(855) 4-ESSAYS

Type a new keyword(s) and press Enter to search

Workplace Surveillance



             Desktop Monitoring Programs:.
             Every time you provide some form of input for your computer, whether it is typing a letter or number, or opening a new application, a signal is transmitted (Bosnor, 2003). These signals can be intercepted by a desktop monitoring program', which can be installed on a computer at the operating system level or the assembly level. The person receiving the intercepted signals van see each character being typed and can replicate what the user is seeing on their screen.
             Phones and Closed Circuit Cameras:.
             Traditional "eavesdropping- methods such as listening in on an employees phone call is still common practice in many organisations. Storing and reviewing voice mail and video-recording employees actions on the job is still a very effective way of monitoring employee behaviour (American Management Association, 2003).
             Companies generally engage in monitoring practices for a number of different reasons such as: performance review, legal compliance, legal liability, and productivity measures (Greenberg, 2000).
             An example of one of the most popular surveillance programs is SSPPYY, which can be remotely installed from anywhere in the world. SSPPYY contains almost all of the surveillance and logging features that one may require for computer monitoring. Some of these features include:.
             Internet Conversation Logging - Log both sides of all chat and instant message conversations for AOL/ICQ/MSN/AIM/Yahoo Instant Messengers. .
             Email Recording - All web-based emails are automatically recorded and saved for your later review. .
             Window Activity Logging - Capture information on every window that was viewed and interacted with.
             Application Activity Logging- Track every application/executable that was executed and interacted with. .
             Printed Documents Logging - Log specific information on all documents that were sent to the printer spool.
             Keystroke Monitoring - Track all keystrokes pressed (including hidden system keys) and which windows they were pressed in.


Essays Related to Workplace Surveillance


Got a writing question? Ask our professional writer!
Submit My Question