Disciplinary action warrented?

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • Electrode
    Full Member

    • Dec 2015
    • 91

    #16
    Originally posted by adrianh
    I don't think that this will fly in 99.99% of companies.People carry cellphones, tablets and some have smart-watches. Be that all that it may, cameras can be brought in in pens and all sorts of other objects.

    It seems to me that the only thing to do is to give people access to the absolute minimum information, of course that leads to all sorts of problems.
    Upon reading your reply, I concluded that your problems are more security related. Yes devices of various sizes can be smuggled in, and your information can be exploited to their benefit. We do have access control and heavy security. Perhaps this can be adopted to your work place. Having a camera monitoring the computer and keeping it under lock and key can be part of a working strategy.

    A confidentiality agreement between you and your employees can act as a legal deterrent. The promise of strict legal action may discourage the employee from copying your data. Limiting physical access to your data would be the best course of action.
    DISCLAIMER - The above does not constitute to legal advice or formal advice in any manner or form

    Comment

    • Brett Nortje
      Bronze Member
      • Jan 2015
      • 132

      #17
      Originally posted by renate109
      Any disciplinary action which is approbriate. I am just wondering if I can still have a hearing/enquiry even though it was done the last time in 2008, but he has had still this files stored on the company laptop he is using.
      Actually, you can take apart the computer to have the electronics assessed as to what came though the mother board and stuff. then, there is cell calls - they will show up as to who he was phoning or smsing and for how long.
      !! Going to my destruction !!

      Comment

      • adrianh
        Diamond Member

        • Mar 2010
        • 6328

        #18
        #weirdscience

        Comment

        • IanF
          Moderator

          • Dec 2007
          • 2680

          #19
          Originally posted by Brett Nortje
          Actually, you can take apart the computer to have the electronics assessed as to what came though the mother board and stuff. then, there is cell calls - they will show up as to who he was phoning or smsing and for how long.
          Does a computer have logging software? I can't see how this is stored on the motherboard? For the cell the top forensic guys couldn't see what was on Oscar's cell as it was encrypted so this is a lot harder than it sounds?
          Only stress when you can change the outcome!

          Comment

          • Brett Nortje
            Bronze Member
            • Jan 2015
            • 132

            #20
            Originally posted by IanF
            Does a computer have logging software? I can't see how this is stored on the motherboard? For the cell the top forensic guys couldn't see what was on Oscar's cell as it was encrypted so this is a lot harder than it sounds?
            Well, every key stroke is stored somewhere, i remember hearing.

            With calls logged to these other 'business people' you cuold ask why he was phoning them? sounds like a suspicious thing, yes?
            !! Going to my destruction !!

            Comment

            • IanF
              Moderator

              • Dec 2007
              • 2680

              #21
              Originally posted by Brett Nortje
              Well, every key stroke is stored somewhere, i remember hearing.

              With calls logged to these other 'business people' you cuold ask why he was phoning them? sounds like a suspicious thing, yes?
              OK an assumption based on a rumour. I hoped to learn something new. Do you have a credible source this?
              Only stress when you can change the outcome!

              Comment

              • adrianh
                Diamond Member

                • Mar 2010
                • 6328

                #22
                ....eish....

                Comment

                • Justloadit
                  Diamond Member

                  • Nov 2010
                  • 3518

                  #23
                  The recording of keystrokes is done by virus software, which then sends the file to some clandestine server.
                  There may be a copy of the file on the hard drive somewhere, which may have some obscure name, so not on the mother board as such, but on the hard drive itself. If the virus is of a high caliber, then the files would be deleted and the area in which they resided in would then be rewritten so that any kind of spyware would not be able to read the sectors.

                  Effectively when one deletes a file of a hard drive, the file is not deleted, the data remains on the hard drive. What happens is that a flag is set in the FAT file stating that the area is now open for use. It may or may not be overwritten in the future by a new file.

                  See this article for a more in depth information
                  Victor - Knowledge is a blessing or a curse, your current circumstances make you decide!
                  Solar pumping, Solar Geyser & Solar Security lighting solutions - www.microsolve.co.za

                  Comment

                  • sterne.law@gmail.com
                    Platinum Member

                    • Oct 2009
                    • 1332

                    #24
                    You can still hold the hearing for the offence of 2008, IF it only came to your attention now.
                    the test is how long, once knowing of a possible offence, until action was taken.
                    Too long is considered a waiver of the right to discipline.
                    Anthony Sterne

                    www.acumenholdings.co.za
                    DISCLAIMER The above is merely a comment in discussion form and an open public arena. It does not constitute a legal opinion or professional advice in any manner or form.

                    Comment

                    Working...