Quote:
Originally posted by AnonXO@5 March 2004 - 16:20
We have child porn filter in place that will prevent much of this activity. A we reserve the right to kick off such users from our network. As far as hacking goes, there are numerous other ways a good IT person can catch a hacker they don't need us to do that for them.
That being said, it's still possible that a user could evade capture by his prey, they would need the hackers details from you, you would not give them to them (apparently), so your company would be held accessory? Is that correct?