First Reference company logo

First Reference Talks

News and Discussions on Payroll, HR & Employment Law

decorative image

IT employee

Slaw: Disgruntled former worker who hijacked network must pay city $1,485,791

In a recent survey of 500 information technology and data security workers, 40 percent said they could easily use their knowledge of encryption keys, shared passwords, weak controls and loopholes in data security programs to make off with information, or hold their organization’s data hostage. And 31 percent said that, even if they no longer worked for the company, with their knowledge of the systems they could access encryption keys and authorization codes and hack in remotely to snoop, secretly alter files or shut down the data system.

 

, , , , , , , , , , , , , , ,

Termination for cause upheld for breach of computer information access policy

Ontario’s Labour Arbitration Board recently held that an employer did not overreact when it terminated an IT employee for cause after he used an employer computer to download, store and share thousands of copyrighted works including movies, TV shows, music tracks, games and pornographic material, totalling over half a terabyte of data. The board found that the employee violated the employer’s trust in him and acted in flagrant disregard for the employer’s computer information access policy over many years.

 

, , , , , , , , , , , , , , , ,