Sunday, November 6, 2011

Session 7

I’ve dealt with the Ed Norman syndrome ever since I began working at my current position. When I first started over 6 years ago, the restrictions were not nearly as severe as they are now. At least back then you could develop your own web site or access the wireless network without having to log in every single time. Things have gotten progressively worse since then. There is rationale behind a lot of these security measures, but there are also a lot of restrictions in place that just impede progress.

One of the restrictions that really frustrates me is in the web development department. When I first was hired, I was tasked to create a web site for an organization. I was able to develop a dynamic site full of resources designed specifically to address the needs of the organization. If I were tasked to create such a site now, I would have to work off from a template that matches the rest of the sites hosted on their server. If I need to edit something on this template I would have to list what it is that I need to modify and wait until a web administrator could do it for me despite the fact that I’m a web master for my department. This means that unless it is a simple change within the content area of the site, I would have to gain permission to make any significant additions or revisions. It is for this reason that I have decided to host my sites on an external server where I have the freedom to develop and change the sites as I please. Another thing that really frustrates me is having computer workstations where you cannot install or update software without administrative privileges. I can’t tell you how many times that this has hindered me from doing my job. If I need to update a video codec in order to play embedded video in a PowerPoint, I have to call a technician and wait for them to come out even though I’m employed as technical support myself.

If I had the authority to control these issues I would handle it much differently. I understand that many of these safeguards are in place to protect from malicious activity and or inexperienced users unknowingly making changes, but those who have a legitimate need to access these computers should be granted access. Like with everything else, there should be training administered to users who request different levels of access privileges. Once these users complete this training and exhibit the ability to handle the privileges responsibly they should be issued some sort of certification, which enables them to retain these privileges for an extended period of time. After all, this is the procedure for gaining access to any other system. I really think that it is a matter of certain individuals having too much control and placing these types of restrictions just make their jobs easier at the expense of everyone else.

2 comments:

  1. I have to ask, how many of these restrictions are really about security and how many are just because it is easier (ADA issues and such)?

    ReplyDelete
  2. I cannot believe that they have not given you complete access. They must not know what talents you possess and what they are missing out on by restricting your access.

    ReplyDelete