Sunday, November 3, 2013

Tracking and Monitoring Employees, Privacy and Smartphones

Companies can use software packages that allows them to view what is on screen or kept in the worker computer devices and hard disks. Employers could very well monitor Internet use including web-surfing and electronic mail. Some apps block and filter content by keywords, phrases and categories.


 Monitoring and Tracking


For those who have a computer terminal at your job, it might be your boss’ viewpoint your work environment. There are various types of computer system monitoring. A different computer monitoring process permits organisations to keep track of how long an employee spends absent from the computer system or idle time at the terminal. A keylogger files a user’s key-board strokes such as usernames and passwords. Sophisticated people who use computers can think their monitored status and try to deploy anti-keylogger software on the computer. The ability to prevent end users from installing apps or bypassing the keylogger’s functions is another important feature of monitoring programs. Other criteria include data storage, automatic screenshots of the user’s desktop, document tracking and scheduled user access.


Monitoring programs can log huge amounts of information. A badly developed reporting user interface could make the most robust programs useless. Reporting approaches must be simple to navigate. It is common for the program to have numerous built-in report functions along with the capability to perform personalized searches.


Is my boss allowed to observe what exactly is on my terminal when I’m doing work? Even so, some employers do notify staff members that observation happens. This information may be communicated in memos, employee handbooks, union contracts, at group meetings or on a sticker fastened to the computer. Normally, personnel discover computer monitoring during a performance evaluation when the information gathered is used to judge the employee’s performance.



Tracking and Monitoring Employees, Privacy and Smartphones

No comments:

Post a Comment