Skip to main content

请教辞职如何归还公司文件

http://gengwg.blogspot.com/发信人: nerdnerd (nerdnerd), 信区: Working
标  题: 请教辞职如何归还公司文件?
发信站: BBS 未名空间站 (Sat Nov  5 22:45:12 2011, 美东)

请教辞职如何归还公司文件?

以前用功的时候曾经将公司的一些excel sheet和文件带回家工作(用的是自己特地买
的移动硬盘。因为申请IT给弄一个的申请过程实在太漫长了)。当时老板关系好的时候
好像睁一只眼闭一只眼,并且还鼓励,因为可以加快工作进展。

但今年以来很久没有这样用功了。

同时也听说今年来某个时间开始公司封锁拷贝了,当然我也没有试过,也不知道准确的
开始时间。

如今要辞职了,如何才能归还而不引起麻烦呢?

另外我刚才检查了一下:
1. 自从今年以来我(不太用功了),所以从年初开始就再也没有碰过那些文件。
2. 下一个工作和现在的工作基本毫不相干。这些文件无法直接或间接的用到下一个工
作上。
3. 在求职和面试的时候我也没有用这些文件去谋取职位或利益。也没和人说过。
4. 我从来没有复制和转播这些文件。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...