Colette,
So have I, with a different attachment from the Compliance Department. I
rang their Office immediately. I passed on my suspicioin that they've been
infected by a computer virus - they do have anti virus software in their
office, I was told, and will look into it. I spoke to someone called
Jackie.
Our Council blocks all incoming executable attachments so we have not been
affected by the recent splurge in infected emails being received - all users
receive is the email message not the attachment.
Gill.
Gill Smith
Data Protection & Security Officer
ICT Services
Devon County Council - www.devon.gov.uk
Tel: 01392 383165
> -----Original Message-----
> From: Colette Healiss [SMTP:[log in to unmask]]
> Sent: Thursday, October 03, 2002 3:17 PM
> To: [log in to unmask]
> Subject: scam email??
>
> Dear All
>
> Have received a peculiar email containing the text below and with an
> attachment (which I have not opened). There is no address showing in the
> "To" field but the sender's address is given as "Compliance Department"
> [log in to unmask]
>
> "Dear Ms Routier-von Felbert
>
> Thank you for the initiation to speak at the conference on 30-1
> October.
>
> I note that Day 2 of the Conference includes a session on the NFI. As
> you
> may be aware the Information Commissioner has long standing doubts
> about the
> compatibility of this exercise with the Data Protection and Human
> Rights
> Acts. It is certainly possible that by the time of your conference
> the
> Commissioner may be involved in formal "
>
> And that's it. The attachment is called "dpr1.dat.scr"
>
> **************************************************************************
> *
> Disclaimer: This e-mail and any file transmitted with it are
> confidential,
> subject to copyright and intended solely for the use of the individual
> or entity to whom they are addressed. It may contain privileged
> information.
> Any unauthorised review, use, disclosure, distribution or publication is
> prohibited.
> If you have received this e-mail in error please contact the sender by
> reply e-mail and destroy and delete the message and all copies from
> your computer.
> **************************************************************************
> *
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|