Home & Garden1 min ago
internet audit trails
9 Answers
how do companies save info as to what you have been doing on the internet at work?
Is there anyway of deleting it?
Is there anyway of deleting it?
Answers
Best Answer
No best answer has yet been selected by yes-doc. Once a best answer has been selected, it will be shown here.
For more on marking an answer as the "Best Answer", please visit our FAQ.In many companies all network traffic is routed through a single hardware device out to the interent.
This hardware device will have in-built security to stop viruses coming in and so on.
This device will track and log all traffic going out to web sites, which could of course be thousands of sites each day.
So, no, there is no way that you can delete it, although the computer adminsitrator could delete it.
It is unlikely anyone will look at it unless your company has announced they are going to start monitoring who is visting what sites, and how long they are spending on the interent.
This hardware device will have in-built security to stop viruses coming in and so on.
This device will track and log all traffic going out to web sites, which could of course be thousands of sites each day.
So, no, there is no way that you can delete it, although the computer adminsitrator could delete it.
It is unlikely anyone will look at it unless your company has announced they are going to start monitoring who is visting what sites, and how long they are spending on the interent.
VHG
you couldn't be more wrong!
many (all) medium-large and corporates routinely scan ic/og traffic as well as all e-mail
you are right that the main reason is virus/spam
but there is also the issue of "inappropriate use".
We run word recognition (********* still causes problems!)
as well as skintone scanning on all e-mail
and every http/ftp site request is compared is compared against one of the "standard" databases (similar idea to "net nanny" - but for corporates)
"red" sites printout immediately.
even sites such as e-bay and BBC are included - the reason there is - you are being paid to WORK for x hours ... not surf.
reports are produced on a daily basis ... and a weekly summary is included in the senior management's summaries.
from that point it's down to policy ... the pede/racist/harassing/political stuff would be dealt with immediately.
standard porn and jokey outgoing e-mail is graded .... most people will look at/send a few "cheeky" sites.
(incoming e-mail is more difficult - especially if it's from a customer or supplier's representative [good will and all that])
ppl who spend "unreasonable" time or have inappropriate surfing habits .. will be added to a hit list and eventually be disciplined if the behaviour is persistent.
as for the rest .... if they want rid of you .... it's an easy "filler" to add to the list.
yes-doc
we can only guess ...
but if you have an IT department .... change to no-doc
most companies give a little leeway
but if they want rid of you .... it's an easy "filler" to add to the list.
you couldn't be more wrong!
many (all) medium-large and corporates routinely scan ic/og traffic as well as all e-mail
you are right that the main reason is virus/spam
but there is also the issue of "inappropriate use".
We run word recognition (********* still causes problems!)
as well as skintone scanning on all e-mail
and every http/ftp site request is compared is compared against one of the "standard" databases (similar idea to "net nanny" - but for corporates)
"red" sites printout immediately.
even sites such as e-bay and BBC are included - the reason there is - you are being paid to WORK for x hours ... not surf.
reports are produced on a daily basis ... and a weekly summary is included in the senior management's summaries.
from that point it's down to policy ... the pede/racist/harassing/political stuff would be dealt with immediately.
standard porn and jokey outgoing e-mail is graded .... most people will look at/send a few "cheeky" sites.
(incoming e-mail is more difficult - especially if it's from a customer or supplier's representative [good will and all that])
ppl who spend "unreasonable" time or have inappropriate surfing habits .. will be added to a hit list and eventually be disciplined if the behaviour is persistent.
as for the rest .... if they want rid of you .... it's an easy "filler" to add to the list.
yes-doc
we can only guess ...
but if you have an IT department .... change to no-doc
most companies give a little leeway
but if they want rid of you .... it's an easy "filler" to add to the list.
VHG - if you ain't in the trade ... it's not widely publiciesd ... because it's boring stuff. - hope we aint fallen out
LOL
companies must make their employees aware ... but how aware they are vairies wildely
Useage is big business now .... the smaller firms obviously don't bother with any of this .....
but even quite modest companies now (esp those with shareholders) feel they have to justify every penny they spend ... and "people issues" is one of the easier areas to monitor
now this I'd think is right up your street .....
Some of the skin tone software is based on these two progs
DupDetector
http://www.freeware-guide.com/rareware/DupDete ctor.html
and unique filer
http://www.uniquefiler.com/
depending on how they are configured they not only detect duplicates .... but similar images (no matter what the names are) - it actually "looks" at the pikkies and compares them
frightening that such a small piece of code can do all that
LOL
companies must make their employees aware ... but how aware they are vairies wildely
Useage is big business now .... the smaller firms obviously don't bother with any of this .....
but even quite modest companies now (esp those with shareholders) feel they have to justify every penny they spend ... and "people issues" is one of the easier areas to monitor
now this I'd think is right up your street .....
Some of the skin tone software is based on these two progs
DupDetector
http://www.freeware-guide.com/rareware/DupDete ctor.html
and unique filer
http://www.uniquefiler.com/
depending on how they are configured they not only detect duplicates .... but similar images (no matter what the names are) - it actually "looks" at the pikkies and compares them
frightening that such a small piece of code can do all that
Thank you for your answers.
basically as i understand you r comments, if I have been on a site only once then really no one is bothered, unless, someone complains and they find i've been there?
I have another question.
If someone gives you their password and youlook at it is that in breach of any law?
basically as i understand you r comments, if I have been on a site only once then really no one is bothered, unless, someone complains and they find i've been there?
I have another question.
If someone gives you their password and youlook at it is that in breach of any law?
depends on your company ... but it's very doubtful for a first time
illegal
No - not as such
it's what you do with that knowledge that could be
could breach company policy
if a banking type password - obviously illegal to clean out their account/spend their money
to impersonate them for fraudulent purposes
etc etc
but seeing a password ... no
illegal
No - not as such
it's what you do with that knowledge that could be
could breach company policy
if a banking type password - obviously illegal to clean out their account/spend their money
to impersonate them for fraudulent purposes
etc etc
but seeing a password ... no
skin-tone searches used to block http://www.ft.com, because of the occasional salmon pink built in to echo the pink paper, but presumably they've got a bit more sophisticated now (this has a faint air of urban myth but I was told by someone who worked there)
Related Questions
Sorry, we can't find any related questions. Try using the search bar at the top of the page to search for some keywords, or choose a topic and submit your own question.