Answer:
Isn't that stalking
Step-by-step explanation:
There are various methods implemented to monitor and manage user activity such as:
Video recordings of sessions.
Log collection and analysis.
Network packet inspection.
Keystroke logging.
Kernel monitoring.
File/screenshot capturing.