Analyze an organization’s employee surveillance capabilities.
In chronological order of arrival in our work environment, phone monitoring has been employed for decades. Before the technology existed to record calls automatically, human beings (operators or supervisors) could be called upon to “listen in” to conversations. Video surveillance has slowly expanded from the secure protection of key access points to an office or factory to a more widespread monitoring of every area of the company’s physical plant. The rapid advancement of computer technology (and the perceived increase in cyberliability) has led to the development of keystroke-logging software to capture every key pressed on a computer keyboard. Similarly, “packet-sniffing” software (named after the practice of breaking up blocks of information into packets for distribution over the Internet) can intercept, analyze, and store all communications on a network. The most recent advance has been the “smart” ID card that can track an employee’s location while he or she moves through the workplace. In the same manner as GPS monitoring of delivery vehicles, the company now knows where you are at all times.