Do you consider fluther confidential?

1 Answer

Answer :

No. I always answer with the idea in mind that someone out there could read it…..I’m kinda paranoid like that. Have been ever since my Mom intercepted a “private” note between me and my boyfriend when I was 16. We thought we’d written it in code, too! Sheesh.

Related questions

Description : Do you consider Fluther to be a source of underlying comfort in your daily life?

Last Answer : Is it pathetic if I say yes? Getting second, third, fourth opinions on what to do in a sticky situation, or on whether something is normal, is extremely valuable to me. Knowing how intelligent ... on these things. Not to mention the fact that jellies are so kind and supportive in difficult times.

Description : Let's send some Fluther love to all the jellies facing life challenges.

Last Answer : Fluther love to all in need and thank you @SuperMousie !

Description : What would fluther-style moderation look like in the real world?

Last Answer : I suspect that Fox News would go out of business.

Description : How many other Jellies do you know outside of Fluther?

Last Answer : Zero

Description : Has fluther become like a new best friend?

Last Answer : Yeah! Sorta like a big, goofy, flop-eared dog that drools a lot. Sit! Stay! Good boy :)

Description : Do you like to make friends on Fluther?

Last Answer : answer:I'm not really good at making friends on the internet. There are people I talk to a lot on the internet, but for me personally, it's difficult to turn purely online relationships ... about the people with whom you start a conversation, and sometimes the context isn't suitable either.

Description : What do you like or dislike about Fluther?

Last Answer : The moderation, and many of the peoples comments really get me laughing sometimes, that is the best part of Fluther. If a place makes you laugh, it can’t be bad.

Description : Have you ever met or had a relationship with someone you met on fluther?

Last Answer : I have to ask my girlfriend to Join here, and thats cool

Description : Why should I join fluther.com?

Last Answer : because we are all here!

Description : Would you consider this rude behavior?

Last Answer : Mmm, tough one! A bit rude if she doesn't know you well. Is her brother far away or abroad so that they do not talk often? That could mean she wanted to speak to him then as she would not get ... for a new friend she made you feel a bit awkward. I would have asked discreetly: Am I interrupting?

Description : Do you share very personal, intimate details of your life with people you consider close friends?

Last Answer : I have no close people but I don’t think I’d be open enough to share personal details anyway. They seem irrelevant.

Description : When I buy a new tent, what should I consider regarding durability etc?

Last Answer : answer:I've had quite a few tents over the years, and the reason I lost most of them was passing them on to someone who needed it more than I did. Even 30 years ago, and even on the low ... though, there really isn't much to it. Nearly any tent can last years unless you're a total jackass.

Description : Of the people that you consider to be your close friends, how many did you meet on your own, and how many were already friends of people you know?

Last Answer : I met most of my good friends on my own. Often at work.

Description : What do you consider stimulating conversation?

Last Answer : answer:I like to talk to the person I am talking to. I know that makes no sense on the surface, but allow me to explain. If I am talking to you, I want to talk to YOU. Please don't ... . Tell me your opinion and thoughts, not those of someone else. These really weaken an arguement, in my opinion.

Description : Will you consider forgiving me for my behaviour in the last 24 hours?

Last Answer : You’re alright in my book :)

Description : WHEN do YOU consider somebody your friend?

Last Answer : I wouldn't call someone a friend until we've hung out [for purely social purposes; not school projects] a few times. Typically though, if that person in question had a previous role in my life ... refer to them as friends, only housemates, because I lived with them before we had any kind of bond.

Description : Who would you consider your friend?

Last Answer : Have they seen me at my worst, or as near as dammit, and love me anyway? And vice versa? Then we’re friends.

Description : Do you consider it rude to NOT wear shoes when you have guests over?

Last Answer : Not if the rest of you is naked.

Description : (Follow up question to the contacting the ex question.) How much do I need to consider the feelings of his spouse in this situation?

Last Answer : How would you feel if you were in her position?

Description : Given what's going on in the US now and possibly in the future; what other country would you consider moving to and why?

Last Answer : I think i’d probably do alright in mexico, I’m pretty much already there, seriously, all of my mail is in Spanish….

Description : What is a good way to get rid of a whole lot of paper that might contain confidential information?

Last Answer : I am able to burn my documents, but I live out where that’s allowed.

Description : Does the Man Mods, know who is Lurving whom, or is it all confidential?

Last Answer : answer:We used to be able to see who gave GAs to answers (not to questions), but that superpower no longer exists. Hasn't for a few years now. We can see the top ten users giving ... from any particular member. This lets us look out for users engaging in naughty self-lurve between alias accounts.

Description : Ladies, do you have a female confidential confidante?

Last Answer : answer:She is a real life angel. A friend I met through the internet about 5 years ago. Through Myspace. We had a lot of things in common. She is much older than me, she's about 35, and I'm ... when I just need encouragement. She really is an angel. I don't know where my life would be without her.

Description : Does anyone besides the confidential recipient have access to PM's?

Last Answer : Only certain individuals (owners and manager) can read pm’s, and do so only to investigate complaints.

Description : How can I set up a confidential email advice system?

Last Answer : set up a website with an email form, the user is asked for an alias and the details of their problem. after they press send it says your message was sent, please take note of your serial ... hosting package that supports php and mysql, a little javascript and some html and css to put it together.

Description : What is an attempt to obtain confidential information from you if the person's identity is false ?

Last Answer : Answer : Attempting to obtain confidential information from you by claiming that the person's identity is false is called phishing scams.

Description : Is google drive safe for confidential information?

Last Answer : For either user data security or legal liability, Google Drive account that is protected by two-factor authentication and a strong password is fairly secure. We can tell from the process that files ... you decide in this article: Is it Safe to Store Sensitive Data like Passwords on Google Drive?

Description : Individual, Paid employee, Confidential officer, a Government department

Last Answer : Find the odd one : (I) Individual, Paid employee, Confidential officer, a Government ... Chamber of Commerce, Consumer Co-operative stores.

Description : A person who acts as a confidential writer is a _________ 

Last Answer : A person who acts as a confidential writer is a _________ (a) worker (b) secretary (c) servant

Description : Why is it important to deal with confidential client information under the data protection act?

Last Answer : Need answer

Description : How can I be sure my information is confidential when I use data recovery services?

Last Answer : Usually most data recovery services are under a non-disclosure they are also conducted in secure labs with controlled access to ensure the confidentiality of your data. Contracts will be wrote up to help protect your systems also.

Description : Which of the following best describes the passing of confidential information from a client to its auditor? The information: a. Should in no circumstances be conveyed to third parties. b. Is not ... d. Should be conveyed to the public if it affects the "correctness" of the financial statement

Last Answer : Is not legally protected and can be subpoenaed by a competent cour

Description : A professional accountant has a professional duty or right disclose confidential information in each of the following, except: a. To comply with technical standards and ethics requirements. b. To disclose to ... body d. To respond to an inquiry or investigation by a member body or regulatory body

Last Answer : To disclose to the Bureau of Internal Revenue any fraudulent scheme committed by the client on payment of income tax

Description : A professional accountant has a professional duty or right to disclose confidential information in each of the following, except: a. To disclose to BIR fraudulent scheme committed by the client on payment ... body d. To respond to an inquiry or investigation by a member body or regulatory body

Last Answer : To disclose to BIR fraudulent scheme committed by the client on payment of income tax

Description : In which of the following circumstances would a CPA be bound by ethics to refrain from disclosing any confidential information obtained during the course of a professional engagement? a. The CPA is ... the PICPA. d. An inquiry by a disciplinary body of PICPA requests confidential client information

Last Answer : A major stockholder of a client company seeks accounting information from the CPA after management declined to disclose the requested information

Description : The confidential relationship will be violated if, without client's permission, the CPA provides working papers about client to a. A court of law which subpoenas them. b. Another CPA firm as part ... . d. An investigative or disciplinary body which is conducting a review of the CPA's practice.

Last Answer : Another CPA firm which has just purchased the CPA's entire practice.

Description : The confidential relationship applies to a. All services provided by CPAs. b. Only audit and attestation services. c. Audit and tax services, but no MAS services. d. Audit and MAS services, but not tax services

Last Answer : All services provided by CPAs

Description : A CPA in public practice shall not disclose any confidential client information without the specific consent of the client. The confidentiality rule is violated if CPA disclosed information without client' ... s largest stockholder. d. Complaint filed with the trial board of the Board of Accountancy

Last Answer : Request by client's largest stockholder.

Description : Which of the following best describes the passing of confidential information from a client to its auditor? The information: a. Should in no circumstances be conveyed to third parties. b. Is not ... d. Should be conveyed to the public if it affects the "correctness" of the financial statements

Last Answer : Is not legally protected and can be subpoenaed by a competent court.

Description : A professional accountant has a professional duty or right to disclose confidential information in each of the following, except: a. To comply with technical standards and ethics requirements. b. To disclose ... body d. To respond to an inquiry or investigation by a member body or regulatory body

Last Answer : To disclose to BIR fraudulent scheme committed by the client on payment of income tax.

Description : When providing consulting services, the CPA acts primarily as a(n): a. Independent practitioner. b. Expert on compliance with industry standards. c. Objective advisor on the use of information. d. Confidential reviewer

Last Answer : Objective advisor on the use of information

Description : Without the consent of the client, a CPA should not disclose confidential information contained in working papers to a: a. Voluntary quality control review board. b. CPA firm that has purchased the ... . c. National court that has issued a valid subpoena. d. Disciplinary body created under statute.

Last Answer : CPA firm that has purchased the CPA’s accounting practice.

Description : The confidential relationship applies to a. All services provided by CPAs. b. Only audit and attestation services. c. Audit and tax services, but no MAS services. d. Audit and MAS services, but not tax services

Last Answer : All services provided by CPAs.

Description : Which of the following statements concerning a CPA's disclosure of confidential client information is ordinarily correct? a. Disclosure should not be made even if such disclosure will protect the CPA's ... consent of the client. d. Disclosure may be made to any government agency without subpoena.

Last Answer : Disclosure may be made to any party on consent of the client.

Description : Information hiding is to hide from user, details ? that are relevant to him that are not relevant to him that may be maliciously handled by him that are confidential

Last Answer : that may be maliciously handled by him

Description : “““.are 'attempts by individuals toobtain confidential information from you by falsifying their identity. (A) Phishing (B) Computer viruses (C) Spyware scams (D) Viruses (E) None of the above

Last Answer : Phishing

Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails

Last Answer : A. application layer, e-mails

Description : _____are attempt by individuals to obtain confidential information from you by falsifying their identity: a) Phishing Trips b) Computer Viruses c) Spyware Scams d) Viruses e) Phishing Scams

Last Answer : a) Phishing Trips

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1) Phishing trips 2) Computer viruses 3) Spyware scams 4) Phishing Scams

Last Answer : 4) Phishing Scams

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1 Phishing trips 2 Computer viruses 3 Spyware scams 4 Phishing Scams

Last Answer : 4 Phishing Scams