A tech pro is charged with monitoring Web use at a family business, but gets an unexpected response when the worst offender is revealed You can have your fancy Computer Science degree, your hands-on hardware expertise, and your mad coding skills. There’s still one place where they’ll barely make a difference: the family business, where rules are made to be broken and “company politics” takes on a whole new meaning. Good luck implementing any tech solution in that environment!I learned this not long after finishing up my college career, when the World Wide Web was in its birthing stages. On campus, we used a type of local email, and with a 2,400-baud dial-up modem, one could connect to the mainframe from home, if a line was available, and communicate with other individuals linked in. We mostly used computers to write, enhance, or fix actual programs that accomplished a specific task.[ For more stories about exasperating IT jobs, check out “10 users IT hates to support.” | Pick up a $50 American Express Gift Cheque if we publish your tech story: Send it to offtherecord@infoworld.com. | Get your weekly dose of workplace shenanigans by following Off the Record on Twitter and subscribing to the anonymous Off the Record newsletter. ] Once I graduated, I accepted a position at a large family operation where I wrote programs using Microsoft Access and SQL queries that extracted data from existing programs and produced reports to aid in sales and purchasing. I even wrote one to control the production on the manufacturing line and one for tracking fleet maintenance. We did real work on our PCs, but the world would soon discover these amazing tools could be put to many other uses.With the arrival of AOL, Prodigy, CompuServe, and EarthLink, as well as their offers of free hours of connected time, Web browsing became a new beast that had to be controlled. Our main office had two modem banks in the basement that dished out phone lines upon demand, but we were limited to 16 lines. This had been plenty when people were merely involved in work, but now with “free” email to be had, we noticed a spike in modem usage.Following quickly on email’s heels came online shopping and porn sites. Soon, the board was caught up in the dot-com boom and trading a lot of stocks, so a few of them were also reading tech journals — not to gain computing expertise but to pick up “insider” info for their investments. The pot was boiling. As a small cog in the IT department, I had been suspicious about dial-up usage. I’d been prompting my boss to be proactive on monitoring and putting policies on its use, since were seeing higher bills for minutes of online and workers were unable to access modem lines for longer periods of time. But he was unconcerned as it was a family-owned business and we had “fine employees.” They were probably doing work.When an article appeared in one of the tech journals making predictions about how many hours were wasted on Web surfing, I finally got the buy-in from my boss and the board to put policies in place for what was expected in the office environment. The CEO told the HR department to compose an addendum to the employee handbook, and we should run a check on the PCs to see if we had any violators who needed to be addressed.There were few tools to help us deal with our problem, but I managed to find one that worked with our Novell network. It was called Lan Assist, and it would enable me to connect to a PC remotely and check its temporary Internet files folder for potential violators. All of this could be performed without the knowledge of the user. I started scanning the machines and recording the data from their Temporary Internet Files directory. When I completed all my scans, I’d found a few workers abusing the shopping sites and such, but the real kicker was one employee who watched porn several hours a day at work. I alerted my boss, and he was as amazed as I was when I told him the identity of the culprit.We called the CEO in and displayed the contents of the directory to him without revealing the owner. The CEO was outraged that someone would abuse their Internet privileges and waste company time in such a manner and demanded to know who it was. I let my boss explain: It was the CEO’s brother-in-law, who happened to be the manager of the HR department!The CEO was aghast and said we were not to talk to the brother-in-law directly. He also made it clear that we were left to our own methods to curb the problem in other ways. Our project soon had a new goal: Install blacklists to curb indiscrete Web surfing, though I never found these to be truly effective, as the “bad” guys can pop up a new website faster than I can block it. Our data findings were disposed too. The new policies helped some, but we still had to talk to employees once in a while about excessive shopping or other time sucks. And the brother-in-law? I installed another utility that made it appear all lines were busy for big chunks of the day, limiting his access to the modem.Our options during that era of IT were greatly limited in small businesses like ours. If we purchased software to control an individual PC, the user would know. Also, the board was opposed to spending the money or policing relatives. But dropping the modem connection meant that the individual could no longer dial into another location to do their work. I’m so thankful our choices nowadays are much more robust and granular for controlling such issues.However, I suspect the solutions for dealing with a family business remain as narrow as ever. Send your own IT tale of managing IT, personal bloopers, supporting users, or dealing with bureaucratic nonsense to offtherecord@infoworld.com. If we publish it, we’ll send you a $50 American Express Gift Cheque.This story, “What! Porn in the office? Oh, never mind,” was originally published at InfoWorld.com. Read more crazy-but-true stories in the anonymous Off the Record blog at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter. IT JobsCareersTechnology Industry