SE-Logo-Emboss021084164.gif (4490 bytes)

Comments regarding this site may be sent to webmaster@softeyes.com

Copyright (c) 2000-2005, SoftEyes, Inc. All Rights Reserved

Hit Counter


           

SoftEyesBanner-535x69.gif (3549 bytes)


Maintenance free, easy to use, invisible and the most tamper proof software available


Why should I monitor computer activity?


For many of the same reasons that security cameras are used to monitor high profile transactions, sensitive facilities, or high risk personnel --
Policy Enforcement, Surveillance and Record.



Parents
- as a safety net in addition to filtering and parental controls. Control when and total time per day the computer can be used. Kids online during latch-key hours and late at night are the most vulnerable. The Internet has become the hunting ground for today's pedophiles.

Spouses
- as notification of destructive and addictive behavior, pornagraphy, gambling, online romances, cheating or hidden assets.

Business
- to enforce Usage Policies, reduce non-work related computer use and document actual work performed.

Educators - as a form of extended supervision and as a mechanism to record subjective situations for review and discussion.

Executives - to learn how their computer is used in their absence and to track sensitive material.

Follow the blue arrows for a tour of our monitoring solutions.



Softeyes, Inc. actively works with non-profit entities that promote safe use of the Internet by children.  If your organization meets this criteria, please contact us at info@softeyes.com for ways we might help.  There is never any cost or obligation for this service.