Feeds

You don't have to be paranoid to work here. But we do

Take me to the cleaners

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Letter "Clients are becoming more litigious, with technology playing such a critical part in the day to day running of businesses they are no longer willing to let mistakes go and bear the cost themselves."

Litigation frenzy driving IT contractors under

Letter Name and address supplied

No kidding, the last two corporations I’ve worked for have demanded professional indemnity insurance up to $10,000,000 – my current employer insisted on me using an "approved supplier". Paranoia about contractors stealing data, or allowing persons into the building also seems to be on the increase.

Example: I’m replacing a member of staff on Maternity leave as a UNIX/Solaris admin and internet/intranet webmaster. My access card for the building will only let me in after 8am, and will only let me OUT before 6:05 pm, one minute late and I have to ask the CLEANERS to let me out!

Because I’m a contractor I cannot request voicemail, stationery supplies, additional equipment or software, or use the company mobile phone I’ve been given (because I’m 'on call' ). I'm not "by company policy" allowed administrator access to any server, workstation or any information relating to the networking infrastructure. Entertainingly enough I am also forbidden from communicating by email with any member of staff above ‘level 60’ (this means I can’t email my boss or any of the senior engineers whose team I’m part of: I have to email the group secretary and have her approve and then forward the email!).

You may spot the obvious problem here – I'm supposed to a UNIX/solaris admin/webmaster but I'm not supposed to have administrator access to any of the systems on which I work nor any access to information about them, nor can I directly request such access from my superior, or colleagues.

Finally after being at work here a month I got the access I needed to do the job I was hired for - only for a more senior ‘level 80’ member of staff to discover this access had been granted and to revoke it.

I leave this week with full pay for a six month contract but after working there for only nine weeks (the most frustrating of my professional life), after the company accepted that I could not even do first line helpdesk because I would require Admin access to workstations to install software.

How crazy is this? Have you heard others like it? I’d love to know … I think this company maybe run by catbert! ®

Security for virtualized datacentres

More from The Register

next story
Every billionaire needs a PANZER TANK, right? STOP THERE, Paul Allen
Angry Microsoftie hauls auctioneers to court over stalled Pzkw. IV 'deal'
WRISTJOB LOVE BONANZA: justWatch sex app promises blind date hookups
Mankind shuffles into the future, five fingers at a time
Apple's Mr Havisham: Tim Cook says dead Steve Jobs' office has remained untouched
'I literally think about him every day' says biz baron's old friend
Flaming drone batteries ground commercial flight before takeoff
Passenger had Something To Declare, instead fiddled while plane burned
Cops apologise for leaving EXPLOSIVES in suitcase at airport
'Canine training exercise' SNAFU sees woman take home booming baggage
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.