Search Details

Word: using (lookup in dictionary) (lookup stats)
Dates: during 2000-2000
Sort By: most recent first (reverse)


Usage:

...Road, are the vital electronic pathways--wires, cables and fiber-optic lines--that carry more than half of all traffic on the Internet. The region is home to more telecom and satellite companies than any other place on earth. The Washington area boasts a higher concentration of people who use the Internet at home and at work than any other urban area in the world. That makes northern Virginia America's main IT node a strategic target as important as the Pentagon. It also explains why so many big companies, such as MCI Worldcom, Network Solutions and America Online (which...

Author: /time Magazine | Title: D.C. Dotcom | 8/14/2000 | See Source »

Increasingly, corporations are using sanctions against violators of their rules on computer use. Twenty-eight percent of companies in the A.M.A. survey said they have dismissed employees for misuse or personal use of telecommunications equipment. Last year Xerox fired 40 employees for what it deemed inappropriate use of the Internet, and the New York Times axed 23 workers for sending what were considered to be obscene e-mails on company computers. "We are on the verge of creating a surveillance society in the workplace," says American Civil Liberties Union associate director Barry Steinhardt. Monitoring advocates reply that the threat...

Author: /time Magazine | Title: Cyberveillance | 8/14/2000 | See Source »

...moment, monitoring for most companies means tracking e-mail and Net use. Elron Software of Burlington, Mass., makes Message Inspector, a program that sniffs out inappropriate terms--as defined by whoever owns it--from incoming and outgoing e-mails. When it finds one, the program obliterates the e-mail or records it in a company database. San Diego firm Websense offers Websense Enterprise, a Trekkie name for a program that blocks access to inappropriate Web pages and logs every minute employees spend on each site...

Author: /time Magazine | Title: Cyberveillance | 8/14/2000 | See Source »

Programs like Investigator have the law on their side, explains Amelia Boss, chairwoman of the American Bar Association's business law section. Employers are free to monitor an employee's use of their networks so long as they don't violate labor and antidiscrimination laws--by targeting union organizers, for example, or minorities. Existing constitutional, statutory and common-law doctrines have not been interpreted to cover employee monitoring. Some union contracts limit an employer's ability to monitor during downtime like lunch hours, but they typically don't bar monitoring altogether. And while federal law prohibits wiretapping and the monitoring...

Author: /time Magazine | Title: Cyberveillance | 8/14/2000 | See Source »

...general on their team. It was Democrats, after all, who pushed through legislation ending the discrimination he recalled so movingly, the kind in which he was denied meals at restaurants in the South and forced to drive through several states without being able to stop to use public bathrooms. At a packed press conference in 1995, Powell relieved Democrats with his decision not to run for President (polls showed him handily defeating Bill Clinton) but devastated them with the announcement of his party affiliation. He said he was a Republican because he liked limited government, fiscal prudence and individual enterprise...

Author: /time Magazine | Title: Republican Convention: The Man Who Wore the White Shirt | 8/14/2000 | See Source »

First | Previous | 171 | 172 | 173 | 174 | 175 | 176 | 177 | 178 | 179 | 180 | 181 | 182 | 183 | 184 | 185 | 186 | 187 | 188 | 189 | 190 | 191 | Next | Last