tag:blogger.com,1999:blog-9928461.post112780000878623486..comments2023-07-26T00:11:11.771+10:00Comments on PHD BLOG IT: Email list conventionsMs Mhttp://www.blogger.com/profile/04919373115938586775noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-9928461.post-1127813487810254762005-09-27T19:31:00.000+10:002005-09-27T19:31:00.000+10:00urm, yeah. I'd have a problem with it, and I'm jus...urm, yeah. I'd have a problem with it, and I'm just bitchy enough that I'd say something about it to the guy, too. <BR/><BR/>The overfamiliarity of his using information given in good faith for a specific purpose for his personal benefit, with no attempt to actually create the intimacy bonds that would make such use more appropriate (frex, a coworker you often have lunch with calling you up on a weekend to see if you'd like to pop out for coffee, or some such--essentially, I think it was a little off-kilter in terms of boundaries.<BR/><BR/>Now I must go and think about whether the gender difference enhances the inappropriateness of the behavior. <BR/><BR/>Oh, and I got gihcy. But I had to puzzle rather hard over the distorted letters to recognize them. Those recognition keys are difficult for me all out of proportion to what it seems like they <I>ought</I> to be.Machttps://www.blogger.com/profile/01846076773328384778noreply@blogger.comtag:blogger.com,1999:blog-9928461.post-1127809006818588392005-09-27T18:16:00.000+10:002005-09-27T18:16:00.000+10:00Yes it is interesting because it crosses a line, a...Yes it is interesting because it crosses a line, albeit not a particularly 'defended' one. I mean we do not as 'yet' regulate who we receive emails from and the nature of those emails quite as much as we technically could...<BR/><BR/>The issue for me is about levels of intimacy perhaps, yes, and a minor betrayal of trust - since he has been entrusted with the names and emails on that list to be used for said purpose and is now using the list in a way that I imagine/guess/assume others did not expect it to be used for - i.e. his own personal advances. Nevertheless, it must be acknowledged that at the time we gave our emails we did not have an extensive discussion about acceptable use of said list. When I came across this kind of issue in workplaces rolling out IT networks, I was a strong proponent of discussing it and coming to an acceptable use policy over setting up designated 'authorities'. I think it keeps the ownership in the group/users. <BR/><BR/>Oh - you're 'toneedy' and I'm 'fonzy' backwards.Ms Mhttps://www.blogger.com/profile/04919373115938586775noreply@blogger.com