Hacker News new | past | comments | ask | show | jobs | submit login

careful. you're massively opening yourself up by using a personal machine for work. use hardware they own, with your configuration.



How?

Understanding what I do is not something most people can do, and understanding I work 100% remote (as does our entire company), and understanding there is no way IT policy in our org can affect my hardware: How?


I believe the other poster is saying that by sending a work email from your laptop or probably even by connecting to the company servers through it, your device could be theoretically investigated as part of a lawsuit. If you don’t use it for email and just type SSH on it then admittedly they probably won’t have much to find, but they could still get access.


I’m not concerned about that.

One reason I’ve been in this job so long is the behavior of the owner. He’s scrupulously ethical and fair. We frequently give away time in implementations just to be sure the customer is on a solid footing.

It’s enlightened self-interest, obviously — our reputation in the our market is now of a very, very high level of customer service, and that sells software - but it’s also just the right thing to do.


Subpoenas?




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: