How can I tell if my laptop is being monitored?


I'm reading through an earlier question posted here and now am wondering if there's a way to tell if my company is monitoring my activities on my laptop? They have the right to, and I just assume they are, but is there a way to tell for sure? Some tool to run?

Here's the original question:

Tags: privacy
Topic: Networking
Answer this Question


7 total
Vote Up (26)

Don't just think of it as monitoring software on your machine.  That you may be able to find, but that's only part of the picture.  If you are on a network, admins can just use a packet sniffer like SilentRunner or NetVizor to see what web sites you are visiting, what emails you are sending,  There is no way that I am aware of for you to detect this, as it is reading packets of data passing through the network, not directly off of your computer.  This is probably pretty unlikely to be used in a very small office though.  Of course if you are using company email, often all it takes is the admin password and all of your emails are open for review.  


As for the stuff on your machine, you can try Malwarebytes, which will show some but not all monitoring software/keyloggers.  Of course, your use of it in itself could give rise to an interesting discussion.  The majority of businesses monitor, at least to some degree, so I would just go with your existing assumption that the all seeing eye is watching.   

Vote Up (24)

Two important thins you should consider to protect your privacy:


1-  When not in your work hours or not in company´s matters, do not use their computers or network connections. Assume  that all you do and see using them is monitored and examined and stored by company´s intelligence. If you must do anything you would not like someone else know about, use your own equipment with your own  internet connection (3G for example...).


2- When not in use, disable computer´s camera and microphone. If you are as paranoic as I am, put a black tape over camera lens (do not let adhesive touch lens).


Finally, dont trust internet. It is like any public road or highway. Whatever is passing by may be observed  and followed by any people who wants do that...


Christopher Nerney
Vote Up (22)

Lifehacker recently responded to a reader who wrote, "I'm concerned that I'm being monitored at work, but I'm not sure how to tell." Lifehacker agrees with you that employees "should always assume" they're being monitored at work.


As far as there being a way to tell, Lifehacker says you should look for certain third-party software..."usually referred to as remote control software or virtual network computing (VNC) software. First, the easy thing to do is to simply check in your Start Menu All Programs and check whether or not something like VNC, RealVNC, TightVNC, UltraVNC, LogMeIn, GoToMyPC, etc is installed. ...If any of those programs are installed, then someone can connect to your computer without you knowing it as long as the program is running in the background as a Windows service."



Vote Up (19)

The best thing to do is assume that they are monitoring everything. Then make sure that you are strictly adhering to the company's web & computer usage guidelines. That way you won't get yourself into trouble by doing something that is outside the bounds of your company's behavioral standards.

Vote Up (11)

If the resource you are accessing is on the Internet, then there is an IP address associated with it.

The company can easily monitor incoming and outgoing traffic and thus every request from your PC

will be seen and the target resource (Google, Yahoo Email, Youtube ...) will be logged and you can not

control or even see those logs.

Vote Up (6)

If you ask such a question, then you are being monitored for sure as we feel when somebody watches. You can test by doing something not very legal but not really harmful and if you see the results than you are monitoring.

Vote Up (3)

If the laptop is a company owned asset, it is within their right to do so.  Assume that they are.  As stated by others, if you err on the side of caution, you will typically not get in trouble.

If it is your own device, but being used on a company network, refer to the Acceptable Use Policy.  If they state that personal devices are allowed but it is their right to monitor usage, assume that they are.  Refer above.

If it is your computer, and not on company networks or used during work hours, it would be a violation of your privacy for them to monitor your activity.


Regardless, always assume the NSA is!  LOL

Ask a question

Join Now or Sign In to ask a question. believes that pricing e-books at US$9.99 will boost sales by over 74 percent as the books are highly price-elastic.
Twitter more than doubled its sales in the second quarter, the company reported Tuesday, showing a strong advertising business.
Early one morning in April last year, someone accessed an underground vault just south of San Jose, California, and cut through fiber-optic cables there. The incident blacked out phone, Internet and 911 service for thousands of people in Silicon Valley.
New Dynamic Perspective sensors help boost cost, though display costs are minimal, IHS says.
Uber and Airbnb, which have already proved popular with travelers and urbanites with smartphones, have unveiled new features and links to other services designed to attract more business users.
Microsoft and IBM are gaining momentum in the cloud infrastructure services market, putting pressure on Amazon and outpacing rival Google, according to a new study.
If you're looking for a place to stay where you can hole up with Netflix in the evening, avoid some of the hotel industry's biggest names.
If there are no bees left what will save agriculture? Robots, of course!
U.S. broadband providers appear to be embracing monthly data caps, but customers are confused about the amount of data they use and broadband plan options, according to preliminary findings by the U.S. Government Accountability Office.
Cisco announced it will soon ship its Application Centric Infrastructure controller and rolled out other extensions across its data center portfolio.
Join us: