This commit is contained in:
Hubot 2021-02-18 15:57:26 -08:00
Родитель c81bef408e
Коммит 0c19b55d5e
1 изменённых файлов: 122 добавлений и 0 удалений

122
2021/02/2021-02-17-suez.md Normal file
Просмотреть файл

@ -0,0 +1,122 @@
Dear GitHub:
In response to the DMCA takedown notice procedure as provided on the online guide,
SUEZ North America, Inc. (“SUEZ”) states the following:
I, [private], on behalf of SUEZ, have read and understand GitHubs guide to filing
a DMCA Notice.
I have a good faith belief that use of the copyrighted materials described [below]
on the infringing web pages is not authorized by the copyright owner, or its agent,
or the law. I have taken fair use into consideration.
I swear, under penalty of perjury, that the information in this notification is accurate
and that I am the copyright owner, or am authorized to act on behalf of the owner,
of an exclusive right that is allegedly infringed.
Below is our statement of the copyrighted work that has been infringed by the alleged perpetrator
along with the list of material we identified as infringed information.
A brief history about us and how the information posted on Github.com is related
to us. SUEZ North America was originally founded as the Hackensack Water
Company in 1896 and later named United Water, with a headquarters in Paramus,
N.J. In 2000, United Water became a subsidiary of SUEZ Environment, a French
Utility Company. United Water, in 2015, rebranded its name under the parent
company, SUEZ, and is now operating in North America under its DBA as SUEZ
North America.
Now, the information posted on the github respository has a list information that is
owned and managed by SUEZ North America (under our United Water Brand). This
includes code, Scripts, Active Directory information, internal computer directories,
list of computer names, domains, device types, operating systems, and other
pertinent information that we are requiring for github to remove from your site.
There are over 50 PowerShell scripts that SUEZ North America created, manages,
and maintains, which searches and retrieves confidential information within our
infrastructure to test the validity of our security and privacy related audits in
compliance with regulatory entities. The code used is to scan our network and
infrastructure, pulls computer names, usernames, and other information related to
our United Water domain and extracts it for auditing purpose. For example, SUEZ
[private].
Now, these scripts were mostly created by SUEZ and were built to not be shared
with the public. We maintain the integrity of our proprietary information and due to
the actions by [private], we are seeking every legal avenue to remove the pertinent
information that we own and manage. As mentioned in previous requests, we have
tried to contact [private] directly and we have not received any response.
Accordingly, we are now contacting your division to remove the pertinent
information from the public's view. We are seeking to have this information
removed within 30 days of the initial receipt of the request and in accordance with
SUEZ's Privacy Rights.
I have read and understand GitHub's Guide to Filing a DMCA Counter Notice.
I have identified the URLs that we are requesting you to remove - see previous
emails and the URLs listed below (Scripts and codes in the URL Links below)
My contact information:
o Name: [private]
o Title: [private]
o Email: [private]
o General: [private]
461 FROM ROAD, SUITE 400
Paramus, NJ 07652
In addition to the information related to our Subsidiary, United Water, we have conducted
a risk impact analysis and have listed each of the URLS that we are requesting your
organization to respectfully remove:
https://github.com/TrunksLegendary/DEV-PowerShell
Active Directory and hardware info:
https://github.com/TrunksLegendary/DEV-PowerShell/blob/master/Computers_In_AD_with_FQDN/User_Computers_Info.txt
Clientele links:
https://github.com/TrunksLegendary/DEV-PowerShell/blob/master/SupportFiles/AdClients90.csv
Hardware information:
https://github.com/TrunksLegendary/DEV-PowerShell/blob/master/CheckDriveSpace/computers.txt
In active SCCM clients:
https://github.com/TrunksLegendary/DEV-PowerShell/blob/master/SupportFiles/SCCM_Inactive.csv
Automated SCCM Client Repair:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/Automated%20SCCM%20client%20Repair
CheckDriveSpace:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/CheckDriveSpace
Comodo/Temp:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/Comodo/Temp
Computers_In_AD_with_FQDN:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/Computers_In_AD_with_FQDN
Example:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/Example
Form_SCCM_TRiggerActions/:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/Form_SCCM_TRiggerActions
LogActivity:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/LogActivity
Modules:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/Modules
PasswordGenerator:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/PasswordGenerator
SCCM2012_Management_Scrupts:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/SCCM2012_Management_Scripts
Security Tools:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/Security_Tools
SupportFiles:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/SupportFiles
WIP:
https://github.com/TrunksLegendary/DEV-PowerShell/tree/master/WIP
Sincerely,
[private]