Feeds

SMS: sack me surreptitiously

Modern communication. Ain't it great?

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Office admin Zoe Halls was sacked by a text message sent from her boss to her mobile phone. "We don't need you in at work tomorrow, I'll phone you AM to explain - John", the SMS message said.

The message arrived on Sunday night, just weeks before Zoe's three-month probation was due to finish at Highway Glass - the Derby based emergency glaziers. She was understandably upset but when John Heath's phone call failed to materialise, she called him. He had turned off his phone. So she popped into the office to find out what was going on.

According to Zoe, he wouldn't even look her in the face and then started making baseless accusations about the staff not liking her, her work not being up to scratch etc etc. "What makes it worse is my boss was laughing and joking with me on Friday," she said. John also claimed that he tried to tell Zoe she was fired on Friday - something she hotly disputes.

The fact is that Zoe has little recourse seeing as she was still in her probation period. But text messaging is a particularly cowardly way of firing someone.

And so sacking is added to the text message's multiple uses - along with dumping girl/boyfriends, bullying children, abusing and stalking ex-partners, distracting you while you drive your truck into someone, sending suicide notes and attempting very slow sexual advances. Not bad for 8p a shot. ®

Related Stories

SMS in action: road killer and life saver
SMS madness: police and bullies get in on the act
You've got mail: I'm going to kill myself
Europeans text sex obsessed

Secure remote control for conventional and virtual desktops

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?