A recent case of alleged cyber stalking has brought attention to the security and safety of e-mail accounts at The University of Memphis.
A female U of M student has accused her ex-boyfriend of stalking her through a series of fraudulent e-mails, some from her own account.
The student, who asked to remain anonymous, a year ago provided her then boyfriend with her Tigerlan username and password giving him access to her U of M e-mail account.
Although the student involved called this a case of cyber stalking, it is being considered an "assault and intimidation" case, according to Derek Myers, the deputy director in the department of public safety.
Myers said there are several ways to handle such cases, but most are narrowed down according to two guidelines: Whether the case is between two students or between one student and non-student.
In this case, since it is one student and non-student, they will go downtown and take the case to court or protection will be issued for the student.
"If you feel threatened then we'll do as much as we can to protect you," Myers said.
Myers said many people stop threatening behavior once charges are made, because you can almost tell on the front end who is problematic.
Resolving the issue becomes easier, though, when it involves two U of M students, Myers said.
The issue is handed down to the dean and the students must undergo counseling.
"Both have something to lose," Myers said.
However, the solution in two student cases can vary based on the situation, Myers said.
"People who are constantly breaking up and getting back together are the ones we try to get into counseling," Myers said.
When the case starts to become a nuisance, then other alternatives, such as number changes, are proposed.
Sometimes, though, intimidation through fraudulent e-mails and un-authorized account usage cannot be blamed only on the intruder, but on the actual user as well, said Liliana Moisa, the network security specialist in the Information Systems lab.
"E-mail accounts are secure," Moisa said. "Passwords have to be personal and well chosen."
Access to information technology resources is granted solely for the grantee's own use and privileges and must not be transferred or shared unless authorized by an appropriate University official, according to the Acceptable Use of Information Technology Resources.
The principle is intended to protect user accounts and sharing its access can leave it vulnerable to outside abuse.
Also if someone else uses an account with the user's permission, such as in this case, and violates University Policy the account holder can be charged and made subject to the same disciplinary action as the actual user.
Moisa said in the past she has received few complaints about cyber stalking.
"Personal computers have to be password protected and must have an anti-virus program and updated patches," Moisa said. "If the personal computer is not properly set up and updated, it can be attacked."
Along with the 64 assault offenses recorded in the past year, cyber stalking is rather new, but can pose just as many problems, said Bruce Harber, the director of the department of public safety.
"I think it will be really unnerving for a lot of people," Harber said. "There's no face to face."
Harber said catching someone who is using e-mail communication to disrupt others can be difficult.
"It's a challenge of match technology," Harber said.
It can also make the job easier, though, because the more technology allows for more resources, Harber said. A lot of times people do not realize the consequences, he said.
Harber said cyber-stalking is still new because there are only a couple reported cases each semester.