Is your workplace tracking your computer activities?
by Kevin Bonsor
Browse the article Is your workplace tracking your computer activities?
Is your workplace tracking your computer activities?
Admit it -- you've used your computer at work to view non-work-related Web sites. Heck, if you are reading this article at work, you might already be guilty as charged. More than 70 percent of the adult online population has accessed the Internet at work for personal use at least once, according to a September 2000 eMarketer study. Employees are sending personal e-mails, playing games, viewing pornography, shopping, checking stock prices and gambling online during working hours. ![]() Cameras in the workplace keep an eye on employee activities. |
At the center of the debate surrounding workplace surveillance is the question of employee privacy rights. In this article, you'll learn about the various kinds of software that enable employers to monitor your computer activities. We will also discuss the legalities of this practice.
A Growing Trend: Systematic Surveillance
The growing number of employers who are monitoring their employees' activities is a result of the low cost of the monitoring technology, a growing percentage of employees using their computers for personal use and an increase in employees leaking sensitive company information. Employers are also watching their workers to avoid sexual harassment and discrimination lawsuits that stem from inappropriate and offensive e-mails circulating within a company. Instead of monitoring those employees who exhibit suspicious behavior, many employers are instituting "continuous, systematic surveillance" in the workplace, according to a Privacy Foundation study written by Andrew Schulman. Reports of companies firing workers for misusing workplace computers are becoming more common as an increasing number of employers implement electronic monitoring software.
Computers leave behind a trail of bread crumbs that can provide employers with all the information they could possibly need about an employee's computer-related activities. For employers, computers are the ultimate spy. There's little that can stop an employer from using these surveillance techniques.
There are basically five methods that employers can use to track employee activities:
- Packet sniffers
- Log files
- Desktop monitoring programs
- Phones
- Closed-circuit cameras
Let's examine some of the Internet surveillance technology and how it's used.
Packet Sniffers
Computer-network administrators have used packet sniffers for years to monitor their networks and perform diagnostic tests or troubleshoot problems. Essentially, a packet sniffer is a program that can see all of the information passing over the network it is connected to. As data streams back and forth on the network, the program looks at, or "sniffs," each packet. A packet is a part of a message that has been broken up. Normally, a computer only looks at packets addressed to it and ignores the rest of the traffic on the network. But when a packet sniffer is set up on a computer, the sniffer's network interface is set to promiscuous mode. This means that it is looking at everything that comes through. The amount of traffic largely depends on the location of the computer in the network. A client system out on an isolated branch of the network sees only a small segment of the network traffic, while the main domain server sees almost all of it.
A packet sniffer can usually be set up in one of two ways:
- Unfiltered - captures all of the packets
- Filtered - captures only those packets containing specific data elements
When you connect to the Internet, you are joining a network maintained by your Internet service provider (ISP). The ISP's network communicates with networks maintained by other ISPs to form the foundation of the Internet. A packet sniffer located at one of the servers of your ISP would potentially be able to monitor all of your online activities, such as:
- Which Web sites you visit
- What you look at on the site
- Whom you send e-mail to
- What's in the e-mail you send
- What you download from a site
- What streaming events you use, such as audio, video and Internet telephony
Desktop monitoring programs work differently than packet sniffers. They can actually monitor every single action you take with your computer.
Desktop Monitoring
Every time you provide some form of input for your computer, whether it's typing on the keyboard or opening a new application, a signal is transmitted. These signals can be intercepted by a desktop monitoring program, which can be installed on a computer at the operating system level or the assembly level. The person receiving the intercepted signals can see each character being typed and can replicate what the user is seeing on his or her screen. Desktop monitoring programs can be installed in two ways:
- Physically - Someone sits at the computer and installs the software.
- Remotely - A computer user opens an e-mail attachment. The attachment, which contains a program the user wants to install, may also contain desktop monitoring software. This is described as a Trojan horse -- a desired program that contains an undesired program.
Hackers often use desktop monitoring programs to obtain user passwords. Intercept programs, because they record keystrokes, also make users susceptible to having their credit card numbers and other sensitive personal data stolen.
Employers can use the desktop monitoring program to read e-mail and see any program that is open on your screen. Desktop replicating software captures the image on the computer screen by intercepting signals that are being transmitted to the computer's video card. These images are then streamed across the network to the system administrator. Some prepackaged programs include an alert system -- when a user visits an objectionable Web site or transmits inappropriate text, the system administrator is alerted to these actions.
But employers don't need to install software to track your computer use. There are actually systems built into every computer that make finding out what you've been doing pretty easy.
Log Files
Your computer is full of log files that provide evidence of what you've been doing. Through these log files, a system administrator can determine what Web sites you've accessed, whom you are sending e-mails to and receiving e-mails from and what applications are being used. So, if you are downloading MP3 files, there's more than likely a log file that holds data about that activity. In many cases, this information can be located even after you've deleted what you thought was all the evidence -- but deleting an e-mail, or a file, doesn't erase the trail. Here are a few places where log files can be found:
- Operating systems
- Web browsers (in the form of a cache)
- Applications (in the form of backups)
You might be surprised at how many companies are monitoring employee activities. In the next section, you'll find out just how widespread this practice is.
Workplace Eavesdropping
Computer surveillance is by far the primary method of monitoring employee activity. However, employers are still using traditional methods such as eavesdropping on phone calls, storing and reviewing voice mail and video-recording employees on the job, according to the American Management Association (AMA). "The lines between one's personal and professional life can blur with expectations of a 24-seven work week, but employees ought to engage in some discretion about personal activities carried out during the official hours of work," Ellen Bayer, AMA's human resources practice leader, said.
Currently, 78 percent of all companies use some type of surveillance system. Here is a breakdown of the methods they use:
- Storing and reviewing computer files: 36 percent
- Video-recording employees: 15 percent
- Recording and reviewing phone calls: 12 percent
- Storing and reviewing voice mail: 8 percent
![]() Cameras can monitor actions that computer programs can't. |
"Privacy in today's workplace is largely illusory," Bayer said. "In this era of open-space cubicles, shared desk space, networked computers and teleworkers, it is hard to realistically hold onto a belief of private space. Work is carried out on equipment belonging to employers who have a legal right to the work product of the employees using it."
In the next section, we will further explore the legalities of workplace monitoring and answer the question of just how much privacy you can expect at work.
Privacy Laws
Simply stated, courts in the United States tend to favor the employer in workplace-surveillance cases. For that reason, employees should always use good judgment when logging onto the Internet and sending e-mails. Choose your words carefully; you never know who might read your correspondence. Under the Electronic Communications Privacy Act (ECPA), electronic communications are divided into two groups:
- Stored communication
- Communication in transit
This directly contradicts many laws regarding traditional mailing systems. If the U.S. Postal Service worked this way, no one would be allowed to open your mail as long as it were being carried to your mailbox; but the second it is placed in the mailbox and stops moving, your neighbors would be free to come over, open and read your mail. This, of course, is not how laws regarding the postal system work. It is illegal to tamper with someone else's mail.
The U.S. Constitution contains no express right to privacy, but the U.S. Supreme Court has historically upheld an implied right to privacy. However, this right does not apply to employees. Courts seem to be upholding the idea that since the company owns the equipment and the office space, it has a right to monitor its employees to prevent misuse of that equipment and space.
With more companies installing monitoring devices and technology, you should be careful the next time you send that e-mail to mom or check out the latest sale at your favorite online store while at work. Your employer could be watching, listening and recording.