2009年1月9日星期五

Employee monitoring

Employee monitoring refers to any method of tracking what an employee does while at work. This may include the use of video cameraskeystroke logging, email filters, or even just watching or listening to the employee. As a result of increased technology, this has become a very important issue in the workplace. Employers have many options at their disposal when it comes to monitoring their employees, but the effectiveness and legality of each technique varies depending on the situation.

Contents

 [hide]

[edit]Employee Monitoring Techniques

[edit]Software

See also main article: Employee monitoring software

[edit]E-mail Scanning

E-mail scanning is a process in which incoming and outgoing mail passes through E-mail filtering software to search for content which may violate the policies of the employer. Often E-mails which are flagged by the filtering software will be then reviewed by a human to verify the validity of the E-mail content. Employees often consider E-mail scanning to be an invasion of privacy, but in many situations, employment contracts are written to give the employer permission to use it without legal repercussions.

[edit]Data Entry, Phone Work, And Retail

Monitoring systems can automatically count every keystroke of data-entry and data-processing clerks. Similarly, workers who answer telephone calls all day are monitored in detail. The exact number and duration of each call, and the idle time between calls, can go into an automatic log for analysis.

[edit]Video Surveillance

One of the most blatant forms of employee monitoring is through the use of Video surveillance equipment. Video feeds of employee activities are fed back to a central location where they are either recorded or monitored live by another person. This form of monitoring is invasive and can rarely be justified as necessary under privacy laws.

[edit]Location Monitoring

For employees that do not work in a static location, supervisors may chose to track their location. Common examples of this are delivery and transportation industries. In some of these cases the employee monitoring is incidental as the location is tracked for other purposes, such as determining the amount of time before a parcel will be delivered, or which taxi is closest.

[edit]Legal Issues

In Canada, it is illegal to perform invasive monitoring, such as reading an employee's emails, unless it can be shown that it is a necessary precaution and there are no other alternatives[citation needed].

The following uses of employee information are generally considered legal:

  • Find needed business information when the employee is not available.
  • Protect security of proprietary information and date.
  • Prevent or investigate possible criminal activities by employees.
  • Prevent personal use of employer facilities.
  • Check for violations of company policy against sending offensive or pornographic email.
  • Investigate complaints of harassment.
  • Check for illegal software.

[edit]Security

In some cases, monitoring an employee's work leads to monitoring the employee's life in aspects that are not related to work. This leads to acquisition of information about the employee, compromising the security of the employee.

Employee Monitoring: It's Not Paranoia—You Really Are Being Watched!

It's possible that someone has been reading your e-mails, listening to your phone calls, and tracking your Internet use. No, it's not a foreign spy. It's not even your ex—it's your employer. And she doesn't even need to tell you she's doing it.

Employers can legally monitor their workers however they want. They can log and review all computer activity as long as they own the machines. The most popular method of keeping tabs on employees is to track Internet use: A whopping 66 percent of companies monitor employee Internet activity, according to a survey released in February by the American Management Association and the ePolicy Institute. What are they looking for? Frequent visits to sexually explicit sites, game sites, and social-networking sites like Facebook on company time. Almost a third of those who said they monitor their employees have fired someone for inappropriate Web surfing.

Some companies monitor employees—tracking keystrokes, reviewing computer files, and reading e-mail—to ensure they're staying loyal. Press leaks of confidential information and trade secrets are of legitimate concern to employers, and many will go to great lengths to make sure that their employees aren't using company computers to pass on information to outside sources.

How They Do It

Most employers who monitor their workers use software loaded directly onto the workstations. Some applications, such as Websense Enterprise 5.1, are meant to monitor the Internet traffic of entire enterprises. There is no shortage of such software available for purchase by both companies and individuals. Programs like Spector Pro can keep detailed logs of keystrokes and SMTP and POP sessions, screenshots, instant messages, and URLs visited on individual computers. Spector can also be programmed to inform users at start-up that their computers are being monitored—a handy tool that can keep an employer in the legal clear.

Employee monitoring is, for the most part, completely legal. Only two states—Delaware and Connecticut—require employers to notify employees of monitoring. But most employers do (and should) make a point of alerting employees to surveillance, in order to avoid the fuzzy legal and ethical boundaries surrounding electronic privacy in the workplace. Of those surveyed who monitor their employees, 83 percent said they inform them that they're doing it.

But not every company informs employees of its actions when it should, which can lead to serious trouble. Case in point: Hewlett-Packard. In 2006, HP hired private investigators to help find the source of information leaks. They used slimy—but legal—tactics such as digging through trash, sending fake e-mails loaded with hidden tracking software, and tailing journalists who were communicating with HP employees. They crossed the legal line when they used pretexting, or posing as someone else in order to get phone records. The chairman of HP and half a dozen board members resigned or were fired as a result, and the entire debacle shed new light on the possibilities of employee monitoring in the digital age.

E-mail monitoring can be particularly tricky. Employers can look through old e-mail, but monitoring e-mails in real time as they come in and out is still a gray legal area. An employer may intercept communications where there is actual or implied employee consent. Implied consent has been found where the employer simply gave notice of the monitoring. The only area that is definitely off-limits is employees' personal laptops and hard drives.

How Do You Know?

If you're using a company-owned computer, it's probably a good idea to assume your activity is being monitored. And unless you're using encrypted e-mail, you should try to avoid using your work e-mail address for personal correspondence. If that's not realistic, then a good rule of thumb is to read every e-mail before you send it, and think about how your boss might react if he or she were reading it.

In most cases you can detect monitoring software the same way as other spyware. Any application firewall, such as Norton or McAfee, should be able to find unauthorized applications on your computer. Of course, in the case of monitoring by your employer, it's likely that IT installed the monitoring app and has therefore set up rules to allow the application to work with your firewall while remaining invisible in the background.

Some antispyware programs can detect and even remove keyloggers. If you install a program like CounterSpy V2, you'll probably be able to figure out whether you're being monitored. Check our full roundup of the best antispyware applications for more ideas.

If a spyware scan isn't revealing anything and you're still apprehensive, you can check for any suspicious processes that are running. It's hard to weed out the normal processes from the foreign ones, however, unless the invasive program creates an obvious folder or process (YouAreBeingWatched.exe). And some monitoring software, like Elite Keylogger, uses rootkit techniques, so you can't even see its processes or files. Hit Ctrl-Alt-Delete and go to the Task Manager to see a list of processes running on your workstation. You may get lucky if you're really familiar with your computer's processes, or if the program really does use an obvious name (some programs do).

Of course, the easiest way to find out whether you're being monitored is just to ask your employers. Ethical considerations will most likely push them to tell you the truth, and they probably know that if they lie it could be grounds for legal trouble later on. The responsible employer should create an Acceptable Use Policy to make what is appropriate in the workplace completely clear. But if you think you're being watched (and you're pretty sure it's not the CIA or your ex), try a standard spyware detection program or monitor your computer's processes.

If you do find you're being monitored, depending on the circumstances, you might be able to take legal action against your employer. The only legal limit on workplace surveillance comes in the form of the ECPA (the Electronic Communications Privacy Act, passed in 1986), which prohibits employers from deliberately eavesdropping on personal conversations. The ECPA does not protect any kind of communication except the spoken word, though, so your every action while at work, including personal e-mails, is most likely subject to review by your employer. You might not be able to take your employer to court for watching you at work, but at least you'll know to quit spending so much time playing Scrabulous on the company dime. —Next: Other Places You're Being Watched

Award-Winning Employee Monitoring Software

Award-Winning Employee Monitoring Software. Record and log everything your employees do - from recording employee keystrokes typed and website visits, to chats, employee emails and screenshots. Remotely control employee workstations. An invisible, stealth monitoring tool, NetVizor gives you one-click access to viewing everyone on your entire network in realtime - from one central location.

With a single click you can view the desktops of every workstation on your network, in realtime. Alternatively, you can use NetVizor's activity ticker to view a constantly-updated list of all computers on your network, showing what users are logged in, and what windows they are working with.

NetVizor's logging capabilities are virtually limitless. NetVizor can log keystrokes typed, application and website usage, detailed file system usage, incoming and outgoing chats and emails, windows interacted with, desktop screenshots, internet packet data, software installations, internet connections, and much more. All activities logged can be tied together and presented in easy-to-read graphical reports.

NetVizor employee monitoring software has built in remote administration features that allow you to remotely control remote workstations. NetVizor allows for remote workstation security auditing, remote application and windows management, file system browsing, system lockdowns, activity log viewing, reports generation, and more!

NetVizor employee monitoring software not only acts as a powerful network monitoring software solution, but also as a content filtering tool. NetVizor can filter websites from being visited by your employees, applications from being ran by the worker, and even chat messengers from being used while NetVizor is active. NetVizor can then email you when specific alerts have been triggered by your employees.

Employee Monitoring Software

Employee Monitoring Software

Employee monitoring software was designed for company administrators to monitor and supervise all their employee computers in realtime from one centralized position. Our NetVizor is your best choice which can be deployed over a business network in seconds and allow for easy centralized log viewing via one central networked PC.

All the network administrator has to do is point and click different users to view their activities! No physical presence is needed to monitor employees! Now network administrators can monitor large networks from one convenient, secure location! NetVizor is a scalable solution - so any network, from a small workgroup, to a large corporate structure, can be monitored by NetVizor!

screen snapshots of employee monitoring software


Top 4 frequently asked questions on NetVizor and employee monitoring

  • How does NetVizor monitor all my employees?
    Click here to read how NetVizor works in your company network.

  • Can NetVizor monitor ALL employees on my network from one location?
    Yes, that is the purpose of NetVizor. Once NetVizor is installed on each client on your network, you can view each PC from your central log viewer on your PC. As long as you are on the same subnet as the other PC's, you can view them with no problem!

  • How do I install/uninstall NetVizor over my network from one location?
    Please refer to NetVizor's help documentation here - this is explained in detail. 

  • What if employees use multiple machines during the day?
    Not a problem. NetVizor can be setup to log roving users as well. Please, to NetVizor's documentation for setting this up - it is very simple to do, and it allows you to view individual users, no matter what PC they use on your network.

More Questions about employee monitoring software ->



Employee Monitoring Features:

Surveillance and Monitoring

NetVizor's logging capabilities are unmatched. NetVizor can log anything from what the employee types, to emails sent/received and programs they ran - all time stamped by date for easy viewing. All logs are easily saved and exported for later use. All of NetVizor's logs can be remotely viewed from a central location for easy activity management!

  • Keystroke Monitoring
    Monitor and log all keystrokes along with the window they are typed in and time stamp.

  • Emails Sent and Received by all users
    Monitor and log all emails sent and received by users of your company! All SMTP and POP3 messages are recorded for later viewing.

  • Events Timeline Logging 
    Log all events employees performed and view them in an organized chronically ordered listing. The Events Timeline lets you view what the events the user performed, in the order they did them. Events logged include Program Starts/Stops, Website Visits, Document Viewings and Printings, and more.

  • Internet Connections
    Monitor and log all Internet sessions made on all PCs. This includes all FTP,HTTP, POP3, Chat Messenger, and any other TCP connections.

  • Internet Conversations
    Monitor and log all chat conversations made on AOL, AOL Instant Messenger, Yahoo Messenger, MSN Messenger, and ICQ

  • Website Activity
    Log all websites visited by the popular browsers: Internet Explorer, Netscape, Opera, and America Online.

  • Window Activity
    Log all windows in which the user directly interacts on the desktop.

  • Application Usage
    Monitor and log all applications ran by employees - NetVizor logs when the application was started, stopped, and how long it was actually used.

  • Software Installations 
    Record software installations performed by users - software name, installation path, and time of installation is logged.

  • Documents Opened 
    Record documents and files opened and viewed by users.

  • Print Jobs Executed
    Record documents and files that are printed by every employee.

  • Screenshot Capturing
    NetVizor can take snapshots of your desktop at set intervals of time, allowing you to visually see what is happening. The ScreenShot capture manager also has a built in Slide show viewer for easy viewing.

  • Password Logging 
    NetVizor has the ability to log all passwords used during monitoring sessions via its keystrokes recorder.

  • Activity Logging
    log all all system shutdowns and user log-ons, as well as NetVizor actions: starting/stopping of monitoring processes, option changes, log accesses, and failed access attempts to start/stop monitoring.

  • Remote Desktop Viewing
    Grab screenshots of the remote computer's desktop - allowing you to remotely view a employee's computer.

  • Remote System Information Viewing
    View a listing of various system information for the remote PC, including processor type, system directories, and more!

  • Remote Internet Connections Viewing
    View a list of the current Internet connections on the remote machine!

  • Remote Recent Document History Viewing
    View a list of the recent documents your employees have opened!

  • Realtime Remote Monitoring
    NetVizor allows you to remotely view what the user is doing in realtime - what windows are open, what applications are running, and more!


Remote Administration Features

Netvizor has built in remote administration features that allow the administrator to remotely control remote workstations. NetVizor allows for remote workstation security auditing, remote application and windows management, file system browsing, system lockdown, and more!

  • Remote System Security Auditing
    Perform a security audit on network workstations - our employee monitoring software can audit the remote workstations password and user policies, as well as improper registry settings, file shares, and Trojan/virus infections. Registry audits can be fixed remotely as well via the NetVizor web interface.

  • Remote File System Navigation and Management
    Browse and navigate the entire file system of the remote PC. The NetVizor remote file system browsing feature allows you to download, delete, and launch remote files - all through your web-browser! 

  • Remote System Lockdown Control
    Lock and unlock the remote desktop from your web-browser! This allows you to keep a user out of the remote PC, without ever having to be present at the PC! 

  • Remote Application/Task Management and Viewing
    View all running applications on the remote PC in a convenient listing on your web-browser. Control and manage tasks by closing them with a single click! 

  • Remote Open Windows Management and Viewing
    View all open Windows on the remote PC's desktop. Close the open windows with a single click! Now you can control what Windows the remote user can see! 

  • Remote System Mouse Freeze Control
    Freeze and unfreeze the remote PC's mouse with a single click! Combine this feature with the Remote Lockdown command for powerful security and control of your remote PC!

  • Remote Website Launching
    Launch a Website on the remote PC for the remote user to see!

  • Remote Application Launching
    Our employee monitoring software can launch a program on the remote PC for the remote user to use! 

  • Remote Message Display
    Display a message for the remote user to read. This allows you to send warnings, or simple messages to the remote PC!

  • Remote System Shutdown/Restart/Logoff
    Shutdown, Restart, or Logoff the remote PC from your web-browser with Netvizor!

Security and Stealth Features

Netvizor has a large array of security and stealth features. NetVizor is undetectable under all Windows versions (it does not even show up in the task manager on any Windows platform) and can circumvent popular third-party "spyware" detectors. NetVizor has powerful lockdown and logging scheduling features, optional startup warnings, and much more.  

  • Stealth-Mode
    NetVizor can run totally in stealth; that is, it is virtually undetectable to the user. NetVizor will NOT show up in the task manager under Windows - at all. NetVizor does not appear in registry and Windows startup utilities while it is running, either.

  • Log File Encryption
    Netvizor has a built in encryption option that allows you to have all your NetVizor activity logs encrypted so others cannot stumble across NetVizor's logs or read them without using NetVizor's protected log viewers. 

  • Logging Time Scheduling
    configure NetVizor to monitor and record only when you want it to!

  • PC Lockdown Scheduling
    schedule NetVizor to lock your PC down when you are not around!

  • Warning Screen
    display a splash screen which alerts users they are being monitored by the NetVizor software (totally optional).

  • Password Protection
    Our Netvizor is password protected to prevent easy monitoring termination and option changes.

  • Active Startup
    run NetVizor already in active monitoring mode.

  • Windows Startup 
    run NetVizor when Windows boots up.

  • Idle Time-out 
    NetVizor will stop logging when the user is inactive for a specified amount of time, when they are active again NetVizor resumes logging.

  • AutoClear
    you can set NetVizor to clear your monitoring logs every xxx number of actions logged, or every xxx number of keystrokes entered. This provides for minimal usage of processor speed and disk space.

  • IP Allowance Configuration
    Netvizor allows you to specify a list of IP addresses that may access the NetVizor controlled remote PC. This allows you to restrict access to IP addresses within your local network, or to only certain static IP addresses! 

  • Access Restriction Configuration
    NetVizor allows you to configure what remote options you can access through your web-browser. You can disable any features of your choosing! 

  • Spyware Detector Disabling
    Configure NetVizor to disable popular spyware detectors that may interfere or detect NetVizor running! 


Content Filtering Features

Netvizor not only acts as a powerful spy software solution, but also as a content filtering tool. NetVizor can filter websites from being visited, applications from being ran by the user, and even chat messengers from being used while NetVizor is active.

  • Application Filtering 
    NetVizor allows you to control what programs users cannot run.

  • Website Filtering 
    NetVizor allows you to control what websites users can and cannot visit.

  • Chat Filtering 
    Our employee monitoring software allows you to control what chat messengers users can and cannot use while NetVizor is running!
  • Email Alerts 
    NetVizor can be configured to send you email notifications when a user runs an unwanted Website, chat client, or application. Alerts can also be sent when the computer is started/shutdown, and when spyware detectors are installed!


Easy to Use!

Netvizor has always been known as being extremely easy to use. You can have NetVizor setup and monitoring in seconds with its built in easy configuration wizard and intuitive graphical interface. NetVizor can even be tweaked to smoothly monitor slower PC's! 

  • Network Installation and Removal
    Network administrators can deploy NetVizor over their entire network, or remove it just as easily - from one central location!

  • Point and Click User Selection
    Click and select any monitored PC OR User on your network via NetVizor's centralized viewing console!

  • Easy Report Generation
    Quickly generate reports for specific (or all) users for specific (or all) dates so you can view and save easy to read, printable logs detailing exactly what users did, and when.

  • Intuitive Interface 
    Easy to use, graphical user interface, with intuitive labeled buttons and icons!

  • Easy Configuration Wizard
    Setup NetVizor in seconds with the built in easy configuration wizard!

  • Speed Adjustment 
    Netvizor lets you adjust the thread efficiency for monitoring - this in turn eliminates lag from NetVizor on slower PC systems

System Requirements

  • Windows 95,98,ME,NT4,2000,2003,XP or Vista!
  • Pentium Class PC (133mhz or higher)
  • 3MB Hard disk space
  • Windows TCP/IP Network

2009年1月6日星期二

Employee Monitoring software

Employee Monitoring software
I am just looking for some monitoring software that will log e-mail's, im's and websites for employees. It needs to be able to work with Microsoft Exchange as well. I have tried SpectorSoft but was curious if anyone knew of any other programs. There are other monitoring programs available but they do not support Microsoft Exchange, just POP3 e-mail.

Any input would be appreciated!


Employee monitoring software

Employee monitoring software
We have a conflict at the office between two colleagues. One is accusing the other of surfing the internet most of the day, the other one says that it's not true.

I've tried checking the history file on the computer, but I really can't find a lot of non-work related stuff. But he could be erasing the history of course. 

Can anyone recommend any monitoring software that I can install to check what is true? All computer access the internet through a Small Business Server 2003, the ISA is not active.


Hi to recommend any monitoring software and then maybe point someone to a link for such a program.
I would guess although not mentioned in the forum rules,will be something that we cannot help them with.

My guess is from previous requests for such programs and that request being denied.
[does that make any sense?] 

http://www.techguy.org/rules.html
This may cover it.
Quote.
"Hacking/Interference - This is the deliberate use of any device, software, routine, or activity to achieve or attempt to achieve any interference with the proper operation of the site, as determined by the administration."

they know what i m doing in my LAN computer in office! Help me to stop them

Hi friends,

i m in a very embrassing condition at the moment.

in my office the system administrator who use to sit in the main server computer, knows every thing..tht what i m browsing , with whom and what i am chatting, and even if i m playing games or not (i played once or twice during luch).

Now he is saying tht he have taken snaps of all those activities..i wonder how he do tht.

can you please help me, so tht i could stop/block him to see my computer connected in LAN by any mean..wither he is using the main server computer

i need ur help 


He probably has monitoring software installed, and probably not JUST on your computer. And since he's the administrator and you're not, you really have no right to defeat it.

What he's doing MAY be unethical... or it MAY be under management's direction. I worked in a government office once where all internet connections had to go through a proxy server, and all traffic was logged, and every user had his own proxy login, so if someone surfed something questionable or forbidden, they knew WHO it was, and under the terms of employment - which everyone had to agree to before being given a proxy login - the person could then be disciplined, from having their proxy access denied, right up to termination.

So the real question is, are the admin's actions endorsed by management, and if so, is there something in your employment agreement that allows them to monitor your usage? If not, you may be able to complain about his actions to management... otherwise, you have two choices: watch what you do on THE COMPANY'S computers, or find another job.

I'd be very surprised if the administrator is doing the monitoring without the endorsement of company management. In fact, corporate monitoring of employee computer activity is common and VERY LEGAL. Court cases have supported the employer's right to monitor AND apply appropriate disciplinary actions against employees who abuse company property.

So the long and the short of this is, stop doing stuff on company computer systems which you don't want them to know about and you know if they see the activity you can get disciplined. I'd be highly surprised if this thread stays open due to the TOS of this forum.

Software to monitor employee surfing?

Software to monitor employee surfing?
While I really despise having to go this route, I have reached a point where I have to monitor my employee's surfing habits. Does anyone know of a program to accomplish this?

Sorry...this is a last resort thing.


Ah, the late night Elves.

Could be a PHD computer illegal person working for the cleaning company dialing home.

Yup, would start by setting up log in type accounts for all authorized users and go from there. Could be Ex-KGB agents working for the cleaning company.  

Can't you just figure out who is there late at night. Go from easy to the more difficult and intrusive solutions. Good employees may be miffed by monitoring software. Can create more problems than are solved.

Could even get one of them mini-cam like to watch the baby and determine who the late night actor really is. Can it be the building super with tool belt attached, logging in to check if a particular light is up to Code. 

Record & Control employee activities - Improve productivity

Record & Control employee activities - Improve productivity
Record & Control employee activities - Improve productivity 
Imonitor Employee Activity Monitor 4.3 Released

July 13, 2008 – Imonitor, the global award-winning provider of Monitoring tools, today announced the release ofEmployee Activity Monitor 4.3,an all-in-one solution that records and controls all employee computer activity and prevents loss of critical and confidential data from leaving the organization
Do you suspect that your employees are abusing business work hours to get ‘personal business’ done? You are not alone…
• • 56.5% of employees feel that surfing the Net or sending non-work-related E-mails decreases productivity, and 31% of employers said that they restrict employee Internet/E-mail usage. (Vault.com survey) 
Imonitor Employee activity monitor can quickly detect and give you the evidence you need to prove that your employees are abusing business work time. It can operate in total stealth - defeating the popular spyware detection tools. These abilities mean you will not have to worry about your employees discovering you are monitoring them - and even if you inform them they will still not be able to tell how. 

Key features of Employee activity monitor:
Stealth and undetectable surveillance 
Log email, instant message, keystrokes, print Jobs 
Monitor FTP file transfer, websites visited, applications used 
Monitor and control websites accessing, filter unwanted websites 
Send alarms to console when employee steals company secretes 
Record MSN, ICQ, AOL and yahoo messenger.chats by users 
Remotly control employee computers through remote desktop 
Monitor the corporation computer alteration of hardware and software 
Record software using history 
View all running processes and kill any of them 
Record live screenshots of multi network computers 
Click to learn more details about Imonitor Employee activity monitor.
Learn more bout Employee activity monitor
Pricing and Availability:
Price of Employee activity monitor: $199.95
Free Trial of Employee activity monitor: 
Download free trial of Employee activity monitor
System Requirements:
Microsoft Windows 98/2000/XP/2003/Vista 
About Imonitor Software
Imonitor Software is an industry-leading monitoring softwrare solution provider. 
To learn more about Imonitor, please visit Employee Monitoring Software

Employee Monitroing through Hardware Solutions

Hi all. I've heard some devices (like Sonicwall firewalls) can perform network monitoring, as in, deliver a report to the admin as to which sites have been accessed by which IP in a certain timeframe (say, a month). I have a client who's looking to monitor his network for employees slouching, but to do so cheaply and easily. I'd welcome any suggestions you guys might have. I know there's software that does this, but I believe he's looking for a simple hardware solution. Does anyone have any suggestions?


Hi all. Thanks for the responses. I actually believe my client's intent isn't nearly as Machiavellian as I might have phrased it. It's much les of "Let's see what Joe's doing every second of every day" and more of "Joe's been turning in stuff late for 3 months and we're about to let him go. Has he been just playing around this entire time?" He - the client - doesn't even want to know how to access the information - he simply wants to know he can hire someone to retrieve it if legal disputes arise following a firing (and believe me - that's a high-morale office... you'd have to really screw up to be let go).
Sorry if there was misunderstanding. I know Sonicwall does some sort of monitoring, but I didn't know how comprehensive the logs were or if they were adequate for what he desired. 

I hope this clarifies. Thanks so much for everyone' who's given me feedback and is taking a look at this. I hope this helps someone else in the future as well.

Now THAT is funny. I recall paying my employees to WORK, NOT to surf the internet  And we wonder why more and more jobs are being outsourced to someone who WANTS TO WORK while they are at WORK