Jim Markunas, editor in chief of CWG Magazine (cwgmagazine.com), has recently been discovered to be unlawfully using former employees' email accounts, AFTER they've left the company, to conduct business. Two employees have discovered that he was unlawfully monitoring their email accounts after they'd left the company, and used information in those accounts to purchase web domains and publish other works in order to ensure that CWG maintained intellectual rights over works that were not developed for CWG. More importantly, Jim had assured both former employees that these email accounts had been DELETED in January, not simply "deactivated."
Aside from these illegal activities, Jim has used watermarked photos from Getty without permission or proper credit (according to their site policies), and has admitted to using fraudulent means to get email subscribers: he would post ads on Craigslist for new writers, and anyone that emailed in their resume was added by Jim to his magazine's subscriber list, without them knowing. This is spam, and it is illegal because it is identity theft: he is taking your email and signing you up for a service you don't even know about!
These practices and others reveal the underhanded, unprofessional nature of Jim Markunas and CWGMagazine.com, so avoid them at all costs!
TBan
North Hollywood,#2Author of original report
Fri, February 19, 2010
Correct. At the time of the first post, I did not realize the implications of the former employee's email, which is why I added the second post, which speaks to the underhanded practices of domain squatting and unethical use of email addresses to bolster subscriber lists. These unethical practices create their own issues of privacy: spam email, a punishable offense under several new cyber spam laws.
Epyon
Hell,#3General Comment
Thu, February 18, 2010
Management will have unrestricted access to information stored in the computer systems. Personal passwords should not be considered a guarantee of privacy. Employees should not expect any information stored on the firm's computer system to be private. From time to time, especially if you are absent, Management may access your computer or files to better serve our business needs. The employee's personal information and documents stored in the firm's system will not be protected, as described in the state of Californias Standards & Practices for network conduct Confidentiality policy Section 3.3.
TBan
North Hollywood,#4Author of original report
Tue, February 16, 2010