{"version":"1.0","provider_name":"Syteca","provider_url":"https:\/\/www.syteca.com\/pl","title":"Programy szpiegowskie a monitoring aktywno\u015bci - r\u00f3\u017cnice | Syteca","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"FiUQBYQFwi\"><a href=\"https:\/\/www.syteca.com\/pl\/blog\/programy-szpiegowskie-a-monitoring-aktywnosci-roznice\">Programy szpiegowskie a monitoring aktywno\u015bci &#8211; r\u00f3\u017cnice<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.syteca.com\/pl\/blog\/programy-szpiegowskie-a-monitoring-aktywnosci-roznice\/embed#?secret=FiUQBYQFwi\" width=\"600\" height=\"338\" title=\"&#8220;Programy szpiegowskie a monitoring aktywno\u015bci &#8211; r\u00f3\u017cnice&#8221; &#8212; Syteca\" data-secret=\"FiUQBYQFwi\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.syteca.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/programy_szpiegowskie_a_monitoring_aktywnosci-roznice.png","thumbnail_width":825,"thumbnail_height":296,"description":"Wielu u\u017cytkownik\u00f3w komputer\u00f3w i urz\u0105dze\u0144 mobilnych cz\u0119sto postrzega szpiegowanie pracownika jako form\u0119 monitoringu. Jest to mylne stwierdzenie, gdy\u017c programy szpiegowskie znacznie r\u00f3\u017cni\u0105 si\u0119 od tych do rejestrowania pracy na komputerze. Podstawow\u0105 r\u00f3\u017cnic\u0105 jest pe\u0142na legalno\u015b\u0107 monitoringu komputera i brak inwigilacji prywatnych danych pracownika. Czym jeszcze r\u00f3\u017cni\u0105 si\u0119 programy szpieguj\u0105ce od kontroli urz\u0105dzenia?\u00a0\u00a0\u00a0Czym s\u0105 s\u0105 programy szpiegowskie?"}