• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!

Left - client requesting personal laptop audit

Collapse
X
  •  
  • Filter
  • Time
  • Show
Clear All
new posts

    #41
    Originally posted by jmo21 View Post
    Have they never heard of copying onto another machine, USB drive, wherever.

    How would access to one machine prove you don't still have a copy?

    Even if it was tied to some piece of software you could clone the drive.
    Is the OPs client GCHQ?

    Footage released of Guardian editors destroying Snowden hard drives | UK news | The Guardian

    Comment


      #42
      Originally posted by BlasterBates View Post
      Checking a Laptop which has had clients data on it is not unreasonable, and it's perfectly normal practice for private laptops to be scanned.
      It is unreasonable because it is totally pointless as myself and others have pointed out.

      Why waste time doing this, when IF the OP has kept something, he would have copied it off elsewhere anyway.

      Comment


        #43
        Originally posted by jmo21 View Post
        It is unreasonable because it is totally pointless as myself and others have pointed out.

        Why waste time doing this, when IF the OP has kept something, he would have copied it off elsewhere anyway.
        Of course the OP could have copied the data on to a stick but without proof that would not be viable in a legal row.

        But if the OP refuses to hand over his Laptop to verify that data has been deleted then the company can probably easily prove that he's taken the data on his laptop. The OP will have to show he has deleted the data, but currently he's refusing to.
        Last edited by BlasterBates; 11 February 2015, 14:04.
        I'm alright Jack

        Comment


          #44
          It's all a rather moot discussion without knowing if the OP contractually agreed that they have the right to do this, or that he wasn't allowed to take company data off site, or copy company data on to his own machine. Or if theres any NDA in place.

          He's already admitted he had company images on his machine which is now off site. These images could be a photo of the project team day out or the schematics of their latest patent-pending product.

          If the OP wipes/destroys the laptop and they have sys logs of him accessing and/or downloading company data then he is in breach and so it's not unreasonable for them to withhold payment.

          Comment


            #45
            Originally posted by Pondlife View Post
            It's all a rather moot discussion without knowing if the OP contractually agreed that they have the right to do this, or that he wasn't allowed to take company data off site, or copy company data on to his own machine. Or if theres any NDA in place.

            He's already admitted he had company images on his machine which is now off site. These images could be a photo of the project team day out or the schematics of their latest patent-pending product.

            If the OP wipes/destroys the laptop and they have sys logs of him accessing and/or downloading company data then he is in breach and so it's not unreasonable for them to withhold payment.
            This is absolutely the point there is a security policy in place and whatever happens the client does have the ability to sue the contractor, fair or not fair. It's not worth squabbling about if it can be resolved with a 2 hr round trip to the client.

            and in any case I suspect although the data has been deleted, it is probably still perfectly readable with the right tools.
            Last edited by BlasterBates; 11 February 2015, 14:09.
            I'm alright Jack

            Comment


              #46
              Originally posted by BlasterBates View Post
              They can sue you because you didn't abide by the security policy which in the case of a client with a strict security policy is generally part of your contract.
              Anybody can sue anybody, for any reason. The OP has said nothing about being in breach of contract (or security policy).

              Fighting a client and getting into a legal battle just to "save a bit of pride" is not a good idea.
              Absolutely agree.

              ...it's perfectly normal practice for private laptops to be scanned
              I have never heard of it happening under any circumstances.

              I don't know any clients that wouldn't scan a Laptop that is to be connected on to their systems.
              OP said nothing about his laptop being connected to client systems.

              I agree completely about not being combative with the client. As I keep saying, this request sounds like one manager being a bit silly. Remember, all they have done is ask for his laptop. They haven't even insisted. But as the OP hasn't given more details, who knows what the situation is.

              Comment


                #47
                Originally posted by unixman View Post


                I have never heard of it happening under any circumstances.


                I saw it happen at my last client, but they did allow BYOD for people, especially the staff of a consultancy they had hired. One of these guys pissed off the wrong people one week, and he was sat down with security with his laptop scanned and then marched off site.

                Comment


                  #48
                  Originally posted by unixman View Post
                  I have never heard of it happening under any circumstances.
                  The company I'm currently working for insist on scanning software to be installed to allow remote access on your prvate laptop, at the bank they had similar policies though I never enquired about connecting remotely. I presume in the case you connected remotely they would have had similar scanning packages installed. They certainly scanned everything going over mail.
                  I'm alright Jack

                  Comment


                    #49
                    Originally posted by TestMangler View Post
                    Similar idea, but you beat me to it. Was going to suggest OS/2 Warp
                    It does multi tasking don't you know.

                    Comment


                      #50
                      Originally posted by PurpleGorilla View Post
                      3.11 is too good for them - why not 3.1.
                      Why not have Microsoft Bob running for a real tulip retro look
                      Socialism is inseparably interwoven with totalitarianism and the abject worship of the state.

                      No Socialist Government conducting the entire life and industry of the country could afford to allow free, sharp, or violently-worded expressions of public discontent.

                      Comment

                      Working...
                      X