Defects or damage that result from the use of non-Callpod-branded or certified products, accessories, software or other peripheral equipment are excluded from coverage. Use of Non-Callpod Products and Accessories. Defects or damage that result from: (a) improper operation, storage, misuse or abuse, accident or neglect, such as physical damage (cracks, scratches, etc.) to the surface of the product resulting from misuse (b) contact with liquid, water, rain, extreme humidity or heavy perspiration, sand, dirt, extreme heat, or food (c) use of this product(s) for commercial purposes or subjecting the product(s) to abnormal usage or conditions or (d) other defects or damage from acts that are not the fault of Callpod(R), are excluded from coverage. Periodic maintenance, repair and replacement of parts due to normal wear and tear are excluded from coverage. This warranty is limited to one-year from the time of purchase by the original consumer (i.e. This limited one-year warranty is a consumers exclusive remedy and applies as follows to new Callpod products and accessories purchased by consumers. warrants Callpod(R)-branded products to be free from defects in materials and workmanship under normal consumer usage for the period(s) outlined below. The software is easy to install and, although the system has a number of components that can be distributed across several systems, all the server and control software can be installed on one system.Callpod Warranty Subject to the exclusions contained below, Callpod, Inc. Monitoring software must be installed on each system, which will then record all activity that takes place, feeding it back to the central server systems that store the data for later analysis and display. The Dashboard display is where it all happens. From here, the administrator can see user timesheets, application usage, website visits and keyboard activity in graphical form, showing a snapshot in a given time frame. More useful from a security perspective is the Security Favourites display, showing which users have been most active in areas such as file transfers to removable media, file downloading, printing documents, sending email with attachments and using webmail. All these activities are potential security risks. The Productivity display reveals which users visit which websites, who spends most time doing internet searches, who uses the most bandwidth, who sends the most email and which apps are used the most. These may be indicators of a productive employee, but they can just as easily show an employee who spends a lot of time watching online videos and chatting to mates.Īll this information can be put to a variety of uses. Analysing the website activity could indicate which sites need to be blocked, but could also indicate a resource that employees find essential for their work, which could be replaced with an in-house product. The system provides the evidence to distinguish between the two by providing a complete transaction list of everything a user did in a particular activity in a given time frame. The system can report a user’s activity down to the keystroke level, providing details of what apps were involved, and also supplying screenshots taken at the time the activity was logged. This last feature is available for all the recorded activities and eliminates any chance of misinterpreting an activity. A URL may be just a string of characters, but a screenshot is unambiguous.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |