Originally posted by Willapp
View Post
- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Collapse
You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:
- You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
- You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
- If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.
Logging in...
Previously on "Left - client requesting personal laptop audit"
Collapse
-
Originally posted by vwdan View PostOh, I never bother taking any client supplied ones anywhere!
Agree it's a slight pain but luckily it's a nice compact Dell and doesn't actually weigh much, plus it's a 5 minute walk to the car
Leave a comment:
-
Originally posted by BlasterBates View PostThere will be some department completely separate dealing with security, and you may well have agreed implicitly or explicitly to abide by their security policy.
I would just take it in and get it done, just so they can't chase you up afterwards.
I mean you're in the right but is it worth it. The security people at the client co might not give up on this one and give you an awful lot of hassle.
Some companies have become very agressive indeed when it comes to protecting their data. Banks for example who've had data distributed causing millions of pounds of damage.
It depends on the client but I wouldn't ignore it. The last client I worked for came down like a ton of bricks on anyone they suspected of taking data, just as a matter of policy.
I don't see the problem that agent can withhold payment but there may be other consequences of not following their security policy.
Leave a comment:
-
Originally posted by Willapp View PostPersonally I find it a chore carrying two laptops around if I'm supplied with one by the client. I can access my personal email on my phone and usually via webmail (depending on client firewall policy) and I would rarely need anything from my laptop during business hours while on-site.
I can understand people having theirs with them, and usually I take mine for the first few days while I'm getting set up with equipment by the client to make sure I have something to use if they do operate a BYOD policy, but actually so far I've always been supplied with equipment by the client - probably to eliminate situation's like the OP's!
Leave a comment:
-
Originally posted by vwdan View PostI always have my company laptop to hand, whether it be on the corporate network or not. It has all the tools and applications I need to work, a modern copy of Office, my e-mails, copies of media I use often and so on. I'd have thought it'd be standard practice for any consultant.
I can understand people having theirs with them, and usually I take mine for the first few days while I'm getting set up with equipment by the client to make sure I have something to use if they do operate a BYOD policy, but actually so far I've always been supplied with equipment by the client - probably to eliminate situation's like the OP's!
Leave a comment:
-
Originally posted by vwdan View PostI always have my company laptop to hand, whether it be on the corporate network or not. It has all the tools and applications I need to work, a modern copy of Office, my e-mails, copies of media I use often and so on. I'd have thought it'd be standard practice for any consultant.
Leave a comment:
-
Originally posted by TheFaQQer View PostYou never know - I use my own equipment and I have access to the payroll and HR data for 80000 employees worldwide.
That's how I got Psychocandy's credit card number and pinned the blame on expertsexchange...
Leave a comment:
-
Originally posted by unixman View PostBYOD. Ugh.
Leave a comment:
-
Originally posted by jmo21 View PostFair enough, but if something is that sensitive (which I don't get the impression this is) they wouldn't let him use his own laptop.
The question is this an arsey manager who's going to call him in and then carry out a scan whilst his subordinates are sniggering in the background or is this standard procedure.
When an employee leaves they go through a set of standard procedures and the manager will fill out a form and I suspect one of the questions on the form does the contractor have company data on a laptop or perhaps "did the contractor use a private laptop", which he probably does have i.e. source code then they probably demand it gets deleted. Of course they have a simplified policy that covers all sensitive data.
Of course the OP can refuse, and who knows what will happen.
If it was the bank I was working at, they would have hassled you.
I mean at the end of the day this really sounds like some compliance dept not an "arsey" manager having a "bit of fun".
It's the OP'S decision ....personally I'd go in.Last edited by BlasterBates; 11 February 2015, 17:20.
Leave a comment:
-
Originally posted by jmo21 View PostFair enough, but if something is that sensitive (which I don't get the impression this is) they wouldn't let him use his own laptop.
That's how I got Psychocandy's credit card number and pinned the blame on expertsexchange...
Leave a comment:
-
Originally posted by BlasterBates View PostWell they want to make sure that their sensitive data is not simply sitting on a laptop on the 17:15 to Clapham forgotten on a luggage rack. That's why they would like to make sure the data is deleted or there isn't any.
Can you imagine the stink for the security dept if someone stole his laptop and cost their company millions simply because they didn't make sure they had deleted all his data.
It's a security risk, it's part of the security policy and there are reasons for it.
Sensitive data will be interesting to any thief or criminal and should only be on laptops when it's necessary, but certainly not on a laptop from somone who no longer works there.
Leave a comment:
-
How do I steal company data? and
How do I demonstrate contractually agreed compliance? are two very different questions.
Leave a comment:
-
Originally posted by jmo21 View PostI have data on laptop.
I copy data to somewhere else
I delete data on laptop as requested
I hand over laptop
They verify I have deleted data from laptop
I still have data somewhere else.
All they have achieved is proving the data is not on the laptop. Them checking the laptop proves nothing, so is a total waste of time.
In fact, if he IS keeping the data when he is not supposed to, he would obviously wipe it from the laptop, and let them check it.
Right?
Can you imagine the stink for the security dept if someone stole his laptop and cost their company millions simply because they didn't make sure they had deleted all his data.
It's a security risk, it's part of the security policy and there are reasons for it.
Sensitive data will be interesting to any thief or criminal and should only be on laptops when it's necessary, but certainly not on a laptop from somone who no longer works there.Last edited by BlasterBates; 11 February 2015, 15:43.
Leave a comment:
-
Originally posted by BlasterBates View PostOf course the OP could have copied the data on to a stick but without proof that would not be viable in a legal row.
But if the OP refuses to hand over his Laptop to verify that data has been deleted then the company can probably easily prove that he's taken the data on his laptop. The OP will have to show he has deleted the data, but currently he's refusing to.
I have data on laptop.
I copy data to somewhere else
I delete data on laptop as requested
I hand over laptop
They verify I have deleted data from laptop
I still have data somewhere else.
All they have achieved is proving the data is not on the laptop. Them checking the laptop proves nothing, so is a total waste of time.
In fact, if he IS keeping the data when he is not supposed to, he would obviously wipe it from the laptop, and let them check it.
Right?
Leave a comment:
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers
Contractor Services
CUK News
- Streamline Your Retirement with iSIPP: A Solution for Contractor Pensions Sep 1 09:13
- Making the most of pension lump sums: overview for contractors Sep 1 08:36
- Umbrella company tribunal cases are opening up; are your wages subject to unlawful deductions, too? Aug 31 08:38
- Contractors, relabelling 'labour' as 'services' to appear 'fully contracted out' won't dupe IR35 inspectors Aug 31 08:30
- How often does HMRC check tax returns? Aug 30 08:27
- Work-life balance as an IT contractor: 5 top tips from a tech recruiter Aug 30 08:20
- Autumn Statement 2023 tipped to prioritise mental health, in a boost for UK workplaces Aug 29 08:33
- Final reminder for contractors to respond to the umbrella consultation (closing today) Aug 29 08:09
- Top 5 most in demand cyber security contract roles Aug 25 08:38
- Changes to the right to request flexible working are incoming, but how will contractors be affected? Aug 24 08:25
Leave a comment: