Collocation Access

Roland Perry lists at internetpolicyagency.com
Mon Oct 23 20:28:49 UTC 2006


In article <20061023112018.F56322 at iama.hypergeek.net>, John A. 
Kilpatrick <john at hypergeek.net> writes
>> But presumably it would need to be stolen. Wouldn't the tech notice 
>>that  happening... Or is there some way the colo security guy can 
>>clone it  undetected?
>
>While your point is valid, arguing something like that with an AT&T 
>tech would be like arguing with the TSA.  Logic and reasoning are of no 
>value in the conversation.  The policy is the policy and you deal with 
>it.

I don't seek to argue it with an individual tech, but with whoever sets 
the corporate security policy.
-- 
Roland Perry



More information about the NANOG mailing list