Obviously if something happens physically or even in the matrix that shouldn't be then the spider going to go looking. But if all you do is go there get marks on a file and copy the file and leave why would the spider even know if you had legit access to that file to copy?
All of this operates under the assumption that the marks a TM gets are inherently different from the marks a decker generates. While this is certainly one reading of things, it is by no means the only reading. Indeed, if you factor in design elements like game balance and parallel rules (which seems to be a big thing in 5e), there seems to be reason to conclude that decker marks and TM marks are, or at least should be, the same. My interpretation is, obviously, also an interpretation. But my interpretation is grounded in the context of the game as a whole. I don't see the contextual support for the TM marks are "real" line of thinking.
The way the game is set up has some inconsistencies in the rules when dealing with marks. People are trying to explain it away and those explanations make sense when you only account for deckers but technomacers kinda blow that explanation out of the water. The big issue here is they need to make a difference for hacked marks and legit marks.
Not really (see above). The method of acquisition is different, but the effect is identical. People are free to come up with whatever plausible explanation for the rules they want for their table. PC vs. NPC marks is how I'm going about it and TM marks work perfectly fine within the PC mark heading.
This doesn't just effect TM's. Say you as a decker have a face buddy of yours convince a tech in a corp to give you marks on a file that normally just would be impossible to hack. Sweet now you can just copy the file no test right? Wrong by the rules you still have to roll even though you have legit marks. By these rules no player can do any matrix action legit or not without GOD coming for them at some point. The exception being TM but only because they are not really doing matrix actions but resonance actions.
Unless the decker got a SIN and was added to payroll, no. If the decker got a SIN and was added to payroll, he probably has other issues. The decker probably should have asked his buddy to copy the file to a chip. I work at a university. You can't even get a @university.edu email here without going through a number of different departments. No single office, let alone single person, generates that kind of authority. A single wageslave can't, on his own, give some random username corporate access.