Solved

Privay and security at work

Posted on 2000-03-22
4
178 Views
Last Modified: 2010-04-11
I have an email account with yahoo. At times I access this account from work. I would like to know certain caveats with regards of accessing this Personal account from work.
1. I am familiar that http addresses can be monitered and  that your actual screen can be monitered using certain software.
Q. Can the password used for my Personal email account be intercepted? (I already know about cookies local to my machine can store my user profile.)
Q. Can the content within the email be viewed by the company?
Any other possible breaches of privacy one needs to be aware of with using personal email, etc at work?
0
Comment
Question by:Paullkha
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 7

Expert Comment

by:jjeff1
ID: 2648604
It depends. We use Microsoft Proxy server at work. We log all the URLs people go to, but not the actual page content.

But, it is certainly possible someone could be monitoring everything you do on the Internet. Usually it comes down to a matter of desire. It is possible to monitor anything I want, I just have to want to do it.

So most likely no one is keeping track of your password or what is in your email, but only because they don't want to. I would not count on privacy at work if you are doing anything with that email account that could get you in trouble. So emailing your mom is ok, blackmailing your boss is probably out.
0
 
LVL 55

Accepted Solution

by:
andyalder earned 50 total points
ID: 2650761
We use a remote control program that can snoop on the user just like you stood behind them and they don't know it's loaded as it's a replacement device driver. I am interested in legal implications as one user got sacked just for visiting too many re-employment sites.
0
 
LVL 2

Expert Comment

by:jgarr
ID: 2651859
I'm pretty sure you can read the password with a protocol analyzer. And the email. But someone would have to monitor your connection and really want to know.. They would be deciphering packet by packet.
I use an analyzer at work to troubleshoot tcp issues and 9 times out of 10, I can find passwords embedded in the data.
And somebody can always read your email. If they can't at your work, they definitely can at  Yahoo.

Lead a less interesting life and no one will care what's in your email. (It works for me)
0
 
LVL 2

Author Comment

by:Paullkha
ID: 2651914
I wanted to know if sending email to recuiters from work using a personal email account is any different than using company email. Apparently, it's not that much more secure.

Thanks - andyalder - thanks for the story - answers my concerns
0

Featured Post

Simple, centralized multimedia control

Watch and learn to see how ATEN provided an easy and effective way for three jointly-owned pubs to control the 60 televisions located across their three venues utilizing the ATEN Control System, Modular Matrix Switch and HDBaseT extenders.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question