Cyber technology has created many great opportunities for anyone that wishes to make use of them. While in the work place, it is easier than ever to communicate and work with coworkers while making tasks more efficient. However, with such ease of access to information in the workplace, it is also easy to misuse such privileges and information. For example, while working with other people in the office, there is easy access to contact information that someone can use outside of the office. Said contact information is, presumably, only permitted for work related issues during the work day itself. Once clocked out, the usage of employee contact information is now considered misuse of personal information. Another example is having someone releasing restricted information to those who do not have permission. In certain instances, there is sensitive information that only a few people are permitted to look in to. However, in acts of defiance, individuals can release or copy the information for other purposes beyond its original intent. A third example is if someone were to disable a firewall, hardware or software, to allow for previously unpermitted packets to enter the workplace environment. The allowance of said packets can introduce potential hacking attempts or data leaks. These three examples are among the many there are that pose as potential workplace defiance. Some acts are more malicious in nature than others are. Sometimes protected information can be shared unknowingly among coworkers, or an employee blocks their browsing activity so they can slack off on the clock. The severity of workplace deviance, in my opinion, really depends on the intent of the user’s actions and what actually occurred. Acts of defiance usually have no place in the work environment, but I believe that if the act assists in a task in the end or proves to be helpful then it should be met with little to no disciplinary action.