/_
/_Did you go to the Spectorsoft website? They answer all these questions.
/_
Hmm, I dug for quite a bit and could not find anything other
than the FAQ's. Technical information I could not find.
Could you forward me the link?
/_> Personally, I am amazed at the money spent on this monitoring. I think
/_> you are just trying to prove what you already suspect and know.
/_> Zero tolerance policies, to me, are more effective....and cheaper :-)
/_
/_Things like this are used as proof for dismissing an employee that has
/_violated the company's computer use policy. To avoid messy legal
/_complications, make sure such software is deployed company-wide and that
/_all monitoring is done equally, otherwise an employee could come back and
/_claim that they were singled out.
/_~M
Yes, I know that is what it's purpose is, in theory. In practice,
99% of the cost to deploy/maintain is spent on Eww's & Ahh's;
and rarely is action taken. Slap's on wrists in most cases (from my experience).
But, that is a whole other discussion for another board.
Thanks for the input, I'll dig some more but would really
appreciate some links if anyone has a couple. I am just trying
to educate myself on the technical aspects behind monitoring
and forensics of computers and networks.
-mike
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change you mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss