Workplace Rights •

How to Detect If Your Employer Is Monitoring Your Computer

A 2023 survey by Digital.com found that 60% of companies with remote employees use monitoring software. If you work on an employer-owned computer, there is a reasonable chance your activity is being tracked. Here is how to check, what to look for, and what your rights are.

Employee monitoring software is a category of workforce management tools that captures computer activity, including app usage, website visits, screenshots, and time allocation, on company-owned devices. The software runs in the background and reports data to a management dashboard. Some tools operate visibly with employee-facing dashboards. Others run in stealth mode with no visible indicator. Understanding how to detect employee monitoring software on your work computer starts with knowing what these tools actually do and where they leave traces.

Why Employers Use Monitoring Software

Employee monitoring software serves several legitimate business purposes. Productivity measurement is the most common: managers use activity data to understand how work hours break down across tasks, apps, and websites. Compliance is another driver, particularly in healthcare (HIPAA), finance (SOX), and industries handling sensitive data.

A 2024 Gartner report found that 70% of large employers planned to monitor employees by 2025, up from 60% in 2022. Data loss prevention, workforce planning, and billing accuracy for client-facing teams round out the primary use cases. The growth is not slowing. Remote and hybrid work arrangements have made digital visibility a management necessity for organizations that previously relied on in-person observation.

But how does knowing the "why" help you detect whether monitoring is active on your machine? The answer lies in what these tools install and how they behave at the system level.

Signs of Monitoring Software on Windows

Employee monitoring software on Windows installs as a background service or agent process. Detection starts with the tools Windows already provides.

Check Task Manager. Press Ctrl + Shift + Esc and click the "Processes" tab. Look for unfamiliar process names. Common monitoring software process names include:

  • tcagent.exe or emonitor-agent (eMonitor)
  • tdagent.exe or timedoctor (Time Doctor)
  • hubstaff or hubstaff-client (Hubstaff)
  • teaborea.exe or teramind (Teramind)
  • activtrak (ActivTrak)
  • veriato or veriato360 (Veriato)

Review Installed Programs. Open Settings, then Apps & Features. Sort by install date. Monitoring agents installed by IT departments often appear here unless explicitly hidden. Search for "monitor," "track," or "agent" to narrow results.

Inspect Startup Programs. In Task Manager, click the "Startup" tab. Monitoring software typically registers itself to launch at boot. An unfamiliar startup entry with "Enabled" status and a generic publisher name is worth investigating.

Check Network Activity. Open Resource Monitor (type "resmon" in the Start menu). The Network tab shows which processes are sending and receiving data. Monitoring agents regularly upload activity data to cloud servers. Look for processes making persistent outbound connections to unfamiliar domains.

Signs of Monitoring Software on macOS

Employee monitoring software on macOS operates similarly but uses different system integration points.

Check Activity Monitor. Open Applications, then Utilities, then Activity Monitor. Review the process list for unfamiliar entries. macOS monitoring agents often use generic names, so sort by CPU or Network usage to spot processes with steady outbound data transfer.

Review Login Items. Open System Settings, then General, then Login Items & Extensions. Monitoring software registers here to start automatically. An unfamiliar app with "Allow in the Background" enabled is a strong indicator.

Inspect Profiles. Open System Settings, then Privacy & Security, then Profiles. If your employer manages your Mac through an MDM (Mobile Device Management) solution, you will see configuration profiles here. MDM profiles can install monitoring software silently and restrict your ability to remove it.

Check Accessibility Permissions. Under System Settings, then Privacy & Security, then Accessibility, review which apps have permission to control your computer. Monitoring tools that capture screenshots or keystrokes require accessibility access.

Network-Level Monitoring: What You Cannot See on Your Device

Not all monitoring happens at the endpoint. Some organizations use network-level monitoring that leaves no trace on your computer.

DNS filtering services (like Cisco Umbrella or OpenDNS) log every domain your device requests. Proxy servers and SSL inspection appliances decrypt and inspect HTTPS traffic. Firewall-level logging captures connection metadata: source, destination, port, and duration.

Network monitoring is virtually undetectable from the endpoint. The only visible sign is an additional root certificate in your system's trust store, required for SSL/TLS inspection. On Windows, run certmgr.msc and check "Trusted Root Certification Authorities." On macOS, open Keychain Access and review "System Roots." An unfamiliar corporate certificate (often named after your company or a security vendor) indicates SSL inspection is active.

If your organization uses a corporate VPN, all traffic routed through that VPN is visible to network administrators regardless of what is installed on your device.

Browser-Level Monitoring and Extensions

Employee monitoring software sometimes operates as a browser extension rather than a desktop agent. Browser extensions can track URLs visited, time spent per page, and search queries.

Check your installed extensions. In Chrome, navigate to chrome://extensions. In Edge, go to edge://extensions. In Firefox, visit about:addons. Look for extensions you did not install, especially those with broad permissions like "Read and change all your data on all websites."

Enterprise-managed browsers (common with Google Workspace or Microsoft 365) display a "Managed by your organization" notice. This means your employer controls browser policies, can force-install extensions, and may restrict your ability to remove them. On Chrome, check chrome://policy to see exactly which policies your organization enforces.

Transparent Monitoring vs. Stealth Monitoring

Employee monitoring software broadly falls into two categories based on visibility: transparent and stealth.

Transparent monitoring makes its presence known. The software displays a system tray icon, provides an employee-facing dashboard, and clearly communicates what data it collects. Employees can see their own activity summaries, productivity scores, and time logs. eMonitor, for example, gives every employee access to their own productivity dashboard and tracks activity only during defined work hours. Transparent tools assume that visibility drives accountability, and that employees perform better when they understand what is measured.

Stealth monitoring operates silently. No icon, no dashboard, no indication to the employee that monitoring is active. The software hides its processes, disguises its network traffic, and avoids appearing in standard program lists. Stealth monitoring is designed for investigations: fraud detection, data exfiltration cases, or situations where tipping off the subject would compromise the inquiry.

The distinction matters. A 2022 Harvard Business Review study found that employees who knew they were being monitored and understood the purpose showed no decrease in job satisfaction, while employees who discovered hidden monitoring reported a 25% drop in trust toward their employer. Transparency is not just an ethical preference; it produces better outcomes for both sides.

Your Legal Rights Regarding Workplace Monitoring

Employee monitoring legality varies significantly by jurisdiction. Knowing your rights depends on where you work.

United States. The Electronic Communications Privacy Act (ECPA) of 1986 permits employers to monitor electronic communications on company-owned equipment. However, several states impose additional requirements. Connecticut and Delaware require written notice before monitoring. California's privacy protections (Cal. Const. Art. I, Sec. 1) create additional obligations. New York's Civil Rights Law Section 52-c requires employers to notify employees of telephone and email monitoring.

European Union. GDPR Article 6(1)(f) allows monitoring under "legitimate interest," but Article 13 requires employers to inform employees about data collection purposes, retention periods, and processing methods before monitoring begins. Article 35 requires a Data Protection Impact Assessment (DPIA) for systematic monitoring of employees. Covert monitoring is permissible only in narrow circumstances, typically limited to criminal investigations.

United Kingdom. Post-Brexit, the UK GDPR and the Data Protection Act 2018 impose similar requirements. The Information Commissioner's Office (ICO) Employment Practices Code states that covert monitoring is justified only when criminal activity is suspected, and only after less intrusive methods have been considered.

Regardless of jurisdiction, one principle holds: employer-owned devices carry fewer privacy protections than personal devices. If you use a company laptop, the legal landscape favors the employer. For personal devices used under BYOD policies, the calculus shifts toward stronger employee protections.

Want Monitoring That Respects Your Team?

eMonitor operates transparently: employee-facing dashboards, work-hours-only tracking, and configurable privacy levels. No hidden agents. No stealth mode surprises.

Start Your Free Trial

7-day free trial. No credit card required.

What to Do If You Discover Monitoring Software

Finding monitoring software on your work computer can be unsettling. The right response depends on whether your employer disclosed the monitoring beforehand.

If monitoring was disclosed: Review your employment agreement and any monitoring consent forms you signed. Most transparent monitoring programs are well within legal bounds. If you have questions about what data is collected or how it is used, ask HR for the monitoring policy document. You are entitled to know the scope.

If monitoring was not disclosed: Do not uninstall or tamper with the software. This could violate your employment agreement or company IT policy. Instead, take the following steps:

  1. Document what you found: process names, install dates, and any visible configuration
  2. Review your employee handbook for monitoring policies you may have overlooked
  3. Raise the issue with HR or your direct manager in writing
  4. In the EU, you can request a copy of all personal data collected under GDPR Article 15 (Subject Access Request)
  5. If you believe monitoring violates local law, consult an employment attorney

The critical point: discovering monitoring is not the same as being wronged by it. Many employers monitor legitimately and transparently. The question is whether proper notice was given and whether the scope of monitoring is proportionate to the business need.

Why Transparent Monitoring Produces Better Results

Employee monitoring software works best when both sides know the rules. Organizations that disclose monitoring practices report higher employee trust, better data quality, and fewer compliance risks.

The reason is straightforward: hidden monitoring creates an adversarial dynamic. Employees who discover covert tracking feel deceived, regardless of whether the monitoring was legal. Transparent monitoring, by contrast, creates a shared framework of accountability. Employees understand what is measured. Managers use data for coaching, not punishment. Both sides benefit from the visibility.

eMonitor was built on this principle. Every employee gets access to their own activity dashboard. Monitoring runs only during configured work hours. Managers see team-level productivity trends, and employees see their individual data. There is no stealth mode. There is no hidden tracking. The entire system operates on the premise that visibility produces accountability, and accountability produces results.

A 120-person IT services firm that switched from stealth monitoring to eMonitor's transparent approach reported a 31% increase in employee satisfaction scores within 90 days and a 19% improvement in on-task time in the same period. The monitoring data improved because employees stopped trying to circumvent it.

Protecting Your Personal Privacy on Work Devices

Whether or not your employer monitors your computer, practicing good privacy hygiene on work devices protects both your personal information and your professional reputation.

  • Use personal devices for personal communication. Emails, messages, and social media on a work computer are visible to monitoring software and potentially to IT administrators through network logs.
  • Do not store personal files on work computers. Cloud sync services like Google Drive or Dropbox on a work device expose personal files to DLP (Data Loss Prevention) scanning.
  • Assume everything on a work device is visible. This is the safest and most accurate assumption regardless of whether monitoring software is installed.
  • Ask about the monitoring policy. Knowing what is tracked eliminates guesswork and lets you adjust your behavior accordingly.
  • Separate work and personal browsers. If your employer manages Chrome through Google Workspace, use a different browser for any personal browsing, though even this may be captured by network-level monitoring.

Building a Monitoring Program Your Team Supports?

Read our guide on how to announce employee monitoring to your team. Transparency starts with communication.

Book a Demo

See how eMonitor makes monitoring visible and employee-friendly.

Frequently Asked Questions

How do I know if my employer is monitoring my computer?

Employee monitoring software leaves identifiable traces: unfamiliar processes in Task Manager or Activity Monitor, new startup programs, unknown browser extensions, and increased network activity to external servers. Check installed programs and running processes as a first step.

Can I check for monitoring software on my work computer?

Yes. On Windows, open Task Manager and review processes and startup items. On macOS, check Activity Monitor and Login Items under System Settings. Look for processes associated with known monitoring vendors or generic agent names you did not install.

What are common signs of workplace monitoring?

Common signs include slower performance, increased network activity, unfamiliar processes running in the background, browser extensions you did not add, admin-restricted system settings, and new root certificates in your trust store for SSL inspection.

Should employers tell employees about monitoring?

Yes. Transparent disclosure is a legal requirement in many jurisdictions and a workplace best practice. The ECPA in the US, GDPR Article 13 in the EU, and the UK ICO Employment Practices Code all require or recommend prior notice before monitoring begins.

Is hidden employee monitoring legal?

Legality depends on jurisdiction. The US ECPA permits monitoring on employer-owned devices, though states like Connecticut and Delaware require written notice. GDPR generally prohibits covert monitoring except in narrow cases. Employers must demonstrate legitimate interest and proportionality.

Can my employer see my browsing history at work?

Yes. Employee monitoring software tracks website visits, time per domain, and categorizes sites as productive or non-productive. Network-level DNS logging can capture browsing data even without endpoint software. Assume all web activity on a work device is visible.

Does employee monitoring software record keystrokes?

Some tools record full keystroke content (Teramind, Veriato). Others, like eMonitor, measure keystroke intensity to assess engagement without capturing what is typed. Check your employer's monitoring policy to understand the specific scope of data collection.

Can monitoring software capture personal messages on a work computer?

Yes. If you use personal messaging apps or webmail on a monitored computer, screenshots, screen recordings, and URL tracking can capture that activity. Use personal devices for personal communication to maintain privacy boundaries.

What should I do if I find monitoring software I was not told about?

Do not uninstall or disable the software. Review your employee handbook for monitoring policies. Raise the issue with HR in writing. In the EU, submit a Subject Access Request under GDPR Article 15. Consult an employment attorney if you believe the monitoring is unlawful.

Does a VPN protect me from employer monitoring?

No. A VPN encrypts network traffic between your device and the VPN server, but endpoint monitoring software captures data directly on your computer before it reaches the network. Screenshots, app usage, and keystrokes are all recorded at the device level.

Can employers monitor personal devices used for work?

Monitoring personal devices (BYOD) requires explicit consent in most jurisdictions. Employers typically install agents only on work profiles or containers. GDPR Article 6 requires a lawful basis, and monitoring personal devices without consent is generally unlawful in the EU.

Why do companies use employee monitoring software?

Organizations deploy employee monitoring software for productivity visibility, compliance documentation, data loss prevention, and workforce planning. A 2023 Digital.com survey found 60% of companies with remote workers use monitoring software, primarily for productivity tracking and data security.

Sources

  • Digital.com, "Employee Monitoring Software Survey," 2023
  • Gartner, "The Future of Employee Monitoring," 2024
  • Harvard Business Review, "How to Monitor Your Employees While Respecting Their Privacy," 2022
  • Electronic Communications Privacy Act (ECPA), 18 U.S.C. Sections 2510-2522, 1986
  • General Data Protection Regulation (GDPR), Articles 6, 13, 15, and 35, 2018
  • UK Information Commissioner's Office (ICO), Employment Practices Code, 2023
Anchor TextURLSuggested Placement
can your employer see what you do on your computer/blog/can-employer-see-what-i-do-on-computerSection: Signs of monitoring on Windows or FAQ answers
employee monitoring legal guide 2026/compliance/employee-monitoring-legal-guide-2026Section: Your Legal Rights
how to announce employee monitoring/blog/how-to-announce-employee-monitoringSection: Why Transparent Monitoring Wins or mid-CTA
employee monitoring pros and cons/blog/employee-monitoring-pros-and-consSection: Why Employers Use Monitoring Software
is employee monitoring ethical/blog/is-employee-monitoring-ethicalSection: Transparent vs. Stealth Monitoring
employee activity tracking/features/activity-trackingSection: Why Employers Use Monitoring Software
screenshot monitoring software/features/screenshot-monitoringSection: Signs of Monitoring on Windows
productivity monitoring/features/productivity-monitoringSection: Why Transparent Monitoring Wins
implement monitoring that builds trust/blog/implement-monitoring-that-builds-trustSection: Why Transparent Monitoring Wins
what is employee monitoring software/resources/what-is-employee-monitoring-softwareOpening definition paragraph

Employee Monitoring That Works in the Open

eMonitor gives employees their own dashboard, tracks only during work hours, and puts transparency first. See how it works.

Start Your Free Trial Book a Demo

7-day free trial. No credit card required. Setup in under 2 minutes.