2009年1月9日星期五

Employee monitoring

Employee monitoring refers to any method of tracking what an employee does while at work. This may include the use of video cameraskeystroke logging, email filters, or even just watching or listening to the employee. As a result of increased technology, this has become a very important issue in the workplace. Employers have many options at their disposal when it comes to monitoring their employees, but the effectiveness and legality of each technique varies depending on the situation.

Contents

 [hide]

[edit]Employee Monitoring Techniques

[edit]Software

See also main article: Employee monitoring software

[edit]E-mail Scanning

E-mail scanning is a process in which incoming and outgoing mail passes through E-mail filtering software to search for content which may violate the policies of the employer. Often E-mails which are flagged by the filtering software will be then reviewed by a human to verify the validity of the E-mail content. Employees often consider E-mail scanning to be an invasion of privacy, but in many situations, employment contracts are written to give the employer permission to use it without legal repercussions.

[edit]Data Entry, Phone Work, And Retail

Monitoring systems can automatically count every keystroke of data-entry and data-processing clerks. Similarly, workers who answer telephone calls all day are monitored in detail. The exact number and duration of each call, and the idle time between calls, can go into an automatic log for analysis.

[edit]Video Surveillance

One of the most blatant forms of employee monitoring is through the use of Video surveillance equipment. Video feeds of employee activities are fed back to a central location where they are either recorded or monitored live by another person. This form of monitoring is invasive and can rarely be justified as necessary under privacy laws.

[edit]Location Monitoring

For employees that do not work in a static location, supervisors may chose to track their location. Common examples of this are delivery and transportation industries. In some of these cases the employee monitoring is incidental as the location is tracked for other purposes, such as determining the amount of time before a parcel will be delivered, or which taxi is closest.

[edit]Legal Issues

In Canada, it is illegal to perform invasive monitoring, such as reading an employee's emails, unless it can be shown that it is a necessary precaution and there are no other alternatives[citation needed].

The following uses of employee information are generally considered legal:

  • Find needed business information when the employee is not available.
  • Protect security of proprietary information and date.
  • Prevent or investigate possible criminal activities by employees.
  • Prevent personal use of employer facilities.
  • Check for violations of company policy against sending offensive or pornographic email.
  • Investigate complaints of harassment.
  • Check for illegal software.

[edit]Security

In some cases, monitoring an employee's work leads to monitoring the employee's life in aspects that are not related to work. This leads to acquisition of information about the employee, compromising the security of the employee.

Employee Monitoring: It's Not Paranoia—You Really Are Being Watched!

It's possible that someone has been reading your e-mails, listening to your phone calls, and tracking your Internet use. No, it's not a foreign spy. It's not even your ex—it's your employer. And she doesn't even need to tell you she's doing it.

Employers can legally monitor their workers however they want. They can log and review all computer activity as long as they own the machines. The most popular method of keeping tabs on employees is to track Internet use: A whopping 66 percent of companies monitor employee Internet activity, according to a survey released in February by the American Management Association and the ePolicy Institute. What are they looking for? Frequent visits to sexually explicit sites, game sites, and social-networking sites like Facebook on company time. Almost a third of those who said they monitor their employees have fired someone for inappropriate Web surfing.

Some companies monitor employees—tracking keystrokes, reviewing computer files, and reading e-mail—to ensure they're staying loyal. Press leaks of confidential information and trade secrets are of legitimate concern to employers, and many will go to great lengths to make sure that their employees aren't using company computers to pass on information to outside sources.

How They Do It

Most employers who monitor their workers use software loaded directly onto the workstations. Some applications, such as Websense Enterprise 5.1, are meant to monitor the Internet traffic of entire enterprises. There is no shortage of such software available for purchase by both companies and individuals. Programs like Spector Pro can keep detailed logs of keystrokes and SMTP and POP sessions, screenshots, instant messages, and URLs visited on individual computers. Spector can also be programmed to inform users at start-up that their computers are being monitored—a handy tool that can keep an employer in the legal clear.

Employee monitoring is, for the most part, completely legal. Only two states—Delaware and Connecticut—require employers to notify employees of monitoring. But most employers do (and should) make a point of alerting employees to surveillance, in order to avoid the fuzzy legal and ethical boundaries surrounding electronic privacy in the workplace. Of those surveyed who monitor their employees, 83 percent said they inform them that they're doing it.

But not every company informs employees of its actions when it should, which can lead to serious trouble. Case in point: Hewlett-Packard. In 2006, HP hired private investigators to help find the source of information leaks. They used slimy—but legal—tactics such as digging through trash, sending fake e-mails loaded with hidden tracking software, and tailing journalists who were communicating with HP employees. They crossed the legal line when they used pretexting, or posing as someone else in order to get phone records. The chairman of HP and half a dozen board members resigned or were fired as a result, and the entire debacle shed new light on the possibilities of employee monitoring in the digital age.

E-mail monitoring can be particularly tricky. Employers can look through old e-mail, but monitoring e-mails in real time as they come in and out is still a gray legal area. An employer may intercept communications where there is actual or implied employee consent. Implied consent has been found where the employer simply gave notice of the monitoring. The only area that is definitely off-limits is employees' personal laptops and hard drives.

How Do You Know?

If you're using a company-owned computer, it's probably a good idea to assume your activity is being monitored. And unless you're using encrypted e-mail, you should try to avoid using your work e-mail address for personal correspondence. If that's not realistic, then a good rule of thumb is to read every e-mail before you send it, and think about how your boss might react if he or she were reading it.

In most cases you can detect monitoring software the same way as other spyware. Any application firewall, such as Norton or McAfee, should be able to find unauthorized applications on your computer. Of course, in the case of monitoring by your employer, it's likely that IT installed the monitoring app and has therefore set up rules to allow the application to work with your firewall while remaining invisible in the background.

Some antispyware programs can detect and even remove keyloggers. If you install a program like CounterSpy V2, you'll probably be able to figure out whether you're being monitored. Check our full roundup of the best antispyware applications for more ideas.

If a spyware scan isn't revealing anything and you're still apprehensive, you can check for any suspicious processes that are running. It's hard to weed out the normal processes from the foreign ones, however, unless the invasive program creates an obvious folder or process (YouAreBeingWatched.exe). And some monitoring software, like Elite Keylogger, uses rootkit techniques, so you can't even see its processes or files. Hit Ctrl-Alt-Delete and go to the Task Manager to see a list of processes running on your workstation. You may get lucky if you're really familiar with your computer's processes, or if the program really does use an obvious name (some programs do).

Of course, the easiest way to find out whether you're being monitored is just to ask your employers. Ethical considerations will most likely push them to tell you the truth, and they probably know that if they lie it could be grounds for legal trouble later on. The responsible employer should create an Acceptable Use Policy to make what is appropriate in the workplace completely clear. But if you think you're being watched (and you're pretty sure it's not the CIA or your ex), try a standard spyware detection program or monitor your computer's processes.

If you do find you're being monitored, depending on the circumstances, you might be able to take legal action against your employer. The only legal limit on workplace surveillance comes in the form of the ECPA (the Electronic Communications Privacy Act, passed in 1986), which prohibits employers from deliberately eavesdropping on personal conversations. The ECPA does not protect any kind of communication except the spoken word, though, so your every action while at work, including personal e-mails, is most likely subject to review by your employer. You might not be able to take your employer to court for watching you at work, but at least you'll know to quit spending so much time playing Scrabulous on the company dime. —Next: Other Places You're Being Watched

Award-Winning Employee Monitoring Software

Award-Winning Employee Monitoring Software. Record and log everything your employees do - from recording employee keystrokes typed and website visits, to chats, employee emails and screenshots. Remotely control employee workstations. An invisible, stealth monitoring tool, NetVizor gives you one-click access to viewing everyone on your entire network in realtime - from one central location.

With a single click you can view the desktops of every workstation on your network, in realtime. Alternatively, you can use NetVizor's activity ticker to view a constantly-updated list of all computers on your network, showing what users are logged in, and what windows they are working with.

NetVizor's logging capabilities are virtually limitless. NetVizor can log keystrokes typed, application and website usage, detailed file system usage, incoming and outgoing chats and emails, windows interacted with, desktop screenshots, internet packet data, software installations, internet connections, and much more. All activities logged can be tied together and presented in easy-to-read graphical reports.

NetVizor employee monitoring software has built in remote administration features that allow you to remotely control remote workstations. NetVizor allows for remote workstation security auditing, remote application and windows management, file system browsing, system lockdowns, activity log viewing, reports generation, and more!

NetVizor employee monitoring software not only acts as a powerful network monitoring software solution, but also as a content filtering tool. NetVizor can filter websites from being visited by your employees, applications from being ran by the worker, and even chat messengers from being used while NetVizor is active. NetVizor can then email you when specific alerts have been triggered by your employees.

Employee Monitoring Software

Employee Monitoring Software

Employee monitoring software was designed for company administrators to monitor and supervise all their employee computers in realtime from one centralized position. Our NetVizor is your best choice which can be deployed over a business network in seconds and allow for easy centralized log viewing via one central networked PC.

All the network administrator has to do is point and click different users to view their activities! No physical presence is needed to monitor employees! Now network administrators can monitor large networks from one convenient, secure location! NetVizor is a scalable solution - so any network, from a small workgroup, to a large corporate structure, can be monitored by NetVizor!

screen snapshots of employee monitoring software


Top 4 frequently asked questions on NetVizor and employee monitoring

  • How does NetVizor monitor all my employees?
    Click here to read how NetVizor works in your company network.

  • Can NetVizor monitor ALL employees on my network from one location?
    Yes, that is the purpose of NetVizor. Once NetVizor is installed on each client on your network, you can view each PC from your central log viewer on your PC. As long as you are on the same subnet as the other PC's, you can view them with no problem!

  • How do I install/uninstall NetVizor over my network from one location?
    Please refer to NetVizor's help documentation here - this is explained in detail. 

  • What if employees use multiple machines during the day?
    Not a problem. NetVizor can be setup to log roving users as well. Please, to NetVizor's documentation for setting this up - it is very simple to do, and it allows you to view individual users, no matter what PC they use on your network.

More Questions about employee monitoring software ->



Employee Monitoring Features:

Surveillance and Monitoring

NetVizor's logging capabilities are unmatched. NetVizor can log anything from what the employee types, to emails sent/received and programs they ran - all time stamped by date for easy viewing. All logs are easily saved and exported for later use. All of NetVizor's logs can be remotely viewed from a central location for easy activity management!

  • Keystroke Monitoring
    Monitor and log all keystrokes along with the window they are typed in and time stamp.

  • Emails Sent and Received by all users
    Monitor and log all emails sent and received by users of your company! All SMTP and POP3 messages are recorded for later viewing.

  • Events Timeline Logging 
    Log all events employees performed and view them in an organized chronically ordered listing. The Events Timeline lets you view what the events the user performed, in the order they did them. Events logged include Program Starts/Stops, Website Visits, Document Viewings and Printings, and more.

  • Internet Connections
    Monitor and log all Internet sessions made on all PCs. This includes all FTP,HTTP, POP3, Chat Messenger, and any other TCP connections.

  • Internet Conversations
    Monitor and log all chat conversations made on AOL, AOL Instant Messenger, Yahoo Messenger, MSN Messenger, and ICQ

  • Website Activity
    Log all websites visited by the popular browsers: Internet Explorer, Netscape, Opera, and America Online.

  • Window Activity
    Log all windows in which the user directly interacts on the desktop.

  • Application Usage
    Monitor and log all applications ran by employees - NetVizor logs when the application was started, stopped, and how long it was actually used.

  • Software Installations 
    Record software installations performed by users - software name, installation path, and time of installation is logged.

  • Documents Opened 
    Record documents and files opened and viewed by users.

  • Print Jobs Executed
    Record documents and files that are printed by every employee.

  • Screenshot Capturing
    NetVizor can take snapshots of your desktop at set intervals of time, allowing you to visually see what is happening. The ScreenShot capture manager also has a built in Slide show viewer for easy viewing.

  • Password Logging 
    NetVizor has the ability to log all passwords used during monitoring sessions via its keystrokes recorder.

  • Activity Logging
    log all all system shutdowns and user log-ons, as well as NetVizor actions: starting/stopping of monitoring processes, option changes, log accesses, and failed access attempts to start/stop monitoring.

  • Remote Desktop Viewing
    Grab screenshots of the remote computer's desktop - allowing you to remotely view a employee's computer.

  • Remote System Information Viewing
    View a listing of various system information for the remote PC, including processor type, system directories, and more!

  • Remote Internet Connections Viewing
    View a list of the current Internet connections on the remote machine!

  • Remote Recent Document History Viewing
    View a list of the recent documents your employees have opened!

  • Realtime Remote Monitoring
    NetVizor allows you to remotely view what the user is doing in realtime - what windows are open, what applications are running, and more!


Remote Administration Features

Netvizor has built in remote administration features that allow the administrator to remotely control remote workstations. NetVizor allows for remote workstation security auditing, remote application and windows management, file system browsing, system lockdown, and more!

  • Remote System Security Auditing
    Perform a security audit on network workstations - our employee monitoring software can audit the remote workstations password and user policies, as well as improper registry settings, file shares, and Trojan/virus infections. Registry audits can be fixed remotely as well via the NetVizor web interface.

  • Remote File System Navigation and Management
    Browse and navigate the entire file system of the remote PC. The NetVizor remote file system browsing feature allows you to download, delete, and launch remote files - all through your web-browser! 

  • Remote System Lockdown Control
    Lock and unlock the remote desktop from your web-browser! This allows you to keep a user out of the remote PC, without ever having to be present at the PC! 

  • Remote Application/Task Management and Viewing
    View all running applications on the remote PC in a convenient listing on your web-browser. Control and manage tasks by closing them with a single click! 

  • Remote Open Windows Management and Viewing
    View all open Windows on the remote PC's desktop. Close the open windows with a single click! Now you can control what Windows the remote user can see! 

  • Remote System Mouse Freeze Control
    Freeze and unfreeze the remote PC's mouse with a single click! Combine this feature with the Remote Lockdown command for powerful security and control of your remote PC!

  • Remote Website Launching
    Launch a Website on the remote PC for the remote user to see!

  • Remote Application Launching
    Our employee monitoring software can launch a program on the remote PC for the remote user to use! 

  • Remote Message Display
    Display a message for the remote user to read. This allows you to send warnings, or simple messages to the remote PC!

  • Remote System Shutdown/Restart/Logoff
    Shutdown, Restart, or Logoff the remote PC from your web-browser with Netvizor!

Security and Stealth Features

Netvizor has a large array of security and stealth features. NetVizor is undetectable under all Windows versions (it does not even show up in the task manager on any Windows platform) and can circumvent popular third-party "spyware" detectors. NetVizor has powerful lockdown and logging scheduling features, optional startup warnings, and much more.  

  • Stealth-Mode
    NetVizor can run totally in stealth; that is, it is virtually undetectable to the user. NetVizor will NOT show up in the task manager under Windows - at all. NetVizor does not appear in registry and Windows startup utilities while it is running, either.

  • Log File Encryption
    Netvizor has a built in encryption option that allows you to have all your NetVizor activity logs encrypted so others cannot stumble across NetVizor's logs or read them without using NetVizor's protected log viewers. 

  • Logging Time Scheduling
    configure NetVizor to monitor and record only when you want it to!

  • PC Lockdown Scheduling
    schedule NetVizor to lock your PC down when you are not around!

  • Warning Screen
    display a splash screen which alerts users they are being monitored by the NetVizor software (totally optional).

  • Password Protection
    Our Netvizor is password protected to prevent easy monitoring termination and option changes.

  • Active Startup
    run NetVizor already in active monitoring mode.

  • Windows Startup 
    run NetVizor when Windows boots up.

  • Idle Time-out 
    NetVizor will stop logging when the user is inactive for a specified amount of time, when they are active again NetVizor resumes logging.

  • AutoClear
    you can set NetVizor to clear your monitoring logs every xxx number of actions logged, or every xxx number of keystrokes entered. This provides for minimal usage of processor speed and disk space.

  • IP Allowance Configuration
    Netvizor allows you to specify a list of IP addresses that may access the NetVizor controlled remote PC. This allows you to restrict access to IP addresses within your local network, or to only certain static IP addresses! 

  • Access Restriction Configuration
    NetVizor allows you to configure what remote options you can access through your web-browser. You can disable any features of your choosing! 

  • Spyware Detector Disabling
    Configure NetVizor to disable popular spyware detectors that may interfere or detect NetVizor running! 


Content Filtering Features

Netvizor not only acts as a powerful spy software solution, but also as a content filtering tool. NetVizor can filter websites from being visited, applications from being ran by the user, and even chat messengers from being used while NetVizor is active.

  • Application Filtering 
    NetVizor allows you to control what programs users cannot run.

  • Website Filtering 
    NetVizor allows you to control what websites users can and cannot visit.

  • Chat Filtering 
    Our employee monitoring software allows you to control what chat messengers users can and cannot use while NetVizor is running!
  • Email Alerts 
    NetVizor can be configured to send you email notifications when a user runs an unwanted Website, chat client, or application. Alerts can also be sent when the computer is started/shutdown, and when spyware detectors are installed!


Easy to Use!

Netvizor has always been known as being extremely easy to use. You can have NetVizor setup and monitoring in seconds with its built in easy configuration wizard and intuitive graphical interface. NetVizor can even be tweaked to smoothly monitor slower PC's! 

  • Network Installation and Removal
    Network administrators can deploy NetVizor over their entire network, or remove it just as easily - from one central location!

  • Point and Click User Selection
    Click and select any monitored PC OR User on your network via NetVizor's centralized viewing console!

  • Easy Report Generation
    Quickly generate reports for specific (or all) users for specific (or all) dates so you can view and save easy to read, printable logs detailing exactly what users did, and when.

  • Intuitive Interface 
    Easy to use, graphical user interface, with intuitive labeled buttons and icons!

  • Easy Configuration Wizard
    Setup NetVizor in seconds with the built in easy configuration wizard!

  • Speed Adjustment 
    Netvizor lets you adjust the thread efficiency for monitoring - this in turn eliminates lag from NetVizor on slower PC systems

System Requirements

  • Windows 95,98,ME,NT4,2000,2003,XP or Vista!
  • Pentium Class PC (133mhz or higher)
  • 3MB Hard disk space
  • Windows TCP/IP Network

2009年1月6日星期二

Employee Monitoring software

Employee Monitoring software
I am just looking for some monitoring software that will log e-mail's, im's and websites for employees. It needs to be able to work with Microsoft Exchange as well. I have tried SpectorSoft but was curious if anyone knew of any other programs. There are other monitoring programs available but they do not support Microsoft Exchange, just POP3 e-mail.

Any input would be appreciated!


Employee monitoring software

Employee monitoring software
We have a conflict at the office between two colleagues. One is accusing the other of surfing the internet most of the day, the other one says that it's not true.

I've tried checking the history file on the computer, but I really can't find a lot of non-work related stuff. But he could be erasing the history of course. 

Can anyone recommend any monitoring software that I can install to check what is true? All computer access the internet through a Small Business Server 2003, the ISA is not active.


Hi to recommend any monitoring software and then maybe point someone to a link for such a program.
I would guess although not mentioned in the forum rules,will be something that we cannot help them with.

My guess is from previous requests for such programs and that request being denied.
[does that make any sense?] 

http://www.techguy.org/rules.html
This may cover it.
Quote.
"Hacking/Interference - This is the deliberate use of any device, software, routine, or activity to achieve or attempt to achieve any interference with the proper operation of the site, as determined by the administration."

they know what i m doing in my LAN computer in office! Help me to stop them

Hi friends,

i m in a very embrassing condition at the moment.

in my office the system administrator who use to sit in the main server computer, knows every thing..tht what i m browsing , with whom and what i am chatting, and even if i m playing games or not (i played once or twice during luch).

Now he is saying tht he have taken snaps of all those activities..i wonder how he do tht.

can you please help me, so tht i could stop/block him to see my computer connected in LAN by any mean..wither he is using the main server computer

i need ur help 


He probably has monitoring software installed, and probably not JUST on your computer. And since he's the administrator and you're not, you really have no right to defeat it.

What he's doing MAY be unethical... or it MAY be under management's direction. I worked in a government office once where all internet connections had to go through a proxy server, and all traffic was logged, and every user had his own proxy login, so if someone surfed something questionable or forbidden, they knew WHO it was, and under the terms of employment - which everyone had to agree to before being given a proxy login - the person could then be disciplined, from having their proxy access denied, right up to termination.

So the real question is, are the admin's actions endorsed by management, and if so, is there something in your employment agreement that allows them to monitor your usage? If not, you may be able to complain about his actions to management... otherwise, you have two choices: watch what you do on THE COMPANY'S computers, or find another job.

I'd be very surprised if the administrator is doing the monitoring without the endorsement of company management. In fact, corporate monitoring of employee computer activity is common and VERY LEGAL. Court cases have supported the employer's right to monitor AND apply appropriate disciplinary actions against employees who abuse company property.

So the long and the short of this is, stop doing stuff on company computer systems which you don't want them to know about and you know if they see the activity you can get disciplined. I'd be highly surprised if this thread stays open due to the TOS of this forum.

Software to monitor employee surfing?

Software to monitor employee surfing?
While I really despise having to go this route, I have reached a point where I have to monitor my employee's surfing habits. Does anyone know of a program to accomplish this?

Sorry...this is a last resort thing.


Ah, the late night Elves.

Could be a PHD computer illegal person working for the cleaning company dialing home.

Yup, would start by setting up log in type accounts for all authorized users and go from there. Could be Ex-KGB agents working for the cleaning company.  

Can't you just figure out who is there late at night. Go from easy to the more difficult and intrusive solutions. Good employees may be miffed by monitoring software. Can create more problems than are solved.

Could even get one of them mini-cam like to watch the baby and determine who the late night actor really is. Can it be the building super with tool belt attached, logging in to check if a particular light is up to Code. 

Record & Control employee activities - Improve productivity

Record & Control employee activities - Improve productivity
Record & Control employee activities - Improve productivity 
Imonitor Employee Activity Monitor 4.3 Released

July 13, 2008 – Imonitor, the global award-winning provider of Monitoring tools, today announced the release ofEmployee Activity Monitor 4.3,an all-in-one solution that records and controls all employee computer activity and prevents loss of critical and confidential data from leaving the organization
Do you suspect that your employees are abusing business work hours to get ‘personal business’ done? You are not alone…
• • 56.5% of employees feel that surfing the Net or sending non-work-related E-mails decreases productivity, and 31% of employers said that they restrict employee Internet/E-mail usage. (Vault.com survey) 
Imonitor Employee activity monitor can quickly detect and give you the evidence you need to prove that your employees are abusing business work time. It can operate in total stealth - defeating the popular spyware detection tools. These abilities mean you will not have to worry about your employees discovering you are monitoring them - and even if you inform them they will still not be able to tell how. 

Key features of Employee activity monitor:
Stealth and undetectable surveillance 
Log email, instant message, keystrokes, print Jobs 
Monitor FTP file transfer, websites visited, applications used 
Monitor and control websites accessing, filter unwanted websites 
Send alarms to console when employee steals company secretes 
Record MSN, ICQ, AOL and yahoo messenger.chats by users 
Remotly control employee computers through remote desktop 
Monitor the corporation computer alteration of hardware and software 
Record software using history 
View all running processes and kill any of them 
Record live screenshots of multi network computers 
Click to learn more details about Imonitor Employee activity monitor.
Learn more bout Employee activity monitor
Pricing and Availability:
Price of Employee activity monitor: $199.95
Free Trial of Employee activity monitor: 
Download free trial of Employee activity monitor
System Requirements:
Microsoft Windows 98/2000/XP/2003/Vista 
About Imonitor Software
Imonitor Software is an industry-leading monitoring softwrare solution provider. 
To learn more about Imonitor, please visit Employee Monitoring Software

Employee Monitroing through Hardware Solutions

Hi all. I've heard some devices (like Sonicwall firewalls) can perform network monitoring, as in, deliver a report to the admin as to which sites have been accessed by which IP in a certain timeframe (say, a month). I have a client who's looking to monitor his network for employees slouching, but to do so cheaply and easily. I'd welcome any suggestions you guys might have. I know there's software that does this, but I believe he's looking for a simple hardware solution. Does anyone have any suggestions?


Hi all. Thanks for the responses. I actually believe my client's intent isn't nearly as Machiavellian as I might have phrased it. It's much les of "Let's see what Joe's doing every second of every day" and more of "Joe's been turning in stuff late for 3 months and we're about to let him go. Has he been just playing around this entire time?" He - the client - doesn't even want to know how to access the information - he simply wants to know he can hire someone to retrieve it if legal disputes arise following a firing (and believe me - that's a high-morale office... you'd have to really screw up to be let go).
Sorry if there was misunderstanding. I know Sonicwall does some sort of monitoring, but I didn't know how comprehensive the logs were or if they were adequate for what he desired. 

I hope this clarifies. Thanks so much for everyone' who's given me feedback and is taking a look at this. I hope this helps someone else in the future as well.

Now THAT is funny. I recall paying my employees to WORK, NOT to surf the internet  And we wonder why more and more jobs are being outsourced to someone who WANTS TO WORK while they are at WORK 

Big brother advice required

Hi All,

I work for a young company and we deal with sensative information which is stored in MS office files. An employee has just announced that they are leaving and my bosses want to know if she has taken anything. Is there any big brother style software available for monitoring activity on our PC's. Files copied to USB ect (we dont want to remove the ability to use USB as it is useful).

I'd have to agree with John here, this would be pretty difficult to monitor or log efficiently for reporting. In the network setup we have here, we also deal with confidential files and financial information, and to prevent as much file removal we turn off all removable devices through Policy. 

There are some Third-Party software packages out there that may be of some help in your situation.

You can code your own program possibly to track, log, and report this information if you want but I imagine it would be a considerable task - ableit fun to do.

Good luck though.


How do they watch you at work?

How do they watch you at work?
Subject: How do they watch you at work?
Subject: Can I find out how am I on monitored on my work computer?

Is there a way to find out if I am monitored on my network 
work computer without being detected? Not that I am breaking any
rules but I would like to know if I am being detected and how much
they know about what I am doing on my work computer.

Is there a way to find out without being detected?

Hi, Usually your efforts would be seen- if monitoring is going on, they can tell. And, the computers you use at work may have set security permissions that will not allow you to install the software or do the "investigating". 

And, if you mess around with the security of the workplace machines, you are probably doing the worst possible thing and any punishment if you do, would be quite justified.

That said, our site also has Rules against subverting security on company machines. This falls into the Illegal Activitiescategory believe it or not. Employers may have the right to monitor usage, I know it's a hard thing to accept, but you stand to lose your job if you are caught. I advise you to not go any further, in fact, I have read that at least in some US workplaces, perhaps in some States that is....they must advise you of any monitoring.... this may not be true in all situations. 

It may pay you to just ask, and you might be surprised by a rundown of any monitoring going on, why it is, etc. Remember also, that just in case there is not now, any employee use montitoring, your acts may convince someone that it is time to start

Sorry, but I have to Close your thread. Please do not post questions about this again here at TSG. 

Please read our Rules section, here >> http://www.techguy.org/rules.html

activity log software

Q:
im looking for a free application that can be used to log all user activitity on a windows xp machine.


A:
What you are indeed asking about is keylogging or monitoring software. There are free and also many pay-for programs that will do what you want....however, 

TSG has a policy of not allowing posts for help about this issue, as the information we would have to post publicly could be misused, I hope you understand why we do not give help with keylogging here.


On the other hand, I can tell you that information about getting and using any of several good programs that can help you monitor children, or other users of YOUR computer is easily available by doing a search with something like Google search engine....

And, you may find more trouble after you apply one of these programs than you bargained for, especially if you try to monitor kids or family members and your even well-intentioned supervision is discovered. If your intent is to monitor children who need supervision, then I completely sympathize with you, however we have no way to know for sure what anyone's words relate to in reality, again hope you can see why we cannot help with this type of question.

If you are a business person, I advise you to consult with other professionals about what they use, to monitor employeeuse in the workplace- the same type of software would and can be used at home, if that is what you need to do. Some are easily spotted by antispyware programs, the more expensive commercial types are often excluded from detection, and they cost quite a bit as you will probably see.

2009年1月4日星期日

Employee Monitoring Keywords

No.Keyword
Why quotes?
KEI Analysis (?)Count (?)24Hrs (?)Competing (?)
1"senate surveillance bill"5711.13317101166512
2"wep epa network security"322.66744306
3"A Definition for Business Ethics"100.992248169609
4"Employee Productivity Statistics"51.84613189331
5"Productivity Formulas"37.5192201501290
6"Ethics Important in Business"16.4712571754010
7"crack for spyware nuker"10.6369867903
8"Is Mozilla Spyware"7.3366343541
9"Cheating Spouse Revenge"6.10487591240
10"Business Ethics Cases"5.3762261549500
11"Is Limewire Spyware"4.4515739730
12"Business Code Ethics"4.06625917716500
13"Definition for Business Ethics"3.30318812810700
14"Registration Key for Spyware Nuker"3.140129885300
15"Surveillance Earpiece"3.0881701169360
16"spyware system scan"2.3744229743
17"Anti Spyware Free Programs"1.39151351870
18"buy spyware software"1.31317912224400
19"optical surveillance systems"1.20451352160
20"Spyware Nuker Registration Code"1.16687596490
21"Totally Free Spyware Removal"1.09017912229400
22"Most Popular Personal Productivity Software"0.99351352620
23"Total Productivity Management"0.86176526710
24"Worst in Business Ethics"0.78549333060
25"10 Signs of Cheating Spouse"0.67481559730
26"Spyware Doctor Registration Key"0.40163439900
27"super anti spyware"0.400202138102000
28"Business and Ethics"0.3421248545000
29"spyware nuker crack"0.217584015500
30"Define Productivity"0.21643298570
31"cell phone spyware"0.19043299730
32"real time flight tracking"0.1831248584000
33"free spyware"0.1565934042250000
34"Free Undetectable Keylogger"0.151584022300
35"free spyware removal"0.136355242925000
36"Home Security Surveillance"0.1361137794100
37"free spyware downloads"0.114654437200
38"Real Time Flight Tracking"0.112976684000
39"Free Spyware Remover"0.0823272231300000
40"windows has detected spyware infection"0.077604146900
41"free keylogger"0.075162110350000
42"avg spyware"0.0587954107000
43"free spyware remover"0.055170116529000
44"Business Ethics"0.0534693204180000
45"Free Spyware Downloads"0.053453138000
46"warning spyware detected on your computer"0.053463139600
47"spyware doctor"0.0525894026680000
48"Spyware Doctor License Code"0.051453139800
49"spyware blaster"0.047193132791000
50"cheating spouses"0.0387450143000
51"keystroke logger"0.0337853182000
52"what is spyware"0.0307551186000
53"free anti spyware"0.029157107862000
54"Spyware Blaster"0.026146100812000
55"spyware removal"0.0172681834260000
56"business ethics"0.0173122135710000
57"spyware terminator"0.0161651131710000
58"free spyware software"0.0157249346000
59"Remove Spyware Free"0.0147753411000
60"free spyware removal software"0.0136544313000
61"free spyware scan"0.0137652457000
62"spyware"0.0131220832118000000
63"video surveillance systems"0.0137652441000
64"free spyware protection"0.0126746361000
65"spyware remover"0.0121721172460000
66"surveillance equipment"0.012122831230000
67"cheating spouse"0.0117350487000
68"Spyware"0.0091011689114000000
69"keystroke recorder"0.0094329208000
70"best free spyware"0.0094631226000
71"Spyware Doctor"0.0092671828270000
72"spyware detector"0.0085739420000
73"surveillance camera"0.008104711350000
74"keylogger"0.00828419410500000
75"best spyware"0.0075235367000
76"surveillance cameras"0.007135922610000
77"spyware removal software"0.0065437510000
78"Home Surveillance"0.0064229276000
79"Free Spyware Removal"0.0067753927000
80"free key logger"0.0054833467000
81"detect spyware"0.0044732516000
82"Surveillance Equipment"0.00467461270000
83"Free Spyware"0.00385582360000
84"anti spyware"0.00320213813600000
85"Remove Spyware"0.00389612670000
86"spy software"0.00269471980000
87"key logger"0.00215610611700000
88"surveillance systems"0.00267462190000
89"surveillance"0.00230620958100000
90"parental controls"0.00257391940000
91"spyware software"0.00258401740000
92"network security"0.0011308915400000
93"Spyware Removal"0.00171483850000
94"parental control"0.00151354250000
95"keyloggers"0.00153362570000
96"remove spyware"0.00146311980000
97"video surveillance"0.00195657230000
98"Productivity"0.000835782100000
99"productivity"0.000896181800000
100"Anti Spyware"0.000775313300000