Originally posted by: spidey07
Originally posted by: Phoenix86
Packet sniff=ok
Printing=ok
Screen prints=ok
Using a service you don't have auth to use=not OK.
By using the company owned computer you grant them access to said service by proxy.
Their computer, they can do whatever they want. They own it and all information transmitted across their network and contained on that machine and all others.
Originally posted by: JS80
where was the email forwarded to?
No they don't. Think of the two following scenarios (may not be applicable to the OP but to the current discussion at hand):Originally posted by: chrisms
It isn't the user's workstation. It is the company's workstation, and they can do whatever they want with it. If an account was open on their workstation I don't see why they wouldn't have the right to duplicate that information (by forwarding it).Originally posted by: her209
Somehow I don't think so because the only they could ascertain the information was to sneak onto the user's workstation otherwise this discussion would be a moot point.Originally posted by: chrisms
This isn't a transfer of real value (money) but of information. The company would be able to check the account information you viewed just as they can check the e-mails the OP viewed.Originally posted by: her209
So if I log into my bank account on my work computer, does that mean they now can transfer money out of my account to theirs because "they own it"?Originally posted by: k1pp3r
Where you face a hard time is that with a company asset. Anything you look at, create, revise, email, publish, etc. the company OWNES, now you. Therefore if it is something that you do not want your company to have any pull over, do it at home. Otherwise, they own it.
Originally posted by: her209
No they don't. Think of the two following scenarios (may not be applicable to the OP but to the current discussion at hand):Originally posted by: chrisms
It isn't the user's workstation. It is the company's workstation, and they can do whatever they want with it. If an account was open on their workstation I don't see why they wouldn't have the right to duplicate that information (by forwarding it).Originally posted by: her209
Somehow I don't think so because the only they could ascertain the information was to sneak onto the user's workstation otherwise this discussion would be a moot point.Originally posted by: chrisms
This isn't a transfer of real value (money) but of information. The company would be able to check the account information you viewed just as they can check the e-mails the OP viewed.Originally posted by: her209
So if I log into my bank account on my work computer, does that mean they now can transfer money out of my account to theirs because "they own it"?Originally posted by: k1pp3r
Where you face a hard time is that with a company asset. Anything you look at, create, revise, email, publish, etc. the company OWNES, now you. Therefore if it is something that you do not want your company to have any pull over, do it at home. Otherwise, they own it.
Scenario 1:
You receive job offer e-mail from prospective company in your personal e-mail. You view the e-mail using your personal computer at home. You come to work and log into your account. You read new personal mail but never open job offer email. You leave your post for a few minutes. Company personell comes and makes a duplicate of job offer e-mail.
Scenario 2:
You receive job offer e-mail from prospective company in your personal e-mail. You view the e-mail using your personal computer at home. You come to work and log into your account. You read new personal mail but never open job offer email. You log off. Your user account and password information has been sniffed. Company personell logs onto your e-mail account using obtained account information. Duplicates job offer e-mail.
This is a scenario that is more likely to occur.
Scenario 3
You receive job offer e-mail from prospective company in your personal e-mail. You view the e-mail using your personal computer at home. You come to work and log into your account. You read new personal mail and open job offer email. All pages you visit have been recorded.
In scenario 3, its okay because the company did not themselves use your account to read into your personal e-mails. If the company does not record web pages you visited, they're still not allowed to go to your workstation and click on the email and duplicate it even though you may have clicked on it earlier.
Originally posted by: Zenmervolt
They are allowed to monitor your usage habits, and if they had reason to, the would be allowed to go through your company E-mail address as well as anything that you sent over the network with something like Yahoo.
However, they are definitely not allowed to send E-mails using your account. If they actually sent the E-mail, that may be a legitimate complaint. The IT guy was stupid, he should have simply written down the information and passed it along that way.
ZV
Sure. But even if it was, the company could still have keystroke loggers.Originally posted by: talyn00
isn't username/password passed with a SSL connection ?Originally posted by: her209
No they don't. Think of the two following scenarios (may not be applicable to the OP but to the current discussion at hand):Originally posted by: chrisms
It isn't the user's workstation. It is the company's workstation, and they can do whatever they want with it. If an account was open on their workstation I don't see why they wouldn't have the right to duplicate that information (by forwarding it).Originally posted by: her209
Somehow I don't think so because the only they could ascertain the information was to sneak onto the user's workstation otherwise this discussion would be a moot point.Originally posted by: chrisms
This isn't a transfer of real value (money) but of information. The company would be able to check the account information you viewed just as they can check the e-mails the OP viewed.Originally posted by: her209
So if I log into my bank account on my work computer, does that mean they now can transfer money out of my account to theirs because "they own it"?Originally posted by: k1pp3r
Where you face a hard time is that with a company asset. Anything you look at, create, revise, email, publish, etc. the company OWNES, now you. Therefore if it is something that you do not want your company to have any pull over, do it at home. Otherwise, they own it.
Scenario 1:
You receive job offer e-mail from prospective company in your personal e-mail. You view the e-mail using your personal computer at home. You come to work and log into your account. You read new personal mail but never open job offer email. You leave your post for a few minutes. Company personell comes and makes a duplicate of job offer e-mail.
Scenario 2:
You receive job offer e-mail from prospective company in your personal e-mail. You view the e-mail using your personal computer at home. You come to work and log into your account. You read new personal mail but never open job offer email. You log off. Your user account and password information has been sniffed. Company personell logs onto your e-mail account using obtained account information. Duplicates job offer e-mail.
This is a scenario that is more likely to occur.
Scenario 3
You receive job offer e-mail from prospective company in your personal e-mail. You view the e-mail using your personal computer at home. You come to work and log into your account. You read new personal mail and open job offer email. All pages you visit have been recorded.
In scenario 3, its okay because the company did not themselves use your account to read into your personal e-mails. If the company does not record web pages you visited, they're still not allowed to go to your workstation and click on the email and duplicate it even though you may have clicked on it earlier.
Originally posted by: doze
Some of these arguements are funny. Nothing has been violated b/c it was their computer, electricity, and bandwidth and OP didn't follow procedure and lock his station when he left.
Originally posted by: doze
Some of these arguements are funny. Nothing has been violated b/c it was their computer, electricity, and bandwidth and OP didn't follow procedure and lock his station when he left.
Originally posted by: smack Down
Originally posted by: doze
Some of these arguements are funny. Nothing has been violated b/c it was their computer, electricity, and bandwidth and OP didn't follow procedure and lock his station when he left.
Right but it wasn't the companies email account. If they had just watched the op open the job offer then it was clearly legal but they "hacked" his email acoount.
Originally posted by: k1pp3r
Originally posted by: smack Down
Originally posted by: doze
Some of these arguements are funny. Nothing has been violated b/c it was their computer, electricity, and bandwidth and OP didn't follow procedure and lock his station when he left.
Right but it wasn't the companies email account. If they had just watched the op open the job offer then it was clearly legal but they "hacked" his email acoount.
How do you "hack" something that was left on the screen for the world to see, all they had to do was click the check box, then forward, no hacking involved
Originally posted by: k1pp3r
Originally posted by: smack Down
Originally posted by: doze
Some of these arguements are funny. Nothing has been violated b/c it was their computer, electricity, and bandwidth and OP didn't follow procedure and lock his station when he left.
Right but it wasn't the companies email account. If they had just watched the op open the job offer then it was clearly legal but they "hacked" his email acoount.
How do you "hack" something that was left on the screen for the world to see, all they had to do was click the check box, then forward, no hacking involved
Originally posted by: her209
Sure. But even if it was, the company could still have keystroke loggers.Originally posted by: talyn00
isn't username/password passed with a SSL connection ?Originally posted by: her209
No they don't. Think of the two following scenarios (may not be applicable to the OP but to the current discussion at hand):Originally posted by: chrisms
It isn't the user's workstation. It is the company's workstation, and they can do whatever they want with it. If an account was open on their workstation I don't see why they wouldn't have the right to duplicate that information (by forwarding it).Originally posted by: her209
Somehow I don't think so because the only they could ascertain the information was to sneak onto the user's workstation otherwise this discussion would be a moot point.Originally posted by: chrisms
This isn't a transfer of real value (money) but of information. The company would be able to check the account information you viewed just as they can check the e-mails the OP viewed.Originally posted by: her209
So if I log into my bank account on my work computer, does that mean they now can transfer money out of my account to theirs because "they own it"?Originally posted by: k1pp3r
Where you face a hard time is that with a company asset. Anything you look at, create, revise, email, publish, etc. the company OWNES, now you. Therefore if it is something that you do not want your company to have any pull over, do it at home. Otherwise, they own it.
Scenario 1:
You receive job offer e-mail from prospective company in your personal e-mail. You view the e-mail using your personal computer at home. You come to work and log into your account. You read new personal mail but never open job offer email. You leave your post for a few minutes. Company personell comes and makes a duplicate of job offer e-mail.
Scenario 2:
You receive job offer e-mail from prospective company in your personal e-mail. You view the e-mail using your personal computer at home. You come to work and log into your account. You read new personal mail but never open job offer email. You log off. Your user account and password information has been sniffed. Company personell logs onto your e-mail account using obtained account information. Duplicates job offer e-mail.
This is a scenario that is more likely to occur.
Scenario 3
You receive job offer e-mail from prospective company in your personal e-mail. You view the e-mail using your personal computer at home. You come to work and log into your account. You read new personal mail and open job offer email. All pages you visit have been recorded.
In scenario 3, its okay because the company did not themselves use your account to read into your personal e-mails. If the company does not record web pages you visited, they're still not allowed to go to your workstation and click on the email and duplicate it even though you may have clicked on it earlier.
EDIT: The point is that they have the ability to obtain your account login information.
Originally posted by: MrDudeMan
Originally posted by: k1pp3r
Originally posted by: smack Down
Originally posted by: doze
Some of these arguements are funny. Nothing has been violated b/c it was their computer, electricity, and bandwidth and OP didn't follow procedure and lock his station when he left.
Right but it wasn't the companies email account. If they had just watched the op open the job offer then it was clearly legal but they "hacked" his email acoount.
How do you "hack" something that was left on the screen for the world to see, all they had to do was click the check box, then forward, no hacking involved
moron :roll: he put hacked in quotes meaning they didnt literally hack his account, but they took control of it without his permission and used it to do something suspicious. not everything is always literal :thumbsdown:
Originally posted by: k1pp3r
Originally posted by: MrDudeMan
Originally posted by: k1pp3r
Originally posted by: smack Down
Originally posted by: doze
Some of these arguements are funny. Nothing has been violated b/c it was their computer, electricity, and bandwidth and OP didn't follow procedure and lock his station when he left.
Right but it wasn't the companies email account. If they had just watched the op open the job offer then it was clearly legal but they "hacked" his email acoount.
How do you "hack" something that was left on the screen for the world to see, all they had to do was click the check box, then forward, no hacking involved
moron :roll: he put hacked in quotes meaning they didnt literally hack his account, but they took control of it without his permission and used it to do something suspicious. not everything is always literal :thumbsdown:
Thank you for insulting me, and just what did i do to you, nothin so ****** you.