Department of Science and Technology: The global ranking of our innovation indicators has increased …
On 15 May, the Public Information Office of the State Department held a press conference to provide information on the mid-2023 customs forum. At the meeting, the Deputy Minister of Science and Technology, U Pyongyang, presented the eighteenth anniversary of the Party as a very unusual and extraordinary decade of our economic and social development. Over the past 10 years, our economic strength has been marked by a historic leap, with the simultaneous growth of scientific and technological po...
The first session of the 15th Guiyang Municipal People's Congress held its third plenary session
On January 29, the first session of the 15th Guiyang Municipal People’s Congress held its third plenary session. The meeting elected the chairman, vice chairmen, secretary general and members of the Standing Committee of the 15th Guiyang Municipal People’s Congress, the mayor and vice mayor of Guiyang Municipal People’s government, the director of Guiyang Municipal Supervision Committee, the president of Guiyang intermediate people’s court and the procurator general of Guiyang Municipal Peopl...
<100 subscribers
Department of Science and Technology: The global ranking of our innovation indicators has increased …
On 15 May, the Public Information Office of the State Department held a press conference to provide information on the mid-2023 customs forum. At the meeting, the Deputy Minister of Science and Technology, U Pyongyang, presented the eighteenth anniversary of the Party as a very unusual and extraordinary decade of our economic and social development. Over the past 10 years, our economic strength has been marked by a historic leap, with the simultaneous growth of scientific and technological po...
The first session of the 15th Guiyang Municipal People's Congress held its third plenary session
On January 29, the first session of the 15th Guiyang Municipal People’s Congress held its third plenary session. The meeting elected the chairman, vice chairmen, secretary general and members of the Standing Committee of the 15th Guiyang Municipal People’s Congress, the mayor and vice mayor of Guiyang Municipal People’s government, the director of Guiyang Municipal Supervision Committee, the president of Guiyang intermediate people’s court and the procurator general of Guiyang Municipal Peopl...
Share Dialog
Share Dialog
Welcome to the wechat subscription number of “Sina Technology”: techsina
Text / a Changyou Li Youli editor / September
On the first day of joining a large Internet factory in Beijing, Jie Jie knew that he would be monitored by the company in the future. Now looking back, he looks like a bystander. How to spread the big net of “Jiazi Lightyear”:
The first is the latest MacBook notebook configured by the company, which has been implanted with a plug-in for online behavior monitoring; When the software is used, the Department must punch in and report the software; When starting the software, you can only use the company’s LAN or the company’s designated public network VPN; In addition, it is also mentioned in the employee manual that it is strictly prohibited to transmit information from the intranet.
Hardware, software and network form a complete closed loop in the name of company safety and efficiency.
As early as more than 20 years ago, employee online behavior monitoring software was born and widely used in many science and technology, financial companies, governments and institutions at home and abroad. Just take the IT industry as an example. According to the report on China’s IT talent supply in 2021, there were 7.05 million it practitioners in China in 2020. This means that every day, millions of employees have a pair of “eyes” behind them from the moment they punch in, always paying attention to whether they are doing anything that violates the company’s information security and privacy.
If the balance between the company and employees can be maintained in the past, the recent occurrence of a series of large factory monitoring events has made people realize that the delicate balance is being broken.
On February 11, a netizen revealed anonymously that his online record in the company was suspected to be monitored by the company. After submitting his resume, he received a precise layoff notice. The screenshot shows that the company can view the details of employees with turnover intention through the employee behavior monitoring system. For example, on the interface of an employee surnamed Ju, the software counts that the employee visited the job search website 23 times, associated chat keywords 254, and delivered resumes 9 times.
public opinion is seething with indignation. The provider of this behavior monitoring system was deeply convinced and denounced. It took off the product introduction page on February 14, and deleted the customer cases once used as publicity. Jiang Wenguang, the Secretary of the board of directors, responded to the media. Turnover intention analysis is a small function of the products. The focus of the behavior perception system is leak tracking analysis to help government and enterprise users manage some internal threats. The company does not monitor whose data, which is the customer’s own behavior. He threw the responsibility to the user: “we can be understood as’ selling knives’ and have a license. We can’t intervene who bought and used this knife for what”.
“996” and other abnormal overtime culture have not been denounced far away. What workers can’t stand is that the enterprise’s monitoring of employees not only stays in the scope of work, but also probes into the depths of employees’ personal privacy.
Recently, “Jiazi Lightyear” combed data and interviewed former employees and lawyers of Internet companies, trying to present the following questions:
What are the monitoring methods of technology companies for employees’ online behavior;
How the “monitoring fence” is built step by step;
Where is the boundary between employee privacy and company monitoring?
“Eyes” are everywhere
Know about “how to view the behavior perception system developed by Shenxin to monitor employees?” Under the question, Justin Lee’s answer received nearly 600 likes, which mentioned:
When you leave a company, you know how sophisticated the scientific management of the company is: the company’s network background system can record every operation you have on the computer. When you open that web page for a few minutes, what information you downloaded from the company’s information system is not confidential, What keys did you press after opening word? What content is displayed on the computer screen you are using
Network information monitoring is only the first link. When an employee’s electronic equipment is connected to the company’s LAN, all the data transmitted through it will be obtained by the company’s network management department. The system processes all the data indifferently and appears in time when the alarm sounds to find a complete chain of evidence. As for when to sound the alarm, the employees know nothing.
Jie Jie told Jiazi Lightyear that when their devices are connected to the intranet, there will be keyword grabbing on wechat or QQ. “The intranet does not limit what you talk to your colleagues, but if there are some sensitive words that eventually lead to negative effects, these data will become evidence of accountability, and both parties will bear joint and several liabilities.” During his three years working in a large factory, Jie Jie seldom talked with people on the intranet about things other than work. “What if something happens to the other party and I am connected?”
He once witnessed the dismissal of a colleague who intercepted a screenshot of a transaction from the company’s intranet and sent it to customers in order to make an order and meet the requirements of potential customers. However, the customer found that there was a huge difference between the transaction and his actual cost, and then complained to the company. This screenshot also became evidence in court. The internal control department of the company quickly traced the source to the employee and fired him for disclosing enterprise secrets.
In order to prevent the disclosure of company secrets, he sent a circle of friends to check carefully. He had no intention of involving some content that had not been announced to the public, and a colleague would remind him to delete it immediately.
What is monitored is not only information, but also traffic. In November 17, 2021 tiktok published a Gome bulletin on penalties for breach of employee behavior standards. The bulletin documents criticized 11 employees, occupied the company’s public cyber source and had nothing to do with work. It also listed the App traffic usage information of each employee, including Tencent videos, jitter, Taobao, Iqiyi, NetEase cloud music, QQ music and many other apps.
Welcome to the wechat subscription number of “Sina Technology”: techsina
Text / a Changyou Li Youli editor / September
On the first day of joining a large Internet factory in Beijing, Jie Jie knew that he would be monitored by the company in the future. Now looking back, he looks like a bystander. How to spread the big net of “Jiazi Lightyear”:
The first is the latest MacBook notebook configured by the company, which has been implanted with a plug-in for online behavior monitoring; When the software is used, the Department must punch in and report the software; When starting the software, you can only use the company’s LAN or the company’s designated public network VPN; In addition, it is also mentioned in the employee manual that it is strictly prohibited to transmit information from the intranet.
Hardware, software and network form a complete closed loop in the name of company safety and efficiency.
As early as more than 20 years ago, employee online behavior monitoring software was born and widely used in many science and technology, financial companies, governments and institutions at home and abroad. Just take the IT industry as an example. According to the report on China’s IT talent supply in 2021, there were 7.05 million it practitioners in China in 2020. This means that every day, millions of employees have a pair of “eyes” behind them from the moment they punch in, always paying attention to whether they are doing anything that violates the company’s information security and privacy.
If the balance between the company and employees can be maintained in the past, the recent occurrence of a series of large factory monitoring events has made people realize that the delicate balance is being broken.
On February 11, a netizen revealed anonymously that his online record in the company was suspected to be monitored by the company. After submitting his resume, he received a precise layoff notice. The screenshot shows that the company can view the details of employees with turnover intention through the employee behavior monitoring system. For example, on the interface of an employee surnamed Ju, the software counts that the employee visited the job search website 23 times, associated chat keywords 254, and delivered resumes 9 times.
public opinion is seething with indignation. The provider of this behavior monitoring system was deeply convinced and denounced. It took off the product introduction page on February 14, and deleted the customer cases once used as publicity. Jiang Wenguang, the Secretary of the board of directors, responded to the media. Turnover intention analysis is a small function of the products. The focus of the behavior perception system is leak tracking analysis to help government and enterprise users manage some internal threats. The company does not monitor whose data, which is the customer’s own behavior. He threw the responsibility to the user: “we can be understood as’ selling knives’ and have a license. We can’t intervene who bought and used this knife for what”.
“996” and other abnormal overtime culture have not been denounced far away. What workers can’t stand is that the enterprise’s monitoring of employees not only stays in the scope of work, but also probes into the depths of employees’ personal privacy.
Recently, “Jiazi Lightyear” combed data and interviewed former employees and lawyers of Internet companies, trying to present the following questions:
What are the monitoring methods of technology companies for employees’ online behavior;
How the “monitoring fence” is built step by step;
Where is the boundary between employee privacy and company monitoring?
“Eyes” are everywhere
Know about “how to view the behavior perception system developed by Shenxin to monitor employees?” Under the question, Justin Lee’s answer received nearly 600 likes, which mentioned:
When you leave a company, you know how sophisticated the scientific management of the company is: the company’s network background system can record every operation you have on the computer. When you open that web page for a few minutes, what information you downloaded from the company’s information system is not confidential, What keys did you press after opening word? What content is displayed on the computer screen you are using
Network information monitoring is only the first link. When an employee’s electronic equipment is connected to the company’s LAN, all the data transmitted through it will be obtained by the company’s network management department. The system processes all the data indifferently and appears in time when the alarm sounds to find a complete chain of evidence. As for when to sound the alarm, the employees know nothing.
Jie Jie told Jiazi Lightyear that when their devices are connected to the intranet, there will be keyword grabbing on wechat or QQ. “The intranet does not limit what you talk to your colleagues, but if there are some sensitive words that eventually lead to negative effects, these data will become evidence of accountability, and both parties will bear joint and several liabilities.” During his three years working in a large factory, Jie Jie seldom talked with people on the intranet about things other than work. “What if something happens to the other party and I am connected?”
He once witnessed the dismissal of a colleague who intercepted a screenshot of a transaction from the company’s intranet and sent it to customers in order to make an order and meet the requirements of potential customers. However, the customer found that there was a huge difference between the transaction and his actual cost, and then complained to the company. This screenshot also became evidence in court. The internal control department of the company quickly traced the source to the employee and fired him for disclosing enterprise secrets.
In order to prevent the disclosure of company secrets, he sent a circle of friends to check carefully. He had no intention of involving some content that had not been announced to the public, and a colleague would remind him to delete it immediately.
What is monitored is not only information, but also traffic. In November 17, 2021 tiktok published a Gome bulletin on penalties for breach of employee behavior standards. The bulletin documents criticized 11 employees, occupied the company’s public cyber source and had nothing to do with work. It also listed the App traffic usage information of each employee, including Tencent videos, jitter, Taobao, Iqiyi, NetEase cloud music, QQ music and many other apps.
Monitoring employees’ online behavior is very common and easy to implement. Search any keyword on the Internet, you can see the promotion of many related software. “Jiazi Lightyear” contacted several enterprise monitoring software developers. They introduced that when the monitor’s computer and the monitored computer are covered by the same network, they can easily use cache files, cookies, historical records and other access traces to realize chat software monitoring, online behavior monitoring, file disclosure control, sensitive behavior / sensitive word alarm, etc.
Figure source: background function diagram of a monitoring software
Recently rushed to the hot search of “Li”
Monitoring employees’ online behavior is very common and easy to implement. Search any keyword on the Internet, you can see the promotion of many related software. “Jiazi Lightyear” contacted several enterprise monitoring software developers. They introduced that when the monitor’s computer and the monitored computer are covered by the same network, they can easily use cache files, cookies, historical records and other access traces to realize chat software monitoring, online behavior monitoring, file disclosure control, sensitive behavior / sensitive word alarm, etc.
Figure source: background function diagram of a monitoring software
Recently rushed to the hot search of “Li”
No comments yet