× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



#3 would be a deal breaker for me if I was in your shoes.

If the parents are insistent, and you want to go through the trouble, could you have the data sent to you so you could sanitize it before you forwarded it on to them?

Personally, I wouldn't allow it.

Glenn

On 8/11/2010 10:08 AM, Shannon O'Donnell wrote:
Hi,

So I have an unusual situation to consider.

I have a 17 y/o kid who does some part time programming for me. He's
learning the trade and I get relatively cheap labor. Works out pretty well
for everyone although having someone that young working for me has been a
challenge for me. I don't generally have to spell out every. Single. Thing.
To an "older", more experienced worker, so that's different.

Anyway he has a laptop I gave him to use and his family would like to
install Web Watcher on it
http://www.webwatchernow.com/monitoring-software/consumer/index_40off.html?g
clid=CPuXu8DGsaMCFRrXnAodaT3l4g to keep tabs on him.

I guess I don't have a problem with that, except for the following four
concerns:

1. How do I get that software off of there, and KNOW! It's off of there for
sure, when he's no longer working for me? I don't want to give the computer
to someone else to use and have that software sending data back to some
unknown repository. And their website indicates that the software is
invisible even when you KNOW it's there so how could you ever be sure it was
gone?

2. How do I know (this might be paranoia so it may not even be a
concern...) that this software won't propagate itself onto other computers
it comes in contact with? Is there any indication that this happens with
these monitoring type software programs?

3. I'm wondering how the capturing of screens and other data on that
computer, which does have access to proprietary, and extremely sensitive
data, would go over with my clients if they knew it was being captured and
stored on a parent's computer?


4. Is there any chance this software is going to interfere with my IBM and
other company's development software?


I'd appreciate any feedback and opinions anyone might have on this
topic/these concerns.

Thanks,

Shannon O'Donnell



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.