Disaster Disgruntled HR Exec Deleted 17K Resumes And Destroyed Personnel Data After Being Fired - How's that diversity working out for ya?

An HR executive in Florida was on full demon time after getting fired and proceeded to trash the company’s personnel files and stored résumés.


Forty-one-year-old Medghyne Calonge of Tampa was charged with maliciously destroying personnel files and deleting thousands of résumés for prospective employees after being fired from 1-800-Accountant, Market Watch reports.

Prosecutors say that colleagues reported seeing Calonge repeatedly hitting the delete key after receiving her pink slip in June 2019. She had only been working there six months when she was terminated due to poor performance.


Among Calonge’s transgressions were reports of insubordination, including inappropriately locking a colleague out of a computer system after they had gotten into an argument. While being fired over the phone, colleagues recall seeing her repeatedly hit the delete button while she received the news.

After being escorted off the premises, Calonge logged into an outside computer system used to manage job applications. The terminated exec proceeded to delete 17,000 résumés and left profanity-filled messages throughout the files, prosecutors said.


“MEDGHYNE CALONGE INTENTIONALLY AND MALICIOUSLY CAUSED SEVERE DAMAGE TO THE COMPUTERS OF HER FORMER EMPLOYER,” SAID AUDREY STRAUSS, ACTING U.S. ATTORNEY FOR THE SOUTHERN DISTRICT OF NEW YORK.
“Her actions wiped out information vitally important to the employer company and cost the company money and time to repair.”

Investigators said the company spent over two years and over $300,000 on building the system that Calonge destroyed. It cost the company another $100,000 to get the system working again. However, many of the files were unable to be retrieved and are lost forever.


After a six-day trial in New York City, Calonge was convicted of two counts of damaging computers and faces upwards of 15 years in prison when sentenced on Dec. 2.

Court records show that Calonge was previously convicted of forgery in Florida in 2008 and was arrested in 2002 for writing a bad check.

(Archive)
(Link)


You know what else is a disaster?
That name. "Medghyne Calonge"
Just rolls off the tip of the ol' tongue, doesn't it?
 
Let's fire this sociopath over the phone without first revoking her privileges or at least having someone there to monitor her. What could possibly go wrong?
Remember when you used to get called into your bosses office to be fired and they'd literally have security escort you to get your shit, take your keys/passes/credentials and then physically walk you out the door specifically so you couldn't steal shit/fuck it up?
 
HR jobs have no point in existing, they're a waste of budget and fuck people over.
Na, HR does have a reason to exist. Personnel records aside, someone other than the Legal Department needs to ensure civil employment statutes and regulations are being adhered to, and outsourcing talking-to's and memos away from managers is a good idea. Its just been taken over by screeching feminists and other assorted trash that have forced out anyone that doesn't have a four year degree in underwater basket weaving, and as a result have bloated everything with incompetence.
 
Last edited:
The HR lady at my old job robbed an employee of his drugs (said she had a gun in her purse while doing it) and sexually assaulted another female employee after showing up at her second job drunk. She then held her own kid hostage from the police for hours. AND THEY STILL WANTED HER BACK.
What kind of dirt did she have on them? Double bookkeeping? Murder?
 
Prosecutors say that colleagues reported seeing Calonge repeatedly hitting the delete key after receiving her pink slip in June 2019. She had only been working there six months when she was terminated due to poor performance.
Only there for six months and has the ability to destroy company records.

She is not their biggest problem.
 
maliciously destroying personnel files and deleting thousands of résumés for prospective employees
They actually use the resumes they keep on file?
 
God this being the farms how many competent, well adjusted, normal, none troon IT people are there? I wouldnt really want a IT office myself.

But this company sounds like a bunch of clowns letting any new hire have this and it sounds like who ever fired her didnt know how to do it as well.
 
two counts of damaging computers and faces upwards of 15 years in prison when sentenced
seems high? I know computers are serious business but not 15 years serious business, she's not even a deadly blackhat hacker.
 
And they'll learn absolutely nothing from this debacle, just you watch.
So one awful dirty sad truth of the world is this, do deal with an issue you first have to admit it exists.

In terms of management structure It policey and everything else no one is gonna jump out and say "I hired her it was a mistake or Yeah the way i fired her was stupid"

Instead they will throw the bad actor under the bus etc. etc
 
  • Agree
Reactions: Kane Lives
Hiring a diversity hire by itself qualifies as getting what you fucking deserve. But holy fuck is this company incompetent.


Not even there for a year and she already had delete privileges for data that wasn't being backed up. You don't give someone access like that unless they're top brass or you've had them sign a "if you fuck with our data we get to literally kill you irl" contract.


Plus she had the ability to lock other people out of the system. She was given full sys admin privileges despite being 13% of the a brand new hire in HR. Why.


Let's fire this sociopath over the phone without first revoking her privileges or at least having someone there to monitor her. What could possibly go wrong?


Oh, and not only did she have remote access, they didn't revoke it even after she started tampering with the data. The only person dumber than this woman is whoever was in charge of IT at this company.


She'll get six months probation and do this all over again in less than a year. Count on it.
Exactly what I was thinking; while I wasn't the only one who could do it, my main role at one of my previous jobs was maintaining our ACL, Active Directory, Permissions, etc. Anytime someone at or above a certain level was leaving the company; whether through their own choice or HR making it for them, I had an email and/or a physical paper saying to kill their account.

If it was a positive leave
"They're leaving the company for something greater, their last day is Friday, they're last hour of work will end at 1200."

If it was a negative leave
"They're in HR right now, get it done."

But hey, if it wasn't for shitty IT practices, people like us wouldn't have jobs.
 
Remember when you used to get called into your bosses office to be fired and they'd literally have security escort you to get your shit, take your keys/passes/credentials and then physically walk you out the door specifically so you couldn't steal shit/fuck it up?
That is why you have copies of the keys / keycards BEFORE they terminate you. This employee was C Tier. I know of a case where I would put in A tier perhaps even S tier.

The guy worked for a university in the payroll department. For one reason or another the guy was terminated, but a few months later a rash of identity thefts happened with the university professors and admin.

Easy case right? The guy was running all the identities and cashing in?

Nope.

All involved where a mix of low lives. Drug addicts, excons, and some illegal aliens. Some claim they found all the identity info in the trash and others on a flashdrive. The shit was across regional lines to making it difficult to track.

Going back to the source, an investigation is done. The guy pops up because according to the staff, he was a computer expert (per some 50 year olds not knowing how to use Excel). They tell use that he mentioned that the IT security for the university sucked as he was able to access confidential information using a student worker account as the Personnel drive was unsecured.

So they look at this kid, but no red flags for his IT activity. Once they guy was let go, his password and account access was removed. No more external access to the accounts. The guy had no keycards and had to be let in by the personal assistant. In short, PROPER PROCEDURE was followed to prevent this type of incident.

A few more months pass by and the cops come back onto campus looking at the personal secretary for the dean and actually questioned the dean himself.

From what I heard the PA keycard was used and the dean's terminal / account credentials. The interesting note was that the dean was at an office site event that Friday and the PA had an alibi namely a campus cop she was dating.

Security footage shows a person in a campus hoodie swipes in and ways there for about 15 minutes during lunch when the office is closed. That event occured on a Friday during summer session so not a lot of witnesses. The masked guy goes to the bus stop a few minutes after the breach and gets off a few blocks later in a residential area.

What did the campus cops / security believed happened? The university, never gave the guy a dedicated keycard. Instead, the PA would give the assistant their keycard when a meeting space needed to be set up. The deans password was his dogs name in reverse but it was guessed on the first try.

The best guess is guy copied the RFID card when he knew the layoffs were coming and was doing "Go For" work. The guy had access to the dean's office as the PA kept the all the keys on one lanyard. From there, he installed a keystroke logger and gained access.

Information was just cut and pasted to an excel file and they guy made copies plus printouts and left them in sketchy areas.
 
As I've said before, ALWAYS disable access permissions before you tell the person they are fired!

Also, any company that doesn't have appropriate backups gets what they have coming to them. Faggots.

Cunt. Doesn't matter how her name is spelled, everybody will just call her a cunt.
Kek.

I knew an IT guy that made his life easier by keeping a copy of the master password file for an entire organization on a USB drive to bring with him anywhere he went so he could access anything from anywhere in the building without having to remote back to his own system. However, being able to copy the master password file is exceptionally poor security. Literally no one should have a reason to ever make a copy of that file, particularly onto an external drive. The master password file contained all the access credentials for the entire organization that had hundreds of employees, local access, departmental access, VPN access, remote vendor access, etc... literally everything, it easily contained a triple digit number of passwords. It also included, for some reason, all the volume keys for all the software for the entire organization, which is really stupid.

Eventually said IT person got sick of the shit at the company and told his boss to suck his fat dick, and walked out. Despite the fact that he never removed the USB key from the premises, he wrote to his old boss and told him to check the USB key in question, and what a poor security practice it was to allow the master password file to be copied to an external drive, since it could be copied to ANY number of external drives and taken off property... The IT guy heard from the people he knew that still worked there that his old boss apparently had a nervous breakdown knowing that it was possible that the entire password file was compromised. He not only had to tell the president and CEO, which nearly cost him his job. They then had to change each password, update each department, VPN user, remote vendor, etc... as well as get new volume software keys and update those. It was nearly a month before sanity was restored.
 
Last edited:
Back