{"id":727,"date":"2015-03-03T23:43:55","date_gmt":"2015-03-03T23:43:55","guid":{"rendered":"https:\/\/www.technology-solved.com\/sw-austin-tx\/?p=727"},"modified":"2015-03-03T23:43:55","modified_gmt":"2015-03-03T23:43:55","slug":"legal-monitor-use-computer-phone","status":"publish","type":"post","link":"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/","title":{"rendered":"Is it legal to monitor the use of a computer (or phone)?"},"content":{"rendered":"<p>Through use of software it is possible to monitor everything done on a computer.\u00a0 Everything from email, to social media post, to web browsing, even capturing every keystroke.\u00a0 \u00a0There are a great number of reasons why you might want to do this, but is it legal?\u00a0\u00a0\u00a0Well, before we actually answer this question lets put out a legal disclaimer &#8211; we are not lawyers.\u00a0 Despite my wife&#8217;s continued believe that I should be a lawyer because she thinks I like to argue, it is not true.\u00a0\u00a0 If you are truly in a legal question of the law you should seek advise from a\u00a0lawyer.<\/p>\n<p>Having got that out of the way, this is our understanding of this legal question.\u00a0 Like many things there is not a yes or no answer to this\u00a0because it vary situational.\u00a0\u00a0 We&#8217;ll discuss a couple different situations.<\/p>\n<p><!--more--><\/p>\n<p><strong>A parent wanting to monitor\u00a0their\u00a0depend child&#8217;s computer use:\u00a0<\/strong> Absolutely legal.\u00a0\u00a0While we\u00a0would\u00a0encourage you to have\u00a0an open\u00a0discussion\u00a0about\u00a0how to use\u00a0the\u00a0computer, set some guidelines about\u00a0its\u00a0use, in the end\u00a0its the parents responsibility to protect and develop their child how they best see\u00a0fit.<\/p>\n<p><strong>A company wanting to monitor an employee&#8217;s use of company assets: <\/strong>Absolutely legal.\u00a0\u00a0 Note I used the word assets and not just computer.\u00a0 I want to call attention to the fact that a company can monitor really anything that is considered a company asset.\u00a0 This could be the computer or email address they provided you or even the internet connection.\u00a0 So even if you are at home, using your computer, and your internet service but the companies email, they can still be monitoring that email.\u00a0 Same thing if you&#8217;re using the company\u00a0computer at home everything that goes on with that computer can be monitored.\u00a0\u00a0 Same thing if you are using your computer at work on the company internet connection everything that goes through that internet connection can be monitored.\u00a0 It call all be legally monitored.\u00a0 If you want to keep it private do not use a company asset at all.<br \/>\nEmployers, you should make sure that you are upfront with your employees and claim\u00a0your right\u00a0to monitor your assets\u00a0by establishing an Acceptable Use Policy.\u00a0\u00a0 It\u00a0also\u00a0helps you to have a\u00a0disclaimer,\u00a0reminder\u00a0or disclaimer\u00a0that displays\u00a0on your\u00a0assets\u00a0from time to time.\u00a0 This\u00a0only firms\u00a0up your legal right to monitor\u00a0your assets.<\/p>\n<p><strong>A tech support company monitoring\u00a0customers\u00a0computers\u00a0and technology assets:\u00a0 <\/strong>Here I think this could be done both legally and illegal.\u00a0 It should never be done without your express knowledge and permission.\u00a0 Computer Troubleshooters of Southwest Austin does offer several monitored services.\u00a0 I think it is import to clarify that there are different types of monitoring &#8211;\u00a0just because you\u00a0have a monitored service\u00a0is\u00a0does not mean we see every thing\u00a0done on you devices.<br \/>\nWe do provide:<\/p>\n<ul>\n<li><strong>Monitored backup service<\/strong> where we can see the status of your backup; was it\u00a0successful,\u00a0what files failed\u00a0to backup,\u00a0and sometimes what files where\u00a0backed\u00a0up.\u00a0\u00a0 It does not\u00a0give\u00a0us\u00a0access to\u00a0actually see or access those the files without additional consent from\u00a0you.<\/li>\n<li><strong>Monitored Anti-malware and content filtering &#8211; <\/strong>It tells us the status of your anti-malware program; is it running; when was the last update; when was the last scan; we get notified if it detects something.\u00a0 The content filtering does block some websites and reports on those sites that are blocked.\u00a0 Please note on content filtering the only thing we require to be blocked are sites know to be a source of malware.\u00a0 This does include P2P sites, Bit-torrents and proxy sites.<\/li>\n<li><strong>RMM &#8211; Remote Management and Monitoring &#8211; <\/strong>This is a service where we can monitor your computers performance and errors.\u00a0 As well as\u00a0monitor update status\u00a0and push white-listed updates to your computers.\u00a0 Note while, we get alerts as\u00a0to the status\u00a0of your devices\u00a0we\u00a0do not\u00a0see\u00a0what\u00a0is\u00a0being\u00a0done\u00a0on them.<br \/>\n(One\u00a0point to clarify here &#8211; If\u00a0we are using remote control software\u00a0to work on your computer, we can see everything on that computer while we are connected.\u00a0 Unless other arrangements have been made with you (your company)\u00a0specifically, the remote control software we use requires you to initiate the connection, we cannot just connect to your computer.)<\/li>\n<li><strong>We can help a parent or company<\/strong><strong> with setting up greater monitoring as well.\u00a0 <\/strong>We do not actually do the monitoring where you can see every email, social media post, web site visited, or every key stroke enter.\u00a0 If you do need this we can help you (or the right person) get this setup.<\/li>\n<\/ul>\n<p>I do believe there might be a few &#8220;tech guys&#8221; who do this stuff not on the up and up.\u00a0\u00a0 Point being if you have a &#8220;tech guy&#8221; &#8211; you might want to ask them what kind of control they have to your system &#8211; During your connection with them and after.\u00a0 If you have any concern about what we have access to please ask.<\/p>\n<p><strong>Monitoring another adult person or legal entities computers (or assets) without their knowledge and permission:\u00a0 <\/strong>Most likely illegal.\u00a0\u00a0 There are a few exceptions here.\u00a0 Note above where I am talk about companies monitoring their assets.\u00a0\u00a0 If you are using your Personal Computer at work and work&#8217;s network and internet connection, you should expect that\u00a0all network\u00a0traffic is monitored.\u00a0 I suppose law enforcement might be able to get a court order to monitor your computers.\u00a0 However, say you install monitoring software on your spouse&#8217;s computer, because you don&#8217;t trust him or her, that is absolutely illegal.\u00a0 If you do not trust your spouse that much, seriously seek the advise of a lawyer before you do something stupid that is going to only hurt whatever case you think you&#8217;re building against your spouse.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Through use of software it is possible to monitor everything done on a computer.\u00a0 Everything from email, to social media post, to web browsing, even capturing every keystroke.\u00a0 \u00a0There are a great number of reasons why you might want to do this, but is it legal?\u00a0\u00a0\u00a0Well, before we actually answer this question lets put out [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-727","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is it legal to monitor the use of a computer (or phone)? - Computer Troubleshooters Southwest Austin<\/title>\n<meta name=\"description\" content=\"Through use of software it is possible to monitor everything done on a computer.\u00a0 Everything from email, to social media post, to web browsing, even\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is it legal to monitor the use of a computer (or phone)? - Computer Troubleshooters Southwest Austin\" \/>\n<meta property=\"og:description\" content=\"Through use of software it is possible to monitor everything done on a computer.\u00a0 Everything from email, to social media post, to web browsing, even\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Troubleshooters Southwest Austin\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-03T23:43:55+00:00\" \/>\n<meta name=\"author\" content=\"ctswaustin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ctswaustin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/\",\"url\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/\",\"name\":\"Is it legal to monitor the use of a computer (or phone)? - Computer Troubleshooters Southwest Austin\",\"isPartOf\":{\"@id\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/#website\"},\"datePublished\":\"2015-03-03T23:43:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/#\/schema\/person\/db82b3889ff0a005c26d9489b99fd625\"},\"description\":\"Through use of software it is possible to monitor everything done on a computer.\u00a0 Everything from email, to social media post, to web browsing, even\",\"breadcrumb\":{\"@id\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Locations\",\"item\":\"https:\/\/www.technology-solved.com\/locations\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Texas\",\"item\":\"https:\/\/www.technology-solved.com\/texas-state\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Homepage\",\"item\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Is it legal to monitor the use of a computer (or phone)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/#website\",\"url\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/\",\"name\":\"Computer Troubleshooters Southwest Austin\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/#\/schema\/person\/db82b3889ff0a005c26d9489b99fd625\",\"name\":\"ctswaustin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"ctswaustin\"},\"url\":\"https:\/\/www.technology-solved.com\/sw-austin-tx\/author\/ctswaustin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is it legal to monitor the use of a computer (or phone)? - Computer Troubleshooters Southwest Austin","description":"Through use of software it is possible to monitor everything done on a computer.\u00a0 Everything from email, to social media post, to web browsing, even","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/","og_locale":"en_US","og_type":"article","og_title":"Is it legal to monitor the use of a computer (or phone)? - Computer Troubleshooters Southwest Austin","og_description":"Through use of software it is possible to monitor everything done on a computer.\u00a0 Everything from email, to social media post, to web browsing, even","og_url":"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/","og_site_name":"Computer Troubleshooters Southwest Austin","article_published_time":"2015-03-03T23:43:55+00:00","author":"ctswaustin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ctswaustin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/","url":"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/","name":"Is it legal to monitor the use of a computer (or phone)? - Computer Troubleshooters Southwest Austin","isPartOf":{"@id":"https:\/\/www.technology-solved.com\/sw-austin-tx\/#website"},"datePublished":"2015-03-03T23:43:55+00:00","author":{"@id":"https:\/\/www.technology-solved.com\/sw-austin-tx\/#\/schema\/person\/db82b3889ff0a005c26d9489b99fd625"},"description":"Through use of software it is possible to monitor everything done on a computer.\u00a0 Everything from email, to social media post, to web browsing, even","breadcrumb":{"@id":"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.technology-solved.com\/sw-austin-tx\/legal-monitor-use-computer-phone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Locations","item":"https:\/\/www.technology-solved.com\/locations\/"},{"@type":"ListItem","position":2,"name":"Texas","item":"https:\/\/www.technology-solved.com\/texas-state\/"},{"@type":"ListItem","position":3,"name":"Homepage","item":"https:\/\/www.technology-solved.com\/sw-austin-tx\/"},{"@type":"ListItem","position":4,"name":"Is it legal to monitor the use of a computer (or phone)?"}]},{"@type":"WebSite","@id":"https:\/\/www.technology-solved.com\/sw-austin-tx\/#website","url":"https:\/\/www.technology-solved.com\/sw-austin-tx\/","name":"Computer Troubleshooters Southwest Austin","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technology-solved.com\/sw-austin-tx\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.technology-solved.com\/sw-austin-tx\/#\/schema\/person\/db82b3889ff0a005c26d9489b99fd625","name":"ctswaustin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technology-solved.com\/sw-austin-tx\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"ctswaustin"},"url":"https:\/\/www.technology-solved.com\/sw-austin-tx\/author\/ctswaustin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.technology-solved.com\/sw-austin-tx\/wp-json\/wp\/v2\/posts\/727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technology-solved.com\/sw-austin-tx\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technology-solved.com\/sw-austin-tx\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/sw-austin-tx\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/sw-austin-tx\/wp-json\/wp\/v2\/comments?post=727"}],"version-history":[{"count":0,"href":"https:\/\/www.technology-solved.com\/sw-austin-tx\/wp-json\/wp\/v2\/posts\/727\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.technology-solved.com\/sw-austin-tx\/wp-json\/wp\/v2\/media?parent=727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technology-solved.com\/sw-austin-tx\/wp-json\/wp\/v2\/categories?post=727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technology-solved.com\/sw-austin-tx\/wp-json\/wp\/v2\/tags?post=727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}