Page 21 IT Administrators Guide
Specically, users can set preferences determining whether:
˚
Anyone can call or IM
˚
Only people on their contacts list can call or IM
In addition, le transfer preferences can be set independently of both calls and IMs.
Users can also block a specic user from seeing their selected online Status or
communicating, even if contact details have already been shared. The list of blocked
users can be managed via their privacy settings.
3.3.3 Location of personal information
We keep some information on the user’s machine, on our servers (but not information
such as presence and location) and in the P2P network. While any personal information
stored and processed is done in line with applicable privacy laws, Skype provides no
inherent security for chat logs, les transferred or voicemail messages stored at the
client. You should tell users that:
˚
Any machine that they use to check Skype continues to synchronize prole data
and chat history each time that it's subsequently used, keeping contact lists,
communication history and IM contents.
˚
Chat logs are saved indenitely in a hidden le in the user’s home directory. They
can be congured to delete or expire (please see the list of les and registry key
locations created during installation in Appendix 2: File locations).
˚
Once a text message, le transfer or audio/video stream is received by the
intended receiver, the sender cannot prevent it being copied, archived or
redistributed by the recipient.
3.4 Security best practice
You should take certain basic actions to address potential threats from:
˚
Password misuse
˚
Cross-site scripting and phishing
˚
Viruses and Trojans
˚
Falsifying user identity
˚
SPAM and SPIT
˚
Multi-logins
˚
Skype editing
Komentáře k této Příručce