Tuesday, April 14, 2020
What Companies Know About Your Browsing History
What Companies Know About Your Browsing History Chances are, if you have an office job, youâve used your work computer for activities that donât necessarily relate to your day-to-day tasks. So how paranoid should you be about being monitored? If youâre using a company computer (or wifi connection), your employer can not only monitor your work email and projects, but they can log your key strokes, including on âprivateâ sites like Facebook or your personal email account. This is also true of company-provided cell phones (employers can even track your whereabouts given your phoneâs GPS). âIf you use your email on a company-owned device or even the office wifi network, you should have no expectation of privacy,â says Paul Bischoff, privacy advocate at Comparitech.com. âMany companies that actively monitor employee email ask new hires to sign a waiver confirming that the company can access your email, but even those that donât offer such a waiver can still do so.â (The legality of this varies state-by-state.) âThe only case in which an employee might have a reasonable expectation of privacy,â writes L.V. Anderson in Slate, âwould be if the employer explicitly stated that employees should have such an expectation.â But thatâs few and far between. Most employees have a unique login that gives them restricted access to work computers and networks. Amna Rizvi, the editor of GadgTecs.com, says that companies typically keep a log of activities for every unique user, which they can then monitor if they choose to. A typical log might look like, [time stamp] open Solitaire [time stamp] close Solitaire [time Stamp] Open Firefox [â¦] open website â¦. And on and on, says Rizvi. So there really is no hiding the sites youâre visiting (or how long you spend on them). But just because they can monitor you doesnât mean they will. âWe can do this but we havenât done it yet,â Rizvi says. âI suspect large companies do keep a record, but might not look at the logs unless a legal issue comes up.â And in fact, most of the monitoring/information interception done on your company network is done for security purposes. All it takes is one click to transfer certain viruses or open up a companyâs network to hackers, which means firms need to be vigilant about what their employees are doing online. âThere could be some Intellectual Property issues and other confidential information that the company wants to control,â says Michael Edelberg, co-founder of Viable Operations/Bespoke Digital Solutions, a cybersecurity firm. âRogue cloud accounts and emails are a vector for hackers as is your social mediaâ¦you might be opening a threat vector that wants access into your company.â However, they may also monitor someone if he or she is a low performer or there are reasons to suspect the employee is using office time inappropriately, says Michael V.N. Hall, a technology consultant, who has reviewed employee tech habits in the past. Hall says IT departments review things like how much network an employee is using compared to others, large deposits of pictures or videos, web content filters for disallowed categories (such as social media or pornography), and the log in and log out times for those already on a concern list. âIn one situation, our company had an employee email a large volume of pictures from her recent vacation to her boyfriend,â says Hall. âThe size of these pictures bottle-necked our business email platform for several hours, slowing down critical business emails.â If youâre worried about what your employer can monitor, Edelberg suggests actually reading the manual you likely received on your first day on the job. And itâs probably best to send vacation photos to your boyfriend after hours.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.