|
Did you pay for the package on a per user basis? Then they have the right to audit the system. How they do it ... Basically, SSA is not going to maliciously attack your system. Just about every vendor out there has at least one program that uses adopted authority and is owned by QSECOFR. What's the difference? However if you feel that you are entitled to run their software regardless of how many users are on your system just because you modified a portion of it, or no longer put on updates, then you need to contact your lawyers. And after you shovel out a bunch of money to your lawyers and lose the case, then you can load the software and continue on with the audit. Rob Berendt -- "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." Benjamin Franklin "Michael Naughton" <mnaughton@xxxxxxxxxxxx> Sent by: midrange-l-bounces@xxxxxxxxxxxx 10/27/2003 10:03 AM Please respond to Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx> To Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx> cc Subject Re: SSA Wants to Audit Our System (?) In our case, we believe that we paid for exactly those rights, and I understand we have the paperwork to prove it. But now I have a more general question: my boss says what they want to do is have us load some of their software on our system, using QSECOFR authority. It's then supposed to run for six weeks, collecting information in data files, which they will collect at the end. He seems to think we'd be crazy to let anyone do that, for any reason, because of security and data integrity issues. Is this standard procedure? Has anyone else experienced anything like this? I'm just curious. . . Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx> writes: >Unless you paid for rights to continue modifying/using their code, you're >in >trouble. Mike Naughton Senior Programmer/Analyst Judd Wire, Inc. 124 Turnpike Road Turners Falls, MA 01376 413-863-4357 x444 mnaughton@xxxxxxxxxxxx _______________________________________________ This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.