Feeds

Porn swallows 20% of NZ police IT capacity

People like us

  • alert
  • submit to reddit

Security for virtualized datacentres

Randy coppers in New Zealand waste so much time surfing for porn while on the job that fully 20 per cent of police computer system capacity is devoted to storing the images, an official audit has revealed.

The investigation, begun five months ago, found vast reams of sexually-explicit material, some involving violence or simulated violence, and some even involving bestiality. The material in question was discovered accidentally, during an investigation of alleged police misconduct unrelated to porn surfing.

Staff hoarding images described by Police Commissioner Rob Robinson as "shockers" include a superintendent, three inspectors, and about 40 women officers or civilian staff, the New Zealand Herald reports.

"These are not mere nudity. They are sexually-explicit images of sex acts," the paper quotes him as saying.

Some images may be bad enough to warrant criminal prosecutions, the paper says, although the authorities deny that any kiddie porn has been found. Other semi-legal content may inspire a hearty round of dismissals. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.