Fired, accused of conducting web searches I didn't do. [on hold]
I had searches I didn't do show up on work devices, and ended up losing my job over this, for a first infraction. I know 100% I didn't search those things. I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission.
I never even knew I was required to have screen locks, not did I care if people used my devices. I never let anyone use my work devices. They said illicit or inappropriate use.
But I know 100% I didn't do it. How can I prove if it synced vs actually searched from that device? There has to be a way. Is there anythign I can do?
I know I signed into google maps with my personal gmail, but I can't remember if ever signed into Google or Chrome on them. But I know I was logged into other work devices too. I cannot remember. I'm Google dumb. About all the settings. Have anxiety and never read the pop ups. Just clicked ok. Assume something synced from another device.
ethics
New contributor
put on hold as off-topic by yochannah, Dukeling, The Wandering Dev Manager, nvoigt, scaaahu 57 mins ago
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "Questions seeking advice on company-specific regulations, agreements, or policies should be directed to your manager or HR department. Questions that address only a specific company or position are of limited use to future visitors. Questions seeking legal advice should be directed to legal professionals. For more information, click here." – Dukeling, nvoigt, scaaahu
If this question can be reworded to fit the rules in the help center, please edit the question.
|
show 5 more comments
I had searches I didn't do show up on work devices, and ended up losing my job over this, for a first infraction. I know 100% I didn't search those things. I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission.
I never even knew I was required to have screen locks, not did I care if people used my devices. I never let anyone use my work devices. They said illicit or inappropriate use.
But I know 100% I didn't do it. How can I prove if it synced vs actually searched from that device? There has to be a way. Is there anythign I can do?
I know I signed into google maps with my personal gmail, but I can't remember if ever signed into Google or Chrome on them. But I know I was logged into other work devices too. I cannot remember. I'm Google dumb. About all the settings. Have anxiety and never read the pop ups. Just clicked ok. Assume something synced from another device.
ethics
New contributor
put on hold as off-topic by yochannah, Dukeling, The Wandering Dev Manager, nvoigt, scaaahu 57 mins ago
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "Questions seeking advice on company-specific regulations, agreements, or policies should be directed to your manager or HR department. Questions that address only a specific company or position are of limited use to future visitors. Questions seeking legal advice should be directed to legal professionals. For more information, click here." – Dukeling, nvoigt, scaaahu
If this question can be reworded to fit the rules in the help center, please edit the question.
5
Possible duplicate of Company policy violation due to browser history syncing
– yochannah
18 hours ago
3
Did you not do them (at all) or did you do them on other devices and they may have synced?
– bruglesco
18 hours ago
3
I'm pretty sure signing into Maps logs you in to your Google account.
– bruglesco
16 hours ago
1
Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
– Tony Dallimore
10 hours ago
4
Have anxiety and never read the pop ups.
Sorry, but that just makes me upset...
– Michael
9 hours ago
|
show 5 more comments
I had searches I didn't do show up on work devices, and ended up losing my job over this, for a first infraction. I know 100% I didn't search those things. I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission.
I never even knew I was required to have screen locks, not did I care if people used my devices. I never let anyone use my work devices. They said illicit or inappropriate use.
But I know 100% I didn't do it. How can I prove if it synced vs actually searched from that device? There has to be a way. Is there anythign I can do?
I know I signed into google maps with my personal gmail, but I can't remember if ever signed into Google or Chrome on them. But I know I was logged into other work devices too. I cannot remember. I'm Google dumb. About all the settings. Have anxiety and never read the pop ups. Just clicked ok. Assume something synced from another device.
ethics
New contributor
I had searches I didn't do show up on work devices, and ended up losing my job over this, for a first infraction. I know 100% I didn't search those things. I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission.
I never even knew I was required to have screen locks, not did I care if people used my devices. I never let anyone use my work devices. They said illicit or inappropriate use.
But I know 100% I didn't do it. How can I prove if it synced vs actually searched from that device? There has to be a way. Is there anythign I can do?
I know I signed into google maps with my personal gmail, but I can't remember if ever signed into Google or Chrome on them. But I know I was logged into other work devices too. I cannot remember. I'm Google dumb. About all the settings. Have anxiety and never read the pop ups. Just clicked ok. Assume something synced from another device.
ethics
ethics
New contributor
New contributor
edited 18 hours ago
yochannah
4,74373050
4,74373050
New contributor
asked 18 hours ago
Confused so bad
422
422
New contributor
New contributor
put on hold as off-topic by yochannah, Dukeling, The Wandering Dev Manager, nvoigt, scaaahu 57 mins ago
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "Questions seeking advice on company-specific regulations, agreements, or policies should be directed to your manager or HR department. Questions that address only a specific company or position are of limited use to future visitors. Questions seeking legal advice should be directed to legal professionals. For more information, click here." – Dukeling, nvoigt, scaaahu
If this question can be reworded to fit the rules in the help center, please edit the question.
put on hold as off-topic by yochannah, Dukeling, The Wandering Dev Manager, nvoigt, scaaahu 57 mins ago
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "Questions seeking advice on company-specific regulations, agreements, or policies should be directed to your manager or HR department. Questions that address only a specific company or position are of limited use to future visitors. Questions seeking legal advice should be directed to legal professionals. For more information, click here." – Dukeling, nvoigt, scaaahu
If this question can be reworded to fit the rules in the help center, please edit the question.
5
Possible duplicate of Company policy violation due to browser history syncing
– yochannah
18 hours ago
3
Did you not do them (at all) or did you do them on other devices and they may have synced?
– bruglesco
18 hours ago
3
I'm pretty sure signing into Maps logs you in to your Google account.
– bruglesco
16 hours ago
1
Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
– Tony Dallimore
10 hours ago
4
Have anxiety and never read the pop ups.
Sorry, but that just makes me upset...
– Michael
9 hours ago
|
show 5 more comments
5
Possible duplicate of Company policy violation due to browser history syncing
– yochannah
18 hours ago
3
Did you not do them (at all) or did you do them on other devices and they may have synced?
– bruglesco
18 hours ago
3
I'm pretty sure signing into Maps logs you in to your Google account.
– bruglesco
16 hours ago
1
Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
– Tony Dallimore
10 hours ago
4
Have anxiety and never read the pop ups.
Sorry, but that just makes me upset...
– Michael
9 hours ago
5
5
Possible duplicate of Company policy violation due to browser history syncing
– yochannah
18 hours ago
Possible duplicate of Company policy violation due to browser history syncing
– yochannah
18 hours ago
3
3
Did you not do them (at all) or did you do them on other devices and they may have synced?
– bruglesco
18 hours ago
Did you not do them (at all) or did you do them on other devices and they may have synced?
– bruglesco
18 hours ago
3
3
I'm pretty sure signing into Maps logs you in to your Google account.
– bruglesco
16 hours ago
I'm pretty sure signing into Maps logs you in to your Google account.
– bruglesco
16 hours ago
1
1
Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
– Tony Dallimore
10 hours ago
Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
– Tony Dallimore
10 hours ago
4
4
Have anxiety and never read the pop ups.
Sorry, but that just makes me upset...– Michael
9 hours ago
Have anxiety and never read the pop ups.
Sorry, but that just makes me upset...– Michael
9 hours ago
|
show 5 more comments
3 Answers
3
active
oldest
votes
The only real advice anyone can give you is to contact a lawyer and see what they say.
You do have a basic responsibility to keep work devices and data secure, so not password protecting them is fairly irresponsible of you.
In future, keep your work and home devices separate. Don't sign into your personal stuff on work devices and vice versa. Always lock your devices when you step away from them to prevent others from using them without your permission. And don't ever search for porn, drugs or anything else which could be possibly frowned upon on a work device or on the work network.
9
This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
– Criggie
13 hours ago
4
In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
– Gabe Sechan
8 hours ago
2
@GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
– Lightness Races in Orbit
8 hours ago
4
@LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
– Gabe Sechan
7 hours ago
1
@GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
– Lightness Races in Orbit
7 hours ago
|
show 5 more comments
Someone else was probably on your machine
In a lot of employment contracts, you are considered to be responsible for anything done under your corporate account/devices even if you yourself weren't at the keyboard.
It is unlikely that this was caused by syncing your Google Account with Chrome. Chrome has a tendency to identify what devices conducted what action. Plus the ability to synchronise histories would prove that the History data can be altered, and thus would typically not be trusted for the firing of an employee. Regardless, this was still a bad move.
What probably happened is that actual attempts to conduct those searches by your account and/or devices was picked up by network security devices as it was being performed. You'll notice I said 'by your account and/or devices' and not 'by you'.
In a lot of places, you'll see a culture for pranking people who leave devices unlocked. Most of the time, this is just a harmless 'beers are on me email' but more juvenile/malicious people may do things that stir up a bit more trouble, unaware (or possibly fully aware) of what their actions might bring.
I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission. I never even knew I was required to have screen locks, not did I care if people used my devices.
Locking your devices and accounts should not be something that needs to be spelt out. It should be, and needs to be from this point on, common sense. Your devices likely hold a lot of company-sensitive information. What if someone got onto your machine and accessed something they shouldn't have access to? What if someone trespassed into the building and got access to your computer? You could have been potentially looking at a lot worse than just getting fired for inappropriate searches.
1
This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
– bruglesco
16 hours ago
@bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
– 520
16 hours ago
1
wait are you implying that someone can't be fired for a misunderstanding on the companies part?
– bruglesco
15 hours ago
1
@bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
– 520
15 hours ago
add a comment |
Note: this answer is written in less than optimal circumstances (31 December...) so I will be back with edits when time permits. Do not hesitate to suggest changes or edit them yourselves.
From the perspective of someone working in information security, your situation is not uncommon.
First - anything mentioned in the answers (mine included) must be put in context of the country you are in. You may be in a place where anything you do is company property and you have zero expectations of privacy - up to places where your private activities on a company device are protected.
This also covers the case of your responsibility when using your device (except for gross misconduct): from places where you are responsible for protecting your devices yourself and take responsibility for that - to places where your liability is limited and the burden of the protection relies on the company.
You need to understand this context of yours first.
In the text below "we" refers to "the company" and "they", to the employees. It is centered around the case where they claim they "did not do it" but we believe they "did".
We have systems which record activity of employees (please keep the legal context in mind - in some places this is fine, in other not, in yet others nobody cares whether this is legal or not, and in yet another nobody cares to record).
We would present the employee evidence of their activity (with the "go" from legal/HR) in the course of the interaction with them. This evidence would show that user ABC did XYZ at time TTT.
Please note that we just know that the user ABC, as registered in our systems, did something. This does not mean that the actual human who is normally associated with the account ABC did it.
There are many cases where ABC does not match the human:
- we were hacked and someone used account ABC for that
- an administrator acted as ABC
- someone used ABC account when the human was not at the keyboard
- someone saw the human typing their password and later that someone connected to ABC account
- ... and plenty of other cases
These are all reasonable claims which can be done - not to counter the evidence, but to challenge the link. (the evidence can certainly be tempered with in some cases, and this is also something which can be investigated)
It can be that we/the authorities prove that the human was the one using account ABC. Case closed.
It can be that we see that the human was not using the account ABC. In that case we need to determine whether
- it is their fault (did not lock the device while explicitly asked to - for instance)
- or not (the company was hacked, they were tricked into an action they could realistically fall for ( we are all humans), ...)
As you see such cases are not obvious and, sure, there are the easy cases (which end with eyes rolling or jail) but a lot are not that obvious. They often land in the gray zone, especially in places which are either not clean-cut in terms of company vs. user responsibility, or extremely specific and then the employee and the company have a ping-pong game of "it is your responsibility", "no, it is yours".
To be honest, I have a hard time understanding your question which jumps from "I have no password on my device", to "I let everyone use them", and to some kind of sync between searches. If I may recommend to clean that up (and stick to facts - and their consequences), I would be glad to comment further
Have anxiety and never read the pop ups
Please do, this makes everyone's life easier and more secure.
add a comment |
3 Answers
3
active
oldest
votes
3 Answers
3
active
oldest
votes
active
oldest
votes
active
oldest
votes
The only real advice anyone can give you is to contact a lawyer and see what they say.
You do have a basic responsibility to keep work devices and data secure, so not password protecting them is fairly irresponsible of you.
In future, keep your work and home devices separate. Don't sign into your personal stuff on work devices and vice versa. Always lock your devices when you step away from them to prevent others from using them without your permission. And don't ever search for porn, drugs or anything else which could be possibly frowned upon on a work device or on the work network.
9
This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
– Criggie
13 hours ago
4
In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
– Gabe Sechan
8 hours ago
2
@GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
– Lightness Races in Orbit
8 hours ago
4
@LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
– Gabe Sechan
7 hours ago
1
@GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
– Lightness Races in Orbit
7 hours ago
|
show 5 more comments
The only real advice anyone can give you is to contact a lawyer and see what they say.
You do have a basic responsibility to keep work devices and data secure, so not password protecting them is fairly irresponsible of you.
In future, keep your work and home devices separate. Don't sign into your personal stuff on work devices and vice versa. Always lock your devices when you step away from them to prevent others from using them without your permission. And don't ever search for porn, drugs or anything else which could be possibly frowned upon on a work device or on the work network.
9
This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
– Criggie
13 hours ago
4
In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
– Gabe Sechan
8 hours ago
2
@GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
– Lightness Races in Orbit
8 hours ago
4
@LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
– Gabe Sechan
7 hours ago
1
@GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
– Lightness Races in Orbit
7 hours ago
|
show 5 more comments
The only real advice anyone can give you is to contact a lawyer and see what they say.
You do have a basic responsibility to keep work devices and data secure, so not password protecting them is fairly irresponsible of you.
In future, keep your work and home devices separate. Don't sign into your personal stuff on work devices and vice versa. Always lock your devices when you step away from them to prevent others from using them without your permission. And don't ever search for porn, drugs or anything else which could be possibly frowned upon on a work device or on the work network.
The only real advice anyone can give you is to contact a lawyer and see what they say.
You do have a basic responsibility to keep work devices and data secure, so not password protecting them is fairly irresponsible of you.
In future, keep your work and home devices separate. Don't sign into your personal stuff on work devices and vice versa. Always lock your devices when you step away from them to prevent others from using them without your permission. And don't ever search for porn, drugs or anything else which could be possibly frowned upon on a work device or on the work network.
answered 18 hours ago
user1666620
10.3k83435
10.3k83435
9
This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
– Criggie
13 hours ago
4
In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
– Gabe Sechan
8 hours ago
2
@GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
– Lightness Races in Orbit
8 hours ago
4
@LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
– Gabe Sechan
7 hours ago
1
@GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
– Lightness Races in Orbit
7 hours ago
|
show 5 more comments
9
This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
– Criggie
13 hours ago
4
In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
– Gabe Sechan
8 hours ago
2
@GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
– Lightness Races in Orbit
8 hours ago
4
@LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
– Gabe Sechan
7 hours ago
1
@GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
– Lightness Races in Orbit
7 hours ago
9
9
This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
– Criggie
13 hours ago
This, but more bluntly obvious, like "NEVER EVER mix work and personal accounts." I have a separate work and personal cellphone for this reason.
– Criggie
13 hours ago
4
4
In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
– Gabe Sechan
8 hours ago
In the future, you should both work at better places. If they have a problem with me logging in to non-adult accounts on my work laptop, then I don't want to work there. You're talking about a routine action, done by 99.99% of the professional world. And by any non-completely insane company, totally ok as you would otherwise leave work early to do it at home.
– Gabe Sechan
8 hours ago
2
2
@GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
– Lightness Races in Orbit
8 hours ago
@GabeSechan You've misunderstood the advice. Nobody's saying you shouldn't want work for a company that doesn't let you do that sort of thing, nor that it is unusual to do so. The point is that doing so without adequate due diligence leaves you completely vulnerable to the sort of attack that the OP has allegedly suffered.
– Lightness Races in Orbit
8 hours ago
4
4
@LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
– Gabe Sechan
7 hours ago
@LightnessRacesinOrbit No, I understood it and fully disagree with it. If a company is that unreasonable, you don't want to work there. Stop helping people treat workers like shit, and start helping people stand up to it.
– Gabe Sechan
7 hours ago
1
1
@GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
– Lightness Races in Orbit
7 hours ago
@GabeSechan Your response just confirms you're talking about a claim that was not made. Even if it had been, you're still on the wrong side: leaving your workstation unsecured is unprofessional and negligent, and it's completely commonplace to put rules in place to encourage people not to do that, and to punish them when they break those rules. If you don't want to work at such a place that's fine but you'll find the remaining workplaces to be few and far between.
– Lightness Races in Orbit
7 hours ago
|
show 5 more comments
Someone else was probably on your machine
In a lot of employment contracts, you are considered to be responsible for anything done under your corporate account/devices even if you yourself weren't at the keyboard.
It is unlikely that this was caused by syncing your Google Account with Chrome. Chrome has a tendency to identify what devices conducted what action. Plus the ability to synchronise histories would prove that the History data can be altered, and thus would typically not be trusted for the firing of an employee. Regardless, this was still a bad move.
What probably happened is that actual attempts to conduct those searches by your account and/or devices was picked up by network security devices as it was being performed. You'll notice I said 'by your account and/or devices' and not 'by you'.
In a lot of places, you'll see a culture for pranking people who leave devices unlocked. Most of the time, this is just a harmless 'beers are on me email' but more juvenile/malicious people may do things that stir up a bit more trouble, unaware (or possibly fully aware) of what their actions might bring.
I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission. I never even knew I was required to have screen locks, not did I care if people used my devices.
Locking your devices and accounts should not be something that needs to be spelt out. It should be, and needs to be from this point on, common sense. Your devices likely hold a lot of company-sensitive information. What if someone got onto your machine and accessed something they shouldn't have access to? What if someone trespassed into the building and got access to your computer? You could have been potentially looking at a lot worse than just getting fired for inappropriate searches.
1
This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
– bruglesco
16 hours ago
@bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
– 520
16 hours ago
1
wait are you implying that someone can't be fired for a misunderstanding on the companies part?
– bruglesco
15 hours ago
1
@bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
– 520
15 hours ago
add a comment |
Someone else was probably on your machine
In a lot of employment contracts, you are considered to be responsible for anything done under your corporate account/devices even if you yourself weren't at the keyboard.
It is unlikely that this was caused by syncing your Google Account with Chrome. Chrome has a tendency to identify what devices conducted what action. Plus the ability to synchronise histories would prove that the History data can be altered, and thus would typically not be trusted for the firing of an employee. Regardless, this was still a bad move.
What probably happened is that actual attempts to conduct those searches by your account and/or devices was picked up by network security devices as it was being performed. You'll notice I said 'by your account and/or devices' and not 'by you'.
In a lot of places, you'll see a culture for pranking people who leave devices unlocked. Most of the time, this is just a harmless 'beers are on me email' but more juvenile/malicious people may do things that stir up a bit more trouble, unaware (or possibly fully aware) of what their actions might bring.
I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission. I never even knew I was required to have screen locks, not did I care if people used my devices.
Locking your devices and accounts should not be something that needs to be spelt out. It should be, and needs to be from this point on, common sense. Your devices likely hold a lot of company-sensitive information. What if someone got onto your machine and accessed something they shouldn't have access to? What if someone trespassed into the building and got access to your computer? You could have been potentially looking at a lot worse than just getting fired for inappropriate searches.
1
This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
– bruglesco
16 hours ago
@bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
– 520
16 hours ago
1
wait are you implying that someone can't be fired for a misunderstanding on the companies part?
– bruglesco
15 hours ago
1
@bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
– 520
15 hours ago
add a comment |
Someone else was probably on your machine
In a lot of employment contracts, you are considered to be responsible for anything done under your corporate account/devices even if you yourself weren't at the keyboard.
It is unlikely that this was caused by syncing your Google Account with Chrome. Chrome has a tendency to identify what devices conducted what action. Plus the ability to synchronise histories would prove that the History data can be altered, and thus would typically not be trusted for the firing of an employee. Regardless, this was still a bad move.
What probably happened is that actual attempts to conduct those searches by your account and/or devices was picked up by network security devices as it was being performed. You'll notice I said 'by your account and/or devices' and not 'by you'.
In a lot of places, you'll see a culture for pranking people who leave devices unlocked. Most of the time, this is just a harmless 'beers are on me email' but more juvenile/malicious people may do things that stir up a bit more trouble, unaware (or possibly fully aware) of what their actions might bring.
I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission. I never even knew I was required to have screen locks, not did I care if people used my devices.
Locking your devices and accounts should not be something that needs to be spelt out. It should be, and needs to be from this point on, common sense. Your devices likely hold a lot of company-sensitive information. What if someone got onto your machine and accessed something they shouldn't have access to? What if someone trespassed into the building and got access to your computer? You could have been potentially looking at a lot worse than just getting fired for inappropriate searches.
Someone else was probably on your machine
In a lot of employment contracts, you are considered to be responsible for anything done under your corporate account/devices even if you yourself weren't at the keyboard.
It is unlikely that this was caused by syncing your Google Account with Chrome. Chrome has a tendency to identify what devices conducted what action. Plus the ability to synchronise histories would prove that the History data can be altered, and thus would typically not be trusted for the firing of an employee. Regardless, this was still a bad move.
What probably happened is that actual attempts to conduct those searches by your account and/or devices was picked up by network security devices as it was being performed. You'll notice I said 'by your account and/or devices' and not 'by you'.
In a lot of places, you'll see a culture for pranking people who leave devices unlocked. Most of the time, this is just a harmless 'beers are on me email' but more juvenile/malicious people may do things that stir up a bit more trouble, unaware (or possibly fully aware) of what their actions might bring.
I had no screen locks or passwords on any of mine or work devices. So it's possible anyone could have got on them, without my permission. I never even knew I was required to have screen locks, not did I care if people used my devices.
Locking your devices and accounts should not be something that needs to be spelt out. It should be, and needs to be from this point on, common sense. Your devices likely hold a lot of company-sensitive information. What if someone got onto your machine and accessed something they shouldn't have access to? What if someone trespassed into the building and got access to your computer? You could have been potentially looking at a lot worse than just getting fired for inappropriate searches.
edited 17 hours ago
answered 17 hours ago
520
1,366213
1,366213
1
This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
– bruglesco
16 hours ago
@bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
– 520
16 hours ago
1
wait are you implying that someone can't be fired for a misunderstanding on the companies part?
– bruglesco
15 hours ago
1
@bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
– 520
15 hours ago
add a comment |
1
This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
– bruglesco
16 hours ago
@bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
– 520
16 hours ago
1
wait are you implying that someone can't be fired for a misunderstanding on the companies part?
– bruglesco
15 hours ago
1
@bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
– 520
15 hours ago
1
1
This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
– bruglesco
16 hours ago
This isn't clear. That is why I asked for clarification. It's absolutely possible that the searches were done by OP and synced when they logged into Google Maps.
– bruglesco
16 hours ago
@bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
– 520
16 hours ago
@bruglesco the browser history wouldn't be enough evidence to get the guy fired unless the company a) locked down the browser (they clearly did not) or b) really doesn't care about wrongful termination lawsuits - especially if it can be altered in this way by legitimate activity (and they WILL be aware of this). They would want something airtight, like what I mentioned.
– 520
16 hours ago
1
1
wait are you implying that someone can't be fired for a misunderstanding on the companies part?
– bruglesco
15 hours ago
wait are you implying that someone can't be fired for a misunderstanding on the companies part?
– bruglesco
15 hours ago
1
1
@bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
– 520
15 hours ago
@bruglesco if the device itself was being investigated, it would have to have been done by someone with a very specific technical competence. After all, you'd have to find a way onto their machine without their password (as apps on windows are managed on a per-machine basis, not by accounts), find a way to get to their (account) browser history on that machine and find a way to read it, yet not be technical enough to know the nuances of Google Chrome. Or they could just look at firewall/proxy logs. Not saying the first is impossible, but the second is MUCH more likely and bulletproof.
– 520
15 hours ago
add a comment |
Note: this answer is written in less than optimal circumstances (31 December...) so I will be back with edits when time permits. Do not hesitate to suggest changes or edit them yourselves.
From the perspective of someone working in information security, your situation is not uncommon.
First - anything mentioned in the answers (mine included) must be put in context of the country you are in. You may be in a place where anything you do is company property and you have zero expectations of privacy - up to places where your private activities on a company device are protected.
This also covers the case of your responsibility when using your device (except for gross misconduct): from places where you are responsible for protecting your devices yourself and take responsibility for that - to places where your liability is limited and the burden of the protection relies on the company.
You need to understand this context of yours first.
In the text below "we" refers to "the company" and "they", to the employees. It is centered around the case where they claim they "did not do it" but we believe they "did".
We have systems which record activity of employees (please keep the legal context in mind - in some places this is fine, in other not, in yet others nobody cares whether this is legal or not, and in yet another nobody cares to record).
We would present the employee evidence of their activity (with the "go" from legal/HR) in the course of the interaction with them. This evidence would show that user ABC did XYZ at time TTT.
Please note that we just know that the user ABC, as registered in our systems, did something. This does not mean that the actual human who is normally associated with the account ABC did it.
There are many cases where ABC does not match the human:
- we were hacked and someone used account ABC for that
- an administrator acted as ABC
- someone used ABC account when the human was not at the keyboard
- someone saw the human typing their password and later that someone connected to ABC account
- ... and plenty of other cases
These are all reasonable claims which can be done - not to counter the evidence, but to challenge the link. (the evidence can certainly be tempered with in some cases, and this is also something which can be investigated)
It can be that we/the authorities prove that the human was the one using account ABC. Case closed.
It can be that we see that the human was not using the account ABC. In that case we need to determine whether
- it is their fault (did not lock the device while explicitly asked to - for instance)
- or not (the company was hacked, they were tricked into an action they could realistically fall for ( we are all humans), ...)
As you see such cases are not obvious and, sure, there are the easy cases (which end with eyes rolling or jail) but a lot are not that obvious. They often land in the gray zone, especially in places which are either not clean-cut in terms of company vs. user responsibility, or extremely specific and then the employee and the company have a ping-pong game of "it is your responsibility", "no, it is yours".
To be honest, I have a hard time understanding your question which jumps from "I have no password on my device", to "I let everyone use them", and to some kind of sync between searches. If I may recommend to clean that up (and stick to facts - and their consequences), I would be glad to comment further
Have anxiety and never read the pop ups
Please do, this makes everyone's life easier and more secure.
add a comment |
Note: this answer is written in less than optimal circumstances (31 December...) so I will be back with edits when time permits. Do not hesitate to suggest changes or edit them yourselves.
From the perspective of someone working in information security, your situation is not uncommon.
First - anything mentioned in the answers (mine included) must be put in context of the country you are in. You may be in a place where anything you do is company property and you have zero expectations of privacy - up to places where your private activities on a company device are protected.
This also covers the case of your responsibility when using your device (except for gross misconduct): from places where you are responsible for protecting your devices yourself and take responsibility for that - to places where your liability is limited and the burden of the protection relies on the company.
You need to understand this context of yours first.
In the text below "we" refers to "the company" and "they", to the employees. It is centered around the case where they claim they "did not do it" but we believe they "did".
We have systems which record activity of employees (please keep the legal context in mind - in some places this is fine, in other not, in yet others nobody cares whether this is legal or not, and in yet another nobody cares to record).
We would present the employee evidence of their activity (with the "go" from legal/HR) in the course of the interaction with them. This evidence would show that user ABC did XYZ at time TTT.
Please note that we just know that the user ABC, as registered in our systems, did something. This does not mean that the actual human who is normally associated with the account ABC did it.
There are many cases where ABC does not match the human:
- we were hacked and someone used account ABC for that
- an administrator acted as ABC
- someone used ABC account when the human was not at the keyboard
- someone saw the human typing their password and later that someone connected to ABC account
- ... and plenty of other cases
These are all reasonable claims which can be done - not to counter the evidence, but to challenge the link. (the evidence can certainly be tempered with in some cases, and this is also something which can be investigated)
It can be that we/the authorities prove that the human was the one using account ABC. Case closed.
It can be that we see that the human was not using the account ABC. In that case we need to determine whether
- it is their fault (did not lock the device while explicitly asked to - for instance)
- or not (the company was hacked, they were tricked into an action they could realistically fall for ( we are all humans), ...)
As you see such cases are not obvious and, sure, there are the easy cases (which end with eyes rolling or jail) but a lot are not that obvious. They often land in the gray zone, especially in places which are either not clean-cut in terms of company vs. user responsibility, or extremely specific and then the employee and the company have a ping-pong game of "it is your responsibility", "no, it is yours".
To be honest, I have a hard time understanding your question which jumps from "I have no password on my device", to "I let everyone use them", and to some kind of sync between searches. If I may recommend to clean that up (and stick to facts - and their consequences), I would be glad to comment further
Have anxiety and never read the pop ups
Please do, this makes everyone's life easier and more secure.
add a comment |
Note: this answer is written in less than optimal circumstances (31 December...) so I will be back with edits when time permits. Do not hesitate to suggest changes or edit them yourselves.
From the perspective of someone working in information security, your situation is not uncommon.
First - anything mentioned in the answers (mine included) must be put in context of the country you are in. You may be in a place where anything you do is company property and you have zero expectations of privacy - up to places where your private activities on a company device are protected.
This also covers the case of your responsibility when using your device (except for gross misconduct): from places where you are responsible for protecting your devices yourself and take responsibility for that - to places where your liability is limited and the burden of the protection relies on the company.
You need to understand this context of yours first.
In the text below "we" refers to "the company" and "they", to the employees. It is centered around the case where they claim they "did not do it" but we believe they "did".
We have systems which record activity of employees (please keep the legal context in mind - in some places this is fine, in other not, in yet others nobody cares whether this is legal or not, and in yet another nobody cares to record).
We would present the employee evidence of their activity (with the "go" from legal/HR) in the course of the interaction with them. This evidence would show that user ABC did XYZ at time TTT.
Please note that we just know that the user ABC, as registered in our systems, did something. This does not mean that the actual human who is normally associated with the account ABC did it.
There are many cases where ABC does not match the human:
- we were hacked and someone used account ABC for that
- an administrator acted as ABC
- someone used ABC account when the human was not at the keyboard
- someone saw the human typing their password and later that someone connected to ABC account
- ... and plenty of other cases
These are all reasonable claims which can be done - not to counter the evidence, but to challenge the link. (the evidence can certainly be tempered with in some cases, and this is also something which can be investigated)
It can be that we/the authorities prove that the human was the one using account ABC. Case closed.
It can be that we see that the human was not using the account ABC. In that case we need to determine whether
- it is their fault (did not lock the device while explicitly asked to - for instance)
- or not (the company was hacked, they were tricked into an action they could realistically fall for ( we are all humans), ...)
As you see such cases are not obvious and, sure, there are the easy cases (which end with eyes rolling or jail) but a lot are not that obvious. They often land in the gray zone, especially in places which are either not clean-cut in terms of company vs. user responsibility, or extremely specific and then the employee and the company have a ping-pong game of "it is your responsibility", "no, it is yours".
To be honest, I have a hard time understanding your question which jumps from "I have no password on my device", to "I let everyone use them", and to some kind of sync between searches. If I may recommend to clean that up (and stick to facts - and their consequences), I would be glad to comment further
Have anxiety and never read the pop ups
Please do, this makes everyone's life easier and more secure.
Note: this answer is written in less than optimal circumstances (31 December...) so I will be back with edits when time permits. Do not hesitate to suggest changes or edit them yourselves.
From the perspective of someone working in information security, your situation is not uncommon.
First - anything mentioned in the answers (mine included) must be put in context of the country you are in. You may be in a place where anything you do is company property and you have zero expectations of privacy - up to places where your private activities on a company device are protected.
This also covers the case of your responsibility when using your device (except for gross misconduct): from places where you are responsible for protecting your devices yourself and take responsibility for that - to places where your liability is limited and the burden of the protection relies on the company.
You need to understand this context of yours first.
In the text below "we" refers to "the company" and "they", to the employees. It is centered around the case where they claim they "did not do it" but we believe they "did".
We have systems which record activity of employees (please keep the legal context in mind - in some places this is fine, in other not, in yet others nobody cares whether this is legal or not, and in yet another nobody cares to record).
We would present the employee evidence of their activity (with the "go" from legal/HR) in the course of the interaction with them. This evidence would show that user ABC did XYZ at time TTT.
Please note that we just know that the user ABC, as registered in our systems, did something. This does not mean that the actual human who is normally associated with the account ABC did it.
There are many cases where ABC does not match the human:
- we were hacked and someone used account ABC for that
- an administrator acted as ABC
- someone used ABC account when the human was not at the keyboard
- someone saw the human typing their password and later that someone connected to ABC account
- ... and plenty of other cases
These are all reasonable claims which can be done - not to counter the evidence, but to challenge the link. (the evidence can certainly be tempered with in some cases, and this is also something which can be investigated)
It can be that we/the authorities prove that the human was the one using account ABC. Case closed.
It can be that we see that the human was not using the account ABC. In that case we need to determine whether
- it is their fault (did not lock the device while explicitly asked to - for instance)
- or not (the company was hacked, they were tricked into an action they could realistically fall for ( we are all humans), ...)
As you see such cases are not obvious and, sure, there are the easy cases (which end with eyes rolling or jail) but a lot are not that obvious. They often land in the gray zone, especially in places which are either not clean-cut in terms of company vs. user responsibility, or extremely specific and then the employee and the company have a ping-pong game of "it is your responsibility", "no, it is yours".
To be honest, I have a hard time understanding your question which jumps from "I have no password on my device", to "I let everyone use them", and to some kind of sync between searches. If I may recommend to clean that up (and stick to facts - and their consequences), I would be glad to comment further
Have anxiety and never read the pop ups
Please do, this makes everyone's life easier and more secure.
answered 1 hour ago
WoJ
2,471912
2,471912
add a comment |
add a comment |
5
Possible duplicate of Company policy violation due to browser history syncing
– yochannah
18 hours ago
3
Did you not do them (at all) or did you do them on other devices and they may have synced?
– bruglesco
18 hours ago
3
I'm pretty sure signing into Maps logs you in to your Google account.
– bruglesco
16 hours ago
1
Have you asked when these searches were performed? Can you prove you were somewhere else when they were performed? You only need to have been in a meeting once when one of these searches was performed to prove at least one was performed by someone else and cast doubt of the accusation that any were performed by you.
– Tony Dallimore
10 hours ago
4
Have anxiety and never read the pop ups.
Sorry, but that just makes me upset...– Michael
9 hours ago