Employee Uses Malicious Compliance When IT Takes Shared L…
The Original Post
The company I work for has 1 login for a tool that my team uses many times a day. This login is shared across the entire company and because people are stupid we get locked out frequently due to people using wrong passwords, etc. So, they sent out an email stating that all requests need to be emailed to a specific group and they’ll run them in the tool and email us back.
Really inconvenient for us.
So, I started hammering this team with requests. Not a blatantly egregious amount but enough that they’re sure to get annoyed with the extra work and they see how much my team uses it.
I thought it would take a day or 2 for them to relent and give us access again but I was wrong. It took about an hour before they sent us the login info and a request to not share it with anybody else.
Victory!
What Reddit Said
Redditors absolutely loved this swift victory. Most commenters praised OP for the perfect execution of malicious compliance. However, many also pointed out the underlying IT security issues that created this mess in the first place.
The community was impressed by how quickly the strategy worked. In fact, several users shared similar stories from their own workplaces. Moreover, many noted that one hour might be a record for fastest malicious compliance success.
The Verdict
The overwhelming consensus: this is textbook malicious compliance done right. OP followed the new rules exactly while demonstrating why they were impractical. This case perfectly shows how malicious compliance can solve workplace inefficiencies when managers make poor decisions about workplace processes.
Original post from r/MaliciousCompliance (1,125 upvotes, 57 comments)