IT Question for the Gurus

The bottom line is that your presence on the internet is almost assuredly tracked, but not actively monitored. You probably have a web filter in place to prevent you from going to the non-business sites they want to block. Typically, your usage would only be investigated down to the sites you visit if a request was made by someone (your manager, etc.) Even if they saw that you visited the blog site, it would be highly unlikely they would have any record of the entry you made. (This assumes you’re working directly on the website and not creating a file on your PC and moving it to the website.)

Some solutions in use in what is a decent size business that did not exist 10 years ago.

WebWatcherNow.com/Internet_Monitor

The main use is to spot check employees when suspicions are had and to locate heavy users if the network is slowing down. Companies have had a lot of trouble with streaming video and audio applications using up too much of a shared resource.

Yeah, I agree. I could only imagine doing that if we already suspect someone of something.

We block streaming video/audio for this reason. Unfortunately, there is a trend toward online training using streaming video. So, more and more often, people who have a legit business need for a certain training product are complaining that they can’t get to their streaming lecture or whatever. It’s not a huge deal for us right now, but I see it soon becoming a huge pain to try to whitelist all the legitimate sites and still block all the unnecessary stuff.

Conversely - I’m not sure if a locked blog entry requires a password to view, but if it does, you can ignore this. If your IT person does a vanity search on her name, and it is in your blog, she can find you.

I think the above can be summarized into: She can, but she probably won’t.

The IT department usually has all the information necessary to trace your steps, on one layer or another. URLs, IP-addresses, activity logs and so forth. However, barring an active suspicion and severe dedication to the task, she will probably not have installed a key-logger on your work computer and even if she did, the day-by-day output would be prohibitive to read through. This information is pretty much the only thing that could be indexed easily enough to run a non-specific vanity search through (I.e. “IT,” “Co-worker” and so forth.

She could scan your visited URLs, detect you were maintaining a blog (if it’s a x.blogspot.com address, for instance) and investigate from there, but in my experience nothing short of an active suspicion of severe abuse could motivate an IT employee to even consider doing this. I’m not talking about the ethical implications here, just the amount of work.