A former Twitter employee, Gary Rooney, won about $600,000 for unfair dismissal after Twitter assumed he resigned by not responding to Elon Musk’s “hardcore” work email.

The case highlighted the importance of clear communication between employers and employees, especially regarding significant changes in employment terms.

Rooney’s private Slack messages, where he discussed leaving, were used as evidence by Twitter, underscoring that internal communication on platforms like Slack is not always private and can be used in legal disputes.

  • ceenote@lemmy.world
    link
    fedilink
    arrow-up
    185
    arrow-down
    6
    ·
    9 days ago

    internal communication on platforms like Slack is not always private

    That’s common sense, frankly.

    • Paddzr@lemmy.world
      link
      fedilink
      arrow-up
      91
      arrow-down
      3
      ·
      9 days ago

      But people don’t understand it.

      Hell, no email sent or received is yours and likely can never be truly deleted off your company’s exchsnge. Same with files etc.

      It’s not common knowledge, let’s not pretend it is and educate people.

      • QuarterSwede@lemmy.world
        link
        fedilink
        arrow-up
        14
        ·
        9 days ago

        True that. I have to tell employees regularly to not send any chat or email they don’t want read in court. That usually gets the point across.

      • bluGill@fedia.io
        link
        fedilink
        arrow-up
        12
        arrow-down
        24
        ·
        9 days ago

        Most companies have a strict policy to delete everything off of exchange after a few months unless there is a reason to keep it longer. You can’t bring up in court anything that wan daleted before you looked.

        • HeyJoe@lemmy.world
          link
          fedilink
          arrow-up
          25
          arrow-down
          1
          ·
          9 days ago

          I don’t think that’s true. We archive all email within the company as soon as it arrives. This is done to prevent an employee from deleting any evidence for many reasons that they may have. We are also on litigation hold which requires all data to be saved and since we can’t trust everyone to do this we are required to back up everything until we are told not to. We have used restored data many times for legal cases in the past.

          • ByteJunk@lemmy.world
            link
            fedilink
            arrow-up
            12
            ·
            9 days ago

            Where I work there is a data retention policy, and emails and other forms of communication (internal emails and slack, but even customer calls, etc) are deleted after a set amount of time, which varies depending on the rationale for storing that data.

            There’s many reasons to do this - limit disclosure issues in case of litigation, reduce storage costs, comply with PII rules around the world, etc. The guys in Legal have us file these loong ass forms about all this, including where the data is kept, security measures, etc etc etc.

            I’m shocked this isn’t common practice everywhere.

            • Silic0n_Alph4@lemmy.world
              link
              fedilink
              arrow-up
              17
              arrow-down
              2
              ·
              9 days ago

              There are two main types of data retention policy:

              • Retain everything to protect the company when the staff do something dodgy.
              • Delete everything to protect management when management do something dodgy.

              It’s a little more nuanced than that, of course, but in broad strokes that’s how I’ve seen it play out. Does the company want to pin the blame on somebody or shrug and say “we have no idea how that can have happened, guess we need to forget about it.”

            • parrhesia@sh.itjust.works
              link
              fedilink
              arrow-up
              1
              ·
              8 days ago

              I think that’s an understandable position but IT is ruled in a cost benefit analysis for many small to medium sized businesses, so I am sure if it’s as common practice there

          • linearchaos@lemmy.world
            link
            fedilink
            English
            arrow-up
            9
            ·
            9 days ago

            No he’s actually right, it’s a SOX thing. Not all companies do it but big ones with good legal departments generally do. Especially if they’re into shady s***.

            The concept rules like this: we delete all emails over 90 days old. If someone subpoena’s emails over 90 days old we simply say they don’t exist we delete emails over 90 days old and show them the policy. From there it gets a little more dicey if people cram stuff into local stores.

            From a corporate standpoint there’s a strong advantage to deleting all of your old emails and not keeping backups over 90 days especially for anything that might be legally questionable.

            That said with the advent of SAAS, there’s a hell of a lot of data out there that doesn’t ever go away even if you do your best to make it happen.

        • AlecSadler@sh.itjust.works
          link
          fedilink
          arrow-up
          4
          ·
          8 days ago

          I’ve contracted for companies with email policies that nuke anything older than 30 days.

          I typically learn it the hard way when I go back to look for an email I need and…it has been deleted.

    • sylver_dragon@lemmy.world
      link
      fedilink
      English
      arrow-up
      29
      arrow-down
      1
      ·
      9 days ago

      When I worked as a US FedGov contractor, I was greeted with a long warning banner every time I logged into my computer. The tl;dr version of it is “fuck your privacy”. Being that I was part of cybersecurity for the site I was working at, I was one of the people doing the fucking. While we didn’t read everything from everyone all the time, we were logging it and could pull it up, if we were performing an investigation. We also had some automated stuff scanning for patterns and keywords on a regular basis, which could trigger an investigation.

      While I’m no longer in the FedGov space (thank the gods), I still assume that everything I do on my work system or with work accounts is being logged. Also, I’m still working in cybersecurity and am often still the one doing the privacy fucking. Yes, everything is being logged. We may not look at it today, we may not look at it tomorrow. But, when HR and Legal ask us about a user’s activity, we can usually be pretty detailed. Act accordingly.

      • CosmicTurtle0@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        1
        ·
        9 days ago

        My company is better than most I’ve worked for. They tell you, upfront, anything on their equipment can be monitored for any reason with no warning.

        But then, as part of the HR and acceptable use policy, no one will monitor your activities without just cause and investigation. Meaning in practice, “We’re not going to look over your shoulder while you watch YouTube videos but if we notice you’re watching a lot of or you start visiting porn sites, we’re going to start monitoring you.”

        Now all that said, I still assume that my company knows every key I type on their laptop.

        • lightnsfw@reddthat.com
          link
          fedilink
          arrow-up
          3
          ·
          9 days ago

          Mines the same way. It’s actually kind of difficult to get approval to monitor someone. Has to be approved by two VPs.

        • sylver_dragon@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          8 days ago

          I would assume they have some basic stuff running 24x7. I can’t imagine a network which doesn’t have Endpoint Detection and Response (EDR) running 24x7 these days. There’s also things like firewall logs, which are almost certainly being captured (or at least netflow). Stuff like screen recording and mouse monitoring is probably saved for extreme cases. That said, my own experience has been pretty close to:

          We’re not going to look over your shoulder while you watch YouTube videos but if we notice you’re watching a lot of or you start visiting porn sites, we’re going to start monitoring you.

          Quite frankly, no one’s got time for that shit. I work at an organization with a bit north of 25,000 employees, and we have less than a dozen security analysts. While I could run a search against our firewall logs and see evidence of folks dicking around. I have much better things to do, like running down abnormal processes and writing up reports on users who got their systems infected while dicking around. And that’s really the way it comes to our attention, most of the time. Someone is out trying to download movies or software on their work laptop (you’d think people would know better…) and they pickup malware. We get an alert and start investigating. While trying to determine the source, we pull browser history and see the user out on “SketchyMovieSite[.]xyz”. And then their dicking around becomes our problem, mostly because the site had a malicious redirect, which is where the infection came from.

          So ya, they may not be looking, but I’d always bet they are recording. Logging isn’t useful if it isn’t recording at the time of the compromise.

  • xmunk@sh.itjust.works
    link
    fedilink
    arrow-up
    143
    arrow-down
    1
    ·
    edit-2
    9 days ago

    Fucking good. I’ve had to fire people (up in Canada though) and it’d be fucking ridiculous to “Please opt in to not be fired” it violates so many fucking employment laws.

  • breadsmasher@lemmy.world
    link
    fedilink
    English
    arrow-up
    115
    ·
    9 days ago

    american-based billionaire attempts to use american capitalist tactics against an employee who is not in america. fails spectacularly.

    are workers rights communism now? /s