Hi All,
I am currently working in X foreign MNC. I joined there more than 4 months ago. Before that, I worked in Y MNC. But due to some family problem, I resigned and couldn't serve the notice period and left the job and came to my hometown. I called my manager of Y MNC one day for experience and relieving documents, and he fired me over the phone when I was at home; the chapter ended there.
After that, I gave high-end training to some fresh resources at a small-scale organization for free of cost. In return, the small-scale organization HR gave me certificates to search for a job to fill the gap. Now in X MNC, my background was not cleared in pre-employment verification. But due to my strong technical background, I got a project in the X MNC. After I was allocated to the project, their screening agency called the small-scale org. where I gained experience. They gave good comments about me. After I completed 2 months with X MNC, I submitted my resignation. They have accepted the resignation. Recently, I came to know that my project manager of X MNC doesn't want to issue a relieving letter to me. For blocking the relieving letter, they are going to terminate me before the exit process for the initiated resignation.
In these events, they have done some nasty things to me. I have heard some of their conversations. I am sure my recruiter of X MNC has provided my home laptop's IP address where I received the offer letter and all this (IP address of the Gmail sender) to my office persons. In that company, all Gmail and Facebook are blocked. Also, they installed spyware on the company's machine where I'm currently working by emailing spyware attachments in the form of project documents or defect Excel sheets. I don't have an issue with it because it's the company's equipment. They hacked my personal laptop using the recruiter-provided IP address. They downloaded all my personal, sensitive, and confidential data to construct evidence for termination. They sent email spyware (keylogger or surveillance software) attachments in the form of job emails in PDF and DOC formats to my newly changed personal Gmail ID, which I put on my resume and was residing on my PC. This is, in fact, an employee monitoring or surveillance case. For me, it's like Wikipedia. I don't have evidence against them because they have done it from proxy servers. This is a clear violation of Section 66A of the IT Amendment Act. Up till now, charges for misrepresentation of facts against me have not been proved by them.
If they don't provide me with a relieving letter, should I escalate such nefarious activities to the HEAD HR, or is it a common practice to do this to those whose backgrounds are not cleared?
Thanks and Regards, Dnaneshwar
From India, Pune
I am currently working in X foreign MNC. I joined there more than 4 months ago. Before that, I worked in Y MNC. But due to some family problem, I resigned and couldn't serve the notice period and left the job and came to my hometown. I called my manager of Y MNC one day for experience and relieving documents, and he fired me over the phone when I was at home; the chapter ended there.
After that, I gave high-end training to some fresh resources at a small-scale organization for free of cost. In return, the small-scale organization HR gave me certificates to search for a job to fill the gap. Now in X MNC, my background was not cleared in pre-employment verification. But due to my strong technical background, I got a project in the X MNC. After I was allocated to the project, their screening agency called the small-scale org. where I gained experience. They gave good comments about me. After I completed 2 months with X MNC, I submitted my resignation. They have accepted the resignation. Recently, I came to know that my project manager of X MNC doesn't want to issue a relieving letter to me. For blocking the relieving letter, they are going to terminate me before the exit process for the initiated resignation.
In these events, they have done some nasty things to me. I have heard some of their conversations. I am sure my recruiter of X MNC has provided my home laptop's IP address where I received the offer letter and all this (IP address of the Gmail sender) to my office persons. In that company, all Gmail and Facebook are blocked. Also, they installed spyware on the company's machine where I'm currently working by emailing spyware attachments in the form of project documents or defect Excel sheets. I don't have an issue with it because it's the company's equipment. They hacked my personal laptop using the recruiter-provided IP address. They downloaded all my personal, sensitive, and confidential data to construct evidence for termination. They sent email spyware (keylogger or surveillance software) attachments in the form of job emails in PDF and DOC formats to my newly changed personal Gmail ID, which I put on my resume and was residing on my PC. This is, in fact, an employee monitoring or surveillance case. For me, it's like Wikipedia. I don't have evidence against them because they have done it from proxy servers. This is a clear violation of Section 66A of the IT Amendment Act. Up till now, charges for misrepresentation of facts against me have not been proved by them.
If they don't provide me with a relieving letter, should I escalate such nefarious activities to the HEAD HR, or is it a common practice to do this to those whose backgrounds are not cleared?
Thanks and Regards, Dnaneshwar
From India, Pune
I didn't store any single personal confidential data on the company's computer. I didn't misuse company resources. They did it to my home PC. Also, nowadays, anti-spyware cannot detect spyware. You cannot see the computer's running processes. They run invisibly in the background.
From India, Pune
From India, Pune
the work machine(company’s equipment ) where I work is desktop computer.I’m having home PC that is my own laptop.
From India, Pune
From India, Pune
"You cannot see on a computer running processes. They run invisibly in the background."
While in no way trying to disagree with this statement or find fault, the three-finger salute (Cmd+Alt+Del) or running the command netstat-an would bring out details which one could try to check out programs, listening ports, etc. I occasionally use https://www.grc.com/x/ne.dll?bh0bkyd2 to probe my computer. I do not see much hope in legally taking it up since you too have a weak point of termination. Try to sit across with HR and sort out the issue while you can politely let them know you are aware of your personal PC being monitored, invaded, etc. Cybercrimes are difficult to prove, and when proxy servers are involved, it is almost impossible. Best of luck in sorting out this problem.
From India, Pune
While in no way trying to disagree with this statement or find fault, the three-finger salute (Cmd+Alt+Del) or running the command netstat-an would bring out details which one could try to check out programs, listening ports, etc. I occasionally use https://www.grc.com/x/ne.dll?bh0bkyd2 to probe my computer. I do not see much hope in legally taking it up since you too have a weak point of termination. Try to sit across with HR and sort out the issue while you can politely let them know you are aware of your personal PC being monitored, invaded, etc. Cybercrimes are difficult to prove, and when proxy servers are involved, it is almost impossible. Best of luck in sorting out this problem.
From India, Pune
Hello Dnaneshwar,
You may not like this.
You have been working at X MNC for 4 months and didn't complete your Notice Period at Y MNC.
You haven't mentioned how long you worked at Y MNC. How long were you there before resigning and leaving without completing the NP?
And now you have resigned from X MNC as well?
You mentioned, "I called my manager of Y MNC one day for experience and relieving documents...". What does 'one day' mean? When did this happen... shortly after returning to your hometown or later?
You provided high-end training to some new recruits at a small-scale organization for free and received an Experience Letter to fill the gap. This was in your interest.
Do you think that MNCs should not protect their interests, as they see fit?
Have you considered the possibility that X and Y MNCs might suspect you of working as a spy for their competitors, leading them to install Spyware on your computers to verify or gather evidence? Such incidents are not uncommon in the IT industry, whether they are detected or not.
"I didn't store any personal confidential data on the company's computer. I didn't misuse company resources. They accessed my home PC." That's your perspective. While you may be trustworthy, once doubt arises, companies tend to explore all possibilities, including home PCs. Some IT professionals, or perhaps "smart techies," with dubious intentions, may use personal computers for improper activities, aware that office devices can be monitored.
Essentially, your actions allowed mistrust to develop in the first place, so it's up to you to address it.
I agree with Nathrao's recommendations in this matter.
All the Best.
Rgds,
TS
From India, Hyderabad
You may not like this.
You have been working at X MNC for 4 months and didn't complete your Notice Period at Y MNC.
You haven't mentioned how long you worked at Y MNC. How long were you there before resigning and leaving without completing the NP?
And now you have resigned from X MNC as well?
You mentioned, "I called my manager of Y MNC one day for experience and relieving documents...". What does 'one day' mean? When did this happen... shortly after returning to your hometown or later?
You provided high-end training to some new recruits at a small-scale organization for free and received an Experience Letter to fill the gap. This was in your interest.
Do you think that MNCs should not protect their interests, as they see fit?
Have you considered the possibility that X and Y MNCs might suspect you of working as a spy for their competitors, leading them to install Spyware on your computers to verify or gather evidence? Such incidents are not uncommon in the IT industry, whether they are detected or not.
"I didn't store any personal confidential data on the company's computer. I didn't misuse company resources. They accessed my home PC." That's your perspective. While you may be trustworthy, once doubt arises, companies tend to explore all possibilities, including home PCs. Some IT professionals, or perhaps "smart techies," with dubious intentions, may use personal computers for improper activities, aware that office devices can be monitored.
Essentially, your actions allowed mistrust to develop in the first place, so it's up to you to address it.
I agree with Nathrao's recommendations in this matter.
All the Best.
Rgds,
TS
From India, Hyderabad
You have written a nice long story.
But it's a story, and it has a lot of holes in it.
Either you like stories, or you are paranoid delusional.
Your recruiter gave your employer the IP address of your home computer.
Very interesting. How did he get it?
What type of an Internet connection do you have at home that gives a static IP THAT IS PUBLIC? Internet from any standard ISP in India comes with dynamic IP. In case of the remaining, a static IP will be behind NAT or will be a private IP. His firewall will prevent someone from coming through to your PC at home.
You were sent spyware through email, and you installed it (even on your home PC). You didn't notice the difference between executable files and project files? You got spyware through Excel? Really? I would definitely like to meet the guy who made an Excel-based spyware capable of extracting and mailing out your confidential information. I will pay him a good amount of money for it too, with a commission to you for introducing him to me.
But it appears basically either this is a pack of lies or that you know actually nothing about computers.
You are not able to see the spyware (or find any processes by using the task manager). Everything is invisible, but you know they are there (how? You must be a master programmer to know that there are invisible programs running that you can't detect).
Anti-Spyware software is not capable of knowing there are spyware in your PC. Really? Then why have you installed them at all? And why would they exist if that were true?
If you don't have any proof that a cybercrime has been committed, then what do you expect to go to the police with? And if that option is not there, I wonder what you are actually trying to get/clarity from the members of this forum?
From India, Mumbai
But it's a story, and it has a lot of holes in it.
Either you like stories, or you are paranoid delusional.
Your recruiter gave your employer the IP address of your home computer.
Very interesting. How did he get it?
What type of an Internet connection do you have at home that gives a static IP THAT IS PUBLIC? Internet from any standard ISP in India comes with dynamic IP. In case of the remaining, a static IP will be behind NAT or will be a private IP. His firewall will prevent someone from coming through to your PC at home.
You were sent spyware through email, and you installed it (even on your home PC). You didn't notice the difference between executable files and project files? You got spyware through Excel? Really? I would definitely like to meet the guy who made an Excel-based spyware capable of extracting and mailing out your confidential information. I will pay him a good amount of money for it too, with a commission to you for introducing him to me.
But it appears basically either this is a pack of lies or that you know actually nothing about computers.
You are not able to see the spyware (or find any processes by using the task manager). Everything is invisible, but you know they are there (how? You must be a master programmer to know that there are invisible programs running that you can't detect).
Anti-Spyware software is not capable of knowing there are spyware in your PC. Really? Then why have you installed them at all? And why would they exist if that were true?
If you don't have any proof that a cybercrime has been committed, then what do you expect to go to the police with? And if that option is not there, I wonder what you are actually trying to get/clarity from the members of this forum?
From India, Mumbai
Just re-read your post.
Keyloggers and spyware are sent to you in the form of Doc files, Excel sheets, and PDF files! My god! You will create a sensation in the computer security world if you can show them such things. The security of the world as we know it will collapse around us. Virus in PDF files! Really.
(I hope readers of this thread recognize the sarcasm)
From India, Mumbai
Keyloggers and spyware are sent to you in the form of Doc files, Excel sheets, and PDF files! My god! You will create a sensation in the computer security world if you can show them such things. The security of the world as we know it will collapse around us. Virus in PDF files! Really.
(I hope readers of this thread recognize the sarcasm)
From India, Mumbai
You should make 2 to 3 times more requests asking your boss and HR for the required documents. In doing so, you may hear from him that company rules were not observed as warranted in your case. Politely mention the rule of law, explaining that there were circumstances that required you to leave suddenly to join another company. At the same time, you can also point out that the company is not observing the law as you are highlighting in your post above.
Approach the HR manager over the phone and involve him in the conversation. Dedicate at least 4-6 weeks to this process seriously, and hopefully, good sense will prevail.
From India, Delhi
Approach the HR manager over the phone and involve him in the conversation. Dedicate at least 4-6 weeks to this process seriously, and hopefully, good sense will prevail.
From India, Delhi
Dear All,
Thank you for your reply. I'm resolving my issue on my own. I agree with @TAJSATEESH.
Exit clearance for X MNC has started for me, and some of the clearances are completed, but some major ones are remaining.
My boss is not releasing me from the project. I have requested through email to be released from the project citing health problems. To avoid termination, for the remaining days (around 10 plus days), I am planning to go to the company for swap in and swap out. I will be on the bench and not doing any work. In that case, what will happen? Will my salary get cut, or will I be treated as absconding? Please help.
@SASWATABANERJEE
Sirji, according to you, there is no concept of spyware remote install. The fact is one can embed that program in JPEG, DOC, mp3, RAR, and ZIP files and send them as email attachments to the target.
In Western countries, a lot of people, especially spouses, parents, and people in love relationships, do that on the target's PC and smartphones. They use licensed programs like sniperspy, winspy, etc. Many individuals upload remote files to free hosting sites like ripway.com and t35.com and ask the victim to download them. Once double-clicked, the program gets installed and runs in stealth mode, remaining undetectable in most cases. Some spywares easily bypass Windows firewalls.
If one's computer is running under Wi-Fi, one may access the PC remotely provided one of the ports should be open.
As far as I'm concerned, a good psychiatrist will tell me whether I have any mental disorders: mood disorders (like bipolar, clinical depression) or personality disorders (like BPD, PPD, OCPD, NPD, etc.) or any childhood ADHD. He will tell me whether I have distorted thinking or if I'm gaslighting. Sorry if you get angry. Thanks for your suggestion.
Thanks and Regards,
Dnaneshwar
From India, Pune
Thank you for your reply. I'm resolving my issue on my own. I agree with @TAJSATEESH.
Exit clearance for X MNC has started for me, and some of the clearances are completed, but some major ones are remaining.
My boss is not releasing me from the project. I have requested through email to be released from the project citing health problems. To avoid termination, for the remaining days (around 10 plus days), I am planning to go to the company for swap in and swap out. I will be on the bench and not doing any work. In that case, what will happen? Will my salary get cut, or will I be treated as absconding? Please help.
@SASWATABANERJEE
Sirji, according to you, there is no concept of spyware remote install. The fact is one can embed that program in JPEG, DOC, mp3, RAR, and ZIP files and send them as email attachments to the target.
In Western countries, a lot of people, especially spouses, parents, and people in love relationships, do that on the target's PC and smartphones. They use licensed programs like sniperspy, winspy, etc. Many individuals upload remote files to free hosting sites like ripway.com and t35.com and ask the victim to download them. Once double-clicked, the program gets installed and runs in stealth mode, remaining undetectable in most cases. Some spywares easily bypass Windows firewalls.
If one's computer is running under Wi-Fi, one may access the PC remotely provided one of the ports should be open.
As far as I'm concerned, a good psychiatrist will tell me whether I have any mental disorders: mood disorders (like bipolar, clinical depression) or personality disorders (like BPD, PPD, OCPD, NPD, etc.) or any childhood ADHD. He will tell me whether I have distorted thinking or if I'm gaslighting. Sorry if you get angry. Thanks for your suggestion.
Thanks and Regards,
Dnaneshwar
From India, Pune
Frankly, neither I nor most on this forum really care for your psychiatric profile. We care about problems posted, solutions, and learning from the points posted. The rest is immaterial to me at least. I still don't believe most of what you wrote about the wrong things done by your company to you.
I don't know what your technical skills are. But I run an organization that is pretty strong on tech. So when I see a story listed that is technically impossible, I reply as such.
Whether people in western countries use licensed or unlicensed spyware is immaterial to the post you have made. You put a lot of things that were about how they have invaded your PC. For one, I know very clearly, you cannot put spyware or any executable inside a PDF file. The embedded JavaScript to load a virus/spyware from Excel or Doc into the core operating system and make it invisible would be stopped by the basic security, and in fact, even macros are disabled by default. If you clicked on an executable and that installed the spyware, then why blame the other party?
I am glad you figured out how to settle your problems with the company. I hope it was through posts my colleagues in the forum made. But there was no point actually in putting in a lot of tech garbage (for most of us here who don't understand tech, it's Greek and Latin anyway). Just explaining the real problem would be enough.
So let's focus now on the solution. If there is something missing there, please state it, and members of the forum will suggest the relevant/possible solutions.
From India, Mumbai
I don't know what your technical skills are. But I run an organization that is pretty strong on tech. So when I see a story listed that is technically impossible, I reply as such.
Whether people in western countries use licensed or unlicensed spyware is immaterial to the post you have made. You put a lot of things that were about how they have invaded your PC. For one, I know very clearly, you cannot put spyware or any executable inside a PDF file. The embedded JavaScript to load a virus/spyware from Excel or Doc into the core operating system and make it invisible would be stopped by the basic security, and in fact, even macros are disabled by default. If you clicked on an executable and that installed the spyware, then why blame the other party?
I am glad you figured out how to settle your problems with the company. I hope it was through posts my colleagues in the forum made. But there was no point actually in putting in a lot of tech garbage (for most of us here who don't understand tech, it's Greek and Latin anyway). Just explaining the real problem would be enough.
So let's focus now on the solution. If there is something missing there, please state it, and members of the forum will suggest the relevant/possible solutions.
From India, Mumbai
Engage with peers to discuss and resolve work and business challenges collaboratively. Our AI-powered platform, features real-time fact-checking, peer reviews, and an extensive historical knowledge base. - Register and Log In.