Employee Computers and Privacy Rights?

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty margin-bottom:0;







up vote
7
down vote

favorite
1












Just started working at a large size company that has their own IT department, supporting all of the workplace technology needs.



I was made aware there are no private rights on employee computers - as it is their property. I came from a very small company, I knew that if they need to go through my work computer it was obviously their right but it was not advertised like this.



So with all these rights stated, what type of audits does a typical large IT department really run on employee computers? What do they include? (i.e, pushing latest virus scan, logging key strokes, website activity, file system, etc)?



(This is in the US)







share|improve this question


















  • 3




    What country are you in?
    – Canadian Luke
    Oct 17 '13 at 6:00
















up vote
7
down vote

favorite
1












Just started working at a large size company that has their own IT department, supporting all of the workplace technology needs.



I was made aware there are no private rights on employee computers - as it is their property. I came from a very small company, I knew that if they need to go through my work computer it was obviously their right but it was not advertised like this.



So with all these rights stated, what type of audits does a typical large IT department really run on employee computers? What do they include? (i.e, pushing latest virus scan, logging key strokes, website activity, file system, etc)?



(This is in the US)







share|improve this question


















  • 3




    What country are you in?
    – Canadian Luke
    Oct 17 '13 at 6:00












up vote
7
down vote

favorite
1









up vote
7
down vote

favorite
1






1





Just started working at a large size company that has their own IT department, supporting all of the workplace technology needs.



I was made aware there are no private rights on employee computers - as it is their property. I came from a very small company, I knew that if they need to go through my work computer it was obviously their right but it was not advertised like this.



So with all these rights stated, what type of audits does a typical large IT department really run on employee computers? What do they include? (i.e, pushing latest virus scan, logging key strokes, website activity, file system, etc)?



(This is in the US)







share|improve this question














Just started working at a large size company that has their own IT department, supporting all of the workplace technology needs.



I was made aware there are no private rights on employee computers - as it is their property. I came from a very small company, I knew that if they need to go through my work computer it was obviously their right but it was not advertised like this.



So with all these rights stated, what type of audits does a typical large IT department really run on employee computers? What do they include? (i.e, pushing latest virus scan, logging key strokes, website activity, file system, etc)?



(This is in the US)









share|improve this question













share|improve this question




share|improve this question








edited Oct 17 '13 at 17:05

























asked Oct 17 '13 at 4:08









Greg McNulty

2,6701523




2,6701523







  • 3




    What country are you in?
    – Canadian Luke
    Oct 17 '13 at 6:00












  • 3




    What country are you in?
    – Canadian Luke
    Oct 17 '13 at 6:00







3




3




What country are you in?
– Canadian Luke
Oct 17 '13 at 6:00




What country are you in?
– Canadian Luke
Oct 17 '13 at 6:00










3 Answers
3






active

oldest

votes

















up vote
10
down vote



accepted










The typical IT department will enforce a corporate version of some anti-virus client on the PC and schedule regular updates. It may not grant you administrative privileges if you don't need them. It will most likely have some proxy or firewall rules that block internet access to sites deemed counterproductive while working, for example Youtube or Facebook.



Those measures are automated. It will be checked if they work, but the results will probably not be checked in so far that it would take enormous manpower to look at all the sites that employees wanted to access and that were blocked.



Then, there are many non-typical IT departments that do whatever they see fit. Legal or not. The best way to handle this is to treat your work computer like a publicly accessible terminal. Only store data that you don't mind people to see.






share|improve this answer
















  • 2




    You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
    – Monica Cellio♦
    Oct 20 '13 at 22:49

















up vote
6
down vote













Programmer and ex tech support talking here.



In order to see what you are typing or what's on your screen, special software is needed - such a keylogger to see your key strokes, for example. Anything else can be checked just with IT equipment and your operating system's out of the box features.



IT can see and inspect all the data that goes in and out of your machine through the network. It may be encrypted, but not all forms of encryption are hard to break, and unless you are somewhat tech savvy, they will always at least know which addresses (URL's and IP addresses) your machine has been accessing.



Your OS can also be accessed remotely, so it's possible to know what has been installed, by whom, etc. A network admin has access to your file system, so they can see cookies, documents etc. If you have a USB drive connected, they can see what's in there too.



You don't have to be paranoid about these things. As mhoran said, a company can see a lot, but it doesn't mean everything will be audited. We techies usually only peep when ordered to by management, and then again that usually only happens when there's something suspect going on.



I used to spy a lot under management's orders when I worked in a college, because they didn't want the students making misuse of the computers in the labs (i.e.: playing games during classes). I always saw the machines being used for a lot of personal things. My job usually led to some pretty awkward conversations, like this:



- [Extremely angry, about to burst a vein on the forehead] Renan, why did you delete my
documents folder?
- Which machine was that this time?
- Lab21! You [expletive]!
- [checking logs] Ah, I deleted that to save you from being arrested by the police.
I personally know the girl and she is underage. She'll be 18 next month, though,
so you can take new pictures after her birthday.
- ... [lowers head, goes away mute and never saves anything in the labs
computers again].





share|improve this answer



























    up vote
    4
    down vote













    What they actively check because of time and people constraints is different from what they collect but don't review, and is also different from what they can collect.



    They own the equipment, they own the data on the equipment, and they own the resources you used (network, power...). Regardless of the size of the IT department, or even if there is an IT department, they can scan or confiscate the computer any time they want.



    Assume that they can do anything. But will they resort to key loggers? They might if they suspect hat you are doing something illegal.



    Virus scan requirements, the use of screen lock timers, and the like are enforced to protect their data. Blocking of websites is done to avoid the use of their machines on potentially illegal or dangerous sites, or sites that are time wasters. Restricting software installation privileges is done to protect their system from viruses or the installation of unapproved or cracked software.






    share|improve this answer




















      Your Answer







      StackExchange.ready(function()
      var channelOptions =
      tags: "".split(" "),
      id: "423"
      ;
      initTagRenderer("".split(" "), "".split(" "), channelOptions);

      StackExchange.using("externalEditor", function()
      // Have to fire editor after snippets, if snippets enabled
      if (StackExchange.settings.snippets.snippetsEnabled)
      StackExchange.using("snippets", function()
      createEditor();
      );

      else
      createEditor();

      );

      function createEditor()
      StackExchange.prepareEditor(
      heartbeatType: 'answer',
      convertImagesToLinks: false,
      noModals: false,
      showLowRepImageUploadWarning: true,
      reputationToPostImages: null,
      bindNavPrevention: true,
      postfix: "",
      noCode: true, onDemand: false,
      discardSelector: ".discard-answer"
      ,immediatelyShowMarkdownHelp:true
      );



      );








       

      draft saved


      draft discarded


















      StackExchange.ready(
      function ()
      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fworkplace.stackexchange.com%2fquestions%2f15092%2femployee-computers-and-privacy-rights%23new-answer', 'question_page');

      );

      Post as a guest

























      StackExchange.ready(function ()
      $("#show-editor-button input, #show-editor-button button").click(function ()
      var showEditor = function()
      $("#show-editor-button").hide();
      $("#post-form").removeClass("dno");
      StackExchange.editor.finallyInit();
      ;

      var useFancy = $(this).data('confirm-use-fancy');
      if(useFancy == 'True')
      var popupTitle = $(this).data('confirm-fancy-title');
      var popupBody = $(this).data('confirm-fancy-body');
      var popupAccept = $(this).data('confirm-fancy-accept-button');

      $(this).loadPopup(
      url: '/post/self-answer-popup',
      loaded: function(popup)
      var pTitle = $(popup).find('h2');
      var pBody = $(popup).find('.popup-body');
      var pSubmit = $(popup).find('.popup-submit');

      pTitle.text(popupTitle);
      pBody.html(popupBody);
      pSubmit.val(popupAccept).click(showEditor);

      )
      else
      var confirmText = $(this).data('confirm-text');
      if (confirmText ? confirm(confirmText) : true)
      showEditor();


      );
      );






      3 Answers
      3






      active

      oldest

      votes








      3 Answers
      3






      active

      oldest

      votes









      active

      oldest

      votes






      active

      oldest

      votes








      up vote
      10
      down vote



      accepted










      The typical IT department will enforce a corporate version of some anti-virus client on the PC and schedule regular updates. It may not grant you administrative privileges if you don't need them. It will most likely have some proxy or firewall rules that block internet access to sites deemed counterproductive while working, for example Youtube or Facebook.



      Those measures are automated. It will be checked if they work, but the results will probably not be checked in so far that it would take enormous manpower to look at all the sites that employees wanted to access and that were blocked.



      Then, there are many non-typical IT departments that do whatever they see fit. Legal or not. The best way to handle this is to treat your work computer like a publicly accessible terminal. Only store data that you don't mind people to see.






      share|improve this answer
















      • 2




        You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
        – Monica Cellio♦
        Oct 20 '13 at 22:49














      up vote
      10
      down vote



      accepted










      The typical IT department will enforce a corporate version of some anti-virus client on the PC and schedule regular updates. It may not grant you administrative privileges if you don't need them. It will most likely have some proxy or firewall rules that block internet access to sites deemed counterproductive while working, for example Youtube or Facebook.



      Those measures are automated. It will be checked if they work, but the results will probably not be checked in so far that it would take enormous manpower to look at all the sites that employees wanted to access and that were blocked.



      Then, there are many non-typical IT departments that do whatever they see fit. Legal or not. The best way to handle this is to treat your work computer like a publicly accessible terminal. Only store data that you don't mind people to see.






      share|improve this answer
















      • 2




        You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
        – Monica Cellio♦
        Oct 20 '13 at 22:49












      up vote
      10
      down vote



      accepted







      up vote
      10
      down vote



      accepted






      The typical IT department will enforce a corporate version of some anti-virus client on the PC and schedule regular updates. It may not grant you administrative privileges if you don't need them. It will most likely have some proxy or firewall rules that block internet access to sites deemed counterproductive while working, for example Youtube or Facebook.



      Those measures are automated. It will be checked if they work, but the results will probably not be checked in so far that it would take enormous manpower to look at all the sites that employees wanted to access and that were blocked.



      Then, there are many non-typical IT departments that do whatever they see fit. Legal or not. The best way to handle this is to treat your work computer like a publicly accessible terminal. Only store data that you don't mind people to see.






      share|improve this answer












      The typical IT department will enforce a corporate version of some anti-virus client on the PC and schedule regular updates. It may not grant you administrative privileges if you don't need them. It will most likely have some proxy or firewall rules that block internet access to sites deemed counterproductive while working, for example Youtube or Facebook.



      Those measures are automated. It will be checked if they work, but the results will probably not be checked in so far that it would take enormous manpower to look at all the sites that employees wanted to access and that were blocked.



      Then, there are many non-typical IT departments that do whatever they see fit. Legal or not. The best way to handle this is to treat your work computer like a publicly accessible terminal. Only store data that you don't mind people to see.







      share|improve this answer












      share|improve this answer



      share|improve this answer










      answered Oct 17 '13 at 5:32









      nvoigt

      42.6k18105147




      42.6k18105147







      • 2




        You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
        – Monica Cellio♦
        Oct 20 '13 at 22:49












      • 2




        You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
        – Monica Cellio♦
        Oct 20 '13 at 22:49







      2




      2




      You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
      – Monica Cellio♦
      Oct 20 '13 at 22:49




      You should assume that internet access is logged. They probably won't routinely check individual users (that's way too much data), but if there's a reason to look more closely at your activity, they will. I know my employer logs this, tracking origin IP and logged-in user.
      – Monica Cellio♦
      Oct 20 '13 at 22:49












      up vote
      6
      down vote













      Programmer and ex tech support talking here.



      In order to see what you are typing or what's on your screen, special software is needed - such a keylogger to see your key strokes, for example. Anything else can be checked just with IT equipment and your operating system's out of the box features.



      IT can see and inspect all the data that goes in and out of your machine through the network. It may be encrypted, but not all forms of encryption are hard to break, and unless you are somewhat tech savvy, they will always at least know which addresses (URL's and IP addresses) your machine has been accessing.



      Your OS can also be accessed remotely, so it's possible to know what has been installed, by whom, etc. A network admin has access to your file system, so they can see cookies, documents etc. If you have a USB drive connected, they can see what's in there too.



      You don't have to be paranoid about these things. As mhoran said, a company can see a lot, but it doesn't mean everything will be audited. We techies usually only peep when ordered to by management, and then again that usually only happens when there's something suspect going on.



      I used to spy a lot under management's orders when I worked in a college, because they didn't want the students making misuse of the computers in the labs (i.e.: playing games during classes). I always saw the machines being used for a lot of personal things. My job usually led to some pretty awkward conversations, like this:



      - [Extremely angry, about to burst a vein on the forehead] Renan, why did you delete my
      documents folder?
      - Which machine was that this time?
      - Lab21! You [expletive]!
      - [checking logs] Ah, I deleted that to save you from being arrested by the police.
      I personally know the girl and she is underage. She'll be 18 next month, though,
      so you can take new pictures after her birthday.
      - ... [lowers head, goes away mute and never saves anything in the labs
      computers again].





      share|improve this answer
























        up vote
        6
        down vote













        Programmer and ex tech support talking here.



        In order to see what you are typing or what's on your screen, special software is needed - such a keylogger to see your key strokes, for example. Anything else can be checked just with IT equipment and your operating system's out of the box features.



        IT can see and inspect all the data that goes in and out of your machine through the network. It may be encrypted, but not all forms of encryption are hard to break, and unless you are somewhat tech savvy, they will always at least know which addresses (URL's and IP addresses) your machine has been accessing.



        Your OS can also be accessed remotely, so it's possible to know what has been installed, by whom, etc. A network admin has access to your file system, so they can see cookies, documents etc. If you have a USB drive connected, they can see what's in there too.



        You don't have to be paranoid about these things. As mhoran said, a company can see a lot, but it doesn't mean everything will be audited. We techies usually only peep when ordered to by management, and then again that usually only happens when there's something suspect going on.



        I used to spy a lot under management's orders when I worked in a college, because they didn't want the students making misuse of the computers in the labs (i.e.: playing games during classes). I always saw the machines being used for a lot of personal things. My job usually led to some pretty awkward conversations, like this:



        - [Extremely angry, about to burst a vein on the forehead] Renan, why did you delete my
        documents folder?
        - Which machine was that this time?
        - Lab21! You [expletive]!
        - [checking logs] Ah, I deleted that to save you from being arrested by the police.
        I personally know the girl and she is underage. She'll be 18 next month, though,
        so you can take new pictures after her birthday.
        - ... [lowers head, goes away mute and never saves anything in the labs
        computers again].





        share|improve this answer






















          up vote
          6
          down vote










          up vote
          6
          down vote









          Programmer and ex tech support talking here.



          In order to see what you are typing or what's on your screen, special software is needed - such a keylogger to see your key strokes, for example. Anything else can be checked just with IT equipment and your operating system's out of the box features.



          IT can see and inspect all the data that goes in and out of your machine through the network. It may be encrypted, but not all forms of encryption are hard to break, and unless you are somewhat tech savvy, they will always at least know which addresses (URL's and IP addresses) your machine has been accessing.



          Your OS can also be accessed remotely, so it's possible to know what has been installed, by whom, etc. A network admin has access to your file system, so they can see cookies, documents etc. If you have a USB drive connected, they can see what's in there too.



          You don't have to be paranoid about these things. As mhoran said, a company can see a lot, but it doesn't mean everything will be audited. We techies usually only peep when ordered to by management, and then again that usually only happens when there's something suspect going on.



          I used to spy a lot under management's orders when I worked in a college, because they didn't want the students making misuse of the computers in the labs (i.e.: playing games during classes). I always saw the machines being used for a lot of personal things. My job usually led to some pretty awkward conversations, like this:



          - [Extremely angry, about to burst a vein on the forehead] Renan, why did you delete my
          documents folder?
          - Which machine was that this time?
          - Lab21! You [expletive]!
          - [checking logs] Ah, I deleted that to save you from being arrested by the police.
          I personally know the girl and she is underage. She'll be 18 next month, though,
          so you can take new pictures after her birthday.
          - ... [lowers head, goes away mute and never saves anything in the labs
          computers again].





          share|improve this answer












          Programmer and ex tech support talking here.



          In order to see what you are typing or what's on your screen, special software is needed - such a keylogger to see your key strokes, for example. Anything else can be checked just with IT equipment and your operating system's out of the box features.



          IT can see and inspect all the data that goes in and out of your machine through the network. It may be encrypted, but not all forms of encryption are hard to break, and unless you are somewhat tech savvy, they will always at least know which addresses (URL's and IP addresses) your machine has been accessing.



          Your OS can also be accessed remotely, so it's possible to know what has been installed, by whom, etc. A network admin has access to your file system, so they can see cookies, documents etc. If you have a USB drive connected, they can see what's in there too.



          You don't have to be paranoid about these things. As mhoran said, a company can see a lot, but it doesn't mean everything will be audited. We techies usually only peep when ordered to by management, and then again that usually only happens when there's something suspect going on.



          I used to spy a lot under management's orders when I worked in a college, because they didn't want the students making misuse of the computers in the labs (i.e.: playing games during classes). I always saw the machines being used for a lot of personal things. My job usually led to some pretty awkward conversations, like this:



          - [Extremely angry, about to burst a vein on the forehead] Renan, why did you delete my
          documents folder?
          - Which machine was that this time?
          - Lab21! You [expletive]!
          - [checking logs] Ah, I deleted that to save you from being arrested by the police.
          I personally know the girl and she is underage. She'll be 18 next month, though,
          so you can take new pictures after her birthday.
          - ... [lowers head, goes away mute and never saves anything in the labs
          computers again].






          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Oct 17 '13 at 13:56







          user10483



























              up vote
              4
              down vote













              What they actively check because of time and people constraints is different from what they collect but don't review, and is also different from what they can collect.



              They own the equipment, they own the data on the equipment, and they own the resources you used (network, power...). Regardless of the size of the IT department, or even if there is an IT department, they can scan or confiscate the computer any time they want.



              Assume that they can do anything. But will they resort to key loggers? They might if they suspect hat you are doing something illegal.



              Virus scan requirements, the use of screen lock timers, and the like are enforced to protect their data. Blocking of websites is done to avoid the use of their machines on potentially illegal or dangerous sites, or sites that are time wasters. Restricting software installation privileges is done to protect their system from viruses or the installation of unapproved or cracked software.






              share|improve this answer
























                up vote
                4
                down vote













                What they actively check because of time and people constraints is different from what they collect but don't review, and is also different from what they can collect.



                They own the equipment, they own the data on the equipment, and they own the resources you used (network, power...). Regardless of the size of the IT department, or even if there is an IT department, they can scan or confiscate the computer any time they want.



                Assume that they can do anything. But will they resort to key loggers? They might if they suspect hat you are doing something illegal.



                Virus scan requirements, the use of screen lock timers, and the like are enforced to protect their data. Blocking of websites is done to avoid the use of their machines on potentially illegal or dangerous sites, or sites that are time wasters. Restricting software installation privileges is done to protect their system from viruses or the installation of unapproved or cracked software.






                share|improve this answer






















                  up vote
                  4
                  down vote










                  up vote
                  4
                  down vote









                  What they actively check because of time and people constraints is different from what they collect but don't review, and is also different from what they can collect.



                  They own the equipment, they own the data on the equipment, and they own the resources you used (network, power...). Regardless of the size of the IT department, or even if there is an IT department, they can scan or confiscate the computer any time they want.



                  Assume that they can do anything. But will they resort to key loggers? They might if they suspect hat you are doing something illegal.



                  Virus scan requirements, the use of screen lock timers, and the like are enforced to protect their data. Blocking of websites is done to avoid the use of their machines on potentially illegal or dangerous sites, or sites that are time wasters. Restricting software installation privileges is done to protect their system from viruses or the installation of unapproved or cracked software.






                  share|improve this answer












                  What they actively check because of time and people constraints is different from what they collect but don't review, and is also different from what they can collect.



                  They own the equipment, they own the data on the equipment, and they own the resources you used (network, power...). Regardless of the size of the IT department, or even if there is an IT department, they can scan or confiscate the computer any time they want.



                  Assume that they can do anything. But will they resort to key loggers? They might if they suspect hat you are doing something illegal.



                  Virus scan requirements, the use of screen lock timers, and the like are enforced to protect their data. Blocking of websites is done to avoid the use of their machines on potentially illegal or dangerous sites, or sites that are time wasters. Restricting software installation privileges is done to protect their system from viruses or the installation of unapproved or cracked software.







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered Oct 17 '13 at 10:52









                  mhoran_psprep

                  40.3k463144




                  40.3k463144






















                       

                      draft saved


                      draft discarded


























                       


                      draft saved


                      draft discarded














                      StackExchange.ready(
                      function ()
                      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fworkplace.stackexchange.com%2fquestions%2f15092%2femployee-computers-and-privacy-rights%23new-answer', 'question_page');

                      );

                      Post as a guest

















































































                      Comments

                      Popular posts from this blog

                      What does second last employer means? [closed]

                      List of Gilmore Girls characters

                      Confectionery