![]() ![]() It’s the same with smartphones and tablets. “Through an SSL (secure sockets layer) interception, usually used to filter out viruses, an administrator can intercept your log-in and read what’s being sent back and forth between your account and the Internet, even on HTTPS secure sites," says Chandrachoodan. Though it’s a rampant abuse of privacy, your organization’s information technology (IT) team can also employ processes that let them track personal emails, phone calls, messages or social media posts. “Every communication your device does with the Internet, including office emails and sites visited on a browser, goes through the company’s servers and they routinely keep a copy of it," he says. It’s a no-brainer that your official email and your Web browser activities are tracked, says Nitin Chandrachoodan, associate professor at the Indian Institute of Technology, Madras. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |