , I never encountered any user at any company encrypting anything .</tokentext>
<sentencetext>I have had remote work in foreign IT company.
As one of standard requirements was having encrypted disk with all working materials.
Except for this one case, I never encountered any user at any company encrypting anything.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761982</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30771284</id>
	<title>Risk? It's not from hackers!</title>
	<author>mhollis</author>
	<datestamp>1263465480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Last company my wife worked for fielded a sales force with laptops. their "office" was their home. They sold advertisements. There was no data security.</p><p>These sales people knew their territories, knew their jobs and knew how to generate revenue. And they were in New England, where a friend is hard won but, once won, a friend for life. The company, based in Virginia, gave no thought to relationships. They operated under the mistaken impression that their product was king.</p><p>So they put my wife out like the cat. Didn't give her severance. She's suing.</p><p>And they fired all of their sales staff. One by one. Told them they were not meeting their quotas.</p><p>There were no corporate financials on the salespeoples' laptops. There was no sensitive information, save addresses and phone numbers of the advertisers and email addresses of the company yes-men that went along with this deal.</p><p>One of the salespeople, who had been with the company some 30 years went to all of his clients and started a new publication and started selling space in it. He has been growing and gaining clients because he treats them right and has a good ad production department. He has the old advertisers he used to have and has new ones who want in. And he's growing in New England.</p><p>Oh, and the original company? They're looking for a New England regional sales manager to replace my wife now. They want one with a complete sales team and solid contacts in the market.</p><p>Data security? We backed up my wife's entire drive onto our own external hard drive because they wouldn't buy her a backup drive (too cheap). We kept that drive. And at the initial hearing for her lawsuit, the company was repeatedly shocked by the content of their own emails coming back to haunt them.</p><p>So in this day and age of corporations firing people for being female, pregnant "too old" or "too unwhite" and getting away with it most of the time, why do they think they need data security again?</p></htmltext>
<tokenext>Last company my wife worked for fielded a sales force with laptops .
their " office " was their home .
They sold advertisements .
There was no data security.These sales people knew their territories , knew their jobs and knew how to generate revenue .
And they were in New England , where a friend is hard won but , once won , a friend for life .
The company , based in Virginia , gave no thought to relationships .
They operated under the mistaken impression that their product was king.So they put my wife out like the cat .
Did n't give her severance .
She 's suing.And they fired all of their sales staff .
One by one .
Told them they were not meeting their quotas.There were no corporate financials on the salespeoples ' laptops .
There was no sensitive information , save addresses and phone numbers of the advertisers and email addresses of the company yes-men that went along with this deal.One of the salespeople , who had been with the company some 30 years went to all of his clients and started a new publication and started selling space in it .
He has been growing and gaining clients because he treats them right and has a good ad production department .
He has the old advertisers he used to have and has new ones who want in .
And he 's growing in New England.Oh , and the original company ?
They 're looking for a New England regional sales manager to replace my wife now .
They want one with a complete sales team and solid contacts in the market.Data security ?
We backed up my wife 's entire drive onto our own external hard drive because they would n't buy her a backup drive ( too cheap ) .
We kept that drive .
And at the initial hearing for her lawsuit , the company was repeatedly shocked by the content of their own emails coming back to haunt them.So in this day and age of corporations firing people for being female , pregnant " too old " or " too unwhite " and getting away with it most of the time , why do they think they need data security again ?</tokentext>
<sentencetext>Last company my wife worked for fielded a sales force with laptops.
their "office" was their home.
They sold advertisements.
There was no data security.These sales people knew their territories, knew their jobs and knew how to generate revenue.
And they were in New England, where a friend is hard won but, once won, a friend for life.
The company, based in Virginia, gave no thought to relationships.
They operated under the mistaken impression that their product was king.So they put my wife out like the cat.
Didn't give her severance.
She's suing.And they fired all of their sales staff.
One by one.
Told them they were not meeting their quotas.There were no corporate financials on the salespeoples' laptops.
There was no sensitive information, save addresses and phone numbers of the advertisers and email addresses of the company yes-men that went along with this deal.One of the salespeople, who had been with the company some 30 years went to all of his clients and started a new publication and started selling space in it.
He has been growing and gaining clients because he treats them right and has a good ad production department.
He has the old advertisers he used to have and has new ones who want in.
And he's growing in New England.Oh, and the original company?
They're looking for a New England regional sales manager to replace my wife now.
They want one with a complete sales team and solid contacts in the market.Data security?
We backed up my wife's entire drive onto our own external hard drive because they wouldn't buy her a backup drive (too cheap).
We kept that drive.
And at the initial hearing for her lawsuit, the company was repeatedly shocked by the content of their own emails coming back to haunt them.So in this day and age of corporations firing people for being female, pregnant "too old" or "too unwhite" and getting away with it most of the time, why do they think they need data security again?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30764382</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>Anonymous</author>
	<datestamp>1263485760000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>It included all the smart-asses who said they use double ROT13 encryption.</p></htmltext>
<tokenext>It included all the smart-asses who said they use double ROT13 encryption .</tokentext>
<sentencetext>It included all the smart-asses who said they use double ROT13 encryption.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762156</id>
	<title>Disk encryption can be very useful sometimes</title>
	<author>Anonymous</author>
	<datestamp>1263466140000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>There's one use for encryption people don't generally discuss: tech service.</p><p>I've been running a home server for a long time. Such systems over time accumulate years worth of mail, which will contain private data, website passwords, and so on. I personally feel uncomfortable with sending a disk containing years worth of data to a tech support department when I want to say, get it replaced under warranty. There have been a few stories about underpaid techs looking for music and porn on customers' hard drives. And if the disk is broken I can hardly erase it properly.</p><p>So my solution:</p><p>For servers, encrypt the disk, and keep the key in an USB drive always plugged into the server. If a disk breaks, I remove the disk, and send it for warranty replacement without worrying about the data.</p><p>For laptops, I use Ubuntu's disk encryption. It's even better there as laptops usually don't have RAID, and may break for multiple reasons that I can't personally fix.</p></htmltext>
<tokenext>There 's one use for encryption people do n't generally discuss : tech service.I 've been running a home server for a long time .
Such systems over time accumulate years worth of mail , which will contain private data , website passwords , and so on .
I personally feel uncomfortable with sending a disk containing years worth of data to a tech support department when I want to say , get it replaced under warranty .
There have been a few stories about underpaid techs looking for music and porn on customers ' hard drives .
And if the disk is broken I can hardly erase it properly.So my solution : For servers , encrypt the disk , and keep the key in an USB drive always plugged into the server .
If a disk breaks , I remove the disk , and send it for warranty replacement without worrying about the data.For laptops , I use Ubuntu 's disk encryption .
It 's even better there as laptops usually do n't have RAID , and may break for multiple reasons that I ca n't personally fix .</tokentext>
<sentencetext>There's one use for encryption people don't generally discuss: tech service.I've been running a home server for a long time.
Such systems over time accumulate years worth of mail, which will contain private data, website passwords, and so on.
I personally feel uncomfortable with sending a disk containing years worth of data to a tech support department when I want to say, get it replaced under warranty.
There have been a few stories about underpaid techs looking for music and porn on customers' hard drives.
And if the disk is broken I can hardly erase it properly.So my solution:For servers, encrypt the disk, and keep the key in an USB drive always plugged into the server.
If a disk breaks, I remove the disk, and send it for warranty replacement without worrying about the data.For laptops, I use Ubuntu's disk encryption.
It's even better there as laptops usually don't have RAID, and may break for multiple reasons that I can't personally fix.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30776892</id>
	<title>73\% percent of laptops don't have sensitive data</title>
	<author>Logic Worshipper</author>
	<datestamp>1263554520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Between VPNs and the number of employees who take laptops home, but don't have access to sensitive data because they don't work on anything sensitive, I'm willing to bet 70\% of corporate laptops don't have sensitive data on their hard drive, and the 3\% don't have competent IT departments.  Not every corporate laptop needs to be encrypted.</p></htmltext>
<tokenext>Between VPNs and the number of employees who take laptops home , but do n't have access to sensitive data because they do n't work on anything sensitive , I 'm willing to bet 70 \ % of corporate laptops do n't have sensitive data on their hard drive , and the 3 \ % do n't have competent IT departments .
Not every corporate laptop needs to be encrypted .</tokentext>
<sentencetext>Between VPNs and the number of employees who take laptops home, but don't have access to sensitive data because they don't work on anything sensitive, I'm willing to bet 70\% of corporate laptops don't have sensitive data on their hard drive, and the 3\% don't have competent IT departments.
Not every corporate laptop needs to be encrypted.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30773372</id>
	<title>Who cares?</title>
	<author>nlindstrom</author>
	<datestamp>1263475560000</datestamp>
	<modclass>None</modclass>
	<modscore>-1</modscore>
	<htmltext><p>When you outsource all of your intellectual property development to another country, then what does it matter that a small fraction of that IP might be sitting on an unencrypted disk?  By the time that disk is stolen, the entirety of your IP will already be smeared across the whole of China or India.</p></htmltext>
<tokenext>When you outsource all of your intellectual property development to another country , then what does it matter that a small fraction of that IP might be sitting on an unencrypted disk ?
By the time that disk is stolen , the entirety of your IP will already be smeared across the whole of China or India .</tokentext>
<sentencetext>When you outsource all of your intellectual property development to another country, then what does it matter that a small fraction of that IP might be sitting on an unencrypted disk?
By the time that disk is stolen, the entirety of your IP will already be smeared across the whole of China or India.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762282</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>Anonymous</author>
	<datestamp>1263468240000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>I also use a laptop often.  However, I use TrueCrypt or BitLocker on Windows, and PGP WDE on my Mac.  Why?  Because if my laptop was stolen, I'd rather have it be "just" a hardware theft that I can get a police report, file a claim on my insurance, and replace my hardware.  Without encryption, I would have not just a hardware theft, but a possible theft of:</p><p>* License keys to the OS and apps.  A volume license key for a popular app is a boon for pirates.</p><p>* Personal Documents on the hard disk which can be used for ID theft, or used in combination with burglars to make finely targeted violent crime.</p><p>* Work documents.  You would be surprised who has extremely company confidential material on personal machines because they need it for a remote presentation to a client.  It could be something as simple as a roadmap of unreleased products that a prospective customer wants, but in the hands of competition, it would mean a major competitive loss.</p><p>* Passwords stored in a password manager, either the Web browser or another utility.  I use different passwords for every Web site I go to, so if one site doesn't get compromised, it won't mean anything else does.</p><p>* Cached files.  You can glean a lot of information even from deleted files about someone, the people they associate with, their job, and such.</p><p>* Identity.  How many people put their Quicken files on a protected disk image or TrueCrypt partition, and make sure to unmount it when done balancing the checkbook?</p><p>* VPN settings.  Even if someone doesn't know my VPN password, they will have account information, IP, and port number, and from this, they could try at the very minimum a brute force attack which either will work, or will have the account get denied.  This would look very bad as an employee.</p><p>* Identity in another sense.  A criminal can take a laptop and then masquerade as another individual to give the police someone to target and arrest.</p><p>On the road, I also take measures to contain data loss.  I have a custom U3 USB flash drive that has a BartPE image on the CD part.  I then have another USB flash drive with two TrueCrypt volumes on it.  The first holds an OS image that I made before going on the trip.  The second TC volume holds backup copies of my documents.  Finally, I use a cloud computing backup service (using a keyfile so the documents leave my machine encrypted), so I am assured of fairly recent backups automatically.  For maximum security, I keep a smart card on my keyring which can be used with PGP or TrueCrypt to ensure that if I have the smart card with me, no attacker is going to be able to mount those volumes.</p><p>USB flash drives are small, easily encrypted if you use known good software like TrueCrypt, Apple's Disk Image utility, LUKS, or EncFS, and easy to put in some sort of case (even a Ziplock bag) so they don't get lost in a laptop case.</p></htmltext>
<tokenext>I also use a laptop often .
However , I use TrueCrypt or BitLocker on Windows , and PGP WDE on my Mac .
Why ? Because if my laptop was stolen , I 'd rather have it be " just " a hardware theft that I can get a police report , file a claim on my insurance , and replace my hardware .
Without encryption , I would have not just a hardware theft , but a possible theft of : * License keys to the OS and apps .
A volume license key for a popular app is a boon for pirates .
* Personal Documents on the hard disk which can be used for ID theft , or used in combination with burglars to make finely targeted violent crime .
* Work documents .
You would be surprised who has extremely company confidential material on personal machines because they need it for a remote presentation to a client .
It could be something as simple as a roadmap of unreleased products that a prospective customer wants , but in the hands of competition , it would mean a major competitive loss .
* Passwords stored in a password manager , either the Web browser or another utility .
I use different passwords for every Web site I go to , so if one site does n't get compromised , it wo n't mean anything else does .
* Cached files .
You can glean a lot of information even from deleted files about someone , the people they associate with , their job , and such .
* Identity .
How many people put their Quicken files on a protected disk image or TrueCrypt partition , and make sure to unmount it when done balancing the checkbook ?
* VPN settings .
Even if someone does n't know my VPN password , they will have account information , IP , and port number , and from this , they could try at the very minimum a brute force attack which either will work , or will have the account get denied .
This would look very bad as an employee .
* Identity in another sense .
A criminal can take a laptop and then masquerade as another individual to give the police someone to target and arrest.On the road , I also take measures to contain data loss .
I have a custom U3 USB flash drive that has a BartPE image on the CD part .
I then have another USB flash drive with two TrueCrypt volumes on it .
The first holds an OS image that I made before going on the trip .
The second TC volume holds backup copies of my documents .
Finally , I use a cloud computing backup service ( using a keyfile so the documents leave my machine encrypted ) , so I am assured of fairly recent backups automatically .
For maximum security , I keep a smart card on my keyring which can be used with PGP or TrueCrypt to ensure that if I have the smart card with me , no attacker is going to be able to mount those volumes.USB flash drives are small , easily encrypted if you use known good software like TrueCrypt , Apple 's Disk Image utility , LUKS , or EncFS , and easy to put in some sort of case ( even a Ziplock bag ) so they do n't get lost in a laptop case .</tokentext>
<sentencetext>I also use a laptop often.
However, I use TrueCrypt or BitLocker on Windows, and PGP WDE on my Mac.
Why?  Because if my laptop was stolen, I'd rather have it be "just" a hardware theft that I can get a police report, file a claim on my insurance, and replace my hardware.
Without encryption, I would have not just a hardware theft, but a possible theft of:* License keys to the OS and apps.
A volume license key for a popular app is a boon for pirates.
* Personal Documents on the hard disk which can be used for ID theft, or used in combination with burglars to make finely targeted violent crime.
* Work documents.
You would be surprised who has extremely company confidential material on personal machines because they need it for a remote presentation to a client.
It could be something as simple as a roadmap of unreleased products that a prospective customer wants, but in the hands of competition, it would mean a major competitive loss.
* Passwords stored in a password manager, either the Web browser or another utility.
I use different passwords for every Web site I go to, so if one site doesn't get compromised, it won't mean anything else does.
* Cached files.
You can glean a lot of information even from deleted files about someone, the people they associate with, their job, and such.
* Identity.
How many people put their Quicken files on a protected disk image or TrueCrypt partition, and make sure to unmount it when done balancing the checkbook?
* VPN settings.
Even if someone doesn't know my VPN password, they will have account information, IP, and port number, and from this, they could try at the very minimum a brute force attack which either will work, or will have the account get denied.
This would look very bad as an employee.
* Identity in another sense.
A criminal can take a laptop and then masquerade as another individual to give the police someone to target and arrest.On the road, I also take measures to contain data loss.
I have a custom U3 USB flash drive that has a BartPE image on the CD part.
I then have another USB flash drive with two TrueCrypt volumes on it.
The first holds an OS image that I made before going on the trip.
The second TC volume holds backup copies of my documents.
Finally, I use a cloud computing backup service (using a keyfile so the documents leave my machine encrypted), so I am assured of fairly recent backups automatically.
For maximum security, I keep a smart card on my keyring which can be used with PGP or TrueCrypt to ensure that if I have the smart card with me, no attacker is going to be able to mount those volumes.USB flash drives are small, easily encrypted if you use known good software like TrueCrypt, Apple's Disk Image utility, LUKS, or EncFS, and easy to put in some sort of case (even a Ziplock bag) so they don't get lost in a laptop case.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763468</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>bill\_mcgonigle</author>
	<datestamp>1263481740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><i>but what happens when the decryption mechanism or the OS crashes? </i></p><p>It sounds like you haven't tried it and don't really understand the mechanisms (understandable).</p><p>The answer is you carry a rescue disc/USB, same as always if you want to be able to deal with eventualities on the road.<nobr> <wbr></nobr>/boot needs to be unencrypted anyway, so you can keep a rescue kit there as well.</p><p>I don't think I've ever heard of anybody losing their data because LUKS failed.  The filesystems you put on top of the encryption layer, sure, they're as fragile or stable as ever, but the encryption is transparent to them.  Layers are useful sometimes.</p></htmltext>
<tokenext>but what happens when the decryption mechanism or the OS crashes ?
It sounds like you have n't tried it and do n't really understand the mechanisms ( understandable ) .The answer is you carry a rescue disc/USB , same as always if you want to be able to deal with eventualities on the road .
/boot needs to be unencrypted anyway , so you can keep a rescue kit there as well.I do n't think I 've ever heard of anybody losing their data because LUKS failed .
The filesystems you put on top of the encryption layer , sure , they 're as fragile or stable as ever , but the encryption is transparent to them .
Layers are useful sometimes .</tokentext>
<sentencetext>but what happens when the decryption mechanism or the OS crashes?
It sounds like you haven't tried it and don't really understand the mechanisms (understandable).The answer is you carry a rescue disc/USB, same as always if you want to be able to deal with eventualities on the road.
/boot needs to be unencrypted anyway, so you can keep a rescue kit there as well.I don't think I've ever heard of anybody losing their data because LUKS failed.
The filesystems you put on top of the encryption layer, sure, they're as fragile or stable as ever, but the encryption is transparent to them.
Layers are useful sometimes.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762932</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>TheCarp</author>
	<datestamp>1263477420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Have you worked in health care...recently?</p><p>I think it was only regulations that made us do it. Well, made them do it. When they came to me and asked if I installed their encryption product, I told them that I had been encrypting my drive for over 3 years on my own, and unlike most others, my job really is easier if I run linux than windows, and then I tossed the key size and encryption mode at them (figured if I made their eyes gloss over they wouldn't want to continue the discussion) and told them I would be happy to talk to whoever I have to to get proper approval to use this instead.</p><p>They gave me the check mark and moved on. Good thing too, had to send the laptop to the shop a couple of years ago, and they replaced it/kept the old one with hard drive. Had I not been encrypting, that would have been a much bigger deal.</p><p>-Steve</p></htmltext>
<tokenext>Have you worked in health care...recently ? I think it was only regulations that made us do it .
Well , made them do it .
When they came to me and asked if I installed their encryption product , I told them that I had been encrypting my drive for over 3 years on my own , and unlike most others , my job really is easier if I run linux than windows , and then I tossed the key size and encryption mode at them ( figured if I made their eyes gloss over they would n't want to continue the discussion ) and told them I would be happy to talk to whoever I have to to get proper approval to use this instead.They gave me the check mark and moved on .
Good thing too , had to send the laptop to the shop a couple of years ago , and they replaced it/kept the old one with hard drive .
Had I not been encrypting , that would have been a much bigger deal.-Steve</tokentext>
<sentencetext>Have you worked in health care...recently?I think it was only regulations that made us do it.
Well, made them do it.
When they came to me and asked if I installed their encryption product, I told them that I had been encrypting my drive for over 3 years on my own, and unlike most others, my job really is easier if I run linux than windows, and then I tossed the key size and encryption mode at them (figured if I made their eyes gloss over they wouldn't want to continue the discussion) and told them I would be happy to talk to whoever I have to to get proper approval to use this instead.They gave me the check mark and moved on.
Good thing too, had to send the laptop to the shop a couple of years ago, and they replaced it/kept the old one with hard drive.
Had I not been encrypting, that would have been a much bigger deal.-Steve</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762472</id>
	<title>Re:Encryption drawbacks</title>
	<author>bertok</author>
	<datestamp>1263471180000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>Using encryption has its drawbacks:<br>* you must provide a meaningful key management<br>* you lose speed of your machines for number crunching<br>* you can easily lose data in the event of hardware corruption<br>* access to data is a bit harder even for legitimate purposes<br>* many systems (for example Active Directory domain controller<nobr> <wbr></nobr>.vs. ipsec) doesn't work well with encryption<br>* skills of your systems management must be higher</p></div><p>I know you probably mean well, but every one of those statements is basically false.</p><p>- Active Directory + Bitlocker OR AD + Encrypting File System (EFS) both do automatic key management, key escrow, etc...<br>- Bitlocker has no performance impact, it uses the TPM chip. Also, most CPUs are MUCH faster at encryption than disks are at reading or writing data, so it's not a bottleneck even for software-only systems.<br>- hardware corruption causes data loss anyway, encryption just ensures that you only ever get <i>valid</i> data. In that respect, it's a little like ZFS -- encryption also provides integrity, as well as security.<br>- Access to data on encrypted volumes is NOT harder. It's usually transparent. If you have proper backup procedures in place, you need never access data in non-standard ways. Speaking of which, your backups should be encrypted too!<br>- AD works well with encryption, and has its own built in. It's already reasonably secure for most applications, and doesn't really need further encryption. The only AD related protocol that had issues with ipsec is DNS, but Windows 7 and 2008 R2 now support that as well.<br>- If you're already deploying Windows Vista or 7 SOEs, adding in Bitlocker trivial, it's basically a checkbox. Deploying ipsec is admittedly a little harder, but it's not exactly rocket science.</p><p>I've implemented extensive encryption before, and it wasn't hard, and the users never noticed. From what I've seen, the lack of encryption is not caused by technical issues, but laziness and politics.</p><p>Security is one of those things that's not a problem <i>day to day</i>, just like backups. The users don't notice, and nobody complains to the managers about it, so it must not be a problem, right?</p><p>You only need security on those rare occasions when there's a hack, or a laptop gets stolen, or some intern sells 10 petabytes of old backup tapes full of customer data on eBay for $35. Of course, when those things happen, it's already too late to implement security. The breach has already occurred. There's no going back in time to tick checkboxes.</p><p>In case you're wondering just how common data breaches are, check out this list of the <i>publicly known</i> ones:</p><p><a href="http://www.privacyrights.org/ar/ChronDataBreaches.htm#CP" title="privacyrights.org">http://www.privacyrights.org/ar/ChronDataBreaches.htm</a> [privacyrights.org]</p><p>If that doesn't scare you, think about how many more there are that the public didn't find out about. Chances are good that <i>your</i> personal data has been leaked to God-knows-who, probably several times, because of lazy IT admins and inept managers.</p></div>
	</htmltext>
<tokenext>Using encryption has its drawbacks : * you must provide a meaningful key management * you lose speed of your machines for number crunching * you can easily lose data in the event of hardware corruption * access to data is a bit harder even for legitimate purposes * many systems ( for example Active Directory domain controller .vs .
ipsec ) does n't work well with encryption * skills of your systems management must be higherI know you probably mean well , but every one of those statements is basically false.- Active Directory + Bitlocker OR AD + Encrypting File System ( EFS ) both do automatic key management , key escrow , etc...- Bitlocker has no performance impact , it uses the TPM chip .
Also , most CPUs are MUCH faster at encryption than disks are at reading or writing data , so it 's not a bottleneck even for software-only systems.- hardware corruption causes data loss anyway , encryption just ensures that you only ever get valid data .
In that respect , it 's a little like ZFS -- encryption also provides integrity , as well as security.- Access to data on encrypted volumes is NOT harder .
It 's usually transparent .
If you have proper backup procedures in place , you need never access data in non-standard ways .
Speaking of which , your backups should be encrypted too ! - AD works well with encryption , and has its own built in .
It 's already reasonably secure for most applications , and does n't really need further encryption .
The only AD related protocol that had issues with ipsec is DNS , but Windows 7 and 2008 R2 now support that as well.- If you 're already deploying Windows Vista or 7 SOEs , adding in Bitlocker trivial , it 's basically a checkbox .
Deploying ipsec is admittedly a little harder , but it 's not exactly rocket science.I 've implemented extensive encryption before , and it was n't hard , and the users never noticed .
From what I 've seen , the lack of encryption is not caused by technical issues , but laziness and politics.Security is one of those things that 's not a problem day to day , just like backups .
The users do n't notice , and nobody complains to the managers about it , so it must not be a problem , right ? You only need security on those rare occasions when there 's a hack , or a laptop gets stolen , or some intern sells 10 petabytes of old backup tapes full of customer data on eBay for $ 35 .
Of course , when those things happen , it 's already too late to implement security .
The breach has already occurred .
There 's no going back in time to tick checkboxes.In case you 're wondering just how common data breaches are , check out this list of the publicly known ones : http : //www.privacyrights.org/ar/ChronDataBreaches.htm [ privacyrights.org ] If that does n't scare you , think about how many more there are that the public did n't find out about .
Chances are good that your personal data has been leaked to God-knows-who , probably several times , because of lazy IT admins and inept managers .</tokentext>
<sentencetext>Using encryption has its drawbacks:* you must provide a meaningful key management* you lose speed of your machines for number crunching* you can easily lose data in the event of hardware corruption* access to data is a bit harder even for legitimate purposes* many systems (for example Active Directory domain controller .vs.
ipsec) doesn't work well with encryption* skills of your systems management must be higherI know you probably mean well, but every one of those statements is basically false.- Active Directory + Bitlocker OR AD + Encrypting File System (EFS) both do automatic key management, key escrow, etc...- Bitlocker has no performance impact, it uses the TPM chip.
Also, most CPUs are MUCH faster at encryption than disks are at reading or writing data, so it's not a bottleneck even for software-only systems.- hardware corruption causes data loss anyway, encryption just ensures that you only ever get valid data.
In that respect, it's a little like ZFS -- encryption also provides integrity, as well as security.- Access to data on encrypted volumes is NOT harder.
It's usually transparent.
If you have proper backup procedures in place, you need never access data in non-standard ways.
Speaking of which, your backups should be encrypted too!- AD works well with encryption, and has its own built in.
It's already reasonably secure for most applications, and doesn't really need further encryption.
The only AD related protocol that had issues with ipsec is DNS, but Windows 7 and 2008 R2 now support that as well.- If you're already deploying Windows Vista or 7 SOEs, adding in Bitlocker trivial, it's basically a checkbox.
Deploying ipsec is admittedly a little harder, but it's not exactly rocket science.I've implemented extensive encryption before, and it wasn't hard, and the users never noticed.
From what I've seen, the lack of encryption is not caused by technical issues, but laziness and politics.Security is one of those things that's not a problem day to day, just like backups.
The users don't notice, and nobody complains to the managers about it, so it must not be a problem, right?You only need security on those rare occasions when there's a hack, or a laptop gets stolen, or some intern sells 10 petabytes of old backup tapes full of customer data on eBay for $35.
Of course, when those things happen, it's already too late to implement security.
The breach has already occurred.
There's no going back in time to tick checkboxes.In case you're wondering just how common data breaches are, check out this list of the publicly known ones:http://www.privacyrights.org/ar/ChronDataBreaches.htm [privacyrights.org]If that doesn't scare you, think about how many more there are that the public didn't find out about.
Chances are good that your personal data has been leaked to God-knows-who, probably several times, because of lazy IT admins and inept managers.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761950</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761982</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>AliasMarlowe</author>
	<datestamp>1263463380000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><p><div class="quote"><p>I'm a consultant. I have honestly NEVER encountered any user at any company encrypting disk/usb/cd/dvd/email.</p></div><p>Where I work (company has over 10^5 employees worldwide), whole disk encryption is <b>standard</b> on all laptops. It is uncommon on desktops, however, and not compulsory on removable devices. All remote access is always encrypted, and requires the correct encryption package and authorizations. A similar situation existed at the place I worked before (about 3.10^4 employees worldwide).<br> <br>
Due to the support and policy infrastructure needed, I suspect encryption is much commoner in large organizations than small ones. How the statistics on use of encryption (TFA says 27\%) are formed is another matter.</p></div>
	</htmltext>
<tokenext>I 'm a consultant .
I have honestly NEVER encountered any user at any company encrypting disk/usb/cd/dvd/email.Where I work ( company has over 10 ^ 5 employees worldwide ) , whole disk encryption is standard on all laptops .
It is uncommon on desktops , however , and not compulsory on removable devices .
All remote access is always encrypted , and requires the correct encryption package and authorizations .
A similar situation existed at the place I worked before ( about 3.10 ^ 4 employees worldwide ) .
Due to the support and policy infrastructure needed , I suspect encryption is much commoner in large organizations than small ones .
How the statistics on use of encryption ( TFA says 27 \ % ) are formed is another matter .</tokentext>
<sentencetext>I'm a consultant.
I have honestly NEVER encountered any user at any company encrypting disk/usb/cd/dvd/email.Where I work (company has over 10^5 employees worldwide), whole disk encryption is standard on all laptops.
It is uncommon on desktops, however, and not compulsory on removable devices.
All remote access is always encrypted, and requires the correct encryption package and authorizations.
A similar situation existed at the place I worked before (about 3.10^4 employees worldwide).
Due to the support and policy infrastructure needed, I suspect encryption is much commoner in large organizations than small ones.
How the statistics on use of encryption (TFA says 27\%) are formed is another matter.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761936</id>
	<title>Re:Dont blame IT</title>
	<author>MortenMW</author>
	<datestamp>1263462540000</datestamp>
	<modclass>Troll</modclass>
	<modscore>0</modscore>
	<htmltext>+1<br> <br>Time, money and people could solve it</htmltext>
<tokenext>+ 1 Time , money and people could solve it</tokentext>
<sentencetext>+1 Time, money and people could solve it</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30768118</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>Anonymous</author>
	<datestamp>1263497640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>This is the same argument made a decade ago by the "road warrior" who prefers paper over a PC. They could be heard saying something like this:</p><p>"The risk of losing access to the data when something goes wrong is far too dangerous to risk it. I have had problems on the road already, yet I have always managed to recover my data either from my file cabinet or from photocopies, but what happens when the software or the OS crashes? Carry another laptop? Carry bootable USB-based software tools? Sorry, too many variables, too much potential for trouble."<nobr> <wbr></nobr>...and then conclude with...</p><p>"This is why I only bring paper with me when I travel and not a laptop."</p><p>I guess what I am saying is that your argument against doing what you know you should... is ignorance. You just don't know what to do because you haven't used it before. If you subscribe to that view, then what are you doing on a PC anyways? And why are you using the Internet for Cripes Sake?</p></htmltext>
<tokenext>This is the same argument made a decade ago by the " road warrior " who prefers paper over a PC .
They could be heard saying something like this : " The risk of losing access to the data when something goes wrong is far too dangerous to risk it .
I have had problems on the road already , yet I have always managed to recover my data either from my file cabinet or from photocopies , but what happens when the software or the OS crashes ?
Carry another laptop ?
Carry bootable USB-based software tools ?
Sorry , too many variables , too much potential for trouble .
" ...and then conclude with... " This is why I only bring paper with me when I travel and not a laptop .
" I guess what I am saying is that your argument against doing what you know you should... is ignorance .
You just do n't know what to do because you have n't used it before .
If you subscribe to that view , then what are you doing on a PC anyways ?
And why are you using the Internet for Cripes Sake ?</tokentext>
<sentencetext>This is the same argument made a decade ago by the "road warrior" who prefers paper over a PC.
They could be heard saying something like this:"The risk of losing access to the data when something goes wrong is far too dangerous to risk it.
I have had problems on the road already, yet I have always managed to recover my data either from my file cabinet or from photocopies, but what happens when the software or the OS crashes?
Carry another laptop?
Carry bootable USB-based software tools?
Sorry, too many variables, too much potential for trouble.
" ...and then conclude with..."This is why I only bring paper with me when I travel and not a laptop.
"I guess what I am saying is that your argument against doing what you know you should... is ignorance.
You just don't know what to do because you haven't used it before.
If you subscribe to that view, then what are you doing on a PC anyways?
And why are you using the Internet for Cripes Sake?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762502</id>
	<title>What tha?</title>
	<author>Anonymous</author>
	<datestamp>1263471420000</datestamp>
	<modclass>Flamebait</modclass>
	<modscore>-1</modscore>
	<htmltext>I clicked 'disable advertising' on slashdot, why didn't this article go away?</htmltext>
<tokenext>I clicked 'disable advertising ' on slashdot , why did n't this article go away ?</tokentext>
<sentencetext>I clicked 'disable advertising' on slashdot, why didn't this article go away?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30765384</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>dueyfinster</author>
	<datestamp>1263488700000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Same here. I worked for a large public sector health company in Europe. After a few data breaches at Energy companies and Banks, it was a ticking timebomb for management. Every new laptop is encrypted being handed to the user and a big effort is underway to get the older ones. Old laptops which can't handle encryption are being replaced, all for 100,000+ employee organization.</htmltext>
<tokenext>Same here .
I worked for a large public sector health company in Europe .
After a few data breaches at Energy companies and Banks , it was a ticking timebomb for management .
Every new laptop is encrypted being handed to the user and a big effort is underway to get the older ones .
Old laptops which ca n't handle encryption are being replaced , all for 100,000 + employee organization .</tokentext>
<sentencetext>Same here.
I worked for a large public sector health company in Europe.
After a few data breaches at Energy companies and Banks, it was a ticking timebomb for management.
Every new laptop is encrypted being handed to the user and a big effort is underway to get the older ones.
Old laptops which can't handle encryption are being replaced, all for 100,000+ employee organization.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761982</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30777592</id>
	<title>Easy Encryption</title>
	<author>Mr.TT</author>
	<datestamp>1263562320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>For those occasions where you need to protect what you share or store online, try ThreadThat.com at <a href="https://www.threadthat.com./" title="www.threadthat.com" rel="nofollow">https://www.threadthat.com./</a> [www.threadthat.com]</htmltext>
<tokenext>For those occasions where you need to protect what you share or store online , try ThreadThat.com at https : //www.threadthat.com./ [ www.threadthat.com ]</tokentext>
<sentencetext>For those occasions where you need to protect what you share or store online, try ThreadThat.com at https://www.threadthat.com./ [www.threadthat.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30767204</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>Dusty101</author>
	<datestamp>1263494880000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Hear hear. I've already had problems with corrupted Keychains on my Mac (OS 10.5) twice in the last year. The only way I was able to recover my encrypted list of passwords was by restoring from backup. There are few things more annoying than trying to access a deliberately-encrypted file and getting nothing but a notification window that reports "Access to this file is restricted". In light of this, there's no way I'm going to trust FileVault.</p></htmltext>
<tokenext>Hear hear .
I 've already had problems with corrupted Keychains on my Mac ( OS 10.5 ) twice in the last year .
The only way I was able to recover my encrypted list of passwords was by restoring from backup .
There are few things more annoying than trying to access a deliberately-encrypted file and getting nothing but a notification window that reports " Access to this file is restricted " .
In light of this , there 's no way I 'm going to trust FileVault .</tokentext>
<sentencetext>Hear hear.
I've already had problems with corrupted Keychains on my Mac (OS 10.5) twice in the last year.
The only way I was able to recover my encrypted list of passwords was by restoring from backup.
There are few things more annoying than trying to access a deliberately-encrypted file and getting nothing but a notification window that reports "Access to this file is restricted".
In light of this, there's no way I'm going to trust FileVault.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766308</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>Anonymous</author>
	<datestamp>1263491760000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>My employer does it for email; where everyone has gpg set up. We use Google Apps for email, and the Firefox "FireGPG" extension makes this really easy even for people who use browsers as their email client.</p><p>I've seen people use encrypted folders at work too - but that was for the purpose of hiding pr0n from their boss.</p></htmltext>
<tokenext>My employer does it for email ; where everyone has gpg set up .
We use Google Apps for email , and the Firefox " FireGPG " extension makes this really easy even for people who use browsers as their email client.I 've seen people use encrypted folders at work too - but that was for the purpose of hiding pr0n from their boss .</tokentext>
<sentencetext>My employer does it for email; where everyone has gpg set up.
We use Google Apps for email, and the Firefox "FireGPG" extension makes this really easy even for people who use browsers as their email client.I've seen people use encrypted folders at work too - but that was for the purpose of hiding pr0n from their boss.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762120</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>Orlando</author>
	<datestamp>1263465600000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p><i>It all comes down to a simple calculation - what is the mathematical probability of someone stealing my drive vs. my OS or disk crashing?(1) Anyone who has traveled knows the second far outweighs the first.</i></p><p>I would go even further - What is the mathematical probability of someone stealing my [laptop] <b>AND</b> be interested enough in the data on the disk to bother trying to get access to it.</p><p>Even without encryption, getting access to the data on a laptop which uses OS password authentication requires some time and knowledge.  I would argue that most people who steal laptops would reinstall as soon as they see a login screen.  In other words, the hardware is more valuable to them than the data.</p><p>Be sure, I'm not saying the risk is zero, but it's pretty low.</p><p>Orlando</p></htmltext>
<tokenext>It all comes down to a simple calculation - what is the mathematical probability of someone stealing my drive vs. my OS or disk crashing ?
( 1 ) Anyone who has traveled knows the second far outweighs the first.I would go even further - What is the mathematical probability of someone stealing my [ laptop ] AND be interested enough in the data on the disk to bother trying to get access to it.Even without encryption , getting access to the data on a laptop which uses OS password authentication requires some time and knowledge .
I would argue that most people who steal laptops would reinstall as soon as they see a login screen .
In other words , the hardware is more valuable to them than the data.Be sure , I 'm not saying the risk is zero , but it 's pretty low.Orlando</tokentext>
<sentencetext>It all comes down to a simple calculation - what is the mathematical probability of someone stealing my drive vs. my OS or disk crashing?
(1) Anyone who has traveled knows the second far outweighs the first.I would go even further - What is the mathematical probability of someone stealing my [laptop] AND be interested enough in the data on the disk to bother trying to get access to it.Even without encryption, getting access to the data on a laptop which uses OS password authentication requires some time and knowledge.
I would argue that most people who steal laptops would reinstall as soon as they see a login screen.
In other words, the hardware is more valuable to them than the data.Be sure, I'm not saying the risk is zero, but it's pretty low.Orlando</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762174</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>asc99c</author>
	<datestamp>1263466380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Agreed.  I'm not in consulting myself, but I do write custom software, and regularly visit customer sites for install and commissioning of the software.  I have also never once seen a company encrypting stuff like this.  Just one company wouldn't let us connect our own laptops onto their network, and instead provided laptops we could collect each morning.  That's about the most security conscious place I've ever encountered, and most of these are very large companies typically tens of thousands of employees.</p></htmltext>
<tokenext>Agreed .
I 'm not in consulting myself , but I do write custom software , and regularly visit customer sites for install and commissioning of the software .
I have also never once seen a company encrypting stuff like this .
Just one company would n't let us connect our own laptops onto their network , and instead provided laptops we could collect each morning .
That 's about the most security conscious place I 've ever encountered , and most of these are very large companies typically tens of thousands of employees .</tokentext>
<sentencetext>Agreed.
I'm not in consulting myself, but I do write custom software, and regularly visit customer sites for install and commissioning of the software.
I have also never once seen a company encrypting stuff like this.
Just one company wouldn't let us connect our own laptops onto their network, and instead provided laptops we could collect each morning.
That's about the most security conscious place I've ever encountered, and most of these are very large companies typically tens of thousands of employees.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30765632</id>
	<title>Re:Dont blame IT</title>
	<author>Atrox666</author>
	<datestamp>1263489600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I would push for this if I could sell these people on a functional backup system for the users.<br>I can't afford to lower my chances at recovering HDs where no backup exists.<br>I also have 11000 computers to deal with in my environment. If it costs $1 per seat for software then I will have no hope at getting funding.</p></htmltext>
<tokenext>I would push for this if I could sell these people on a functional backup system for the users.I ca n't afford to lower my chances at recovering HDs where no backup exists.I also have 11000 computers to deal with in my environment .
If it costs $ 1 per seat for software then I will have no hope at getting funding .</tokentext>
<sentencetext>I would push for this if I could sell these people on a functional backup system for the users.I can't afford to lower my chances at recovering HDs where no backup exists.I also have 11000 computers to deal with in my environment.
If it costs $1 per seat for software then I will have no hope at getting funding.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762084</id>
	<title>Orangutans</title>
	<author>Anonymous</author>
	<datestamp>1263465060000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Am I the only one who read that initially as: 27\% of Orangutans?  I thought that was a pretty good number for an ape.</p></htmltext>
<tokenext>Am I the only one who read that initially as : 27 \ % of Orangutans ?
I thought that was a pretty good number for an ape .</tokentext>
<sentencetext>Am I the only one who read that initially as: 27\% of Orangutans?
I thought that was a pretty good number for an ape.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30764074</id>
	<title>We use it, and it sucks</title>
	<author>onyx00</author>
	<datestamp>1263484620000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext><p>I work at a Fortune 100 company and we recently (1 year ago) deployed disk encryption to all laptops.  It sucks honestly.  You can't do image backups anymore, not to mention backups are questionable because you don't always know how the backup is being done (low level copy, file copy, etc.).  Furthermore, it SLOWS compiles, etc. way way down.  When you are hitting the disk a ton to compile, the encryption takes a huge toll.  And finally, if something does wrong on the disk, well your data it at the hands of an IT guy they hired last week.  Even worse, they won't give IT-contractors the keys to fix encryption issues, so only a limited staff can deal with disk encryption issues encountered.</p></htmltext>
<tokenext>I work at a Fortune 100 company and we recently ( 1 year ago ) deployed disk encryption to all laptops .
It sucks honestly .
You ca n't do image backups anymore , not to mention backups are questionable because you do n't always know how the backup is being done ( low level copy , file copy , etc. ) .
Furthermore , it SLOWS compiles , etc .
way way down .
When you are hitting the disk a ton to compile , the encryption takes a huge toll .
And finally , if something does wrong on the disk , well your data it at the hands of an IT guy they hired last week .
Even worse , they wo n't give IT-contractors the keys to fix encryption issues , so only a limited staff can deal with disk encryption issues encountered .</tokentext>
<sentencetext>I work at a Fortune 100 company and we recently (1 year ago) deployed disk encryption to all laptops.
It sucks honestly.
You can't do image backups anymore, not to mention backups are questionable because you don't always know how the backup is being done (low level copy, file copy, etc.).
Furthermore, it SLOWS compiles, etc.
way way down.
When you are hitting the disk a ton to compile, the encryption takes a huge toll.
And finally, if something does wrong on the disk, well your data it at the hands of an IT guy they hired last week.
Even worse, they won't give IT-contractors the keys to fix encryption issues, so only a limited staff can deal with disk encryption issues encountered.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762364</id>
	<title>Ah ah, what about the emails?!</title>
	<author>etenil</author>
	<datestamp>1263469500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Companies massively use emails, even for very sensitive business information.

While I was still sysadmin, I was amazed to see all this mass of unencrypted and even unsigned emails passing through! I did try to make people sensitive to the issue (I wasn't in charge of the outsourced mail part), but only making the white collar people understand the advantages of using something like PGP was a hell...

Encrypting stuff on the hard drive is all very nice, but as long as their emails will be transiting in clear form, I'm pretty sure no one will even bother trying to get into their hard drive...</htmltext>
<tokenext>Companies massively use emails , even for very sensitive business information .
While I was still sysadmin , I was amazed to see all this mass of unencrypted and even unsigned emails passing through !
I did try to make people sensitive to the issue ( I was n't in charge of the outsourced mail part ) , but only making the white collar people understand the advantages of using something like PGP was a hell.. . Encrypting stuff on the hard drive is all very nice , but as long as their emails will be transiting in clear form , I 'm pretty sure no one will even bother trying to get into their hard drive.. .</tokentext>
<sentencetext>Companies massively use emails, even for very sensitive business information.
While I was still sysadmin, I was amazed to see all this mass of unencrypted and even unsigned emails passing through!
I did try to make people sensitive to the issue (I wasn't in charge of the outsourced mail part), but only making the white collar people understand the advantages of using something like PGP was a hell...

Encrypting stuff on the hard drive is all very nice, but as long as their emails will be transiting in clear form, I'm pretty sure no one will even bother trying to get into their hard drive...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762378</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>aclarke</author>
	<datestamp>1263469860000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>If you have sensitive customer data on your computer, by law you may be required to notify those customers if the data is lost.  Or, you may decide that morally it is the right thing to do.  Therefore, you also have to balance the potential bad press your company's announcement will generate based on you losing your laptop, whether or not you know that the people who stole it are going to access the data.
<br> <br>
Risk management is more than just the likelihood of your laptop being stolen and your data being accessed by criminals.  It's about the significance of each risk as well.  Given that for many people, having a laptop stolen and having to disclose that fact is a huge negative, having encryption can mitigate or eliminate that risk.</htmltext>
<tokenext>If you have sensitive customer data on your computer , by law you may be required to notify those customers if the data is lost .
Or , you may decide that morally it is the right thing to do .
Therefore , you also have to balance the potential bad press your company 's announcement will generate based on you losing your laptop , whether or not you know that the people who stole it are going to access the data .
Risk management is more than just the likelihood of your laptop being stolen and your data being accessed by criminals .
It 's about the significance of each risk as well .
Given that for many people , having a laptop stolen and having to disclose that fact is a huge negative , having encryption can mitigate or eliminate that risk .</tokentext>
<sentencetext>If you have sensitive customer data on your computer, by law you may be required to notify those customers if the data is lost.
Or, you may decide that morally it is the right thing to do.
Therefore, you also have to balance the potential bad press your company's announcement will generate based on you losing your laptop, whether or not you know that the people who stole it are going to access the data.
Risk management is more than just the likelihood of your laptop being stolen and your data being accessed by criminals.
It's about the significance of each risk as well.
Given that for many people, having a laptop stolen and having to disclose that fact is a huge negative, having encryption can mitigate or eliminate that risk.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762120</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761954</id>
	<title>My experiences were.</title>
	<author>motherjoe</author>
	<datestamp>1263462960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The two Global IT outsourcers I worked for had us encrypt for Lotus Notes and Outlook, remote VPN connections, and when we connected to network devices on shared or owned customer space it was always SSH or SFTP.</p><p>That said, for much of the older legacy stuff that was deep inside each company's infrastructure it wasn't so much required.</p></htmltext>
<tokenext>The two Global IT outsourcers I worked for had us encrypt for Lotus Notes and Outlook , remote VPN connections , and when we connected to network devices on shared or owned customer space it was always SSH or SFTP.That said , for much of the older legacy stuff that was deep inside each company 's infrastructure it was n't so much required .</tokentext>
<sentencetext>The two Global IT outsourcers I worked for had us encrypt for Lotus Notes and Outlook, remote VPN connections, and when we connected to network devices on shared or owned customer space it was always SSH or SFTP.That said, for much of the older legacy stuff that was deep inside each company's infrastructure it wasn't so much required.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762768</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>david.given</author>
	<datestamp>1263475320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><nobr> <wbr></nobr></p><div class="quote"><p>...about 3.10^4 employees worldwide...</p></div><p>&lt;pedant&gt; 92 employees isn't such a big number. And who's the 0.3521 of an employee? Did someone fail to get out of the way fast enough when closing the tape vault? &lt;/pedant&gt;</p></div>
	</htmltext>
<tokenext>...about 3.10 ^ 4 employees worldwide... 92 employees is n't such a big number .
And who 's the 0.3521 of an employee ?
Did someone fail to get out of the way fast enough when closing the tape vault ?</tokentext>
<sentencetext> ...about 3.10^4 employees worldwide... 92 employees isn't such a big number.
And who's the 0.3521 of an employee?
Did someone fail to get out of the way fast enough when closing the tape vault? 
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761982</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763720</id>
	<title>Of those 27\%</title>
	<author>TejWC</author>
	<datestamp>1263483000000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p>I wonder what percent of them wrote their password on a post-it note attached to their laptop.</p></htmltext>
<tokenext>I wonder what percent of them wrote their password on a post-it note attached to their laptop .</tokentext>
<sentencetext>I wonder what percent of them wrote their password on a post-it note attached to their laptop.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766738</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>bschorr</author>
	<datestamp>1263493200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Our company has a really cool product that we sell to our customers for recovering data in the case of a drive failure.  It's called a "backup".<br><br>It's been in the papers, you should check it out.<nobr> <wbr></nobr>;-)</htmltext>
<tokenext>Our company has a really cool product that we sell to our customers for recovering data in the case of a drive failure .
It 's called a " backup " .It 's been in the papers , you should check it out .
; - )</tokentext>
<sentencetext>Our company has a really cool product that we sell to our customers for recovering data in the case of a drive failure.
It's called a "backup".It's been in the papers, you should check it out.
;-)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761996</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762426</id>
	<title>CheckPoint...</title>
	<author>bomek</author>
	<datestamp>1263470700000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If all encryption software are like those from checkpoint, i understand those numbers...</p></htmltext>
<tokenext>If all encryption software are like those from checkpoint , i understand those numbers.. .</tokentext>
<sentencetext>If all encryption software are like those from checkpoint, i understand those numbers...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762840</id>
	<title>Why not leave the hard disk in the datacenter?</title>
	<author>An dochasac</author>
	<datestamp>1263476220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The amount of data in typical business documents and email now vastly exceeds the amount of data you need to push out to a thin client to provide a good user experience.  Why not leave the hard drive and all of the data they contain in your home office and only take home the <a href="http://www.aimtec.co.uk/gobi8.php" title="aimtec.co.uk">keyboard and screen to display it with</a> [aimtec.co.uk] (which DOES use an encrypted channel back to the data center).  That's what my company does and if a Sun Ray thin client or Gobi laptop ever goes missing, so be it, pull another one off the shelf and keep typing where you left off.</htmltext>
<tokenext>The amount of data in typical business documents and email now vastly exceeds the amount of data you need to push out to a thin client to provide a good user experience .
Why not leave the hard drive and all of the data they contain in your home office and only take home the keyboard and screen to display it with [ aimtec.co.uk ] ( which DOES use an encrypted channel back to the data center ) .
That 's what my company does and if a Sun Ray thin client or Gobi laptop ever goes missing , so be it , pull another one off the shelf and keep typing where you left off .</tokentext>
<sentencetext>The amount of data in typical business documents and email now vastly exceeds the amount of data you need to push out to a thin client to provide a good user experience.
Why not leave the hard drive and all of the data they contain in your home office and only take home the keyboard and screen to display it with [aimtec.co.uk] (which DOES use an encrypted channel back to the data center).
That's what my company does and if a Sun Ray thin client or Gobi laptop ever goes missing, so be it, pull another one off the shelf and keep typing where you left off.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762524</id>
	<title>Small office setup</title>
	<author>freedumb2000</author>
	<datestamp>1263471780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>
I have no idea if this is at all a best-practice (nost likely not), but I still feel like sharing how encryption is used in our 2-person office.
</p><p>
I set up disk encryption (with dm-crypt) for the linux server data drives and their backup drives only. The (Windows) desktop clients are dumb machines in the sense that no data stored localy, except installed applications. All work is done on files on the server directly.
</p><p>
My main worry is that someone walks away with the server machine and/or the backup drives and has access to all company relevant data of the past 20 years.
</p><p>
The server is unlocked with a keyfile stored on a USB flash drive, which is stored in a safe. The only time it is needed is when the server gets rebooted (practically never). The keyfiles for the external backup drives are stored on the local encrypted server partion. They get read every time the backup drives are switched and mounted. All drives aditionally share a common master keyphrase, in case the USB flash drive dies.
</p><p>
I am aware that this scheme has it's holes, unencrypted temporary data on the Windows host being the most obvious.
What worries me most though is unencryped e-mail transfer and no tamper-safe documents formats. PDF would be great as common all-purpose distributable document format, but it's protection is a joke.
I'll be happy to hear comments on how to improve my setup, but keep in mind we are small shop and won't be investing in dedicated appliances or any of that nature.</p></htmltext>
<tokenext>I have no idea if this is at all a best-practice ( nost likely not ) , but I still feel like sharing how encryption is used in our 2-person office .
I set up disk encryption ( with dm-crypt ) for the linux server data drives and their backup drives only .
The ( Windows ) desktop clients are dumb machines in the sense that no data stored localy , except installed applications .
All work is done on files on the server directly .
My main worry is that someone walks away with the server machine and/or the backup drives and has access to all company relevant data of the past 20 years .
The server is unlocked with a keyfile stored on a USB flash drive , which is stored in a safe .
The only time it is needed is when the server gets rebooted ( practically never ) .
The keyfiles for the external backup drives are stored on the local encrypted server partion .
They get read every time the backup drives are switched and mounted .
All drives aditionally share a common master keyphrase , in case the USB flash drive dies .
I am aware that this scheme has it 's holes , unencrypted temporary data on the Windows host being the most obvious .
What worries me most though is unencryped e-mail transfer and no tamper-safe documents formats .
PDF would be great as common all-purpose distributable document format , but it 's protection is a joke .
I 'll be happy to hear comments on how to improve my setup , but keep in mind we are small shop and wo n't be investing in dedicated appliances or any of that nature .</tokentext>
<sentencetext>
I have no idea if this is at all a best-practice (nost likely not), but I still feel like sharing how encryption is used in our 2-person office.
I set up disk encryption (with dm-crypt) for the linux server data drives and their backup drives only.
The (Windows) desktop clients are dumb machines in the sense that no data stored localy, except installed applications.
All work is done on files on the server directly.
My main worry is that someone walks away with the server machine and/or the backup drives and has access to all company relevant data of the past 20 years.
The server is unlocked with a keyfile stored on a USB flash drive, which is stored in a safe.
The only time it is needed is when the server gets rebooted (practically never).
The keyfiles for the external backup drives are stored on the local encrypted server partion.
They get read every time the backup drives are switched and mounted.
All drives aditionally share a common master keyphrase, in case the USB flash drive dies.
I am aware that this scheme has it's holes, unencrypted temporary data on the Windows host being the most obvious.
What worries me most though is unencryped e-mail transfer and no tamper-safe documents formats.
PDF would be great as common all-purpose distributable document format, but it's protection is a joke.
I'll be happy to hear comments on how to improve my setup, but keep in mind we are small shop and won't be investing in dedicated appliances or any of that nature.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30765234</id>
	<title>27\%? In the land of Fairy Town maybe...</title>
	<author>DarthVain</author>
	<datestamp>1263488220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>27\% might actually use encryption someplace. Probably it is more like 1\% that use encryption properly.</p><p>I don't know how many times I will see a laptop sitting on a desk, all encrypted up, all tight and secure and shit, and happily backing up to an external unencrypted hard drive each night that is sitting right next to it on the desk.</p><p>Perfect example of how statistic lie, and how IT policy is so easily circumvented. It also shows how much stupid/silly IT policy is created, that only marginally does what it is designed to do because it was created in a vacuum.</p></htmltext>
<tokenext>27 \ % might actually use encryption someplace .
Probably it is more like 1 \ % that use encryption properly.I do n't know how many times I will see a laptop sitting on a desk , all encrypted up , all tight and secure and shit , and happily backing up to an external unencrypted hard drive each night that is sitting right next to it on the desk.Perfect example of how statistic lie , and how IT policy is so easily circumvented .
It also shows how much stupid/silly IT policy is created , that only marginally does what it is designed to do because it was created in a vacuum .</tokentext>
<sentencetext>27\% might actually use encryption someplace.
Probably it is more like 1\% that use encryption properly.I don't know how many times I will see a laptop sitting on a desk, all encrypted up, all tight and secure and shit, and happily backing up to an external unencrypted hard drive each night that is sitting right next to it on the desk.Perfect example of how statistic lie, and how IT policy is so easily circumvented.
It also shows how much stupid/silly IT policy is created, that only marginally does what it is designed to do because it was created in a vacuum.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766878</id>
	<title>We're from the gov't and we're here to help...</title>
	<author>bschorr</author>
	<datestamp>1263493680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Anybody else notice the irony of having a thread about how few people encrypt their mobile devices just a couple of stories below a story about the government seizing laptops?</htmltext>
<tokenext>Anybody else notice the irony of having a thread about how few people encrypt their mobile devices just a couple of stories below a story about the government seizing laptops ?</tokentext>
<sentencetext>Anybody else notice the irony of having a thread about how few people encrypt their mobile devices just a couple of stories below a story about the government seizing laptops?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762182</id>
	<title>Re:Encryption drawbacks</title>
	<author>Anonymous</author>
	<datestamp>1263466440000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>I ask, what are the tradeoffs though?  Some of these factors can be mitigated.  If you use Vista or Windows 7, Bitlocker recovery keys can be plopped into Active Directory.</p><p>The factors for not having encryption are worse, and this is not factoring PCI/DSS compliance, Sarbanes-Oxley, HIPAA, CALEA, and other laws:</p><p>* The legal liability of having records that were likely tampered with, so if there is a tax audit, there is no proof of anything that can stand in a tax court.  The IRS or tax body may find that the lack of security constitutes malfeasance and assess immense fines.</p><p>* Shareholders will band together and make a class action suit at a drop of a hat.  If a company shows that it knew about the risk, but didn't deploy encryption, there will be flocks of law firms in a feeding frenzy looking for anything which could be construed as gross misconduct or failing to employ due diligence.</p><p>* Law enforcement who is tired of chasing ID theft cases will be looking at the company to see if any criminal laws about data retention got broken.  (This is mainly the EU.)</p><p>* You can do a lot with paying ad guys for PR, but it will cost a lot more to patch up damaged reputation than having meaningful security in the first place.</p><p>* The fees a company pays to have data recovery consultants will far, far outweigh the costs of having a security infrastructure.  Yes, I have heard many bosses say, "just call Geek Squad", but for an enterprise-level meltdown, one will be looking at a huge tab, especially if business production systems are down.</p><p>* In some countries, having a rival company or nation know who is on a business's payroll may put lives at stake, especially if someone is found to be working for an unpopular company in an unstable country.</p></htmltext>
<tokenext>I ask , what are the tradeoffs though ?
Some of these factors can be mitigated .
If you use Vista or Windows 7 , Bitlocker recovery keys can be plopped into Active Directory.The factors for not having encryption are worse , and this is not factoring PCI/DSS compliance , Sarbanes-Oxley , HIPAA , CALEA , and other laws : * The legal liability of having records that were likely tampered with , so if there is a tax audit , there is no proof of anything that can stand in a tax court .
The IRS or tax body may find that the lack of security constitutes malfeasance and assess immense fines .
* Shareholders will band together and make a class action suit at a drop of a hat .
If a company shows that it knew about the risk , but did n't deploy encryption , there will be flocks of law firms in a feeding frenzy looking for anything which could be construed as gross misconduct or failing to employ due diligence .
* Law enforcement who is tired of chasing ID theft cases will be looking at the company to see if any criminal laws about data retention got broken .
( This is mainly the EU .
) * You can do a lot with paying ad guys for PR , but it will cost a lot more to patch up damaged reputation than having meaningful security in the first place .
* The fees a company pays to have data recovery consultants will far , far outweigh the costs of having a security infrastructure .
Yes , I have heard many bosses say , " just call Geek Squad " , but for an enterprise-level meltdown , one will be looking at a huge tab , especially if business production systems are down .
* In some countries , having a rival company or nation know who is on a business 's payroll may put lives at stake , especially if someone is found to be working for an unpopular company in an unstable country .</tokentext>
<sentencetext>I ask, what are the tradeoffs though?
Some of these factors can be mitigated.
If you use Vista or Windows 7, Bitlocker recovery keys can be plopped into Active Directory.The factors for not having encryption are worse, and this is not factoring PCI/DSS compliance, Sarbanes-Oxley, HIPAA, CALEA, and other laws:* The legal liability of having records that were likely tampered with, so if there is a tax audit, there is no proof of anything that can stand in a tax court.
The IRS or tax body may find that the lack of security constitutes malfeasance and assess immense fines.
* Shareholders will band together and make a class action suit at a drop of a hat.
If a company shows that it knew about the risk, but didn't deploy encryption, there will be flocks of law firms in a feeding frenzy looking for anything which could be construed as gross misconduct or failing to employ due diligence.
* Law enforcement who is tired of chasing ID theft cases will be looking at the company to see if any criminal laws about data retention got broken.
(This is mainly the EU.
)* You can do a lot with paying ad guys for PR, but it will cost a lot more to patch up damaged reputation than having meaningful security in the first place.
* The fees a company pays to have data recovery consultants will far, far outweigh the costs of having a security infrastructure.
Yes, I have heard many bosses say, "just call Geek Squad", but for an enterprise-level meltdown, one will be looking at a huge tab, especially if business production systems are down.
* In some countries, having a rival company or nation know who is on a business's payroll may put lives at stake, especially if someone is found to be working for an unpopular company in an unstable country.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761950</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30770706</id>
	<title>Re:Dont blame IT</title>
	<author>grcumb</author>
	<datestamp>1263463440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>We would do it if we werent undermanned, underfunded, and had competent users.</p></div><p>Dude, my Director doesn't even <em>know</em> her laptop's home folder is encrypted. She just logs in and everything is there.</p><p>She's a die-hard XP user who is anything but technologically adept. But when I told her that she'd have to choose between Ubuntu and Windows 7 on her new laptop, she chose Ubuntu. During the install, it asked if I wanted home folder encryption, I said yes, and that was that.</p><p>I've had exactly one support session with that laptop since: Her default file association was opening documents in OO.o instead of MS Office (running under WINE). I changed the association and haven't heard a peep since.</p></div>
	</htmltext>
<tokenext>We would do it if we werent undermanned , underfunded , and had competent users.Dude , my Director does n't even know her laptop 's home folder is encrypted .
She just logs in and everything is there.She 's a die-hard XP user who is anything but technologically adept .
But when I told her that she 'd have to choose between Ubuntu and Windows 7 on her new laptop , she chose Ubuntu .
During the install , it asked if I wanted home folder encryption , I said yes , and that was that.I 've had exactly one support session with that laptop since : Her default file association was opening documents in OO.o instead of MS Office ( running under WINE ) .
I changed the association and have n't heard a peep since .</tokentext>
<sentencetext>We would do it if we werent undermanned, underfunded, and had competent users.Dude, my Director doesn't even know her laptop's home folder is encrypted.
She just logs in and everything is there.She's a die-hard XP user who is anything but technologically adept.
But when I told her that she'd have to choose between Ubuntu and Windows 7 on her new laptop, she chose Ubuntu.
During the install, it asked if I wanted home folder encryption, I said yes, and that was that.I've had exactly one support session with that laptop since: Her default file association was opening documents in OO.o instead of MS Office (running under WINE).
I changed the association and haven't heard a peep since.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763368</id>
	<title>Re:Disk encryption can be very useful sometimes</title>
	<author>butlerm</author>
	<datestamp>1263480900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I never send hard drives in for warranty service or replacement.  If they have confidential  data on them, I beat them up with a hammer and throw them away. If the drives actually work, and aren't hopelessly old, I put them on a shelf instead.</p><p>As far as encrypting data at the block level is concerned, I doubt it will become prevalent until it is a standard feature of every common operating system.  Even then there will be many systems that won't use it without hardware encryption support, because it will be too slow.</p></htmltext>
<tokenext>I never send hard drives in for warranty service or replacement .
If they have confidential data on them , I beat them up with a hammer and throw them away .
If the drives actually work , and are n't hopelessly old , I put them on a shelf instead.As far as encrypting data at the block level is concerned , I doubt it will become prevalent until it is a standard feature of every common operating system .
Even then there will be many systems that wo n't use it without hardware encryption support , because it will be too slow .</tokentext>
<sentencetext>I never send hard drives in for warranty service or replacement.
If they have confidential  data on them, I beat them up with a hammer and throw them away.
If the drives actually work, and aren't hopelessly old, I put them on a shelf instead.As far as encrypting data at the block level is concerned, I doubt it will become prevalent until it is a standard feature of every common operating system.
Even then there will be many systems that won't use it without hardware encryption support, because it will be too slow.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762156</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886</id>
	<title>Dont blame IT</title>
	<author>Anonymous</author>
	<datestamp>1263461580000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext>We would do it if we werent undermanned, underfunded, and had competent users.
<br> <br>
Support for things is already maxing many people out, now you want to add this?
<br> <br>
Please.</htmltext>
<tokenext>We would do it if we werent undermanned , underfunded , and had competent users .
Support for things is already maxing many people out , now you want to add this ?
Please .</tokentext>
<sentencetext>We would do it if we werent undermanned, underfunded, and had competent users.
Support for things is already maxing many people out, now you want to add this?
Please.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761904</id>
	<title>Remote Desktop</title>
	<author>Anonymous</author>
	<datestamp>1263461940000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>I telecommute and all my work is stored on the server I remote into.<br>As I have no work stored locally there is no encryption (aside from the VPN into the server).</p></htmltext>
<tokenext>I telecommute and all my work is stored on the server I remote into.As I have no work stored locally there is no encryption ( aside from the VPN into the server ) .</tokentext>
<sentencetext>I telecommute and all my work is stored on the server I remote into.As I have no work stored locally there is no encryption (aside from the VPN into the server).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766746</id>
	<title>Re:Dont blame IT</title>
	<author>IdleTime</author>
	<datestamp>1263493200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Well, I guess your company is mismanaged then.<br> <br>
I've been working from home for over 7 years. I have two USB drives I use for work, a 1TB and a 2TB FreeAgent drive which have been encrypted using TrueCrypt. My<nobr> <wbr></nobr>/home/xxxx directories are also encrypted.</htmltext>
<tokenext>Well , I guess your company is mismanaged then .
I 've been working from home for over 7 years .
I have two USB drives I use for work , a 1TB and a 2TB FreeAgent drive which have been encrypted using TrueCrypt .
My /home/xxxx directories are also encrypted .</tokentext>
<sentencetext>Well, I guess your company is mismanaged then.
I've been working from home for over 7 years.
I have two USB drives I use for work, a 1TB and a 2TB FreeAgent drive which have been encrypted using TrueCrypt.
My /home/xxxx directories are also encrypted.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952</id>
	<title>As a road warrior I should be using encryption...</title>
	<author>hwyhobo</author>
	<datestamp>1263462960000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>5</modscore>
	<htmltext><p>As a road warrior I should be using encryption, right? I would be a perfect candidate for it? And yet there is no way I will encrypt my laptop when I travel. The risk of losing access to the data when something goes wrong is far too dangerous to risk it. I have had problems on the road already, yet I have always managed to recover my data either from my laptop or from backups, but what happens when the decryption mechanism or the OS crashes? Carry another laptop? Carry bootable USB-based decryption tools? Sorry, too many variables, too much potential for trouble. </p><p>It all comes down to a simple calculation - what is the mathematical probability of someone stealing my drive vs. my OS or disk crashing?(1) Anyone who has traveled knows the second far outweighs the first.</p><p>(1) As long as it is unencrypted, you can still recover it relatively easily.</p></htmltext>
<tokenext>As a road warrior I should be using encryption , right ?
I would be a perfect candidate for it ?
And yet there is no way I will encrypt my laptop when I travel .
The risk of losing access to the data when something goes wrong is far too dangerous to risk it .
I have had problems on the road already , yet I have always managed to recover my data either from my laptop or from backups , but what happens when the decryption mechanism or the OS crashes ?
Carry another laptop ?
Carry bootable USB-based decryption tools ?
Sorry , too many variables , too much potential for trouble .
It all comes down to a simple calculation - what is the mathematical probability of someone stealing my drive vs. my OS or disk crashing ?
( 1 ) Anyone who has traveled knows the second far outweighs the first .
( 1 ) As long as it is unencrypted , you can still recover it relatively easily .</tokentext>
<sentencetext>As a road warrior I should be using encryption, right?
I would be a perfect candidate for it?
And yet there is no way I will encrypt my laptop when I travel.
The risk of losing access to the data when something goes wrong is far too dangerous to risk it.
I have had problems on the road already, yet I have always managed to recover my data either from my laptop or from backups, but what happens when the decryption mechanism or the OS crashes?
Carry another laptop?
Carry bootable USB-based decryption tools?
Sorry, too many variables, too much potential for trouble.
It all comes down to a simple calculation - what is the mathematical probability of someone stealing my drive vs. my OS or disk crashing?
(1) Anyone who has traveled knows the second far outweighs the first.
(1) As long as it is unencrypted, you can still recover it relatively easily.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761966</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>Anonymous</author>
	<datestamp>1263463200000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>I work in a large corporate environment (20,000+ desktops) - we implemented full disk encryption for laptops and enforced the use of encrypted USB sticks across the estate last year. <br> <br>

I wasn't directly involved in the projects, so product selection may have been botched, but neither solution we've chosen appears enterprise-ready. Both have come with a high support overhead.</htmltext>
<tokenext>I work in a large corporate environment ( 20,000 + desktops ) - we implemented full disk encryption for laptops and enforced the use of encrypted USB sticks across the estate last year .
I was n't directly involved in the projects , so product selection may have been botched , but neither solution we 've chosen appears enterprise-ready .
Both have come with a high support overhead .</tokentext>
<sentencetext>I work in a large corporate environment (20,000+ desktops) - we implemented full disk encryption for laptops and enforced the use of encrypted USB sticks across the estate last year.
I wasn't directly involved in the projects, so product selection may have been botched, but neither solution we've chosen appears enterprise-ready.
Both have come with a high support overhead.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763396</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>characterZer0</author>
	<datestamp>1263481080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>I'm a consultant.</p></div></blockquote><p>That is why you do not see it. The companies that use it know what they are doing, and do not need you.</p></div>
	</htmltext>
<tokenext>I 'm a consultant.That is why you do not see it .
The companies that use it know what they are doing , and do not need you .</tokentext>
<sentencetext>I'm a consultant.That is why you do not see it.
The companies that use it know what they are doing, and do not need you.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761956</id>
	<title>Which is fine.</title>
	<author>pspahn</author>
	<datestamp>1263463020000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>At some point, organizations will realize they actually were vulnerable, and will swarm to adopt new security policies.<br> <br>
A lack of security, in this case, ends up creating security... job security.</htmltext>
<tokenext>At some point , organizations will realize they actually were vulnerable , and will swarm to adopt new security policies .
A lack of security , in this case , ends up creating security... job security .</tokentext>
<sentencetext>At some point, organizations will realize they actually were vulnerable, and will swarm to adopt new security policies.
A lack of security, in this case, ends up creating security... job security.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761942</id>
	<title>How much of this is really SENSITIVE?</title>
	<author>Isaac-1</author>
	<datestamp>1263462600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I have to wonder how much of this data that most people deal with in a work from home, telecommuter lifestyle is really that confidential.  It seems to me even those with cut throat rival competitors where corporate espionage is the accept norm would find little value in much of the information they could gain by sifting through the virtual in boxes of these people.  After all its not like your likely to find the super secret plans for the new product, instead you are likely to find random puzzle pieces that give no clue as to the big picture.  Some email exchange about being mis-billed for janitorial supplies here, someone talking about the revising the employee lunch schedule, and then a bit of gold, a 23 page spreadsheet file projecting the cost vehicle fleet utilization.</p></htmltext>
<tokenext>I have to wonder how much of this data that most people deal with in a work from home , telecommuter lifestyle is really that confidential .
It seems to me even those with cut throat rival competitors where corporate espionage is the accept norm would find little value in much of the information they could gain by sifting through the virtual in boxes of these people .
After all its not like your likely to find the super secret plans for the new product , instead you are likely to find random puzzle pieces that give no clue as to the big picture .
Some email exchange about being mis-billed for janitorial supplies here , someone talking about the revising the employee lunch schedule , and then a bit of gold , a 23 page spreadsheet file projecting the cost vehicle fleet utilization .</tokentext>
<sentencetext>I have to wonder how much of this data that most people deal with in a work from home, telecommuter lifestyle is really that confidential.
It seems to me even those with cut throat rival competitors where corporate espionage is the accept norm would find little value in much of the information they could gain by sifting through the virtual in boxes of these people.
After all its not like your likely to find the super secret plans for the new product, instead you are likely to find random puzzle pieces that give no clue as to the big picture.
Some email exchange about being mis-billed for janitorial supplies here, someone talking about the revising the employee lunch schedule, and then a bit of gold, a 23 page spreadsheet file projecting the cost vehicle fleet utilization.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762580</id>
	<title>No corporate data on my computer</title>
	<author>gnasher719</author>
	<datestamp>1263472740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Seriously, what makes you think there would be any corporate data on my home computer when I work from home? Allowing anything like that is just insane. No sane organisation would ever allow that. (Obviously the UK government is no sane organisation by that definition).</htmltext>
<tokenext>Seriously , what makes you think there would be any corporate data on my home computer when I work from home ?
Allowing anything like that is just insane .
No sane organisation would ever allow that .
( Obviously the UK government is no sane organisation by that definition ) .</tokentext>
<sentencetext>Seriously, what makes you think there would be any corporate data on my home computer when I work from home?
Allowing anything like that is just insane.
No sane organisation would ever allow that.
(Obviously the UK government is no sane organisation by that definition).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922</id>
	<title>Does anyone beiieve this number?</title>
	<author>upuv</author>
	<datestamp>1263462180000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p> I'm a consultant.  I have honestly NEVER encountered any user at any company encrypting disk/usb/cd/dvd/email.</p><p>Exactly where does this BS stat come from again?</p></htmltext>
<tokenext>I 'm a consultant .
I have honestly NEVER encountered any user at any company encrypting disk/usb/cd/dvd/email.Exactly where does this BS stat come from again ?</tokentext>
<sentencetext> I'm a consultant.
I have honestly NEVER encountered any user at any company encrypting disk/usb/cd/dvd/email.Exactly where does this BS stat come from again?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762226</id>
	<title>A lot of organisations just are not that important</title>
	<author>frinkacheese</author>
	<datestamp>1263467220000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext>
If you run a cleaning company or you're a group of plumbers or perhaps you have a fairly large landscape gardening company then your data just is not that important or a target. So this survey is really quite useless, so what is Agnes Cleaners do not encrypt their thumb drives with their cleaning rota on it? Nobody cares.

So whilst all organisations should encrypt just because it is sensible, not all organisations really need to bother because the likelihood of anything happening to their data is so small that it's just not worth the effort of sorting out the idiots who call up the part-time IT admin guy because they have forgotten their encryption key (again).</htmltext>
<tokenext>If you run a cleaning company or you 're a group of plumbers or perhaps you have a fairly large landscape gardening company then your data just is not that important or a target .
So this survey is really quite useless , so what is Agnes Cleaners do not encrypt their thumb drives with their cleaning rota on it ?
Nobody cares .
So whilst all organisations should encrypt just because it is sensible , not all organisations really need to bother because the likelihood of anything happening to their data is so small that it 's just not worth the effort of sorting out the idiots who call up the part-time IT admin guy because they have forgotten their encryption key ( again ) .</tokentext>
<sentencetext>
If you run a cleaning company or you're a group of plumbers or perhaps you have a fairly large landscape gardening company then your data just is not that important or a target.
So this survey is really quite useless, so what is Agnes Cleaners do not encrypt their thumb drives with their cleaning rota on it?
Nobody cares.
So whilst all organisations should encrypt just because it is sensible, not all organisations really need to bother because the likelihood of anything happening to their data is so small that it's just not worth the effort of sorting out the idiots who call up the part-time IT admin guy because they have forgotten their encryption key (again).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762262</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>Bert64</author>
	<datestamp>1263467880000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>And if your OS fails to boot, you will need to carry bootable media with you in any case.</p><p>There are also hardware encrypted drives, OS independent, no performance hit, no software to become corrupted... The only thing that would stop you getting at your data is a hardware failure, and a hardware failure will break an unencrypted drive just as badly.</p></htmltext>
<tokenext>And if your OS fails to boot , you will need to carry bootable media with you in any case.There are also hardware encrypted drives , OS independent , no performance hit , no software to become corrupted... The only thing that would stop you getting at your data is a hardware failure , and a hardware failure will break an unencrypted drive just as badly .</tokentext>
<sentencetext>And if your OS fails to boot, you will need to carry bootable media with you in any case.There are also hardware encrypted drives, OS independent, no performance hit, no software to become corrupted... The only thing that would stop you getting at your data is a hardware failure, and a hardware failure will break an unencrypted drive just as badly.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762398</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>Radtoo</author>
	<datestamp>1263470220000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p><div class="quote"><p>but what happens when the decryption mechanism or the OS crashes? [...]</p><p>It all comes down to a simple calculation - what is the mathematical probability of someone stealing my drive vs. my OS or disk crashing?(1) Anyone who has traveled knows the second far outweighs the first.</p><p>(1) As long as it is unencrypted, you can still recover it relatively easily.</p></div><p>Well, I'm not sure what encryption solution you might have tried. I for one have been using first TrueCrypt and then LUKS on a laptop. It traveled far and its hard disk drive already had to be replaced twice. There never were any particular pains with encryption.</p><p>
First and most important of all, backups and encryption do not interfere. So you obviously DO backup such a laptop that may get stolen, lost, or break completely. Certainly, if you use encryption, you want to have the software needed to decrypt an encrypted partition it on your backup or a live DVD, but that's nothing that's hard  to get.
</p><p>
Even filewise recovery and forensics is possible on an encrypted partition, too - as long as you have the master encryption header (or similar) backed up, there's little chance for additional problems introduced by having encryption in case of a recovery.</p></div>
	</htmltext>
<tokenext>but what happens when the decryption mechanism or the OS crashes ?
[ ... ] It all comes down to a simple calculation - what is the mathematical probability of someone stealing my drive vs. my OS or disk crashing ?
( 1 ) Anyone who has traveled knows the second far outweighs the first .
( 1 ) As long as it is unencrypted , you can still recover it relatively easily.Well , I 'm not sure what encryption solution you might have tried .
I for one have been using first TrueCrypt and then LUKS on a laptop .
It traveled far and its hard disk drive already had to be replaced twice .
There never were any particular pains with encryption .
First and most important of all , backups and encryption do not interfere .
So you obviously DO backup such a laptop that may get stolen , lost , or break completely .
Certainly , if you use encryption , you want to have the software needed to decrypt an encrypted partition it on your backup or a live DVD , but that 's nothing that 's hard to get .
Even filewise recovery and forensics is possible on an encrypted partition , too - as long as you have the master encryption header ( or similar ) backed up , there 's little chance for additional problems introduced by having encryption in case of a recovery .</tokentext>
<sentencetext>but what happens when the decryption mechanism or the OS crashes?
[...]It all comes down to a simple calculation - what is the mathematical probability of someone stealing my drive vs. my OS or disk crashing?
(1) Anyone who has traveled knows the second far outweighs the first.
(1) As long as it is unencrypted, you can still recover it relatively easily.Well, I'm not sure what encryption solution you might have tried.
I for one have been using first TrueCrypt and then LUKS on a laptop.
It traveled far and its hard disk drive already had to be replaced twice.
There never were any particular pains with encryption.
First and most important of all, backups and encryption do not interfere.
So you obviously DO backup such a laptop that may get stolen, lost, or break completely.
Certainly, if you use encryption, you want to have the software needed to decrypt an encrypted partition it on your backup or a live DVD, but that's nothing that's hard  to get.
Even filewise recovery and forensics is possible on an encrypted partition, too - as long as you have the master encryption header (or similar) backed up, there's little chance for additional problems introduced by having encryption in case of a recovery.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766000</id>
	<title>Encryption Gone Wrong</title>
	<author>Inanis</author>
	<datestamp>1263490740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I work in a company where encryption is standard on all laptops. One day someone in IT that worked out of a remote office pushed a change to the encryption server. He thought he was testing a change in DEV. He was very, very wrong.  The change he made prevented all the laptops from booting up. This affected <b>everyone</b> with a laptop worldwide. Talk about a cluster fuck. Everyone in IT from the Help Desk reps to Developers were dispatched to fix every single laptop in the company. It took almost a week to get everyone back to normal.</p><p>Now, there is of course about a million and one things that could have been done to prevent this - better admin controls, better configuration of the encryption server and a better change management process just to name a few. Unfortunately the fact of the matter is this great system that was supposed to protect the corporation brought it to its knees for days.</p><p>I&rsquo;m not saying encryption is a bad thing, But this was slapped it in placed by an arbitrary &ldquo;mandatory deadline&rdquo; without understanding the first thing about how to deploy this correctly. If they had taken the time to understand it first this probably wouldn&rsquo;t have happened.</p><p>We still use it. Users still complain about it. Nothing has been done to prevent this from happening again other than the guy that mistakenly pushed the change getting canned.</p></htmltext>
<tokenext>I work in a company where encryption is standard on all laptops .
One day someone in IT that worked out of a remote office pushed a change to the encryption server .
He thought he was testing a change in DEV .
He was very , very wrong .
The change he made prevented all the laptops from booting up .
This affected everyone with a laptop worldwide .
Talk about a cluster fuck .
Everyone in IT from the Help Desk reps to Developers were dispatched to fix every single laptop in the company .
It took almost a week to get everyone back to normal.Now , there is of course about a million and one things that could have been done to prevent this - better admin controls , better configuration of the encryption server and a better change management process just to name a few .
Unfortunately the fact of the matter is this great system that was supposed to protect the corporation brought it to its knees for days.I    m not saying encryption is a bad thing , But this was slapped it in placed by an arbitrary    mandatory deadline    without understanding the first thing about how to deploy this correctly .
If they had taken the time to understand it first this probably wouldn    t have happened.We still use it .
Users still complain about it .
Nothing has been done to prevent this from happening again other than the guy that mistakenly pushed the change getting canned .</tokentext>
<sentencetext>I work in a company where encryption is standard on all laptops.
One day someone in IT that worked out of a remote office pushed a change to the encryption server.
He thought he was testing a change in DEV.
He was very, very wrong.
The change he made prevented all the laptops from booting up.
This affected everyone with a laptop worldwide.
Talk about a cluster fuck.
Everyone in IT from the Help Desk reps to Developers were dispatched to fix every single laptop in the company.
It took almost a week to get everyone back to normal.Now, there is of course about a million and one things that could have been done to prevent this - better admin controls, better configuration of the encryption server and a better change management process just to name a few.
Unfortunately the fact of the matter is this great system that was supposed to protect the corporation brought it to its knees for days.I’m not saying encryption is a bad thing, But this was slapped it in placed by an arbitrary “mandatory deadline” without understanding the first thing about how to deploy this correctly.
If they had taken the time to understand it first this probably wouldn’t have happened.We still use it.
Users still complain about it.
Nothing has been done to prevent this from happening again other than the guy that mistakenly pushed the change getting canned.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762666</id>
	<title>And how many of that 27\% are using it effectively?</title>
	<author>Chris Mattern</author>
	<datestamp>1263473760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've seen disk encryption set ups where you never have to supply an outside key or password to start up the computer--it's all self contained.  Meaning that all the information necessary for decryption is being kept on the disk.  Yeah, that's secure.</p></htmltext>
<tokenext>I 've seen disk encryption set ups where you never have to supply an outside key or password to start up the computer--it 's all self contained .
Meaning that all the information necessary for decryption is being kept on the disk .
Yeah , that 's secure .</tokentext>
<sentencetext>I've seen disk encryption set ups where you never have to supply an outside key or password to start up the computer--it's all self contained.
Meaning that all the information necessary for decryption is being kept on the disk.
Yeah, that's secure.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761950</id>
	<title>Encryption drawbacks</title>
	<author>WetCat</author>
	<datestamp>1263462960000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext><p>Using encryption has its drawbacks:<br>* you must provide a meaningful key management<br>* you lose speed of your machines for number crunching<br>* you can easily lose data in the event of hardware corruption<br>* access to data is a bit harder even for legitimate purposes<br>* many systems (for example Active Directory domain controller<nobr> <wbr></nobr>.vs. ipsec) doesn't work well with encryption<br>* skills of your systems management must be higher</p></htmltext>
<tokenext>Using encryption has its drawbacks : * you must provide a meaningful key management * you lose speed of your machines for number crunching * you can easily lose data in the event of hardware corruption * access to data is a bit harder even for legitimate purposes * many systems ( for example Active Directory domain controller .vs .
ipsec ) does n't work well with encryption * skills of your systems management must be higher</tokentext>
<sentencetext>Using encryption has its drawbacks:* you must provide a meaningful key management* you lose speed of your machines for number crunching* you can easily lose data in the event of hardware corruption* access to data is a bit harder even for legitimate purposes* many systems (for example Active Directory domain controller .vs.
ipsec) doesn't work well with encryption* skills of your systems management must be higher</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762642</id>
	<title>While everyone is arguing over drive encryption...</title>
	<author>Anonymous</author>
	<datestamp>1263473580000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>thousands of businesses are using plain FTP and email to throw unencrypted files around to &amp; from other companies daily.</p></htmltext>
<tokenext>thousands of businesses are using plain FTP and email to throw unencrypted files around to &amp; from other companies daily .</tokentext>
<sentencetext>thousands of businesses are using plain FTP and email to throw unencrypted files around to &amp; from other companies daily.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761964</id>
	<title>More then I expected.</title>
	<author>Wizarth</author>
	<datestamp>1263463140000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>That is a larger percentage then I expected. I wonder if the statistics were collected by asking people if they used it, and the percentages were more the amount of people who knew they should be.</p></htmltext>
<tokenext>That is a larger percentage then I expected .
I wonder if the statistics were collected by asking people if they used it , and the percentages were more the amount of people who knew they should be .</tokentext>
<sentencetext>That is a larger percentage then I expected.
I wonder if the statistics were collected by asking people if they used it, and the percentages were more the amount of people who knew they should be.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761918</id>
	<title>lose the keys, lose the data ...</title>
	<author>Anonymous</author>
	<datestamp>1263462180000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>There are corporate docs using Office 2003 DRM where I work.  I'm literally the only person in a multi-national company that can read the docs because I'm the only one who applied the hotfix for the expired certificate.</p><p>IT can't or won't do it through the domain.</p></htmltext>
<tokenext>There are corporate docs using Office 2003 DRM where I work .
I 'm literally the only person in a multi-national company that can read the docs because I 'm the only one who applied the hotfix for the expired certificate.IT ca n't or wo n't do it through the domain .</tokentext>
<sentencetext>There are corporate docs using Office 2003 DRM where I work.
I'm literally the only person in a multi-national company that can read the docs because I'm the only one who applied the hotfix for the expired certificate.IT can't or won't do it through the domain.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30764148</id>
	<title>Re:This is why China is beating America hands down</title>
	<author>tomtomtom</author>
	<datestamp>1263484920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Hmm. The thing is, in almost all industries where the incentives are sufficient for industrial espionage to be a credible threat, forms of collusion or cartels are almost certainly a greater threat leading to the same outcome.</p><p>If you have medical records, state secrets or financial information, then OF COURSE you should be taking these sorts of precautions (and not storing this data on laptops is the first precaution you take). Common thieves stealing bank or credit card details is a credible threat. Journalists paying for the medical records of politically sensitive individuals is a credible threat.</p><p>But your competitors paying to steal information on what pricing discounts you offer to your biggest customers? Or where your biggest orders came from? If the customer doesn't tell your competitors directly, you can be 100\% certain that the two companies' respective sales forces will chat about it amongst themselves. Same for release timing information.</p><p>To use an analogy: People are the "analogue hole" to these sorts of measures' "DRM".</p></htmltext>
<tokenext>Hmm .
The thing is , in almost all industries where the incentives are sufficient for industrial espionage to be a credible threat , forms of collusion or cartels are almost certainly a greater threat leading to the same outcome.If you have medical records , state secrets or financial information , then OF COURSE you should be taking these sorts of precautions ( and not storing this data on laptops is the first precaution you take ) .
Common thieves stealing bank or credit card details is a credible threat .
Journalists paying for the medical records of politically sensitive individuals is a credible threat.But your competitors paying to steal information on what pricing discounts you offer to your biggest customers ?
Or where your biggest orders came from ?
If the customer does n't tell your competitors directly , you can be 100 \ % certain that the two companies ' respective sales forces will chat about it amongst themselves .
Same for release timing information.To use an analogy : People are the " analogue hole " to these sorts of measures ' " DRM " .</tokentext>
<sentencetext>Hmm.
The thing is, in almost all industries where the incentives are sufficient for industrial espionage to be a credible threat, forms of collusion or cartels are almost certainly a greater threat leading to the same outcome.If you have medical records, state secrets or financial information, then OF COURSE you should be taking these sorts of precautions (and not storing this data on laptops is the first precaution you take).
Common thieves stealing bank or credit card details is a credible threat.
Journalists paying for the medical records of politically sensitive individuals is a credible threat.But your competitors paying to steal information on what pricing discounts you offer to your biggest customers?
Or where your biggest orders came from?
If the customer doesn't tell your competitors directly, you can be 100\% certain that the two companies' respective sales forces will chat about it amongst themselves.
Same for release timing information.To use an analogy: People are the "analogue hole" to these sorts of measures' "DRM".</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762372</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30772286</id>
	<title>Misleading title</title>
	<author>Anonymous</author>
	<datestamp>1263470160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Encrypting the hard disk is not the only kind of encryption a remote user can use. There's another encryption technology, called VPN - do you think there'd be a few more companies using this form?</p><p>So the title claiming "Only 27\% of organisations use encryption" is misleading, even a lie.</p><p>BTW: like a number of other remote users, I've VPNed into a corporate system, then connected to virtual machine and worked there - no hard disk encryption used, but the VM's hard drive is a piece of a corporate SAN - I'd rate that as comparatively secure. The only thing that would be protected by any putative HD encryption on the laptop would be the OS and the VPN software.</p></htmltext>
<tokenext>Encrypting the hard disk is not the only kind of encryption a remote user can use .
There 's another encryption technology , called VPN - do you think there 'd be a few more companies using this form ? So the title claiming " Only 27 \ % of organisations use encryption " is misleading , even a lie.BTW : like a number of other remote users , I 've VPNed into a corporate system , then connected to virtual machine and worked there - no hard disk encryption used , but the VM 's hard drive is a piece of a corporate SAN - I 'd rate that as comparatively secure .
The only thing that would be protected by any putative HD encryption on the laptop would be the OS and the VPN software .</tokentext>
<sentencetext>Encrypting the hard disk is not the only kind of encryption a remote user can use.
There's another encryption technology, called VPN - do you think there'd be a few more companies using this form?So the title claiming "Only 27\% of organisations use encryption" is misleading, even a lie.BTW: like a number of other remote users, I've VPNed into a corporate system, then connected to virtual machine and worked there - no hard disk encryption used, but the VM's hard drive is a piece of a corporate SAN - I'd rate that as comparatively secure.
The only thing that would be protected by any putative HD encryption on the laptop would be the OS and the VPN software.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762752</id>
	<title>Up to...</title>
	<author>imakemusic</author>
	<datestamp>1263474900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>The clear majority (77\%) of businesses have <strong>up to</strong> a quarter of their total workforce consisting of regular remote users.</p></div><p>And my left arm is made of <strong>up to</strong> 75\% cheese.</p><p>Is it just me, or is that line a little misleading?</p></div>
	</htmltext>
<tokenext>The clear majority ( 77 \ % ) of businesses have up to a quarter of their total workforce consisting of regular remote users.And my left arm is made of up to 75 \ % cheese.Is it just me , or is that line a little misleading ?</tokentext>
<sentencetext>The clear majority (77\%) of businesses have up to a quarter of their total workforce consisting of regular remote users.And my left arm is made of up to 75\% cheese.Is it just me, or is that line a little misleading?
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762146</id>
	<title>Re:Does anyone beiieve this number?</title>
	<author>Anonymous</author>
	<datestamp>1263465960000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've worked for the Dutch ministry of foreign affairs, and at least my department not only didn't use encryption, but also no virus scanners, and yes, everyone was administrator on his computer. I've seen computers with sensitive data teeming with worms and viruses. (I was the guy who had to clean them up.) Truth is, people won't care about this until two things happen: 1) something goes spectacularly cataclysmically wrong and 2) the government fails to cover it up properly.</p></htmltext>
<tokenext>I 've worked for the Dutch ministry of foreign affairs , and at least my department not only did n't use encryption , but also no virus scanners , and yes , everyone was administrator on his computer .
I 've seen computers with sensitive data teeming with worms and viruses .
( I was the guy who had to clean them up .
) Truth is , people wo n't care about this until two things happen : 1 ) something goes spectacularly cataclysmically wrong and 2 ) the government fails to cover it up properly .</tokentext>
<sentencetext>I've worked for the Dutch ministry of foreign affairs, and at least my department not only didn't use encryption, but also no virus scanners, and yes, everyone was administrator on his computer.
I've seen computers with sensitive data teeming with worms and viruses.
(I was the guy who had to clean them up.
) Truth is, people won't care about this until two things happen: 1) something goes spectacularly cataclysmically wrong and 2) the government fails to cover it up properly.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761996</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>Anonymous</author>
	<datestamp>1263463680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>100\% Agree.  The simple fact is if I encrypt it here I can't un-encrypt it there.  Translation. My hard disk uses version 1.5.3.6.3.222.43..56666.333 of software BLOTZO.supersafe.org and nothing else I own does.  My HD goes cactus I'm screwed.</p><p>I simply can't trust that I can recover from a failure.  Even if I carry the magic secret key to the encryption.</p><p>It'll cost "me" more to recover than to have stolen.</p><p>P.S.  I will go down on assault charges the next time some moron un-plugs my usb drive without safely ejecting it.</p></htmltext>
<tokenext>100 \ % Agree .
The simple fact is if I encrypt it here I ca n't un-encrypt it there .
Translation. My hard disk uses version 1.5.3.6.3.222.43..56666.333 of software BLOTZO.supersafe.org and nothing else I own does .
My HD goes cactus I 'm screwed.I simply ca n't trust that I can recover from a failure .
Even if I carry the magic secret key to the encryption.It 'll cost " me " more to recover than to have stolen.P.S .
I will go down on assault charges the next time some moron un-plugs my usb drive without safely ejecting it .</tokentext>
<sentencetext>100\% Agree.
The simple fact is if I encrypt it here I can't un-encrypt it there.
Translation. My hard disk uses version 1.5.3.6.3.222.43..56666.333 of software BLOTZO.supersafe.org and nothing else I own does.
My HD goes cactus I'm screwed.I simply can't trust that I can recover from a failure.
Even if I carry the magic secret key to the encryption.It'll cost "me" more to recover than to have stolen.P.S.
I will go down on assault charges the next time some moron un-plugs my usb drive without safely ejecting it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762042</id>
	<title>Re:As a road warrior I should be using encryption.</title>
	<author>Anonymous</author>
	<datestamp>1263464460000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>It depends on your job. If you're, say, a marketing consultant, encryption probably isn't all that important. If you work for a credit card processing company (I previously worked in the IT department for one) you absolutely should be using encryption.</p></htmltext>
<tokenext>It depends on your job .
If you 're , say , a marketing consultant , encryption probably is n't all that important .
If you work for a credit card processing company ( I previously worked in the IT department for one ) you absolutely should be using encryption .</tokentext>
<sentencetext>It depends on your job.
If you're, say, a marketing consultant, encryption probably isn't all that important.
If you work for a credit card processing company (I previously worked in the IT department for one) you absolutely should be using encryption.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763540</id>
	<title>What about support and performance issues?</title>
	<author>cbope</author>
	<datestamp>1263482160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I work in a medium sized technology company. A couple of years back, the company decided to implement whole disk encryption in all laptops for people who travel. The encryption key was stored in the BIOS on the Dell Latitudes we used. Looking back, it was a pretty big disaster on a several points:</p><p>1. Many people lost work stored on their laptops when the disk became unreadable because the encryption could not be "unlocked", probably because a bit got flipped in a sensitive area of the disk. Of course they should have had backups, but the disk had not failed; it was rendered unreadable by the encryption itself not because the disk itself was trashed or damaged. In several cases the persons were traveling when this happened and they were left without a working laptop until they returned home.</p><p>2. Most of the laptops were equipped with small, fairly slow hard drives and modest single-core CPU's. Encrypting/decrypting all data to/from the hard disk just added overheard and the machines were even slower than before the encryption was installed. Of course, faster drives and CPU's could have been used but like everything in the modern IT world they were bought "on a limited budget".</p><p>3. As I remember, there was no way to easily recover data if the laptop itself failed and the drive was installed into a different laptop, because the encryption key to unlock the encryption was in the BIOS of the dead laptop. Maybe there was a proper recovery solution but at least our IT department didn't know how to do it. Several people lost weeks or months worth of data due to this.</p><p>I was one of the lucky ones as a pilot user for workstation-class laptops, and mine was delivered before they started encrypting the laptops. Every time IT asked for the laptop to install the encryption software, I told them I was too busy to surrender the laptop for several hours. In the end, I never got it installed. In the mean time as laptops have been replaced more recently, they are not encrypted. I have a USB hard drive with a TrueCrypt folder on it for sensitive documents/files that I carry with me always. If for some reason, I can't access to my TrueCrypt folder, then at least I still have my laptop for email/web/vpn and I can continue with basic work. I travel a lot and if I were to lose use of my laptop during a business trip it would be a disaster.</p></htmltext>
<tokenext>I work in a medium sized technology company .
A couple of years back , the company decided to implement whole disk encryption in all laptops for people who travel .
The encryption key was stored in the BIOS on the Dell Latitudes we used .
Looking back , it was a pretty big disaster on a several points : 1 .
Many people lost work stored on their laptops when the disk became unreadable because the encryption could not be " unlocked " , probably because a bit got flipped in a sensitive area of the disk .
Of course they should have had backups , but the disk had not failed ; it was rendered unreadable by the encryption itself not because the disk itself was trashed or damaged .
In several cases the persons were traveling when this happened and they were left without a working laptop until they returned home.2 .
Most of the laptops were equipped with small , fairly slow hard drives and modest single-core CPU 's .
Encrypting/decrypting all data to/from the hard disk just added overheard and the machines were even slower than before the encryption was installed .
Of course , faster drives and CPU 's could have been used but like everything in the modern IT world they were bought " on a limited budget " .3 .
As I remember , there was no way to easily recover data if the laptop itself failed and the drive was installed into a different laptop , because the encryption key to unlock the encryption was in the BIOS of the dead laptop .
Maybe there was a proper recovery solution but at least our IT department did n't know how to do it .
Several people lost weeks or months worth of data due to this.I was one of the lucky ones as a pilot user for workstation-class laptops , and mine was delivered before they started encrypting the laptops .
Every time IT asked for the laptop to install the encryption software , I told them I was too busy to surrender the laptop for several hours .
In the end , I never got it installed .
In the mean time as laptops have been replaced more recently , they are not encrypted .
I have a USB hard drive with a TrueCrypt folder on it for sensitive documents/files that I carry with me always .
If for some reason , I ca n't access to my TrueCrypt folder , then at least I still have my laptop for email/web/vpn and I can continue with basic work .
I travel a lot and if I were to lose use of my laptop during a business trip it would be a disaster .</tokentext>
<sentencetext>I work in a medium sized technology company.
A couple of years back, the company decided to implement whole disk encryption in all laptops for people who travel.
The encryption key was stored in the BIOS on the Dell Latitudes we used.
Looking back, it was a pretty big disaster on a several points:1.
Many people lost work stored on their laptops when the disk became unreadable because the encryption could not be "unlocked", probably because a bit got flipped in a sensitive area of the disk.
Of course they should have had backups, but the disk had not failed; it was rendered unreadable by the encryption itself not because the disk itself was trashed or damaged.
In several cases the persons were traveling when this happened and they were left without a working laptop until they returned home.2.
Most of the laptops were equipped with small, fairly slow hard drives and modest single-core CPU's.
Encrypting/decrypting all data to/from the hard disk just added overheard and the machines were even slower than before the encryption was installed.
Of course, faster drives and CPU's could have been used but like everything in the modern IT world they were bought "on a limited budget".3.
As I remember, there was no way to easily recover data if the laptop itself failed and the drive was installed into a different laptop, because the encryption key to unlock the encryption was in the BIOS of the dead laptop.
Maybe there was a proper recovery solution but at least our IT department didn't know how to do it.
Several people lost weeks or months worth of data due to this.I was one of the lucky ones as a pilot user for workstation-class laptops, and mine was delivered before they started encrypting the laptops.
Every time IT asked for the laptop to install the encryption software, I told them I was too busy to surrender the laptop for several hours.
In the end, I never got it installed.
In the mean time as laptops have been replaced more recently, they are not encrypted.
I have a USB hard drive with a TrueCrypt folder on it for sensitive documents/files that I carry with me always.
If for some reason, I can't access to my TrueCrypt folder, then at least I still have my laptop for email/web/vpn and I can continue with basic work.
I travel a lot and if I were to lose use of my laptop during a business trip it would be a disaster.</sentencetext>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763468
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762182
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761950
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_31</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762398
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762956
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762366
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761982
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762262
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761936
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763396
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762378
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762120
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_36</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30769384
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762642
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766308
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762932
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762846
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762768
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761982
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762114
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761966
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_35</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762282
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761950
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_30</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762146
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30767204
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_29</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766746
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30770706
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30768578
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762642
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763116
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762156
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30764382
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766738
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761996
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762174
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30765374
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761904
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30765384
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761982
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_34</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763060
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762156
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30765632
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30768118
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763006
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763368
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762156
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_33</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762042
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_32</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762358
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762226
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_14_0350216_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30764148
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762372
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762120
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761918
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763540
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761922
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766308
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763006
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761982
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30765384
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762366
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762768
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762114
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762174
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763396
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762932
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30764382
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762146
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761966
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762524
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763720
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762666
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761942
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762226
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762358
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762074
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761952
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762042
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762282
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762846
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30767204
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30768118
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762120
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762378
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762372
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30764148
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762262
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761996
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766738
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762398
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763468
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762156
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763060
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763368
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30763116
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762642
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30768578
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30769384
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761886
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30770706
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761936
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30766746
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30765632
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762956
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761964
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761904
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30765374
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761894
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762364
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30761950
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762472
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762182
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_14_0350216.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_14_0350216.30762840
</commentlist>
</conversation>
