For the (brief) time I worked in my local government, we certainly had to make sure we kept records of correspondence in writing. Organising that was the entirety of my job, in fact. That’s in the UK, though.
How many people have email addresses at the clintonemail.com domain that Hilary was reduced to using hdr22@clintonemail.com?
“Let’s try hilary@clintonemail.com”
“Nope, that’s taken”
“hilaryclinton@clintonemail.com then?”
“Sorry, ma’am”
“Hmmm, hrc@clintonemail.com?”
“Ah, no, sorry”
“Fuuuuuuu…”
<days later>
“Woot! hdr22 is available!”
Was “nextpresident@clintonemail.com” taken?
Chelsea bagged that for future use.
I too, am driven by my principles. One of which is, “Never pass up the opportunity for a Star Trek joke.”
Don’t take everything so seriously. It’s just the internet.
This statement seems to misunderstand the reason for such policies. The rationale itself is so we don’t place ourselves in a position where we cannot easily retrieve correspondence and so we needn’t wonder what’s occurring outside the firewall. When someone violates that policy, a reaction of “we cannot know what was done” is not an accusation of some specific bad act. It’s the self-evident point that the breach created the very circumstance the policy hoped to avoid.
As this story explains, Mrs. Clinton ran her own e-mail server, as opposed to a Hotmail or Gmail type solution. She had a custom domain and her own e-mail server running at her home.
There is no instance of any mail that cannot be retrieved from her system.
In contrast, the IRS, who appeared to be compliant withNARA policies, was able to successfully claim it could not supply requested email.
In other words, Mrs. Clinton has responded to all requests for mail.
The IRS could not.
Of the two, which complied better with the policy and its underlying rationale?
Sure, sure…until the next time I defend a Republican and commentators archly suggest it’s an obvious choice and I would’t do the same for a Democrat, with this example quickly relegated to the convenient amnesia bin.
I was not aware of that. If that’s the case, I agree, this is a tempest in a teapot unless someone assumes something malicious on Clinton’s part. She should have used the government’s infrastructure–Caesar’s wife, and all that–but the breach seems one of form rather than substance.
I’m not 100% clear from the story, but as I understand it the physical server itself was located in her home; at least, the article points out the greater security that would afford. This is taking it probably too far, but if she felt like nobbling it she could do that. Your cite also says that her server’s backup were commercial servers; it doesn’t say whether those were standard ones.
[QUOTE=Bricker]
Sure, sure…until the next time I defend a Republican and commentators archly suggest it’s an obvious choice and I would’t do the same for a Democrat, with this example quickly relegated to the convenient amnesia bin.
[/QUOTE]
What positions on this issue have I expressed before this thread?
Because journalists are not tech-savvy. The “backup” in this case refers to additional MX records with lower priority than the default MX record pointing to the main server at the Clinton home, as opposed to actual archival backup.
You, personally? None that I recall, so you may safely assume my comment did not include you.
Ah, thank you. I find I retain a little concern about the server being so potentially freely tamperable with by Clinton, though.
Also apparently tamperable isn’t a word. That’s even more concerning.
Should I assume from your lack of recollection of my prior views that you have suffered from a bout of “convenient amnesia”?
It may have worked that way with the “Google as a backup” configuration they did first, but their subsequent solution was MX Logic (now McAfee Saas), which provides a whole range of services involving spam, phishing, and malware filtering and a lot more. That would have to use MX redirect to interpose the Saas servers in front of the target server. It also sounds like the service can filter outbound mail, too, and optionally provide “service continuity” in the event of an outage, so if thus subscribed they would effectively be running a parallel mail server. As yet another option, Saas also provides archival storage. It’s not clear just what services Hilary subscribed to, though. If she only used them for security filtering then you’re still correct that this wouldn’t provide archival backup.
Mark me down as one who thinks this is a non issue - not at all important.
Well, your concern is your own conc… um, your own issue. I’m of the opinion that the law expresses the will of the people of the United States. In this case, Secretary Clinton, as head of her agency, was responsible for creating and applying sufficient standards for records retention. (It’s true that subsequent to her time in office, a more stringent law was proposed and passed). To paraphrase a Nixon quote, then, if the Secretary does it, it’s not a crime.
On the contrary – it’s INconvenient. In other words, it’s not to my benefit.
It’ll still be the internet, even then.
Touché, and touché!
Well, yes.
But I assume, if I were to commit some warning-worthy offense, I could not disclaim responsibility for it by reminding you that this was the internet.
I assume, in other words, that despite this being the internet, we collectively assign some value to the ideas and representations made here. Right?
OK, look, how about this: I will personally nominate you for SDMB 2015 Non-partisan Homecoming Queen, even though everybody knows it will be John Mace again, but he rocks a tiara…
And seriously, chiffon?
How about you just remember this conversation?