This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ccess to private data (as on a company's local area network or intranet) by outsider
computer users (as of the Internet)." MERRIAM-WEBSTER'S COLLEGIATE
DICTIONARY 471 (11th ed.2003). It can also be "programmed to analyze the network
traffic flowing between [a] computer and the Internet"; it then "compares the information
it monitors with a set of rules in its database," and "[i]f it sees something not allowed ...
the firewall can block and prevent the action." NEWTON'S TELECOM DICTIONARY
392 (22nd ed.2006). Further, "[m]ost firewall programs let you adjust the rules to allow
certain types of data to flow freely back and forth without interference." Id.
During the interview, Softich confirmed Cochenour's report that a Frontline employee
had accessed child pornography via the Internet. Softich also reported that he had
personally viewed the sites and confirmed that they depicted "very, very young girls in
various states of undress." Softich further informed Kennedy that, according to the
Internet Protocol address and log-in information, the offending sites were accessed from
a computer in the office of Appellant Jeffrey Brian Ziegler, who had been employed by
Frontline as director of operations since August 2000. Softich also informed Kennedy
that the IT department had already placed a monitor on Ziegler's computer to record its
Internet traffic by copying its cache files. [FN3]
FN3. A cache is "a computer memory with very short access time used for storage of
frequently or recently used instructions or data." MERRIAM-WEBSTER'S
COLLEGIATE DICTIONARY 171 (11th ed.2003). "[I]nformation is cached by placing
it closer to the user or user application in order to 79 make it more readily and speedily available...." NEWTON'S TELECOM DICTIONARY
189 (22nd ed.2006).
Agent Kennedy next interviewed William Schneider, Softich's subordinate in Frontline's
IT department. Schneider confirmed that the IT department had placed a device in...
View Full Document
- Spring '08