The Failing Right of Laptop Privacy 315
davidwr writes "Wired has an interesting editorial on laptop searches and seizures. It raises some interesting issues, including employee rights against police searches in the workplace, routine vs. non-routine searches at ports of entry, and police use of unrelated data found in a database search. The article ends saying: 'Of course, there's a chance that the courts will not recognize the different scope of privacy interests at stake in computer searches, or will not be adept at crafting a rule that gives enough leeway and guidance to law enforcement, while also protecting privacy. At that point, the Constitution may fail us, and we will have to turn to Congress to create rules that are better adapted for the information age.'"
At that point, the Constitution may fail us (Score:4, Insightful)
Re:At that point, the Constitution may fail us (Score:4, Insightful)
Re: (Score:3, Insightful)
Oh, what bullshit. Look, if the constitution wasn't supposed to be amended, then Article Five wouldn't be there in the first place, would it?
Re: (Score:3, Interesting)
Sure, the constitution can be amended... but much like prohibition, eliminating state legislators from electing senators sucks, amendment or not.
Re:At that point, the Constitution may fail us (Score:5, Insightful)
Word.
1913 was the *start* of us loosing our rights but with the recent stuff (patriot act, land seizures, warrant less wire taping, military tribunals) its all gone now.
I cant think of a single part of the bill of rights that we still have.
Why is speech "limited" at political rallies or universities? Why is hate speech a crime?
Why are there gun laws restricting firearms?
The 3rd.. is possibly impractical.. and also probably meaningless as well.. but if not, the feds will find a way to make it legal.
The government can search practically anything they want now? Laptops, Phone records, E-Mail, you name it, why?
How can the City of New London takes peoples land and give it to Pfizer?
Why is José Padilla been in jail for 4 years being tortured, when his case is still pre-trail?
Why does just about everyone accused of mutable crimes seek a plea bargain for a lesser offence instead of standing up for there rights? Why does the state tack on so many charges with extreme punishment (101 years for spamming)?
Why is a man being sentenced to 101 years for spamming? Why is another man sentenced (and denied appeal) to 50 years in prison for selling pot? Why are children being convicted of molesting each other?
Why does the government have the power to do anything we don't specially say they don't have or can pick apart and widdle down the other rights we have? Why is it the people reserve no rights beyond what's listed in the constitution
We have a "vestige" of the construction.. we don't actually have enforceable rights in the same sense as they were written. The Ed Brown case is part of this, the court would not allow him to use constructional law in his court. read that again.. you can't use the construction.. the highest law on of land in a U.S. federal court. The judges swear an oath to it but its entirely irreverent anymore.
Re: (Score:3, Interesting)
Can you "bear" a main battle tank or a cruise missile? No.
"Arms", in historical context, meant guns that were carried by a soldier. The term was understood to be distinct from "cannon", big-ass guns that were not something a man would "keep and bear".
If a weapon is something that an infantryman would carry into battle, it falls within the rightful scope of
Re: (Score:3, Interesting)
Re: (Score:3, Interesting)
There's also the part about it being for an organized militia. You left that out.
The second admendment does not say firearms are limited to a militia, it specifically states the right of the people to keep and bear Arms, shall not be infringed. [usconstitution.net] People have the right. It make perfect sense when you consider the Founding Fathers were concerned about a tyrannical government, when only the government has firearms and not the people, it invites the government to become tyrannical. that's what happened in 1
Re:At that point, the Constitution may fail us (Score:4, Informative)
Why is José Padilla been in jail for 4 years being tortured, when his case is still pre-trail? ..because the 6th (and 8th) Amendment, are meaningless.
He's admitted to blowing up a civilian airplane and is a fugitive from Venezuela.
That's not Jose Padilla [wikipedia.org], Padilla was the so called dirty bommber arrested at Chicago's OHara airport. The one you're think of that blew up that airplane, Cubana Flight 455 [wikipedia.org] is Luis Posada Carriles [wikipedia.org], a Cuban living in Miami as a free man. Venezuela has repeatedly asked the US for his extradiction but the US refuses to hand him over.
FalconRe: (Score:3, Insightful)
Pfui.
You both sound like you would be more comfortable with a hereditary House of Lords
---or is it the Corporate State of Microsoft?
The late nineteenth century Senat
And Hopefully... (Score:4, Funny)
When the day comes that the Constitution can no longer protect us in the information age, we have a Congress actually interested and willing to step in on behalf of the people.
'Hopefully' is one way to put. (Score:2)
For myself, though, I must admit reading the last sentence of the summary more like this:
"At that point, the Constitution may fail us, and we will be screwed."
Re:And Hopefully... (Score:4, Insightful)
KFG
Re: (Score:2, Insightful)
Democracy is a device that ensures we shall be governed no better than the majority deserves.
Democracy is a horrible system of government for the minority dissenters in the group . . .
Re:And Hopefully... (Score:4, Insightful)
Shaw used the royal "we" and his observation was directed at your point. Democratic forms of government at best serve the lowest common demoniator (which is something rather different than the majority). At worst it is, of course, nothing more than a self-satisfied lynch mob.
Which is why the framers gave us a Congress instead of a democracy (they knew about Athens), under a constitution (they knew about Rome). They anticipated Shaw's further observation that anyone who robs Peter to pay Paul can always count on the support of Paul.
It is not the fault of Congress if the least common denominator has demanded more and more democracy while deserving it less and less.
It is the fundamental premise of our governmental philosophy that the government will be corrupted and that it is the responsibility of The People, freemen all, to see to their own freedoms.
Where The People demand the "freedom" to be endentured in order that they may be "free" to watch Survivor and Big Brother on a really big TV, that is the freedom they will get.
Freedom is messy and uncomfortable. The People would rather be comfortable serfs than uncomfortable freemen, in numbers far greater than a simple majority. Let's call it, ooooooooh (pulling a number out of my ass that probably isn't too far wrong) - 98%.
Give me liberty, or give me. .
KFG
Re:And Hopefully... (Score:5, Informative)
Uh, but it does, and plainly so. Not only is a laptop part of a person's "effects" as protected explicitly in the fourth amendment, but the contents of a laptop are ones papers. The search of papers inside of a laptop is thus the same as the search of papers inside of an envelope. The transmission of a paper via email is no different than the transmission of a paper via postal mail. The constitution plainly and clearly provides protection for this, and it is simply a question of whether the courts will acknowledge this now, or come to their senses later. It is not exactly a matter of interpretation when the language is that clear.
Re: (Score:2, Insightful)
Re: (Score:3, Insightful)
Perhaps we'll just need to bring the papers and effects closer to our "person" in the interim. How many people might get a little bio-engineered implant that holds a relatively large amount of data? Access it over bluetooth, direct via your mind, or something else.
Of course, there are a lot of steps between that technology and reality, but I think forcing a person into surgery to get at some data which may or may not be hidden away inside of them would rub a lot of people the wrong way.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
You think the Government is going to let you install a hard drive in your brain? I dont see the FDA letting that happen. Hope you know a good street doc.
The biotech advances coming this century are anticipated to be on the order of the 20th century computer revolution or larger. If such technology existed, I'd bet I could find a neuro-mechanic (or ten) that would be willing, if compensated, to bend a few rules to install an import part that found its way through customs. "The Government" would have to
Re: (Score:2, Insightful)
encrypted email on the other hand is more like a sealed envelope.
Re: (Score:2, Insightful)
We've let our rights be whittled away over the centuries... a DMCA here, a 'Patriot' Act there... because we the people have failed to enforce our rights are under the Constitution, and our 'leaders' have chosen to ignore the Constitution altogether, except where it suits themselves.
Ironically, the Founding Fathers wrote the Bill of Rights in the first place BECAUSE they were afraid that futu
Re: (Score:2)
Re: (Score:3, Insightful)
Right, because modern legal language like the kind used to write EULAs and NDAs is so superior to the Constitution, which can be read and understood by normal people.
Just because modern Americans tend to be so petty and self-serving that they demand things be explained with a page of words instead of a sentence does not mean that's how things should be done.
The constitution (Score:2)
Re: (Score:2)
Much as I love geeking, I see the skin as a natural barrier, and would prefer to go Amish rather than be some ghoulish cyborg.
But it's a "free" country, and my opinion is likely the minority.
Re: (Score:2, Funny)
Does this give me the ability to shoot lasers out of my eyes?
Or at least the ability to at least surf naughty websites wirelessly without the need for a laptop?
I dunno, I might go for it. I let things get under my skin all the time anyway
Re:And Hopefully...Constitutional Plugins (Score:4, Insightful)
Why bother with naughty websites when, if you're implanting stuff anyway, you could just put in an artificial gland that would release endorphins (or whatever) on command?
Re: (Score:3, Funny)
Seconded.
You two both misspelled "totally awesome and sweet." You might consider a spelling-and-grammar implant.
You must be a terrorist! (Score:3, Funny)
If you had nothing to hide, you'd have no qualms about us inspecting your computers, listening on your phone calls, and being searched when we feel like it.
What are you trying to hide?
Re: (Score:2)
Generaly, when something lives, it gets a mind of it's own and people use certain living
Congress makes laws in our interest?? (Score:4, Funny)
Turn to congress for help in protecting our liberties? Haha, that's a good one. He must be new here.
Re: (Score:2)
Oh, yeah... go ahead and mod me down, but... SOLD TO THE HIGHEST BIDDER!... or most influence.
Re: (Score:2)
one word... (Score:2, Interesting)
TrueCrypt or PGPDisk or....
Re:one word... (Score:5, Informative)
Many countries, such as Britain, criminalize witholding encryption keys from law enforcement to the extent that unless you are actually a terrorist with detailed and executable plans of action labeled 'evil plot' stupidly stored on your laptop, you are probably better off (in the criminal liability sense) just giving it to them. Sadly, I don't think that the US is far behind on this one, either.
Re: (Score:2)
Many countries, such as Britain, criminalize witholding encryption keys from law enforcement to the extent that unless you are actually a terrorist with detailed and executable plans of action labeled 'evil plot' stupidly stored on your laptop, you are probably better off (in the criminal liability sense) just giving it to them. Sadly, I don't think that the US is far behind on this one, either.
We're not there yet, AFAIK...
http://www.latimes.com/news/nationworld/columnone/ la-me-pellicano2mar02,1,8581 [latimes.com]
Re:one word... (Score:4, Interesting)
That's what a steganographic filesystem is for: plausible deniability. You have multiple layers of data encryption, none of which know about the lower layers, each of which stores data in the free space left behind by the upper layer. They ask you for the password, you provide the password to financial records at the first encrypted layer. For that matter, you could have an unencrypted layer on top so that there's no proof that any encrypted data even exists. In the unlikely event that they find the crypto tool, though, you have financial records at the first encrypted level. Say that there's nothing else, but under duress, admit to a second level with something a little more embarrassing (e.g. your porn collection). Keep anything that has to be kept secret at the third level.
There are two big problems, though: 1. Writes to the upper layer overwrite data at the lower layers, so the redundancy at the lower layers is pretty crucial to avoid data loss, and even then, beyond a certain point, you'll start losing data. 2. All the implementations I've seen out there are Linux-only (or at best UNIX/Linux), which makes them less than useless for most of the general public.
Re: (Score:3, Informative)
TrueCrypt allows for hidden volumes (i.e. encrypted areas within encrypted areas) and it's a windows program. They claim it's not possible to detect the hidden volumes, but I have to take their word for it.
Re: (Score:3, Interesting)
Actually, they say it is possible to detect hidden volumes [truecrypt.org] a few ways, one being if you're using a journaled filesystem on the host device. It will be possible to see changes to hard disk sectors that the directory will say are not being used by files. So the solution is not to format the source disk as N
Re: (Score:2)
I think the solution is to make the outer encrypted volume a set size, and then create the inner volume to be flexible for size requirements. Before you create the inner volume, put a few financial-related documents in the volume. Now if they open it, here's a few docume
Re: (Score:3, Insightful)
So you're screwed with TPM, then? (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
It's too bad that having encrypted documents (or encryption software) is probably grounds to have you "detained."
Re: (Score:2)
two words: probable cause. search warrant. three words: contempt of court. obstruction of justice. to the judge your laptop is just another lockbox: surrender the key or go to jail.
for no fixed term, but simply at the court's pleasure.
Re: (Score:2)
three words: contempt of court. obstruction of justice.to the judge your laptop is just another lockbox: surrender the key or go to jail.
If, rather than the files being stored on computer, they were on paper in filing cabinet but written in a code or cipher, would the judge be allowed to demand that the documents be decoded? Surely an encrypted document is much more like a paper document written in code than a locked safe? Encryption is not a container (to be opened) like a safe, but is like a code, cipher or a foreign (but not understood to the reader) language.
Re: (Score:2)
"To every lock there is a key..."
I think a judge will see encryption as a container. It isn't uncommon for a Geek to speak of "wrapping" content in encryption.
So? (Score:5, Interesting)
I have made it quite clear to contractors that their laptops will be subject to scrutiny prior to their being permitted to access our corporate LAN, as well there my be periodic spot-checks, especially if I suspect that a laptop might have become infected with something nasty.
Re:So? (Score:4, Insightful)
If you have to have carry some personal data around with you, and/or don't happen to have a secure server at home, encrypt(and hidden file) it and stick it on the non-music/video area or notes folder of an ipod. They're far more common than linux running laptops and probably far less likely to create draw unwanted attention.
airport/boarder/other security guard/storm trooper: what's that?
you: my ipod
guard: turn it on
you: ok
guard: looks good, these are not the droids we're looking for, move along
Or it may remain unnoticed and unquestioned in your pocket
Re: (Score:2)
The article's author freely admints that her laptop was purchased by not her, possibly an employer. If it's not yours it's, well, not yours and anything no matter how personal you put on it is not yours.
Why does that follow? Surely there is a distinction between the owner of the 'container' and the owner of the items stored in the container. In the same way that if you put your lunchbox in your desk drawer at work, you still own your own lunch and box. The location where an item (whether tangible or intangible) is stored (or located) does not affect its ownership.
Re: (Score:3, Informative)
deliberately muddy the waters (Score:3, Interesting)
Re: (Score:2)
Or alternatively, keep your important stuff stored on a CompactFlash (or SmartMedia) card or whatever, and have that card "installed" in your digital camera.
Protect yourself, Re:So? (Score:2)
Regardless of how one feels about the right to individual privacy in the workplace, surely we can all agree that the government conducting warrantless searches on a business' property without the consent of the business and without cause is a bad thing, right?
Yes, that's bad. Is it legal? Part of the fourth amendment warrent requirement was to keep the government from being used as a tool against your business competitors. The spirit of it is that reasonable suspicion will stand up to public scrutiny
Two words (Score:4, Insightful)
Disk encryption. You can get TrueCrypt for free and encrypt a partition with a hidden partition inside. Keep it on a USB drive or external hard drive. See you in about five years after the NSA's supercomputer has been trying to decrypt it.
Of course, in the US today they'll probably just disappear you to GITMO while they work on it.
Encryption is the only real option (Score:5, Interesting)
One of the best things that I've done recently is to wipe and randomize a 40-gig partition on one of my drives and set up a 256-bit AES-encrypted ext3 filesystem. Unless I enter my lengthy passphrase, there is no way to mount the volume, much less look at its contents. Barring some unforseen weakness in AES, this is now data that nobody but me will ever see (unless I do something silly like forget to unmount it).
It is, in many ways, a brave new world, but people need to know that there are things they can do to protect themselves. This, of course, is not news to the Slashdot crowd, but it is something that the less-clueful public needs to hear about.
Re: (Score:3, Insightful)
Officer: What is this 40-gig partition here?
You: I don't know, random junk.
Officer: So you don't mind if we zero it?
You: Don't do that! It's my personal files... encrypted.
Officer: Please unlock it so we can take a look.
You: No thanks. It's just my personal files anyway.
Officer: You know, this is the equivalent of transporting a saf
Traveller's rights. (Score:2)
Re: (Score:2)
Which is a usefull option if e.g., you are entering a foreign country with a laptop full of your employers trade secrets.
Re: (Score:3, Interesting)
Well, out of the Bill of Rights [cornell.edu], Amendments 1, 7, and 8 make absolute statements prohibiting certain acts of Congress (e.g. "Congress shall make no law..."); Amendments 2, 4, 9, and 10 refer to "the people" which could mean all people or 'the people of the United States' (i.e., citizens); and Amendments 5 and 6 use language referring to "no person" or "the accused," which can only mean that they apply to all people, not just citizens. (And for completeness, Amendment 3 would only be relevant for people who
Re: (Score:2, Insightful)
Like me, you should back up your laptop's encrypted partition daily. If they wipe the partition, you can get it back next time you're online. But the important thing in these searches is to put them on notice that you don't consent, because consenting, or failing to assert the opposite, will make an otherwise illegal search, legal. By putting them on notice, they run the risk of conducting an illegal search of
Re: (Score:2)
There are many search warrants that allow you to look through my papers, but I've never heard of one that lets you scribble on the backs of them.
Re:Encryption isnt that safe (Score:3, Informative)
2) If they can HEAR you type it, they can guess it
3) They can install a keyloggers of many kinds
4) ENCRYPT YOUR SWAP FILE-- don't assume that memory is locked
5) Encrypted swap implementation has to properly handle the keys
6) You must be in control of the information, 3rd parties can give into probable cause
7) Using a rare filesystem has gotten people off in some cases
8) Beware of wireless keyboards
9) Some forms of security without government back door
Re: (Score:2)
Relax guy, its just pr0n. Trust me, everyone has a directory full of it. Just rename the directory "Taxes" and your mother will never be the wiser.
Seriously, if someone really wanted to get at your data, once they realized you had an entire partition encrypted, they would keylog you to get the passphrase. Who has 40 gigs of personal data tha
Re: (Score:2)
MP3
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
At home, the alarm drops power to the UPS which initiates a shutdown. Unexpected visitors while I am away auto lock sensitive data if I forget.
Very simple analog analogue... (Score:3, Interesting)
A perfectly good non-electronic equivalent situation already exists: Personal diaries.
Would the readily-apparent evidence suffice to justify confiscating and reading someone's diary?
If not, then stay the hell away from my laptop.
Don't bring it to the airport. (Score:3, Interesting)
Would the readily-apparent evidence suffice to justify confiscating and reading someone's diary?
The airport case [law.com] in question, you are screwed. The courts reasoned that searches at airports are routine, so just about anything goes. They should be ashamed of themselves. Until they come to their senses, I suggest you keep your diary, paper or electronic at home. The electronic one is easier to access, but you better move it around by ground transport.
Don't bring it in your car either. (Score:2)
Wow, I missed this one a few days back. [soonews.ca] It looks like the entire contents of your automobile, including your laptop, is fair game at the US Canada border.
Once again, leave your data at home and get to it though password protected and encrypted network access.
Re: (Score:2)
Re: Don't bring it to the airport (Score:2)
Re: (Score:2)
UK Immigration are known to do this. They'll even phone some of the numbers in it and ask questions if they want to test your story.
Story (Score:3, Funny)
Re: (Score:2, Funny)
HA! (Score:2, Funny)
Is it possible to mod the article +1 Funny?
This is disturbing, to say the least... but (Score:2)
If you only have a 'test drive' in the laptop, they can look at it all they want. They would still have to find and recognize the other drive as well as the boot USB drive, and then ask for encryption keys
Just a thought...
whiny!!! (Score:4, Insightful)
Re: (Score:2)
Moreover, it's simply not that hard to store one's personal data on a usb key which, these days, are more than large enough to store everything she's whining about. The problem is not that laws don't protect her, it's that she doesn't protect herself.
Re: (Score:2)
She is not worried about what her employer do, but what the government do.
Re: (Score:3, Insightful)
She's not really talking about her employer looking through the laptop. She's talking about law enforcement. If you'd RTFA, you'd find this paragraph on page 2:
Don't be a cheapskate! (Score:4, Insightful)
Even if her own computer is too expensive for her, how much does a USB key cost these days? Combined with Firefox Portable and Thunderbird Portable (and others) this provides a simple and elegant solution.
Failed what? (Score:5, Insightful)
Nonsense. The Constitution hasn't "failed us", it is our commitment to honoring its provisions that has wavered. The Constitution is just as relevant and meaningful now as it was two centuries ago. Furthermore, I would argue that it is more important than ever that we observe Constitutional law and hold our elected (and unelected!) officials accountable for their deviances from it.
So far as Congress crafting better rules for the Information Age is concerned
Interesting Read: Poor Conclusion (Score:2, Informative)
Hahahaha (Score:2)
Oh that's good, tell another one!
You're abusing company property (Score:2, Insightful)
In short: you're an idiot and are abusing company property to meet your own personal demands. The company didn't provide you with that laptop to store your own personal life on it, the idea behind it was actually to make you more mobile while still having the access a
Portable Apps (Score:2)
Rights (Score:2, Insightful)
Laptops, schmaptops (Score:2)
According to AG Gonzales, Americans not only don't have a right to privacy with regards to their laptops, we don't even have a right to habeas corpus. See the FireHose [slashdot.org] for my (rejected) story submission.
Cheers,
b&
My Computer or the Highway (Score:2)
And all the more reason to pressure your state/local/Federal governments towards a Privacy Amendment to the (respective) Constitution. Which would reiterate the 4th Amendment (and implicit) rights to privacy in your "papers and effects". By requiring the government to protect your privacy by restricting copying/transmitting your personal data to only within th
Re: (Score:2)
Privately-owned laptops are one thing, but... (Score:2)
I worked Desktop Support in an environment where we were forbidden to say or write the letters "PC" because they stood for "Personal Computer:" we were required to describe computers as works
This isn't actually a problem with laptops (Score:2)
A laptop purchased buy your employer is the property of your employer, not you. So if the government has a warrant(or reasonable cause) to search your employer's property they have the right to search your laptop(and they should have, or else every dodgy company in the world would keep all their financial records on laptops and make the government get hundreds of warrants to search it all). Don't keep private stuff on your company laptop!!! Buy your own,
Dual boot (Score:2)
A few simple thoughts (Score:3, Interesting)
I carry mine to work and don't plug it into the network
I don't use the work machine for any internet searches, I use my laptop through cell card
2 - Separate your data sets
Carry your sensitive data on something other than laptop
I carry mine on a CD, they can't call that a bomb
3 - If they want to search it...
Ask "What exactly are you looking for?" and write down the answer!
If they say its just a routine inspection let them look, don't let them open files
If they want to see a file ask for the warrant
If they insist ask (don't) demand to see a supervisor
4 - Be nice, calm, and ask the supervisor to witness
Any search (with understanding you are under protest) as there is no warrant.
Ask the supervisor for a full accounting of all files opened/accessed prior to boot/power on
(this is critical as they cant log all files accessed during boot)
5 - Best of all, don't give them a reason to search it
Doofus (Score:3, Insightful)
If your most private possession is owned by someone else, the police are not even close to your worst worry.
First, there are several new cases that suggest that agents can search computers at the border
No, that's not accurate. The cases state that agents may make a search a requirement for crossing the border with the computer. You have the right to refuse the search and ship the computer back the way you came.
Second, a recent case in the 9th U.S. Circuit Court of Appeals has held that private employees have no reasonable expectation of privacy
This has been true since the country's inception. Nor is it difficult to understand: Its not the employee's office or the employee's computer. They're not even under contract to you the way an apartment or hotel room would be. These things belong to the employer and the employer has a right to grant a warrantless search of its posessions just as you have the right to permit the police to search your house if you so choose.
The employer also has a right to refuse a warrantless search, you as you would of your posessions. The difference is: why would the employer want to? If you're breaking the law at work, they want to know about it just as much as the police do.
Another Perspective on Personal Data (Score:3, Interesting)
If we consider that electronic stuff (hardware, software and data) as containers within containers, the hardware might be owned by the employer, and the employer might have a right to see what containers are placed on the hardware. However, many of those containers (files) might contain so-called intellectual property that belongs to the person herself. The employer has no right to that (leaving aside, for the moment, contracts in which the individual stupidly gives all IP rights to the employer, even for private, non-work-related, non-compensated creations). The mere fact of physical location does not give the employer the right of unwarranted search. For example, the person's purse happens to be located in the desk drawer of the employer-supplied desk, within the employer's office. The employer does not have the right to search the purse, nor take possession of its contents. By analogy, I would argue that the content of personal data files (not necessarily the wrapper that is the file structure itself) is off-limits to the employer.
In short: the employer has the right (according to court ruling) to see the files on their property, but not necessarily the file content. The courts have not distinguished among respective ownerships of the hardware, the data structures, and the data contents. This distinction is something that will eventually be tested in court, I expect.
Like other posters, I agree that the employer could demand immediate return of the laptop and the individual would lose all of her personal information, and therefore the person must assume that risk of loss, encryption or no encryption. And I use my own laptop for my work - the employer does not have the right to access my machine. If they want my work (which they do) they agree to my terms. Every so often I hear the dire warning of the IT department about not providing me support. But then again, I've had occasion to fix some of the messes on other users' computers that were "supported" by the IT department.