• @Land_Strider@lemmy.world
      link
      fedilink
      English
      8610 months ago

      Which was also used repeatedly over the course of 3-4 months to gain access via a non-corporate laptop without the IT doing anything about it.

      • @Zer0_F0x@lemmy.world
        link
        fedilink
        English
        1110 months ago

        I’ve been in IT for a few years and I’ve changed companies a few times. I just checked my login creds for various systems of 3 previous employers and like half of them still work. Unfortunately it’s a lot more common than any IT department would like to admit

    • yeehaw
      link
      fedilink
      English
      12
      edit-2
      10 months ago

      Technically he was not authorized to use the computer system due to his termination which the law looks at and calls hacking.

      • @KISSmyOSFeddit@lemmy.world
        link
        fedilink
        English
        2410 months ago

        No, the law specifically called this “unauthorized access to computer material”. It’s right there in the article.

        • yeehaw
          link
          fedilink
          English
          -810 months ago

          I said the law looks at whether it was authorized access or not, I was not citing any literal lines from the law. Didn’t read the article because I know this already because of the industry I work in and I took a course a number of years ago that literally was about this.