Solved

Keystroke

Posted on 2004-08-18
4
319 Views
Last Modified: 2013-12-04
Hi,

Our other office is setting up new network, my boss told me that he wants to use Keystroke software/hardware.

Here is what he wants:
1. be able to record Keystrokes
2. can flag out the person is copying files to other locations..............

Doable?  Thx
0
Comment
Question by:mcrmg
  • 2
4 Comments
 
LVL 14

Expert Comment

by:JohnK813
ID: 11831690
Doable?  Yes, but only if the boss tells everyone first, and everyone agrees to let this happen.  Otherwise, I'd imagine there would be some pretty big legal issues.

I'd imagine logger software would be easier/cheaper than hardware, but I don't know if the Member Agreement will allow me to help you find some.
0
 

Author Comment

by:mcrmg
ID: 11831872
>>Otherwise, I'd imagine there would be some pretty big legal issues.
I think my boss did not think about this...........

So, it is illegal to install that without telling?  (or you can direct me to some documentation thart I can send it to my boss.)

Thanks
0
 
LVL 14

Assisted Solution

by:JohnK813
JohnK813 earned 50 total points
ID: 11832223
I'm not by any means a lawyer, so I'm not the person to ask.  Here are two links that may get you started, though:

http://www.privacyrights.org/fs/fs7-work.htm
http://www.fwlaw.com/techsurv.html

If I were you, I'd check with my company lawyer first.  Or, I'd just go ahead and inform everyone.  Telling everyone does two things:
a) avoids the mess of a situation that occurs when someone finds out they're being logged, and
b) sometimes just the threat of being watched will cause people to stick to the straight and narrow
0
 
LVL 4

Accepted Solution

by:
novacopy earned 100 total points
ID: 11834846
We have key loggers on many of our PC's what we did is make the user read a computer policy handbook which basically tells them everything they type and look at on the computer is being monitored.

you might want to get something on paper with a John Handcock.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now