Internet Tracking Software
Sepama Software provides Track4Win, an Internet Usage Tracking and Computer Monitoring software product to enable you to track Internet usage across a computer network (LAN and Wan / Internet).
Internet Tracking software enables businesses to manage how their
employees use the Internet (Employee Internet Management [EIM]),
reducing Internet abuse,
improving productivity, conserving network
bandwidth and storage costs, and mitigating legal liability.
Actually, Track4Win is not only a good employee monitoring software, but also a student monitoring tool. Many students in high schools or colleges like to play game on campus. And Internet abuse in university / college / school is the same serious as in workplace. So if school system administrators install Track4Win in their campus network, then they can track each computer usage and prevent student from Internet misuse.
In addition, in some big universities, there are large libraries and computer centers (or computer labs) where students use hundreds of computers everyday. These universities must know the usage rate of these computers. With its strong time tracking and computer monitoring features, Track4Win can track the computer use time and analyze the usage rate. In a university computer center, it is important to know each computer usage rate because school management is able to how to utilize school's limited information technology resources. Especially, some computers are always idle in some university library and computer centre (or computer lab). To avoid wasting school resource, please install Track4Win in your campus network so that your school's system administrator can track computer usage and monitor Internet use. Track4Win is a real-time Internet monitoring and computer usage tracking tool. It is a really useful computer monitoring software product for any school/college/university. Tracking Internet use is very important at campus.
In a similar usage environment, a public library, Track4Win can also become a powerful tool to track computer time usage. So, System administration staff in libraries like to install Track4Win.
Systreacker can catch live url (web site address) and web page title. So even if students delete Internet cookies and history, you are still able to track Internet use. Moreover, you can monitor network and realize Internet tracking simultaneously. Track4Win allows you to manage, analyze and report on student use of the Internet by using Web Tracking software.
Price Internet Tracker
gives you a low price Internet Usage
Tracking alternative. There is no
additional hardware and software required for Internet tracking.
Unlike many big Internet tracking solutions, Track4Win allows you
maintain a high ROI! Try this best monitoring program for tracking web use. Free download!
Track4Win is 100% live tracking to the second.
It records application active and inactive time. When there is no mouse movement and no keyboard press in 1 miniute, Track4Win Monitor will think it is inactive status.
There will be an option in the new version so that users themselves can define the inactive time interval.
New! Track4win Enterprise edition released !File Access Monitoring and Security: (New Feature)
If you have existing client base and are capable to be a reseller, please contact us at resale@Track4win.com
Monitor employees, Monitor Internet Usage....
The following article is about Internet tracking in school. Enjoy reading!
Surveillance in Schools: Safety vs. Personal Privacy
As technology becomes more prevalent in schools and in the workplace, new problems come with it and some old ones are magnified. Slacking off, bullying, using company time for personal correspondence--these are all old problems that have been magnified with the addition of email and internet in the workplace. Spam, viruses, and bandwidth concerns are new ones. Many employers have chosen to deal with these problems by monitoring the incoming and outgoing email on their network as well as web browsing.
What is email monitoring?
With the advent of computers in the workplace has come the ability also to easily intercept and read other people's email without them being aware that it is being done. This is done one of several ways. It can be done through the use of software that will automatically save a copy of every email sent or received to a hidden location on your personal computer. A couple of examples of such software products are "pectre Pro" and "eeaster." Your email can also be intercepted by the Internet Service Provider (ISP). Every email you send goes first to the ISP and then is sent out to the Internet on its way to the recipient. Copies of email you have sent or received can easily be found on the server and read by someone with access to the server. Copies remain on the server for up to one year. Most people assume that once they delete an email, it is gone. Not true, as was discovered by Oliver North in the Iran-Contra investigations in 1987-1989. Deleted email messages between Oliver North and John Poindexter were retrieved in the investigation. Said Oliver North, "We all sincerely believed that when we send a PROFS message to another party and pressed the button 'delete' that it was gone forever. Wow, were we wrong." (Mikkkeee, n.d.) Those who use an email provider other than your ISP, such as Yahoo or Hotmail, leave themselves open to interception at this point as well. And finally, though there are many other points of interception, coworkers and system administrators or security officers at your place of work can also intercept your "private" email. Schools, as well as other employers, often act as your email provider and therefore have access to whatever you send or receive. In addition, as the email passes through the office network on it's way to it's destination, coworkers are capable of intercepting it as well. ("Top 10 Places Your Email Can Be Intercepted", 2000)
What is web monitoring?
Web monitoring ability has also been made widely available to employers, parents, and teachers. Web monitoring differs from simple web filtering in that it retains a record of web sites visited by a user, rather than simply blocking access to sites. Records of the sites visited are recorded in two different ways. Server based and client based software both record web browsing activites, but are installed either on the company's network, or on the individual computer. (Schulman, "Computer and Internet Surveillance...", 2002) The second method is most commonly used in the private sector by parents and spouses to monitor family members. There are some examples of web monitoring software there. Software that makes use of a network to monitor and record web browsing is relatively inexpensive. It has even been recently employed by the U.S. Army who recently paid $1.8 million for a system that will watch over 200,000 workers, which works out to a cost of $9 per person. (Kirby, n.d.) Into this per person figure, the actual cost of monitoring web browsing must also be taken into account. Web monitoring software records browsing activity by either taking snapshots of the user's browser, by actively recording the entire browsing activity, or by creating a record of URLs with access times and dates.
Internet monitoring is becoming more and more a common occurrence in the workplace. Between 1/3 and 1/2 of the US online workforce has its email and/or web surfing under continuous surveillance by employers. (Schulman, "Workplace Surveillance", 2002) A few of the primary reasons for schools or other places of employment, to use monitoring software is to prevent sexual harassment lawsuits, threatening viruses, bandwidth concerns and slacking off. (Schulman, "The Business & Technology...", n.d) Though these are valid issues, I would argue that constant monitoring is counter productive. It promotes an air of suspicion and hostility among the employees. Also, by tracking and storing details of employee's email and web browsing, the employer may inadvertently be storing potential evidence that could be used against him/her in future litigation. (Schulman, "One-Third or U.S...", 2001) Then there is the question of ethics and privacy. Should employers be looking at employees email? Should teachers look at students email? Is this like opening their mail? Is monitoring web browsing the same as standing behind the student in class?
The Ethical question--Is our right to privacy being usurped?
Most would use the analogy that the email message is like a telephone conversation. When you are talking on the phone, you only intend for the one person at the receiving end to hear your message. Similarly, you only intend for the receiver to read your email message. If wire tapping is an invasion of privacy, then, likewise, intercepting email messages ought to be as well. (Belanoff, 1999) The problem with this argument is that employers see the situation from a different angle. For them it is a property issue. The company is providing the computers and the network for your use; therefore, they have a right to ensure that they are not wrongfully using company resources. The fact that the sheer nature of the equipment makes this monitoring possible negates your expectation of privacy. (Belanoff, 1999) In addition, a phone conversation is auditory and needs to be secretly recorded to be saved and used by others, but an email is written conversation that passes through several portals on its way to its destination. It can be "discovered" by a number of persons along the way.
The main objections to internet monitoring seem to be that it invades our "right to privacy," or right to be left alone. Email users tend to assume that the same laws that protect their mail will protect their email and many employers take advantage of this by not making it clear to their employees that no such privacy exists. "People treat their emails like private letters, sealed and protected by law when in fact they are more like a postcard that anyone can read." (Meeks, n.d.) In addition, constant monitoring by some employers makes employees uneasy. Is it fair to monitor the email of every employee, even if no wrongdoing is suspected? Because there are so many points at which an email can be "discovered," the courts have generally found that there is no reasonable expectation of privacy. Perhaps a less invasive method would be to spot check, or only monitor the email of suspected abusers.
For the school district, there are several benefits. The biggest advantage is probably the ability to eliminate spam and email viruses. Much time and money can be spent trying to purge the district's computers of viruses, and considering today's financial crisis in the public school system, monitoring seems like a wise choice. Bandwidth concerns are a high priority as well. Large attachments and spam both can clog a system and/or slow down the network. It is relatively inexpensive to monitor the system as opposed to upgrading the network.
A couple of other benefits that are seemingly more trivial is the prevention of bullying or sexual harassment and just general wasting of time. Cases of bullying or sexual harassment can be caught and dealt with early, thereby avoiding likely lawsuits. Additionally, the district would be able to prove that they knew of the problem and dealt with it in a timely manner. This has been an important issue in some email monitoring court cases. This could be a drawback as well, if the district did not take prompt action against an employee guilty of bullying or sexual harassment.
What about the employees' privacy though? Teachers will not want to lose their privacy by having their incoming and outgoing email messages monitored. This is assuredly a drawback. A school district will not want to risk creating a hostile work environment by leaving the impression that they are suspicious of everybody. Constant monitoring of the entire internt system is probably not a good idea then. Also, there is the risk that lawsuits could be brought against the district, claiming invasion of privacy or that the district did little to stop harassment. A carefully crafted internet policy is a necessity to insuring that no expectation of privacy is given. As for the harassment issue, this is something to weigh very carefully. Is the district better off monitoring for this kind of thing, or should they worry about having proof of not handling a harassment issue quickly enough?
Is monitoring students different than employees?
As more and more schools begin to incorporate technology into their curriculums, they are faced with the decision of whether to allow students to use email at school or not. Some have taken the easy route and have forbidden student email accounts. Others, seeing the educational value of email for class projects, have decided to allow it but to monitor it for the students' safety. Again, districts face the privacy issue as a drawback. However, the advantages are not always the same as for the teachers. While monitoring students internet activities are still important for reasons of viruses and bandwidth issues, the bigger issue is protecting students, both from outside influences and from bullying by other students. Although students may consider monitoring their email an intrusion on their privacy, is it any different than intercepting a note passed in class between two students? This has been done for centuries without cries of invasion of privacy. As long as students have read and signed an Acceptable Use Policy (AUP) explaining the rules, they should not expect their emails or web browsing at school to be private. Schools must consider the fact that some parents consider the Internet to be a danger and expect their children to be protected.
The method of monitoring for students is usually different as well. Depending on the age of the students, teachers can set up one email account per class, thus making it easier to monitor the email coming and going or can set up a student email account through a system such as ePals or eChalk. These email programs allow the monitor to set the level of controls to an appropriate level for the age level of the students. This ranges from previewing all incoming and outgoing messages to flagging a message that contains certain words to be previewed before reaching its destination.
There is seemingly a conflict between protection of students and allowing the students to explore as part of the learning process. If we monitor students' correspondence and browsing activities, they may be prevented from gaining access to some valuable information. Should this be sacrificed in the name of safety? Where do we draw the line between protecting children and allowing them to explore and learn? ePals and eChalk are two examples of software that try to deal with this issue. Because the controls can be set at varying levels, monitoring can be much more stringent at the grade school level than at the high school level.
Recommendation to Schools
Without some controls in place, schools could face slower networks, a glut of spam, viruses, and possible misuse of email for harassment, etc. Before putting anything into place however, it is important that teachers have a clear and concise email use policy to read and sign and students have an AUP in place as well. This helps to eliminate the expectation of privacy that many wrongfully assume they have when it comes to email. It also lays out exactly what is expected of students and teachers when it comes to email use. It is much easier to follow the rules when everyone knows exactly what they are. (Spykerman, 2003) Some suggestions with regard to email monitoring:
AUP's should also contain specific references to what is deemed appropriate email usage. Schools should spell out the things that are not appropriate, such as sex-related material, offensive, obscene or harassing material, hate/violence related material, foul language, etc.; as well as the consequences of violating the AUP. It should be noted that privacy is not a reasonable expectation, and students should be told exactly how the email system is monitored. A signature should be required annually, without which email access will be denied.
For the sake of morale, the monitoring that takes place should be in the form of spot checks when there is reason for suspicion. Simply having an email use policy in place that says teachers and students will be monitored will promote proper email habits for the most part.(Mikkkeee, n.d.) For student email accounts, a suggested way to go is to use a system such as ePals that can be set at different levels according to the age levels of the students. This will route all student email through an assigned "monitor." Another suggestion for both students and teachers is to employ a flash screen that reminds them that their emails are being monitored each time they use the system. It's not enough to have them sign an email use policy annually; they should be reminded often to use the system properly.
In conclusion, should a district decide that email monitoring is necessary, it is important to have a written Email Use Policy for teachers and an Acceptable Use Policy for students in place before doing any monitoring. Failure to do this leaves the district open to possible lawsuits. Whether a district chooses to monitor or not, this Email Use Policy/ AUP will help guide employees/students in using email appropriately. Despite the conflicts over privacy issues and restrictions on learning, some monitoring is necessary to ensure that acceptable email use is being carried out. Simply stating what is expected in an email use policy is insufficient if there is no way to check to see if the rules are being followed so that they can be enforced.
Internet tracking software is important to help improve the efficiency at work and school. Choose Track4win to implement your web tracking solution at office and school.