Skype - 2.0 Betriebsanweisung Seite 20

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 30
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 19
Page 20 IT Administrators Guide
In addition, Skype cannot protect users’ hardware against the introduction of spyware
or malware, which could compromise the security of a Skype call; it is the user’s
responsibility to ensure they have adequate anti-spyware and anti-virus protection on
their hardware to prevent unauthorized eavesdropping in this manner.
Please be aware that in some jurisdictions Skype works with in-country partners, who
take overall responsibility for the Skype products in that market. These partners may
distribute modified versions of the Skype software as well as use local servers in order
to comply with the laws and regulations. This means there is a possibility that your
communications and personal data could be stored, monitored, or blocked and made
available to authorised local parties, for instance law enforcement, subject to the local
legal standards.
3.3 Privacy
To help manage communications and protect privacy, Skype has tools that give users
control over sharing their contact details, who can see their online Status and who can
call or IM (Instant Message) them.
Also, some personal information is stored locally on the computer being used by the
user. Users should be warned about this, particularly if they’re using a public or shared
computer.
3.3.1 Sharing contact details
A request to share contact details includes a digital signature, which (once signed) is
sent back to the originator. It’s tied to the same sign-in credentials used to authenticate a
Skype identity.
When a Skype user shares their contact details with another user, it lets them see their
currently selected online Status. It also gives them permission to communicate freely with
each other (depending on their privacy preference settings).
Each time a user adds a contact to their contacts list, Skype prompts them to send a
request for contact details. If the new contact accepts the request, both users are able to
see each others selected online Status.
If the contact denies or ignores the request, the requester cannot see the other user's
selected online Status and gets no special communication permissions. Skype can be
congured to refuse calls, chats or video from unauthorized Skype clients.
3.3.2 Controlling communication
The ability to communicate contact details is an important part of maintaining privacy. It’s
also essential for controlling who can contact users. Skype allows each user to set their
own privacy thresholds about who can call or IM.
Seitenansicht 19
1 2 ... 15 16 17 18 19 20 21 22 23 24 25 ... 29 30

Kommentare zu diesen Handbüchern

Keine Kommentare