{"id":6047,"date":"2012-07-04T10:22:53","date_gmt":"2012-07-04T08:22:53","guid":{"rendered":"http:\/\/www.wjst.de\/blog\/?p=6047"},"modified":"2012-07-04T11:56:17","modified_gmt":"2012-07-04T09:56:17","slug":"warning-reply-to-all","status":"publish","type":"post","link":"https:\/\/www.wjst.de\/blog\/sciencesurf\/2012\/07\/warning-reply-to-all\/","title":{"rendered":"Warning: Reply to all"},"content":{"rendered":"<p>Nature 486, 157 (14 June 2012) warns:<\/p>\n<blockquote><p>\nScientists discussing their work through written media, including e-mail, should be aware that they could at any time be asked to reveal their conversations.&#8221;You are commanded to produce&#8230;any and all documents, data, and\/or communications.\u201d Towards the end of last year, those orders appeared in a subpoena that landed at the Woods Hole Oceanographic Institution in Massachusetts.\n<\/p><\/blockquote>\n<p>so please write me private things only in a closed letter. Maybe it&#8217;s not such a problem<!--more--> with the <a href=\"http:\/\/www.spiegel.de\/netzwelt\/netzpolitik\/ueberwachung-eu-kommissarin-kuendigt-neue-vorratsdaten-richtlinie-an-a-842477.html\">European legislation<\/a><\/p>\n<blockquote><p>Die europaweite Richtlinie zur Vorratsdatenspeicherung soll erst im kommenden Jahr in einer \u00fcberarbeiteten Fassung vorliegen. Das sagte EU-Kommissarin Cecilia Malmstr\u00f6m der &#8220;Frankfurter Allgemeinen Zeitung&#8221;. K\u00fcnftig sollen die Daten &#8211; wer mit wem wann von wo telefoniert hat, mit welcher IP-Adresse jemand im Internet unterwegs war, wem eine E-Mail geschrieben wurde &#8211; nur zur Bek\u00e4mpfung schwerer Verbrechen und Terrorismus genutzt werden k\u00f6nnen.<\/p><\/blockquote>\n\n<p>&nbsp;<\/p>\n<div class=\"bottom-note\">\n  <span class=\"mod1\">CC-BY-NC Science Surf , accessed 28.04.2026<\/span>\n <\/div>","protected":false},"excerpt":{"rendered":"<p>Nature 486, 157 (14 June 2012) warns: Scientists discussing their work through written media, including e-mail, should be aware that they could at any time be asked to reveal their conversations.&#8221;You are commanded to produce&#8230;any and all documents, data, and\/or communications.\u201d Towards the end of last year, those orders appeared in a subpoena that landed &hellip; <a href=\"https:\/\/www.wjst.de\/blog\/sciencesurf\/2012\/07\/warning-reply-to-all\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Warning: Reply to all<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[132],"class_list":["post-6047","post","type-post","status-publish","format-standard","hentry","category-philosophy-of-science","tag-privacy"],"_links":{"self":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/6047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/comments?post=6047"}],"version-history":[{"count":4,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/6047\/revisions"}],"predecessor-version":[{"id":6049,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/6047\/revisions\/6049"}],"wp:attachment":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/media?parent=6047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/categories?post=6047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/tags?post=6047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}