Anna OrlovProfessor WillisEnglish 10117 March XXXX
Annotation. Title is centered.
Online Monitoring:A Threat to Employee Privacy in the Wired Workplace
Annotation. Opening sentences provide background for thesis.
As the Internet has become an integral tool of businesses,company policies on Internet usage have become as common aspolicies regarding vacation days or sexual harassment. A 2005study by the American Management Association and ePolicy Institute found that 76% of companies monitor employees’ use ofthe Web, and the number of companies that block employees’ access to certain Web sites has increased 27% since 2001 (1). Unlike other company rules, however, Internet usage policies ...view middle of the document...
Source: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007). Source:Diana Hacker (Boston:Bedford/St.Martin’s, 2007).
tests, and in-store video surveillance. The difference, Lane argues,between these old methods of data gathering and electronic surveillance involves quantity:
Annotation. Long quotation is set off from the text; marks are omitted.
Technology makes it possible for employers to gatherenormous amounts of data about employees, often far beyond what is necessary to satisfy safety or productivity concerns. And the trends that drive technology—faster, smaller, cheaper—make it possiblefor larger and larger numbers of employers to gatherever-greater amounts of personal data. (3-4)
Annotation. End of indented quotation. Page number is given in parentheses after the final period.
Lane points out that employers can collect data whenever employees use their computers—for example, when they send e-mail,surf the Web, or even arrive at or depart from their workstations.
Annotation. Clear topic sentences, like this one, are used throughout the paper.
Another key difference between traditional surveillance andelectronic surveillance is that employers can monitor workers’ computer use secretly. One popular monitoring method is keystrokelogging, which is done by means of an undetectable program onemployees’ computers. The Web site of a vendor for Spector Pro, apopular keystroke logging program, explains that the software canbe installed to operate in “Stealth” mode so that it “does not showup as an icon, does not appear in the Windows system tray, . . .[and] cannot be uninstalled without the Spector Pro passwordwhich YOU specify” (“Automatically”).
Annotation. Source with an unknown author is cited by a shortened title.
As Lane explains, these programs record every key entered into the computer in hidden directories that can later be accessed or uploaded by supervisors;the programs can even scan for keywords tailored to individualcompanies (128-29).
Long quotation is
set off from the
marks are omitted.
Page number is given in parentheses
after the final period.
this one,are used
Source with an unknown author is
cited by a shortened
SSource: Hacker/Sommers (Boston: Bedford/St. Martin’s, 2011, 2007). ource:Diana Hacker (Boston:Bedford/St.Martin’s, 2007).
readers move from
one paragraph to
Orlov treats both
sides fairly; she pro-
vides a transition to
her own argument.
for opposing views.
Annotation. Orlov anticipates objections and provides sources for opposing views.
Some experts have argued that a range of legitimate concernsjustifies employer monitoring of employee Internet usage. As PCWorld columnist Daniel Tynan points out, companies that don’t monitor network traffic can be penalized for their ignorance: “Employees could...