Employee Computers and Privacy Rights?
Clash Royale CLAN TAG#URR8PPP
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty margin-bottom:0;
up vote
7
down vote
favorite
Just started working at a large size company that has their own IT department, supporting all of the workplace technology needs.
I was made aware there are no private rights on employee computers - as it is their property. I came from a very small company, I knew that if they need to go through my work computer it was obviously their right but it was not advertised like this.
So with all these rights stated, what type of audits does a typical large IT department really run on employee computers? What do they include? (i.e, pushing latest virus scan, logging key strokes, website activity, file system, etc)?
(This is in the US)
work-environment management new-job company-culture employer-relations
add a comment |Â
up vote
7
down vote
favorite
Just started working at a large size company that has their own IT department, supporting all of the workplace technology needs.
I was made aware there are no private rights on employee computers - as it is their property. I came from a very small company, I knew that if they need to go through my work computer it was obviously their right but it was not advertised like this.
So with all these rights stated, what type of audits does a typical large IT department really run on employee computers? What do they include? (i.e, pushing latest virus scan, logging key strokes, website activity, file system, etc)?
(This is in the US)
work-environment management new-job company-culture employer-relations
3
What country are you in?
– Canadian Luke
Oct 17 '13 at 6:00
add a comment |Â
up vote
7
down vote
favorite
up vote
7
down vote
favorite
Just started working at a large size company that has their own IT department, supporting all of the workplace technology needs.
I was made aware there are no private rights on employee computers - as it is their property. I came from a very small company, I knew that if they need to go through my work computer it was obviously their right but it was not advertised like this.
So with all these rights stated, what type of audits does a typical large IT department really run on employee computers? What do they include? (i.e, pushing latest virus scan, logging key strokes, website activity, file system, etc)?
(This is in the US)
work-environment management new-job company-culture employer-relations
Just started working at a large size company that has their own IT department, supporting all of the workplace technology needs.
I was made aware there are no private rights on employee computers - as it is their property. I came from a very small company, I knew that if they need to go through my work computer it was obviously their right but it was not advertised like this.
So with all these rights stated, what type of audits does a typical large IT department really run on employee computers? What do they include? (i.e, pushing latest virus scan, logging key strokes, website activity, file system, etc)?
(This is in the US)
work-environment management new-job company-culture employer-relations
edited Oct 17 '13 at 17:05
asked Oct 17 '13 at 4:08
Greg McNulty
2,6701523
2,6701523
3
What country are you in?
– Canadian Luke
Oct 17 '13 at 6:00
add a comment |Â
3
What country are you in?
– Canadian Luke
Oct 17 '13 at 6:00
3
3
What country are you in?
– Canadian Luke
Oct 17 '13 at 6:00
What country are you in?
– Canadian Luke
Oct 17 '13 at 6:00
add a comment |Â
3 Answers
3
active
oldest
votes
up vote
10
down vote
accepted
The typical IT department will enforce a corporate version of some anti-virus client on the PC and schedule regular updates. It may not grant you administrative privileges if you don't need them. It will most likely have some proxy or firewall rules that block internet access to sites deemed counterproductive while working, for example Youtube or Facebook.
Those measures are automated. It will be checked if they work, but the results will probably not be checked in so far that it would take enormous manpower to look at all the sites that employees wanted to access and that were blocked.
Then, there are many non-typical IT departments that do whatever they see fit. Legal or not. The best way to handle this is to treat your work computer like a publicly accessible terminal. Only store data that you don't mind people to see.
2
You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
– Monica Cellio♦
Oct 20 '13 at 22:49
add a comment |Â
up vote
6
down vote
Programmer and ex tech support talking here.
In order to see what you are typing or what's on your screen, special software is needed - such a keylogger to see your key strokes, for example. Anything else can be checked just with IT equipment and your operating system's out of the box features.
IT can see and inspect all the data that goes in and out of your machine through the network. It may be encrypted, but not all forms of encryption are hard to break, and unless you are somewhat tech savvy, they will always at least know which addresses (URL's and IP addresses) your machine has been accessing.
Your OS can also be accessed remotely, so it's possible to know what has been installed, by whom, etc. A network admin has access to your file system, so they can see cookies, documents etc. If you have a USB drive connected, they can see what's in there too.
You don't have to be paranoid about these things. As mhoran said, a company can see a lot, but it doesn't mean everything will be audited. We techies usually only peep when ordered to by management, and then again that usually only happens when there's something suspect going on.
I used to spy a lot under management's orders when I worked in a college, because they didn't want the students making misuse of the computers in the labs (i.e.: playing games during classes). I always saw the machines being used for a lot of personal things. My job usually led to some pretty awkward conversations, like this:
- [Extremely angry, about to burst a vein on the forehead] Renan, why did you delete my
documents folder?
- Which machine was that this time?
- Lab21! You [expletive]!
- [checking logs] Ah, I deleted that to save you from being arrested by the police.
I personally know the girl and she is underage. She'll be 18 next month, though,
so you can take new pictures after her birthday.
- ... [lowers head, goes away mute and never saves anything in the labs
computers again].
add a comment |Â
up vote
4
down vote
What they actively check because of time and people constraints is different from what they collect but don't review, and is also different from what they can collect.
They own the equipment, they own the data on the equipment, and they own the resources you used (network, power...). Regardless of the size of the IT department, or even if there is an IT department, they can scan or confiscate the computer any time they want.
Assume that they can do anything. But will they resort to key loggers? They might if they suspect hat you are doing something illegal.
Virus scan requirements, the use of screen lock timers, and the like are enforced to protect their data. Blocking of websites is done to avoid the use of their machines on potentially illegal or dangerous sites, or sites that are time wasters. Restricting software installation privileges is done to protect their system from viruses or the installation of unapproved or cracked software.
add a comment |Â
StackExchange.ready(function ()
$("#show-editor-button input, #show-editor-button button").click(function ()
var showEditor = function()
$("#show-editor-button").hide();
$("#post-form").removeClass("dno");
StackExchange.editor.finallyInit();
;
var useFancy = $(this).data('confirm-use-fancy');
if(useFancy == 'True')
var popupTitle = $(this).data('confirm-fancy-title');
var popupBody = $(this).data('confirm-fancy-body');
var popupAccept = $(this).data('confirm-fancy-accept-button');
$(this).loadPopup(
url: '/post/self-answer-popup',
loaded: function(popup)
var pTitle = $(popup).find('h2');
var pBody = $(popup).find('.popup-body');
var pSubmit = $(popup).find('.popup-submit');
pTitle.text(popupTitle);
pBody.html(popupBody);
pSubmit.val(popupAccept).click(showEditor);
)
else
var confirmText = $(this).data('confirm-text');
if (confirmText ? confirm(confirmText) : true)
showEditor();
);
);
3 Answers
3
active
oldest
votes
3 Answers
3
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
10
down vote
accepted
The typical IT department will enforce a corporate version of some anti-virus client on the PC and schedule regular updates. It may not grant you administrative privileges if you don't need them. It will most likely have some proxy or firewall rules that block internet access to sites deemed counterproductive while working, for example Youtube or Facebook.
Those measures are automated. It will be checked if they work, but the results will probably not be checked in so far that it would take enormous manpower to look at all the sites that employees wanted to access and that were blocked.
Then, there are many non-typical IT departments that do whatever they see fit. Legal or not. The best way to handle this is to treat your work computer like a publicly accessible terminal. Only store data that you don't mind people to see.
2
You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
– Monica Cellio♦
Oct 20 '13 at 22:49
add a comment |Â
up vote
10
down vote
accepted
The typical IT department will enforce a corporate version of some anti-virus client on the PC and schedule regular updates. It may not grant you administrative privileges if you don't need them. It will most likely have some proxy or firewall rules that block internet access to sites deemed counterproductive while working, for example Youtube or Facebook.
Those measures are automated. It will be checked if they work, but the results will probably not be checked in so far that it would take enormous manpower to look at all the sites that employees wanted to access and that were blocked.
Then, there are many non-typical IT departments that do whatever they see fit. Legal or not. The best way to handle this is to treat your work computer like a publicly accessible terminal. Only store data that you don't mind people to see.
2
You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
– Monica Cellio♦
Oct 20 '13 at 22:49
add a comment |Â
up vote
10
down vote
accepted
up vote
10
down vote
accepted
The typical IT department will enforce a corporate version of some anti-virus client on the PC and schedule regular updates. It may not grant you administrative privileges if you don't need them. It will most likely have some proxy or firewall rules that block internet access to sites deemed counterproductive while working, for example Youtube or Facebook.
Those measures are automated. It will be checked if they work, but the results will probably not be checked in so far that it would take enormous manpower to look at all the sites that employees wanted to access and that were blocked.
Then, there are many non-typical IT departments that do whatever they see fit. Legal or not. The best way to handle this is to treat your work computer like a publicly accessible terminal. Only store data that you don't mind people to see.
The typical IT department will enforce a corporate version of some anti-virus client on the PC and schedule regular updates. It may not grant you administrative privileges if you don't need them. It will most likely have some proxy or firewall rules that block internet access to sites deemed counterproductive while working, for example Youtube or Facebook.
Those measures are automated. It will be checked if they work, but the results will probably not be checked in so far that it would take enormous manpower to look at all the sites that employees wanted to access and that were blocked.
Then, there are many non-typical IT departments that do whatever they see fit. Legal or not. The best way to handle this is to treat your work computer like a publicly accessible terminal. Only store data that you don't mind people to see.
answered Oct 17 '13 at 5:32
nvoigt
42.6k18105147
42.6k18105147
2
You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
– Monica Cellio♦
Oct 20 '13 at 22:49
add a comment |Â
2
You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
– Monica Cellio♦
Oct 20 '13 at 22:49
2
2
You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
– Monica Cellio♦
Oct 20 '13 at 22:49
You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
– Monica Cellio♦
Oct 20 '13 at 22:49
add a comment |Â
up vote
6
down vote
Programmer and ex tech support talking here.
In order to see what you are typing or what's on your screen, special software is needed - such a keylogger to see your key strokes, for example. Anything else can be checked just with IT equipment and your operating system's out of the box features.
IT can see and inspect all the data that goes in and out of your machine through the network. It may be encrypted, but not all forms of encryption are hard to break, and unless you are somewhat tech savvy, they will always at least know which addresses (URL's and IP addresses) your machine has been accessing.
Your OS can also be accessed remotely, so it's possible to know what has been installed, by whom, etc. A network admin has access to your file system, so they can see cookies, documents etc. If you have a USB drive connected, they can see what's in there too.
You don't have to be paranoid about these things. As mhoran said, a company can see a lot, but it doesn't mean everything will be audited. We techies usually only peep when ordered to by management, and then again that usually only happens when there's something suspect going on.
I used to spy a lot under management's orders when I worked in a college, because they didn't want the students making misuse of the computers in the labs (i.e.: playing games during classes). I always saw the machines being used for a lot of personal things. My job usually led to some pretty awkward conversations, like this:
- [Extremely angry, about to burst a vein on the forehead] Renan, why did you delete my
documents folder?
- Which machine was that this time?
- Lab21! You [expletive]!
- [checking logs] Ah, I deleted that to save you from being arrested by the police.
I personally know the girl and she is underage. She'll be 18 next month, though,
so you can take new pictures after her birthday.
- ... [lowers head, goes away mute and never saves anything in the labs
computers again].
add a comment |Â
up vote
6
down vote
Programmer and ex tech support talking here.
In order to see what you are typing or what's on your screen, special software is needed - such a keylogger to see your key strokes, for example. Anything else can be checked just with IT equipment and your operating system's out of the box features.
IT can see and inspect all the data that goes in and out of your machine through the network. It may be encrypted, but not all forms of encryption are hard to break, and unless you are somewhat tech savvy, they will always at least know which addresses (URL's and IP addresses) your machine has been accessing.
Your OS can also be accessed remotely, so it's possible to know what has been installed, by whom, etc. A network admin has access to your file system, so they can see cookies, documents etc. If you have a USB drive connected, they can see what's in there too.
You don't have to be paranoid about these things. As mhoran said, a company can see a lot, but it doesn't mean everything will be audited. We techies usually only peep when ordered to by management, and then again that usually only happens when there's something suspect going on.
I used to spy a lot under management's orders when I worked in a college, because they didn't want the students making misuse of the computers in the labs (i.e.: playing games during classes). I always saw the machines being used for a lot of personal things. My job usually led to some pretty awkward conversations, like this:
- [Extremely angry, about to burst a vein on the forehead] Renan, why did you delete my
documents folder?
- Which machine was that this time?
- Lab21! You [expletive]!
- [checking logs] Ah, I deleted that to save you from being arrested by the police.
I personally know the girl and she is underage. She'll be 18 next month, though,
so you can take new pictures after her birthday.
- ... [lowers head, goes away mute and never saves anything in the labs
computers again].
add a comment |Â
up vote
6
down vote
up vote
6
down vote
Programmer and ex tech support talking here.
In order to see what you are typing or what's on your screen, special software is needed - such a keylogger to see your key strokes, for example. Anything else can be checked just with IT equipment and your operating system's out of the box features.
IT can see and inspect all the data that goes in and out of your machine through the network. It may be encrypted, but not all forms of encryption are hard to break, and unless you are somewhat tech savvy, they will always at least know which addresses (URL's and IP addresses) your machine has been accessing.
Your OS can also be accessed remotely, so it's possible to know what has been installed, by whom, etc. A network admin has access to your file system, so they can see cookies, documents etc. If you have a USB drive connected, they can see what's in there too.
You don't have to be paranoid about these things. As mhoran said, a company can see a lot, but it doesn't mean everything will be audited. We techies usually only peep when ordered to by management, and then again that usually only happens when there's something suspect going on.
I used to spy a lot under management's orders when I worked in a college, because they didn't want the students making misuse of the computers in the labs (i.e.: playing games during classes). I always saw the machines being used for a lot of personal things. My job usually led to some pretty awkward conversations, like this:
- [Extremely angry, about to burst a vein on the forehead] Renan, why did you delete my
documents folder?
- Which machine was that this time?
- Lab21! You [expletive]!
- [checking logs] Ah, I deleted that to save you from being arrested by the police.
I personally know the girl and she is underage. She'll be 18 next month, though,
so you can take new pictures after her birthday.
- ... [lowers head, goes away mute and never saves anything in the labs
computers again].
Programmer and ex tech support talking here.
In order to see what you are typing or what's on your screen, special software is needed - such a keylogger to see your key strokes, for example. Anything else can be checked just with IT equipment and your operating system's out of the box features.
IT can see and inspect all the data that goes in and out of your machine through the network. It may be encrypted, but not all forms of encryption are hard to break, and unless you are somewhat tech savvy, they will always at least know which addresses (URL's and IP addresses) your machine has been accessing.
Your OS can also be accessed remotely, so it's possible to know what has been installed, by whom, etc. A network admin has access to your file system, so they can see cookies, documents etc. If you have a USB drive connected, they can see what's in there too.
You don't have to be paranoid about these things. As mhoran said, a company can see a lot, but it doesn't mean everything will be audited. We techies usually only peep when ordered to by management, and then again that usually only happens when there's something suspect going on.
I used to spy a lot under management's orders when I worked in a college, because they didn't want the students making misuse of the computers in the labs (i.e.: playing games during classes). I always saw the machines being used for a lot of personal things. My job usually led to some pretty awkward conversations, like this:
- [Extremely angry, about to burst a vein on the forehead] Renan, why did you delete my
documents folder?
- Which machine was that this time?
- Lab21! You [expletive]!
- [checking logs] Ah, I deleted that to save you from being arrested by the police.
I personally know the girl and she is underage. She'll be 18 next month, though,
so you can take new pictures after her birthday.
- ... [lowers head, goes away mute and never saves anything in the labs
computers again].
answered Oct 17 '13 at 13:56
user10483
add a comment |Â
add a comment |Â
up vote
4
down vote
What they actively check because of time and people constraints is different from what they collect but don't review, and is also different from what they can collect.
They own the equipment, they own the data on the equipment, and they own the resources you used (network, power...). Regardless of the size of the IT department, or even if there is an IT department, they can scan or confiscate the computer any time they want.
Assume that they can do anything. But will they resort to key loggers? They might if they suspect hat you are doing something illegal.
Virus scan requirements, the use of screen lock timers, and the like are enforced to protect their data. Blocking of websites is done to avoid the use of their machines on potentially illegal or dangerous sites, or sites that are time wasters. Restricting software installation privileges is done to protect their system from viruses or the installation of unapproved or cracked software.
add a comment |Â
up vote
4
down vote
What they actively check because of time and people constraints is different from what they collect but don't review, and is also different from what they can collect.
They own the equipment, they own the data on the equipment, and they own the resources you used (network, power...). Regardless of the size of the IT department, or even if there is an IT department, they can scan or confiscate the computer any time they want.
Assume that they can do anything. But will they resort to key loggers? They might if they suspect hat you are doing something illegal.
Virus scan requirements, the use of screen lock timers, and the like are enforced to protect their data. Blocking of websites is done to avoid the use of their machines on potentially illegal or dangerous sites, or sites that are time wasters. Restricting software installation privileges is done to protect their system from viruses or the installation of unapproved or cracked software.
add a comment |Â
up vote
4
down vote
up vote
4
down vote
What they actively check because of time and people constraints is different from what they collect but don't review, and is also different from what they can collect.
They own the equipment, they own the data on the equipment, and they own the resources you used (network, power...). Regardless of the size of the IT department, or even if there is an IT department, they can scan or confiscate the computer any time they want.
Assume that they can do anything. But will they resort to key loggers? They might if they suspect hat you are doing something illegal.
Virus scan requirements, the use of screen lock timers, and the like are enforced to protect their data. Blocking of websites is done to avoid the use of their machines on potentially illegal or dangerous sites, or sites that are time wasters. Restricting software installation privileges is done to protect their system from viruses or the installation of unapproved or cracked software.
What they actively check because of time and people constraints is different from what they collect but don't review, and is also different from what they can collect.
They own the equipment, they own the data on the equipment, and they own the resources you used (network, power...). Regardless of the size of the IT department, or even if there is an IT department, they can scan or confiscate the computer any time they want.
Assume that they can do anything. But will they resort to key loggers? They might if they suspect hat you are doing something illegal.
Virus scan requirements, the use of screen lock timers, and the like are enforced to protect their data. Blocking of websites is done to avoid the use of their machines on potentially illegal or dangerous sites, or sites that are time wasters. Restricting software installation privileges is done to protect their system from viruses or the installation of unapproved or cracked software.
answered Oct 17 '13 at 10:52
mhoran_psprep
40.3k463144
40.3k463144
add a comment |Â
add a comment |Â
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fworkplace.stackexchange.com%2fquestions%2f15092%2femployee-computers-and-privacy-rights%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
3
What country are you in?
– Canadian Luke
Oct 17 '13 at 6:00