Fired, accused of conducting web searches I didn't do. [on hold]












6














I had searches I didn't do show up on work devices, and ended up losing my job over this, for a first infraction. I know 100% I didn't search those things. I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission.
I never even knew I was required to have screen locks, not did I care if people used my devices. I never let anyone use my work devices. They said illicit or inappropriate use.



But I know 100% I didn't do it. How can I prove if it synced vs actually searched from that device? There has to be a way. Is there anythign I can do?



I know I signed into google maps with my personal gmail, but I can't remember if ever signed into Google or Chrome on them. But I know I was logged into other work devices too. I cannot remember. I'm Google dumb. About all the settings. Have anxiety and never read the pop ups. Just clicked ok. Assume something synced from another device.










share|improve this question









New contributor




Confused so bad is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











put on hold as off-topic by yochannah, Dukeling, The Wandering Dev Manager, nvoigt, scaaahu 57 mins ago


This question appears to be off-topic. The users who voted to close gave this specific reason:


  • "Questions seeking advice on company-specific regulations, agreements, or policies should be directed to your manager or HR department. Questions that address only a specific company or position are of limited use to future visitors. Questions seeking legal advice should be directed to legal professionals. For more information, click here." – Dukeling, nvoigt, scaaahu

If this question can be reworded to fit the rules in the help center, please edit the question.









  • 5




    Possible duplicate of Company policy violation due to browser history syncing
    – yochannah
    18 hours ago






  • 3




    Did you not do them (at all) or did you do them on other devices and they may have synced?
    – bruglesco
    18 hours ago






  • 3




    I'm pretty sure signing into Maps logs you in to your Google account.
    – bruglesco
    16 hours ago






  • 1




    Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
    – Tony Dallimore
    10 hours ago






  • 4




    Have anxiety and never read the pop ups. Sorry, but that just makes me upset...
    – Michael
    9 hours ago


















6














I had searches I didn't do show up on work devices, and ended up losing my job over this, for a first infraction. I know 100% I didn't search those things. I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission.
I never even knew I was required to have screen locks, not did I care if people used my devices. I never let anyone use my work devices. They said illicit or inappropriate use.



But I know 100% I didn't do it. How can I prove if it synced vs actually searched from that device? There has to be a way. Is there anythign I can do?



I know I signed into google maps with my personal gmail, but I can't remember if ever signed into Google or Chrome on them. But I know I was logged into other work devices too. I cannot remember. I'm Google dumb. About all the settings. Have anxiety and never read the pop ups. Just clicked ok. Assume something synced from another device.










share|improve this question









New contributor




Confused so bad is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











put on hold as off-topic by yochannah, Dukeling, The Wandering Dev Manager, nvoigt, scaaahu 57 mins ago


This question appears to be off-topic. The users who voted to close gave this specific reason:


  • "Questions seeking advice on company-specific regulations, agreements, or policies should be directed to your manager or HR department. Questions that address only a specific company or position are of limited use to future visitors. Questions seeking legal advice should be directed to legal professionals. For more information, click here." – Dukeling, nvoigt, scaaahu

If this question can be reworded to fit the rules in the help center, please edit the question.









  • 5




    Possible duplicate of Company policy violation due to browser history syncing
    – yochannah
    18 hours ago






  • 3




    Did you not do them (at all) or did you do them on other devices and they may have synced?
    – bruglesco
    18 hours ago






  • 3




    I'm pretty sure signing into Maps logs you in to your Google account.
    – bruglesco
    16 hours ago






  • 1




    Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
    – Tony Dallimore
    10 hours ago






  • 4




    Have anxiety and never read the pop ups. Sorry, but that just makes me upset...
    – Michael
    9 hours ago
















6












6








6


1





I had searches I didn't do show up on work devices, and ended up losing my job over this, for a first infraction. I know 100% I didn't search those things. I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission.
I never even knew I was required to have screen locks, not did I care if people used my devices. I never let anyone use my work devices. They said illicit or inappropriate use.



But I know 100% I didn't do it. How can I prove if it synced vs actually searched from that device? There has to be a way. Is there anythign I can do?



I know I signed into google maps with my personal gmail, but I can't remember if ever signed into Google or Chrome on them. But I know I was logged into other work devices too. I cannot remember. I'm Google dumb. About all the settings. Have anxiety and never read the pop ups. Just clicked ok. Assume something synced from another device.










share|improve this question









New contributor




Confused so bad is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











I had searches I didn't do show up on work devices, and ended up losing my job over this, for a first infraction. I know 100% I didn't search those things. I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission.
I never even knew I was required to have screen locks, not did I care if people used my devices. I never let anyone use my work devices. They said illicit or inappropriate use.



But I know 100% I didn't do it. How can I prove if it synced vs actually searched from that device? There has to be a way. Is there anythign I can do?



I know I signed into google maps with my personal gmail, but I can't remember if ever signed into Google or Chrome on them. But I know I was logged into other work devices too. I cannot remember. I'm Google dumb. About all the settings. Have anxiety and never read the pop ups. Just clicked ok. Assume something synced from another device.







ethics






share|improve this question









New contributor




Confused so bad is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











share|improve this question









New contributor




Confused so bad is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this question




share|improve this question








edited 18 hours ago









yochannah

4,74373050




4,74373050






New contributor




Confused so bad is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked 18 hours ago









Confused so bad

422




422




New contributor




Confused so bad is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





Confused so bad is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






Confused so bad is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.




put on hold as off-topic by yochannah, Dukeling, The Wandering Dev Manager, nvoigt, scaaahu 57 mins ago


This question appears to be off-topic. The users who voted to close gave this specific reason:


  • "Questions seeking advice on company-specific regulations, agreements, or policies should be directed to your manager or HR department. Questions that address only a specific company or position are of limited use to future visitors. Questions seeking legal advice should be directed to legal professionals. For more information, click here." – Dukeling, nvoigt, scaaahu

If this question can be reworded to fit the rules in the help center, please edit the question.




put on hold as off-topic by yochannah, Dukeling, The Wandering Dev Manager, nvoigt, scaaahu 57 mins ago


This question appears to be off-topic. The users who voted to close gave this specific reason:


  • "Questions seeking advice on company-specific regulations, agreements, or policies should be directed to your manager or HR department. Questions that address only a specific company or position are of limited use to future visitors. Questions seeking legal advice should be directed to legal professionals. For more information, click here." – Dukeling, nvoigt, scaaahu

If this question can be reworded to fit the rules in the help center, please edit the question.








  • 5




    Possible duplicate of Company policy violation due to browser history syncing
    – yochannah
    18 hours ago






  • 3




    Did you not do them (at all) or did you do them on other devices and they may have synced?
    – bruglesco
    18 hours ago






  • 3




    I'm pretty sure signing into Maps logs you in to your Google account.
    – bruglesco
    16 hours ago






  • 1




    Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
    – Tony Dallimore
    10 hours ago






  • 4




    Have anxiety and never read the pop ups. Sorry, but that just makes me upset...
    – Michael
    9 hours ago
















  • 5




    Possible duplicate of Company policy violation due to browser history syncing
    – yochannah
    18 hours ago






  • 3




    Did you not do them (at all) or did you do them on other devices and they may have synced?
    – bruglesco
    18 hours ago






  • 3




    I'm pretty sure signing into Maps logs you in to your Google account.
    – bruglesco
    16 hours ago






  • 1




    Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
    – Tony Dallimore
    10 hours ago






  • 4




    Have anxiety and never read the pop ups. Sorry, but that just makes me upset...
    – Michael
    9 hours ago










5




5




Possible duplicate of Company policy violation due to browser history syncing
– yochannah
18 hours ago




Possible duplicate of Company policy violation due to browser history syncing
– yochannah
18 hours ago




3




3




Did you not do them (at all) or did you do them on other devices and they may have synced?
– bruglesco
18 hours ago




Did you not do them (at all) or did you do them on other devices and they may have synced?
– bruglesco
18 hours ago




3




3




I'm pretty sure signing into Maps logs you in to your Google account.
– bruglesco
16 hours ago




I'm pretty sure signing into Maps logs you in to your Google account.
– bruglesco
16 hours ago




1




1




Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
– Tony Dallimore
10 hours ago




Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
– Tony Dallimore
10 hours ago




4




4




Have anxiety and never read the pop ups. Sorry, but that just makes me upset...
– Michael
9 hours ago






Have anxiety and never read the pop ups. Sorry, but that just makes me upset...
– Michael
9 hours ago












3 Answers
3






active

oldest

votes


















27














The only real advice anyone can give you is to contact a lawyer and see what they say.



You do have a basic responsibility to keep work devices and data secure, so not password protecting them is fairly irresponsible of you.



In future, keep your work and home devices separate. Don't sign into your personal stuff on work devices and vice versa. Always lock your devices when you step away from them to prevent others from using them without your permission. And don't ever search for porn, drugs or anything else which could be possibly frowned upon on a work device or on the work network.






share|improve this answer

















  • 9




    This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
    – Criggie
    13 hours ago






  • 4




    In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
    – Gabe Sechan
    8 hours ago






  • 2




    @GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
    – Lightness Races in Orbit
    8 hours ago






  • 4




    @LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
    – Gabe Sechan
    7 hours ago






  • 1




    @GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
    – Lightness Races in Orbit
    7 hours ago





















11














Someone else was probably on your machine



In a lot of employment contracts, you are considered to be responsible for anything done under your corporate account/devices even if you yourself weren't at the keyboard.



It is unlikely that this was caused by syncing your Google Account with Chrome. Chrome has a tendency to identify what devices conducted what action. Plus the ability to synchronise histories would prove that the History data can be altered, and thus would typically not be trusted for the firing of an employee. Regardless, this was still a bad move.



What probably happened is that actual attempts to conduct those searches by your account and/or devices was picked up by network security devices as it was being performed. You'll notice I said 'by your account and/or devices' and not 'by you'.



In a lot of places, you'll see a culture for pranking people who leave devices unlocked. Most of the time, this is just a harmless 'beers are on me email' but more juvenile/malicious people may do things that stir up a bit more trouble, unaware (or possibly fully aware) of what their actions might bring.




I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission. I never even knew I was required to have screen locks, not did I care if people used my devices.




Locking your devices and accounts should not be something that needs to be spelt out. It should be, and needs to be from this point on, common sense. Your devices likely hold a lot of company-sensitive information. What if someone got onto your machine and accessed something they shouldn't have access to? What if someone trespassed into the building and got access to your computer? You could have been potentially looking at a lot worse than just getting fired for inappropriate searches.






share|improve this answer



















  • 1




    This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
    – bruglesco
    16 hours ago










  • @bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
    – 520
    16 hours ago








  • 1




    wait are you implying that someone can't be fired for a misunderstanding on the companies part?
    – bruglesco
    15 hours ago






  • 1




    @bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
    – 520
    15 hours ago





















0














Note: this answer is written in less than optimal circumstances (31 December...) so I will be back with edits when time permits. Do not hesitate to suggest changes or edit them yourselves.



From the perspective of someone working in information security, your situation is not uncommon.



First - anything mentioned in the answers (mine included) must be put in context of the country you are in. You may be in a place where anything you do is company property and you have zero expectations of privacy - up to places where your private activities on a company device are protected.



This also covers the case of your responsibility when using your device (except for gross misconduct): from places where you are responsible for protecting your devices yourself and take responsibility for that - to places where your liability is limited and the burden of the protection relies on the company.



You need to understand this context of yours first.





In the text below "we" refers to "the company" and "they", to the employees. It is centered around the case where they claim they "did not do it" but we believe they "did".



We have systems which record activity of employees (please keep the legal context in mind - in some places this is fine, in other not, in yet others nobody cares whether this is legal or not, and in yet another nobody cares to record).



We would present the employee evidence of their activity (with the "go" from legal/HR) in the course of the interaction with them. This evidence would show that user ABC did XYZ at time TTT.



Please note that we just know that the user ABC, as registered in our systems, did something. This does not mean that the actual human who is normally associated with the account ABC did it.



There are many cases where ABC does not match the human:




  • we were hacked and someone used account ABC for that

  • an administrator acted as ABC

  • someone used ABC account when the human was not at the keyboard

  • someone saw the human typing their password and later that someone connected to ABC account

  • ... and plenty of other cases


These are all reasonable claims which can be done - not to counter the evidence, but to challenge the link. (the evidence can certainly be tempered with in some cases, and this is also something which can be investigated)



It can be that we/the authorities prove that the human was the one using account ABC. Case closed.



It can be that we see that the human was not using the account ABC. In that case we need to determine whether




  • it is their fault (did not lock the device while explicitly asked to - for instance)

  • or not (the company was hacked, they were tricked into an action they could realistically fall for ( we are all humans), ...)


As you see such cases are not obvious and, sure, there are the easy cases (which end with eyes rolling or jail) but a lot are not that obvious. They often land in the gray zone, especially in places which are either not clean-cut in terms of company vs. user responsibility, or extremely specific and then the employee and the company have a ping-pong game of "it is your responsibility", "no, it is yours".



To be honest, I have a hard time understanding your question which jumps from "I have no password on my device", to "I let everyone use them", and to some kind of sync between searches. If I may recommend to clean that up (and stick to facts - and their consequences), I would be glad to comment further




Have anxiety and never read the pop ups




Please do, this makes everyone's life easier and more secure.






share|improve this answer




























    3 Answers
    3






    active

    oldest

    votes








    3 Answers
    3






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    27














    The only real advice anyone can give you is to contact a lawyer and see what they say.



    You do have a basic responsibility to keep work devices and data secure, so not password protecting them is fairly irresponsible of you.



    In future, keep your work and home devices separate. Don't sign into your personal stuff on work devices and vice versa. Always lock your devices when you step away from them to prevent others from using them without your permission. And don't ever search for porn, drugs or anything else which could be possibly frowned upon on a work device or on the work network.






    share|improve this answer

















    • 9




      This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
      – Criggie
      13 hours ago






    • 4




      In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
      – Gabe Sechan
      8 hours ago






    • 2




      @GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
      – Lightness Races in Orbit
      8 hours ago






    • 4




      @LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
      – Gabe Sechan
      7 hours ago






    • 1




      @GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
      – Lightness Races in Orbit
      7 hours ago


















    27














    The only real advice anyone can give you is to contact a lawyer and see what they say.



    You do have a basic responsibility to keep work devices and data secure, so not password protecting them is fairly irresponsible of you.



    In future, keep your work and home devices separate. Don't sign into your personal stuff on work devices and vice versa. Always lock your devices when you step away from them to prevent others from using them without your permission. And don't ever search for porn, drugs or anything else which could be possibly frowned upon on a work device or on the work network.






    share|improve this answer

















    • 9




      This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
      – Criggie
      13 hours ago






    • 4




      In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
      – Gabe Sechan
      8 hours ago






    • 2




      @GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
      – Lightness Races in Orbit
      8 hours ago






    • 4




      @LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
      – Gabe Sechan
      7 hours ago






    • 1




      @GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
      – Lightness Races in Orbit
      7 hours ago
















    27












    27








    27






    The only real advice anyone can give you is to contact a lawyer and see what they say.



    You do have a basic responsibility to keep work devices and data secure, so not password protecting them is fairly irresponsible of you.



    In future, keep your work and home devices separate. Don't sign into your personal stuff on work devices and vice versa. Always lock your devices when you step away from them to prevent others from using them without your permission. And don't ever search for porn, drugs or anything else which could be possibly frowned upon on a work device or on the work network.






    share|improve this answer












    The only real advice anyone can give you is to contact a lawyer and see what they say.



    You do have a basic responsibility to keep work devices and data secure, so not password protecting them is fairly irresponsible of you.



    In future, keep your work and home devices separate. Don't sign into your personal stuff on work devices and vice versa. Always lock your devices when you step away from them to prevent others from using them without your permission. And don't ever search for porn, drugs or anything else which could be possibly frowned upon on a work device or on the work network.







    share|improve this answer












    share|improve this answer



    share|improve this answer










    answered 18 hours ago









    user1666620

    10.3k83435




    10.3k83435








    • 9




      This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
      – Criggie
      13 hours ago






    • 4




      In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
      – Gabe Sechan
      8 hours ago






    • 2




      @GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
      – Lightness Races in Orbit
      8 hours ago






    • 4




      @LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
      – Gabe Sechan
      7 hours ago






    • 1




      @GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
      – Lightness Races in Orbit
      7 hours ago
















    • 9




      This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
      – Criggie
      13 hours ago






    • 4




      In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
      – Gabe Sechan
      8 hours ago






    • 2




      @GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
      – Lightness Races in Orbit
      8 hours ago






    • 4




      @LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
      – Gabe Sechan
      7 hours ago






    • 1




      @GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
      – Lightness Races in Orbit
      7 hours ago










    9




    9




    This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
    – Criggie
    13 hours ago




    This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
    – Criggie
    13 hours ago




    4




    4




    In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
    – Gabe Sechan
    8 hours ago




    In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
    – Gabe Sechan
    8 hours ago




    2




    2




    @GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
    – Lightness Races in Orbit
    8 hours ago




    @GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
    – Lightness Races in Orbit
    8 hours ago




    4




    4




    @LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
    – Gabe Sechan
    7 hours ago




    @LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
    – Gabe Sechan
    7 hours ago




    1




    1




    @GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
    – Lightness Races in Orbit
    7 hours ago






    @GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
    – Lightness Races in Orbit
    7 hours ago















    11














    Someone else was probably on your machine



    In a lot of employment contracts, you are considered to be responsible for anything done under your corporate account/devices even if you yourself weren't at the keyboard.



    It is unlikely that this was caused by syncing your Google Account with Chrome. Chrome has a tendency to identify what devices conducted what action. Plus the ability to synchronise histories would prove that the History data can be altered, and thus would typically not be trusted for the firing of an employee. Regardless, this was still a bad move.



    What probably happened is that actual attempts to conduct those searches by your account and/or devices was picked up by network security devices as it was being performed. You'll notice I said 'by your account and/or devices' and not 'by you'.



    In a lot of places, you'll see a culture for pranking people who leave devices unlocked. Most of the time, this is just a harmless 'beers are on me email' but more juvenile/malicious people may do things that stir up a bit more trouble, unaware (or possibly fully aware) of what their actions might bring.




    I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission. I never even knew I was required to have screen locks, not did I care if people used my devices.




    Locking your devices and accounts should not be something that needs to be spelt out. It should be, and needs to be from this point on, common sense. Your devices likely hold a lot of company-sensitive information. What if someone got onto your machine and accessed something they shouldn't have access to? What if someone trespassed into the building and got access to your computer? You could have been potentially looking at a lot worse than just getting fired for inappropriate searches.






    share|improve this answer



















    • 1




      This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
      – bruglesco
      16 hours ago










    • @bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
      – 520
      16 hours ago








    • 1




      wait are you implying that someone can't be fired for a misunderstanding on the companies part?
      – bruglesco
      15 hours ago






    • 1




      @bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
      – 520
      15 hours ago


















    11














    Someone else was probably on your machine



    In a lot of employment contracts, you are considered to be responsible for anything done under your corporate account/devices even if you yourself weren't at the keyboard.



    It is unlikely that this was caused by syncing your Google Account with Chrome. Chrome has a tendency to identify what devices conducted what action. Plus the ability to synchronise histories would prove that the History data can be altered, and thus would typically not be trusted for the firing of an employee. Regardless, this was still a bad move.



    What probably happened is that actual attempts to conduct those searches by your account and/or devices was picked up by network security devices as it was being performed. You'll notice I said 'by your account and/or devices' and not 'by you'.



    In a lot of places, you'll see a culture for pranking people who leave devices unlocked. Most of the time, this is just a harmless 'beers are on me email' but more juvenile/malicious people may do things that stir up a bit more trouble, unaware (or possibly fully aware) of what their actions might bring.




    I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission. I never even knew I was required to have screen locks, not did I care if people used my devices.




    Locking your devices and accounts should not be something that needs to be spelt out. It should be, and needs to be from this point on, common sense. Your devices likely hold a lot of company-sensitive information. What if someone got onto your machine and accessed something they shouldn't have access to? What if someone trespassed into the building and got access to your computer? You could have been potentially looking at a lot worse than just getting fired for inappropriate searches.






    share|improve this answer



















    • 1




      This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
      – bruglesco
      16 hours ago










    • @bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
      – 520
      16 hours ago








    • 1




      wait are you implying that someone can't be fired for a misunderstanding on the companies part?
      – bruglesco
      15 hours ago






    • 1




      @bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
      – 520
      15 hours ago
















    11












    11








    11






    Someone else was probably on your machine



    In a lot of employment contracts, you are considered to be responsible for anything done under your corporate account/devices even if you yourself weren't at the keyboard.



    It is unlikely that this was caused by syncing your Google Account with Chrome. Chrome has a tendency to identify what devices conducted what action. Plus the ability to synchronise histories would prove that the History data can be altered, and thus would typically not be trusted for the firing of an employee. Regardless, this was still a bad move.



    What probably happened is that actual attempts to conduct those searches by your account and/or devices was picked up by network security devices as it was being performed. You'll notice I said 'by your account and/or devices' and not 'by you'.



    In a lot of places, you'll see a culture for pranking people who leave devices unlocked. Most of the time, this is just a harmless 'beers are on me email' but more juvenile/malicious people may do things that stir up a bit more trouble, unaware (or possibly fully aware) of what their actions might bring.




    I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission. I never even knew I was required to have screen locks, not did I care if people used my devices.




    Locking your devices and accounts should not be something that needs to be spelt out. It should be, and needs to be from this point on, common sense. Your devices likely hold a lot of company-sensitive information. What if someone got onto your machine and accessed something they shouldn't have access to? What if someone trespassed into the building and got access to your computer? You could have been potentially looking at a lot worse than just getting fired for inappropriate searches.






    share|improve this answer














    Someone else was probably on your machine



    In a lot of employment contracts, you are considered to be responsible for anything done under your corporate account/devices even if you yourself weren't at the keyboard.



    It is unlikely that this was caused by syncing your Google Account with Chrome. Chrome has a tendency to identify what devices conducted what action. Plus the ability to synchronise histories would prove that the History data can be altered, and thus would typically not be trusted for the firing of an employee. Regardless, this was still a bad move.



    What probably happened is that actual attempts to conduct those searches by your account and/or devices was picked up by network security devices as it was being performed. You'll notice I said 'by your account and/or devices' and not 'by you'.



    In a lot of places, you'll see a culture for pranking people who leave devices unlocked. Most of the time, this is just a harmless 'beers are on me email' but more juvenile/malicious people may do things that stir up a bit more trouble, unaware (or possibly fully aware) of what their actions might bring.




    I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission. I never even knew I was required to have screen locks, not did I care if people used my devices.




    Locking your devices and accounts should not be something that needs to be spelt out. It should be, and needs to be from this point on, common sense. Your devices likely hold a lot of company-sensitive information. What if someone got onto your machine and accessed something they shouldn't have access to? What if someone trespassed into the building and got access to your computer? You could have been potentially looking at a lot worse than just getting fired for inappropriate searches.







    share|improve this answer














    share|improve this answer



    share|improve this answer








    edited 17 hours ago

























    answered 17 hours ago









    520

    1,366213




    1,366213








    • 1




      This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
      – bruglesco
      16 hours ago










    • @bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
      – 520
      16 hours ago








    • 1




      wait are you implying that someone can't be fired for a misunderstanding on the companies part?
      – bruglesco
      15 hours ago






    • 1




      @bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
      – 520
      15 hours ago
















    • 1




      This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
      – bruglesco
      16 hours ago










    • @bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
      – 520
      16 hours ago








    • 1




      wait are you implying that someone can't be fired for a misunderstanding on the companies part?
      – bruglesco
      15 hours ago






    • 1




      @bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
      – 520
      15 hours ago










    1




    1




    This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
    – bruglesco
    16 hours ago




    This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
    – bruglesco
    16 hours ago












    @bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
    – 520
    16 hours ago






    @bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
    – 520
    16 hours ago






    1




    1




    wait are you implying that someone can't be fired for a misunderstanding on the companies part?
    – bruglesco
    15 hours ago




    wait are you implying that someone can't be fired for a misunderstanding on the companies part?
    – bruglesco
    15 hours ago




    1




    1




    @bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
    – 520
    15 hours ago






    @bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
    – 520
    15 hours ago













    0














    Note: this answer is written in less than optimal circumstances (31 December...) so I will be back with edits when time permits. Do not hesitate to suggest changes or edit them yourselves.



    From the perspective of someone working in information security, your situation is not uncommon.



    First - anything mentioned in the answers (mine included) must be put in context of the country you are in. You may be in a place where anything you do is company property and you have zero expectations of privacy - up to places where your private activities on a company device are protected.



    This also covers the case of your responsibility when using your device (except for gross misconduct): from places where you are responsible for protecting your devices yourself and take responsibility for that - to places where your liability is limited and the burden of the protection relies on the company.



    You need to understand this context of yours first.





    In the text below "we" refers to "the company" and "they", to the employees. It is centered around the case where they claim they "did not do it" but we believe they "did".



    We have systems which record activity of employees (please keep the legal context in mind - in some places this is fine, in other not, in yet others nobody cares whether this is legal or not, and in yet another nobody cares to record).



    We would present the employee evidence of their activity (with the "go" from legal/HR) in the course of the interaction with them. This evidence would show that user ABC did XYZ at time TTT.



    Please note that we just know that the user ABC, as registered in our systems, did something. This does not mean that the actual human who is normally associated with the account ABC did it.



    There are many cases where ABC does not match the human:




    • we were hacked and someone used account ABC for that

    • an administrator acted as ABC

    • someone used ABC account when the human was not at the keyboard

    • someone saw the human typing their password and later that someone connected to ABC account

    • ... and plenty of other cases


    These are all reasonable claims which can be done - not to counter the evidence, but to challenge the link. (the evidence can certainly be tempered with in some cases, and this is also something which can be investigated)



    It can be that we/the authorities prove that the human was the one using account ABC. Case closed.



    It can be that we see that the human was not using the account ABC. In that case we need to determine whether




    • it is their fault (did not lock the device while explicitly asked to - for instance)

    • or not (the company was hacked, they were tricked into an action they could realistically fall for ( we are all humans), ...)


    As you see such cases are not obvious and, sure, there are the easy cases (which end with eyes rolling or jail) but a lot are not that obvious. They often land in the gray zone, especially in places which are either not clean-cut in terms of company vs. user responsibility, or extremely specific and then the employee and the company have a ping-pong game of "it is your responsibility", "no, it is yours".



    To be honest, I have a hard time understanding your question which jumps from "I have no password on my device", to "I let everyone use them", and to some kind of sync between searches. If I may recommend to clean that up (and stick to facts - and their consequences), I would be glad to comment further




    Have anxiety and never read the pop ups




    Please do, this makes everyone's life easier and more secure.






    share|improve this answer


























      0














      Note: this answer is written in less than optimal circumstances (31 December...) so I will be back with edits when time permits. Do not hesitate to suggest changes or edit them yourselves.



      From the perspective of someone working in information security, your situation is not uncommon.



      First - anything mentioned in the answers (mine included) must be put in context of the country you are in. You may be in a place where anything you do is company property and you have zero expectations of privacy - up to places where your private activities on a company device are protected.



      This also covers the case of your responsibility when using your device (except for gross misconduct): from places where you are responsible for protecting your devices yourself and take responsibility for that - to places where your liability is limited and the burden of the protection relies on the company.



      You need to understand this context of yours first.





      In the text below "we" refers to "the company" and "they", to the employees. It is centered around the case where they claim they "did not do it" but we believe they "did".



      We have systems which record activity of employees (please keep the legal context in mind - in some places this is fine, in other not, in yet others nobody cares whether this is legal or not, and in yet another nobody cares to record).



      We would present the employee evidence of their activity (with the "go" from legal/HR) in the course of the interaction with them. This evidence would show that user ABC did XYZ at time TTT.



      Please note that we just know that the user ABC, as registered in our systems, did something. This does not mean that the actual human who is normally associated with the account ABC did it.



      There are many cases where ABC does not match the human:




      • we were hacked and someone used account ABC for that

      • an administrator acted as ABC

      • someone used ABC account when the human was not at the keyboard

      • someone saw the human typing their password and later that someone connected to ABC account

      • ... and plenty of other cases


      These are all reasonable claims which can be done - not to counter the evidence, but to challenge the link. (the evidence can certainly be tempered with in some cases, and this is also something which can be investigated)



      It can be that we/the authorities prove that the human was the one using account ABC. Case closed.



      It can be that we see that the human was not using the account ABC. In that case we need to determine whether




      • it is their fault (did not lock the device while explicitly asked to - for instance)

      • or not (the company was hacked, they were tricked into an action they could realistically fall for ( we are all humans), ...)


      As you see such cases are not obvious and, sure, there are the easy cases (which end with eyes rolling or jail) but a lot are not that obvious. They often land in the gray zone, especially in places which are either not clean-cut in terms of company vs. user responsibility, or extremely specific and then the employee and the company have a ping-pong game of "it is your responsibility", "no, it is yours".



      To be honest, I have a hard time understanding your question which jumps from "I have no password on my device", to "I let everyone use them", and to some kind of sync between searches. If I may recommend to clean that up (and stick to facts - and their consequences), I would be glad to comment further




      Have anxiety and never read the pop ups




      Please do, this makes everyone's life easier and more secure.






      share|improve this answer
























        0












        0








        0






        Note: this answer is written in less than optimal circumstances (31 December...) so I will be back with edits when time permits. Do not hesitate to suggest changes or edit them yourselves.



        From the perspective of someone working in information security, your situation is not uncommon.



        First - anything mentioned in the answers (mine included) must be put in context of the country you are in. You may be in a place where anything you do is company property and you have zero expectations of privacy - up to places where your private activities on a company device are protected.



        This also covers the case of your responsibility when using your device (except for gross misconduct): from places where you are responsible for protecting your devices yourself and take responsibility for that - to places where your liability is limited and the burden of the protection relies on the company.



        You need to understand this context of yours first.





        In the text below "we" refers to "the company" and "they", to the employees. It is centered around the case where they claim they "did not do it" but we believe they "did".



        We have systems which record activity of employees (please keep the legal context in mind - in some places this is fine, in other not, in yet others nobody cares whether this is legal or not, and in yet another nobody cares to record).



        We would present the employee evidence of their activity (with the "go" from legal/HR) in the course of the interaction with them. This evidence would show that user ABC did XYZ at time TTT.



        Please note that we just know that the user ABC, as registered in our systems, did something. This does not mean that the actual human who is normally associated with the account ABC did it.



        There are many cases where ABC does not match the human:




        • we were hacked and someone used account ABC for that

        • an administrator acted as ABC

        • someone used ABC account when the human was not at the keyboard

        • someone saw the human typing their password and later that someone connected to ABC account

        • ... and plenty of other cases


        These are all reasonable claims which can be done - not to counter the evidence, but to challenge the link. (the evidence can certainly be tempered with in some cases, and this is also something which can be investigated)



        It can be that we/the authorities prove that the human was the one using account ABC. Case closed.



        It can be that we see that the human was not using the account ABC. In that case we need to determine whether




        • it is their fault (did not lock the device while explicitly asked to - for instance)

        • or not (the company was hacked, they were tricked into an action they could realistically fall for ( we are all humans), ...)


        As you see such cases are not obvious and, sure, there are the easy cases (which end with eyes rolling or jail) but a lot are not that obvious. They often land in the gray zone, especially in places which are either not clean-cut in terms of company vs. user responsibility, or extremely specific and then the employee and the company have a ping-pong game of "it is your responsibility", "no, it is yours".



        To be honest, I have a hard time understanding your question which jumps from "I have no password on my device", to "I let everyone use them", and to some kind of sync between searches. If I may recommend to clean that up (and stick to facts - and their consequences), I would be glad to comment further




        Have anxiety and never read the pop ups




        Please do, this makes everyone's life easier and more secure.






        share|improve this answer












        Note: this answer is written in less than optimal circumstances (31 December...) so I will be back with edits when time permits. Do not hesitate to suggest changes or edit them yourselves.



        From the perspective of someone working in information security, your situation is not uncommon.



        First - anything mentioned in the answers (mine included) must be put in context of the country you are in. You may be in a place where anything you do is company property and you have zero expectations of privacy - up to places where your private activities on a company device are protected.



        This also covers the case of your responsibility when using your device (except for gross misconduct): from places where you are responsible for protecting your devices yourself and take responsibility for that - to places where your liability is limited and the burden of the protection relies on the company.



        You need to understand this context of yours first.





        In the text below "we" refers to "the company" and "they", to the employees. It is centered around the case where they claim they "did not do it" but we believe they "did".



        We have systems which record activity of employees (please keep the legal context in mind - in some places this is fine, in other not, in yet others nobody cares whether this is legal or not, and in yet another nobody cares to record).



        We would present the employee evidence of their activity (with the "go" from legal/HR) in the course of the interaction with them. This evidence would show that user ABC did XYZ at time TTT.



        Please note that we just know that the user ABC, as registered in our systems, did something. This does not mean that the actual human who is normally associated with the account ABC did it.



        There are many cases where ABC does not match the human:




        • we were hacked and someone used account ABC for that

        • an administrator acted as ABC

        • someone used ABC account when the human was not at the keyboard

        • someone saw the human typing their password and later that someone connected to ABC account

        • ... and plenty of other cases


        These are all reasonable claims which can be done - not to counter the evidence, but to challenge the link. (the evidence can certainly be tempered with in some cases, and this is also something which can be investigated)



        It can be that we/the authorities prove that the human was the one using account ABC. Case closed.



        It can be that we see that the human was not using the account ABC. In that case we need to determine whether




        • it is their fault (did not lock the device while explicitly asked to - for instance)

        • or not (the company was hacked, they were tricked into an action they could realistically fall for ( we are all humans), ...)


        As you see such cases are not obvious and, sure, there are the easy cases (which end with eyes rolling or jail) but a lot are not that obvious. They often land in the gray zone, especially in places which are either not clean-cut in terms of company vs. user responsibility, or extremely specific and then the employee and the company have a ping-pong game of "it is your responsibility", "no, it is yours".



        To be honest, I have a hard time understanding your question which jumps from "I have no password on my device", to "I let everyone use them", and to some kind of sync between searches. If I may recommend to clean that up (and stick to facts - and their consequences), I would be glad to comment further




        Have anxiety and never read the pop ups




        Please do, this makes everyone's life easier and more secure.







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered 1 hour ago









        WoJ

        2,471912




        2,471912















            Popular posts from this blog

            Understanding the information contained in the Deep Space Network XML data?

            Ross-on-Wye

            Eastern Orthodox Church