<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Internet Monitoring: both sides of the table (Part 2)</title>
	<atom:link href="http://www.gfi.com/blog/internet-monitoring-sides-table-part-2/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/internet-monitoring-sides-table-part-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=internet-monitoring-sides-table-part-2</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Simon</title>
		<link>http://www.gfi.com/blog/internet-monitoring-sides-table-part-2/comment-page-1/#comment-29337</link>
		<dc:creator>Simon</dc:creator>
		<pubDate>Fri, 08 Jul 2011 17:08:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3214#comment-29337</guid>
		<description><![CDATA[Rose is correct - if Internet monitoring isn&#039;t regarded as a tool of unjustified repression, then nobody will be scared by it. Probably this fear employees have is not because of their guilty conscience but because of concerns about illegitimate use against them.]]></description>
		<content:encoded><![CDATA[<p>Rose is correct &#8211; if Internet monitoring isn&#8217;t regarded as a tool of unjustified repression, then nobody will be scared by it. Probably this fear employees have is not because of their guilty conscience but because of concerns about illegitimate use against them.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Rose Fellows</title>
		<link>http://www.gfi.com/blog/internet-monitoring-sides-table-part-2/comment-page-1/#comment-28999</link>
		<dc:creator>Rose Fellows</dc:creator>
		<pubDate>Sun, 17 Apr 2011 12:32:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3214#comment-28999</guid>
		<description><![CDATA[If employees are confident that Internet monitoring will be fair - i.e. if the employer doesn&#039;t abuse its power and doesn&#039;t fake the logs, fo example, to &quot;prove&quot; that somebody has visited a site while he or she hasn&#039;t, then it is easier to accept that one is being watched. In my opinion, Internet monitoring must be used mostly as a way to stop access to insecure sites that can infect a user&#039;s computer and spread the infection over the network than for monitoring who is chatting on Facebook and who isn&#039;t. Productivity can be increased when employees relax on fun sites but moderation is key here.]]></description>
		<content:encoded><![CDATA[<p>If employees are confident that Internet monitoring will be fair &#8211; i.e. if the employer doesn&#8217;t abuse its power and doesn&#8217;t fake the logs, fo example, to &#8220;prove&#8221; that somebody has visited a site while he or she hasn&#8217;t, then it is easier to accept that one is being watched. In my opinion, Internet monitoring must be used mostly as a way to stop access to insecure sites that can infect a user&#8217;s computer and spread the infection over the network than for monitoring who is chatting on Facebook and who isn&#8217;t. Productivity can be increased when employees relax on fun sites but moderation is key here.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:40:21 by W3 Total Cache --