Can a company's IT department know what Web sites an employee visits, even if the employee has no data in their...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
history folder on their C drive? I heard there is free software available to block them from monitoring who I am sending emails to from my business email address.
There are certain privacy requirements that employers are bound to. However, as an employee you probably signed an acceptable use policy (AUP). Also, you are using the company's equipment, network, and Internet service. The company has most likely placed limits on what each employee can do with the Internet and email system or at least defined in the policy what is or is not involved. There's a lot at stake for them as one inappropriate email or sexually explicit website could mean huge fines and legal headaches.
Sure there are tools that allow the user to redirect traffic and other technologies like proxies that allow users to obfuscate their IP address but you're still talking about the company's assets. If they were to catch you trying to pull such tricks it could get you fired. Personally, I don't think it's worth it. No matter what you do they can still monitor all traffic that goes into or out of their network and you are not in a position to detect it. Your best bet is to use the company's network for business activities and conduct personal business on your home Internet connection.
Dig Deeper on Network Security Monitoring and Analysis
Related Q&A from Michael Gregg
Enterprise security expert, Michael Gregg answers a question regarding port 3389 issues when a user tries to open port 3389 RDP on their router to ...continue reading
Security expert Michael Gregg fields a question about unknown network cards gaining access to a user's network.continue reading
Security expert Michael Gregg discusses the disadvantages to a layered approach to enterprise security.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.