RescueTime, too, emphasizes its openness.
"We don't like being compared to Big Brother, that is absolutely not what RescueTime is trying to be," Hruska says. There was a time when RescueTime could be installed without employees' knowledge, but that capability has since been disabled.
"We did bend under pressure from some of our larger corporate clients and allowed them to do what we call the 'stealth install,'" Hruska says. "We did that for a very short time and found that it wasn't working for us."
There are plenty of other products that monitor employees' activities surreptitiously, capturing keystrokes and tracking activities such as application use, document downloads and website visits.
"I understand the need for enterprises to watch and monitor that and protect their intellectual property and data. But that's not what we are," Hruska says.
Sign up for CIO Asia eNewsletters.