Feeds

Skiving Aussie fingered on Facebook

Epic fail for sickie-throwing call centre employee

High performance access to file storage

An Oz call centre employee has become an overnight net celeb down under after an email exchange between him and his firm's workforce manager regarding a "sickie" escaped into the wild yesterday.

The correspondence, currently doing the rounds of Aussie inboxes, concerns a day's leave of absence claimed by Kyle Doyle on 21 August. Read on...

From: Niresh Regmi
Sent: Wednesday, 27 August 2008 9:35 a.m.
To: Kyle Doyle
Subject: Absence on Thursday 21st 2008

Hi Kyle,
Please provide a medical certificate stating a valid reason for your sick leave on Thursday 21st 2008.
Thank You

NIRESH REGMI
Real Time Manager, Workforce Operations


From: Kyle Doyle
Sent: Wednesday, 27 August 2008 9:38 a.m.
To: Niresh Regmi
Subject: RE: Absence on Thursday 21st 2008

Niresh,
1 day leave absences do not require a medical certificate as stated in my contract, provided I have stated that I am on leave for medical reasons.
Thanks
Regards,

Kyle Doyle
Resolutions Expert - Technical


From: Niresh Regmi
Sent: Wednesday, 27 August 2008 9:39 a.m.
To: Kyle Doyle
Subject: RE: Absence on Thursday 21st 2008

Hi Kyle,
Usually that is the case, as per your contract. However please note that leave during these occasions is only granted for genuine medical reasons. You line manager has determined that your leave was not due to medical reasons and as such we cannot grant leave on this occasion.

NIRESH REGMI


From: Kyle Doyle
Sent: Wednesday, 27 August 2008 9:43 a.m.
To: Niresh Regmi
Subject: RE: Absence on Thursday 21st 2008

Hi Niresh,
My leave was due to medical reasons, so you cannot deny leave based on a line manager's discretion, with no proof, please process leave as requested.
Thanks
Regards,

Kyle Doyle


From: Niresh Regmi
Sent: Wednesday, 27 August 2008 9:50 a.m.
To: Kyle Doyle
Subject: RE: Absence on Thursday 21st 2008

Hi Kyle,
I believe the proof that you are after is below

Kyle Doyle' Facebook page declaring: Kyle Doyle is not going to work, f... it -- I'm still trashed. SICKIE WOO!

Brilliant. To his credit, the busted Doyle concludes:

From: Kyle Doyle
Sent: Wednesday, 27 August 2008 9:55 a.m.
To: Niresh Regmi
Subject: RE: Absence on Thursday 21st 2008

HAHAHA LMAO epic fail
No worries man
Regards,

Kyle Doyle

®

High performance access to file storage

More from The Register

next story
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.