In the workplace of this pilot fish, management has implemented a new idea: highly qualified and highly paid regular IT employees will monitor teams of low-end contractors.
“Ostensibly, it’s opening doors so they can have access to the rooms,” the fish complains. But the contract requires that all contractors have valid security authorizations, accept the company’s rules of behavior and take their training in computer security and privacy.
“After all this, they are not allowed to do their job unless one of our IT people” escorts them, “sighs fish.
“I believe in trusting but verifying, but isn’t this taking it too far? How can we afford to pay people for not doing their job, but we can’t afford to hire anyone to fill vacancies?”
To read this full article, click here.