A former Twitter employee, Gary Rooney, won about $600,000 for unfair dismissal after Twitter assumed he resigned by not responding to Elon Musk’s “hardcore” work email.

The case highlighted the importance of clear communication between employers and employees, especially regarding significant changes in employment terms.

Rooney’s private Slack messages, where he discussed leaving, were used as evidence by Twitter, underscoring that internal communication on platforms like Slack is not always private and can be used in legal disputes.

  • sylver_dragon@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    When I worked as a US FedGov contractor, I was greeted with a long warning banner every time I logged into my computer. The tl;dr version of it is “fuck your privacy”. Being that I was part of cybersecurity for the site I was working at, I was one of the people doing the fucking. While we didn’t read everything from everyone all the time, we were logging it and could pull it up, if we were performing an investigation. We also had some automated stuff scanning for patterns and keywords on a regular basis, which could trigger an investigation.

    While I’m no longer in the FedGov space (thank the gods), I still assume that everything I do on my work system or with work accounts is being logged. Also, I’m still working in cybersecurity and am often still the one doing the privacy fucking. Yes, everything is being logged. We may not look at it today, we may not look at it tomorrow. But, when HR and Legal ask us about a user’s activity, we can usually be pretty detailed. Act accordingly.

    • CosmicTurtle0@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      My company is better than most I’ve worked for. They tell you, upfront, anything on their equipment can be monitored for any reason with no warning.

      But then, as part of the HR and acceptable use policy, no one will monitor your activities without just cause and investigation. Meaning in practice, “We’re not going to look over your shoulder while you watch YouTube videos but if we notice you’re watching a lot of or you start visiting porn sites, we’re going to start monitoring you.”

      Now all that said, I still assume that my company knows every key I type on their laptop.

      • sylver_dragon@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 months ago

        I would assume they have some basic stuff running 24x7. I can’t imagine a network which doesn’t have Endpoint Detection and Response (EDR) running 24x7 these days. There’s also things like firewall logs, which are almost certainly being captured (or at least netflow). Stuff like screen recording and mouse monitoring is probably saved for extreme cases. That said, my own experience has been pretty close to:

        We’re not going to look over your shoulder while you watch YouTube videos but if we notice you’re watching a lot of or you start visiting porn sites, we’re going to start monitoring you.

        Quite frankly, no one’s got time for that shit. I work at an organization with a bit north of 25,000 employees, and we have less than a dozen security analysts. While I could run a search against our firewall logs and see evidence of folks dicking around. I have much better things to do, like running down abnormal processes and writing up reports on users who got their systems infected while dicking around. And that’s really the way it comes to our attention, most of the time. Someone is out trying to download movies or software on their work laptop (you’d think people would know better…) and they pickup malware. We get an alert and start investigating. While trying to determine the source, we pull browser history and see the user out on “SketchyMovieSite[.]xyz”. And then their dicking around becomes our problem, mostly because the site had a malicious redirect, which is where the infection came from.

        So ya, they may not be looking, but I’d always bet they are recording. Logging isn’t useful if it isn’t recording at the time of the compromise.

      • lightnsfw@reddthat.com
        link
        fedilink
        arrow-up
        0
        ·
        3 months ago

        Mines the same way. It’s actually kind of difficult to get approval to monitor someone. Has to be approved by two VPs.

      • linearchaos@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 months ago

        It’s not OP, but when I left it was because the money and resources were better.

        Federal purchasing is fairly rigged you don’t end up with decent hardware to do anything. Projects are constantly as complicated and strenuously pushed as possible. Everything has an angle there are too many people with essentially tenure. Don’t get me wrong, I liked a lot of the people that I worked with and around, but leaving Federal work for Enterprise was really refreshing.

      • sylver_dragon@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 months ago

        Remote work and pay. I was already interested in getting a remote gig when COVID hit. We went to a hybrid schedule and I realized that I really liked working from home. Also that my job was pretty much built for it. While many of the folks I used to work with are still hybrid, fully remote was never an option. I worked with Classified systems and I could never convince them to put a SIPR drop in my home. I guess you need to get elected President for that.

        As the world was opening back up, many companies saw remote work as a carrot to offer cybersecurity folks and I started to see a lot more job postings with it as an option. So, I put my LinkedIn profile to “looking for work” and started getting recruiters messaging me on a regular basis. One hit me up with “REMOTE WORK OPPORTUNITY” (yes, all in caps) as the lead for an offer. What followed that sounded interesting and I started talking with him. A few week later, I put in my notice and started working in the private sector. Got a pay bump in the move as well.

        My time in the FedGov space was overall a positive thing. I learned a lot and got to see systems locked down in a way that actually mattered (I never thought I would miss STIGs). At the same time, I don’t see myself ever going back. The bureaucratic nature of everything is soul crushing. And sitting in an OSS all day long sucks. It especially sucks when you’re the only one in the container and need to go out and take a piss. Clear the room, arm the alarm, spin the lock, sign the sheet, go piss. Open the lock, sign the sheet, disarm the alarm, get back to wishing for the sweet, sweet embrace of death.

        • femtech@midwest.social
          link
          fedilink
          arrow-up
          0
          ·
          3 months ago

          OMG the OSS at my first job was like that, but they wouldn’t give contractors the lock code. So after I was waiting 30 min to go pee I spun the lock, went pee, came back and waited an hour outside the door. We both got a talking to, him by his command and me by my company. I snapped back and pay, hours, and lack of trust and that if they tried to gig me for this I was walking out and not coming back. That was back in 2012 and I have changed jobs multiple times. I like the team and what I do, openshift and kuberneties is awesome to get teams to update their code. But as you said,no remote, except for development.