OogieBoogie wrote:so many way to steal client information if you really want to.
the log are not for everyday check, but to find out who did wrong if the shit hits the fan. Then they have proof against the culprit if there's one. Don't think that you can go away freely after stealing client information if there's proof against you!! There's a big fine waiting for you, as well as losing your new job (nobody's want to be involved with a thief, very bad for you image), and maybe sometime in jail.
That's why for the past decade, there has been several data security standards or regulations which have been released. Some which comes to mind: BS7799 (now called ISO/IEC 27002), Basel II, Gramm-Leach-Bliley Act (GLBA), Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley Act of 2002, PCI DSS, etc. It's up to the company to implement good practices in protecting their infrastructure and their client information. Failure to secure the client information can lead to a lot of both financial (fines, etc) and non-financial (loss of customer trust in the brand/company name) issues for the company.
So there are times some companies which have been burned badly would suddenly decide to be very strict and not allow external email nor chat programs. Or after failing an IT security audit, they decide to be stricter than before.
My business is not to remake myself, but make the absolute best out of what God made. -Robert Browning