Employee monitoring software

Last updated

Employee monitoring software is a means of employee monitoring, and allows company administrators to monitor and supervise all their employee computers from a central location. [1] It is normally deployed over a business network and allows for easy centralized log viewing via one central networked PC. Sometimes, companies opt to monitor their employees using remote desktop software instead. [2]

Contents

Purpose

Employee monitoring software is used to supervise employees' performance, prevent illegal activities, avoid confidential info leakage, and catch insider threats. Nowadays employee monitoring software is widely used in technology companies. [3]

Features

An employee monitoring program can monitor almost everything on a computer, such as keystrokes and passwords inputted, websites visited, chats in Facebook Messenger, Skype and other social chats. A piece of monitoring software can also capture screenshots of mobile activities. E-mail monitoring includes employers having access to records of employee’s e-mails that are sent through the company’s servers. [4] Companies may use keyword searches to natural language processing to analyze e-mails. [4] The administrator can view the logs through a cloud panel, or receive the logs by email. [5]

See also

Related Research Articles

Surveillance

Surveillance is the monitoring of behavior, activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information, such as Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception. Synonym: Observation . Surveillance is used by governments for intelligence gathering, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on their competitors, suppliers or customers. Religious organisations charged with detecting heresy and heterodoxy may also carry out surveillance. Auditors carry out a form of surveillance.

Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.

System administrator Person who maintains and operates a computer system or computer network

A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers. The system administrator seeks to ensure that the uptime, performance, resources, and security of the computers they manage meet the needs of the users, without exceeding a set budget when doing so.

Identity management (IdM), also known as identity and access management, is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and data management. Identity and access management systems not only identify, authenticate, and authorize individuals who will be utilizing IT resources, but also the hardware and applications employees need to access. Identity and access management solutions have become more prevalent and critical in recent years as regulatory compliance requirements have become increasingly more rigorous and complex.

An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple types of audits, multiple objectives for different audits, etc. Most commonly the controls being audited can be categorized to technical, physical and administrative. Auditing information security covers topics from auditing the physical security of data centers to auditing the logical security of databases and highlights key components to look for and different methods for auditing these areas.

Time-tracking software is a category of computer software that allows its employees to record time spent on tasks or projects. The software is used in many industries, including those who employ freelancers and hourly workers. It is also used by professionals who bill their customers by the hour. These include lawyers, freelancers and accountants.

Email privacy is a broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and has legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as relatively more communication occurs via email compared to via postal mail.

Office administration is a set of day-to-day activities that are related to the maintenance of an office building, financial planning, record keeping & billing, personal, physical distribution and logistics, within an organization. An employee that undertakes these activities is commonly called an office administrator or office manager, and plays a key role in any organizations infrastructure, regardless of the scale. Many administrative positions require the candidate to have an advanced skill set in the software applications Microsoft Word, Excel and Access.

Veriato, formerly known as SpectorSoft, is a software company that develops and sells user behavior analytics and employee monitoring software.

In computing, a log file is a file that records either events that occur in an operating system or other software runs, or messages between different users of a communication software. Logging is the act of keeping a log. In the simplest case, messages are written to a single log file.

Workplace privacy is related with various ways of accessing, controlling, and monitoring employees' information in a working environment. Employees typically must relinquish some of their privacy while in the workplace, but how much they must do so can be a contentious issue. The debate rages on as to whether it is moral, ethical and legal for employers to monitor the actions of their employees. Employers believe that monitoring is necessary both to discourage illicit activity and to limit liability. With this problem of monitoring employees, many are experiencing a negative effect on emotional and physical stress including fatigue, lowered employee morale and lack of motivation within the workplace. Employers might choose to monitor employee activities using surveillance cameras, or may wish to record employees activities while using company-owned computers or telephones. Courts are finding that disputes between workplace privacy and freedom are being complicated with the advancement of technology as traditional rules that govern areas of privacy law are debatable and becoming less important.

Employee Monitoring is the act of employers surveying employee activity through different surveillance methods. Organizations engage in employee monitoring for different reasons such as to track performance, to avoid legal liability, to protect trade secrets, and to address other security concerns. This practice may impact employee satisfaction due to its impact on the privacy of the employees. Among organizations, the extent and methods of employee monitoring differ.

Norton Family

Norton Family is an American cloud-based parental control service. Norton Family is aimed at "fostering communication" involving parents and their children's online activities. Computer activities are monitored by the software client, and reports are published online.

<i>Robbins v. Lower Merion School District</i> Federal class action lawsuit

Robbins v. Lower Merion School District is a federal class action lawsuit, brought in February 2010 on behalf of students of two high schools in Lower Merion Township, a suburb of Philadelphia. In October 2010, the school district agreed to pay $610,000 to settle the Robbins and parallel Hasan lawsuits against it.

Computer surveillance in the workplace is the use of computers to monitor activity in a workplace. Computer monitoring is a method of collecting performance data which employers obtain through digitalised employee monitoring. Computer surveillance may nowadays be used alongside traditional security applications, such as closed-circuit television.

RescueAssist is a cloud-based remote support platform designed targeted at IT support teams and customer support organizations. In 2018, LogMeIn's GoToAssist was rebranded to RescueAssist creating the Rescue brand of support products.

Retina-X Studios is a software manufacturer company that develops computer and cell phone monitoring applications, focused on computers, smartphones, tablets and networks. The company is founded in 1997 and it is based in Jacksonville, Florida, United States.

In the field of information security, user activity monitoring (UAM) is the monitoring and recording of user actions. UAM captures user actions, including the use of applications, windows opened, system commands executed, checkboxes clicked, text entered/edited, URLs visited and nearly every other on-screen event to protect data by ensuring that employees and contractors are staying within their assigned tasks, and posing no risk to the organization.

Indiscriminate monitoring is a form of monitoring, such as email monitoring or telephone tapping, that may interfere with an individual or group of individuals right to privacy. Organizations that conduct indiscriminate monitoring may use surveillance technologies to collect large amounts of data that could violate privacy laws or regulations. These practices could impact individuals emotionally, mentally, and globally.

References

  1. "What Is Employee Monitoring Software? (with pictures)". wiseGEEK. Archived from the original on 2018-01-02. Retrieved 2018-01-02.
  2. "What is employee monitoring?". WhatIs.com. Archived from the original on 16 February 2018. Retrieved 16 February 2018.
  3. Ciocchetti, Corey A. (2011). "The Eavesdropping Employer: A Twenty-First Century Framework for Employee Monitoring". American Business Law Journal. 48 (2): 285–369. doi:10.1111/j.1744-1714.2011.01116.x. ISSN   1744-1714.
  4. 1 2 Spitzmüller, Christiane; Stanton, Jeffrey M. (June 2006). "Examining employee compliance with organizational surveillance and monitoring". Journal of Occupational and Organizational Psychology. 79 (2): 245–272. doi:10.1348/096317905x52607. ISSN   0963-1798.
  5. "Employee Monitoring Software features that matter". OsMonitor. 10 February 2018. Archived from the original on 17 January 2018. Retrieved 6 February 2018.