• @[email protected]
      link
      fedilink
      English
      8619 days ago

      Which was also used repeatedly over the course of 3-4 months to gain access via a non-corporate laptop without the IT doing anything about it.

      • @[email protected]
        link
        fedilink
        English
        1118 days ago

        I’ve been in IT for a few years and I’ve changed companies a few times. I just checked my login creds for various systems of 3 previous employers and like half of them still work. Unfortunately it’s a lot more common than any IT department would like to admit

    • @[email protected]
      link
      fedilink
      English
      5919 days ago

      It’s only hacking if it’s in a CVE.

      Anything else is just sparkling unauthorized access.

    • yeehaw
      link
      fedilink
      English
      13
      edit-2
      19 days ago

      Technically he was not authorized to use the computer system due to his termination which the law looks at and calls hacking.

      • @[email protected]
        link
        fedilink
        English
        2419 days ago

        No, the law specifically called this “unauthorized access to computer material”. It’s right there in the article.

        • yeehaw
          link
          fedilink
          English
          -819 days ago

          I said the law looks at whether it was authorized access or not, I was not citing any literal lines from the law. Didn’t read the article because I know this already because of the industry I work in and I took a course a number of years ago that literally was about this.