INCREASING PRODUCTIVITY. By Implementing A Non-Invasive Employee Surveillance Solution



Similar documents
Cyclope Internet Filtering Proxy. - Installation Guide -

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

HUMAN RESOURCES POLICIES & PROCEDURES

Profound Outdoors Privacy Policy

SURVEILLANCE AND PRIVACY

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

Information Governance Framework. June 2015

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

Cyclope Internet Filtering Proxy

Delaware State University Policy

ICT Student Usage Policy

Berwick Academy Policy on E Safety

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

INSIDE. Malicious Threats of Peer-to-Peer Networking

Collection and Use of Information

Privacy Policy. log in to the Services with social networking credentials;

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Niagara County Community College

PRIVACY NOTICE. Last Updated: March 24, 2015

Acceptable Use Policy ("AUP")

ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015

ZIMPERIUM, INC. END USER LICENSE TERMS

Acceptable Use of Information Technology

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

Policies & Procedures. Moat Community College E-Safety Policy

CHIS, Inc. Privacy General Guidelines

EMERSON PARK ACADEMY

What Personally Identifiable Information does EducationDynamics collect?

Acceptable Use and Publishing Policy

About Help Desk. McAfee Help Desk 2.0 Software. Product Guide. Functions of McAfee Help Desk software. Quarantine release.

Filtering and Identifying Web Activity by User Name

APPMACHINE MOBILE PRIVACY STATEMENT. Version, May 29, 2015

SAP Splash Privacy Statement

Our Vendor Code of Conduct

13.19 ETHICS REPORTING POLICY AND PROCEDURE

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

PRIVACY POLICY. Types of Information Collected

DailyMailz may collect and process the following personal information about you:

Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services.

FINAL DOCUMENT. Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Part 1: General Requirements

Virginia Commonwealth University Police Department

St. Peter s C.E. Primary School Farnworth , Internet Security and Facsimile Policy

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND USAGE POLICY

IMARDA i360 MANAGING FLEET-WIDE COMPLIANCE COMPLIANCE ISSUES:

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

Terms of use of information and communication technologies at the University of Burgundy

HIPAA Security Training Manual

SPECIFIC TERMS AND CONDITIONS ON THE RENTAL OF A DEDICATED SERVER

BRING YOUR OWN DEVICE (BYOD) POLICY

Safeguard Your Remote Employees With CyBlock Hybrid

region16.net Acceptable Use Policy ( AUP )

TECHNOLOGY USE POLICY FLORENCE ELEMENTARY

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015

Bates Technical College. Information Technology Acceptable Use Policy

MOSMAN HIGH SCHOOL NSW DEC BRING YOUR OWN DEVICE STUDENT AGREEMENT

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Guidance on the Use of Social Networking

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Records Retention and Disposal Schedule. Information Management

AMC PRIVACY POLICY INFORMATION COLLECTION

How To Understand The Bring Your Own Device To School Policy At A School

Employees monitoring of information and communication technologies private usage Guidelines updated in Portugal

Transcription:

INCREASING PRODUCTIVITY By Implementing A Non-Invasive Employee Surveillance Solution

Introduction 3 Employee Monitoring 3 How It Works 4 Employee Activity 5 Internet Activity 5 Applications Used 5 Overtime 5 Attendance 6 Users Activity 6 Day Summary 6 About Amplusnet 7 Copyright 2006 Amplusnet-Group, All Rights Reserved 2

Introduction Today s most wanted business words are profits and more profits. It is the right of each employer to ask more and more form the workers. Today s work is more and more based on advanced technology and one should find way of monitoring and controlling it. Employee monitoring is not a new concept in the business environment, yet the use of computers during daily activity pushed managers to evaluating and implementing solutions for guiding them into establishing policies, punishments and compensations. Cyclope Employee Surveillance is a surveillance application that stealthily monitors the activity of computers. It is a tool dedicated to managers and IT administrators with the view of enhancing network security, establishing use policies and avoiding legal liabilities. Employee Monitoring With so many reactions from employees and unions regarding the right to privacy, solutions respecting the right to privacy are being developed. Monitoring may also be specifically targeted, for example to detect misconduct or to ensure compliance with specific company policies and procedures. A survey conducted in 2005 by the American Management Association and the epolicy Institute revealed that from the number of companies participating in the survey 26% fired employees due to Internet misuse, 25% terminated employees for email misuse. 76% of the companies admitted monitoring each employee s Internet connections. Cyclope Employee Surveillance Solution monitors all activities connected to the use of a computer and IT infrastructure within a company. It provides detailed information on how computers are being used and how the IT infrastructure is exploited by the network members. Copyright 2006 Amplusnet-Group, All Rights Reserved 3

What Can Cyclope Employee Bring To Your Company? A proactive human resources management: it helps managers make an employee work profile; evaluate their work and alerts management to suspicious behavior and involvement in nonproductive activities. Information support on establishing an acceptable use policy (AUP) Reduced nonproductive activities, such as surfing the Internet for non work related materials, visiting explicit content websites, reading the last night game reviews, buying online, selling or buying stock, online gaming Establishing computer configuration and needed application for each job description Respecting the right to privacy it does not monitor the informational content Time management overtime and overtime activities Group management allowing employees to be grouped according to the internal structure How It Works Cyclope Employee Surveillance monitors employees who use the computer in their work. Copyright 2006 Amplusnet-Group, All Rights Reserved 4

Cyclope Employee Surveillance solution has a client server structure, requiring the installation of two different applications: Cyclope Server and Cyclope Client, all data being gathered and visualized in a web based interface. The Cyclope Client application needs to be installed on all computers that will undergo monitoring, its function being to gather all information on the monitored computer/user and have it sent to the server application. The Cyclope Server application manages all monitored clients and generates for the interface users the information as customizable charts and reports. Employee Activity Cyclope Employee Surveillance monitors the activity of all computers, processes the information and renders it as customizable statistics and reports. Internet Activity Employees tend to spend most of their time browsing on the Internet. Cyclope Employee Surveillance gives accurate statistics on what pages have been accessed and how much time the employee spent using them. This report includes also all accessed web applications Applications Used Cyclope Employee Surveillance provides detailed information on what applications have been used and the percentage of time as from total working time. It is a good indicator to see the job description of each worker and determine what applications can be used. Consulting the chart it is easy to figure it out whether a game or a productive application. An IT administrator can discover the use of unlicensed application whose use may cause liabilities. Overtime Many times, employees complained about too much workload and need extra time to complete their jobs. Well, extra time means also extra expenses for the employer. Cyclope Employee Copyright 2006 Amplusnet-Group, All Rights Reserved 5

Surveillance gives you all activities that took place during overtime to see whether this was justified or not. Attendance Attendance refers to the actual time an employee spent at the computer, overtime included. It is a good indicator on work presence. Users Activity Cyclope Employee Surveillance gives information on the employee activity as active or idle, and offers the support of comparing similar job descriptions. Day Summary This section offers a detailed image of employee daily activity, (programs used, duration while programs have been used, and percentage of total time). Cyclope Benefits Cyclope Employee Surveillance was designed to provide assistance to managers and not just a spying tool. Reports and statistics are meant to provide useful information for accessing employee s activity in terms of complying with the rules and preserving the infrastructure integrity. The network security is assured by implementing policies and restraining access to web sites or resources that may pose a threat. The ultimate purpose of Cyclope Employee Surveillance is increasing productivity by focusing employees to work related computer activities. Scalability Cyclope Employee Surveillance can be implemented in any industry, government or educational organization, with larger or smaller number of employees. Security Cyclope Employee Surveillance is making an application audit, helping network administrators control applications running on a computer, evaluate if computers are Copyright 2006 Amplusnet-Group, All Rights Reserved 6

properly used or more computers are needed to a specified location. Thus, all unlicensed or inappropriate application can be uninstalled. Privacy Cyclope Employee Surveillance is not an invasive solution. Identification is made solely by electronic means and does not collect personal information or intercept any means of electronic communication (monitoring messages as they are transmitted). It clearly monitors what an employee is doing at work as far as job description and IT infrastructure is handled. Before implementing a monitoring solution every manager should make sure that it complies with the local laws. Legislation on employee monitoring varies from country to county. The US law generally allows monitoring of employees provided they have no reasonable expectation of privacy. As a result, if companies have given employees clear notice that they will monitor public areas and technology resources, employees generally will have no reasonable expectation of privacy and a company can monitor. European countries have individually established laws on this matter, yet a new directive dealing with the issues of consent, medical data, drug and genetic testing, and monitoring and surveillance is due to be issued. About Amplusnet Amplusnet Group is a privately owned group of companies operating in the field of development and marketing of software solution and of outsourcing services. The group operates,, an estore containing online anonymity and privacy tools, and cyclope-series.com, a portal containing enterprise monitoring solutions. Cyclope Series points at providing state of the art monitoring and filtering solutions that provide a detailed image on a company s ICT infrastructure usage. Cyclope Series Solutions supports a high employee control, employee productivity and provides means of identify areas of abuse or malpractice. Copyright 2006 Amplusnet-Group, All Rights Reserved 7