Re: [Re: Keybord Entry Capture Programs]

From: Mike Brown (mikebrownat_private)
Date: Fri Jul 13 2001 - 15:12:42 PDT

  • Next message: Richard C Bond: "RE: Where is the data written?"

        I didn't want to be misunderstood so let my say it another way. Of course you don't
    HAVE to tell them, but in the long run your better off.
        The intent of monitoring computer usage shouldn't just be catching the people
    breaking the rules, it should be to prevent infractions in the first place. If you
    suspect a single person of E-mailing company secrets then of course you shouldn't tell
    them that you will be watching next week on wednesday from 3:00 to 3:45. But as far as
    setting company policy all users should know that what they do on the computers is
    monitored and recorded. This not only stops casual use of the computer systems but also
    keeps employees "in the loop".
        The company has the RIGHT to record and monitor computer usage secretly but that
    power is very intimidating to the end user and shouldn't be thrown around. Your just
    looking for trouble if one day you walk in to the accounting office and walk up to Jim
    and ask him about his lover shelly and why he likes to read hotteens.com. Informing
    employees in the first place will stop allot of your problems from even starting. It also
    looks really good if after you do review of computer usage you can tell your boss that
    there where no infractions.
        SO it is your right to monitor but that doesn't mean you want to. The exception to
    this is if you have reasonable expectations, like if Jim stays late every night and you
    haven't seen an increases in his work output but you have seen an increases in bandwidth
    usage.
    
    
    Mike
    
    
    Computer Investigator wrote:
    
    > Mike you do not have to give notification to employees if you implement a user
    > policy that states all user activities can be monitored, etc...
    >
    > Users have no right to privacy in most cases, but can build a case for privacy
    > if its known within organization that computers are used for personal use, and
    > no policy exisits.
    >
    > prep for chain of command, if your looking to catch an employee, don't use
    > keytrap alone, use with video survallnce to place them at pc during occurance,
    > note cmos time/date to make sure accurate when software or dongle installed.
    > if check software note that in log. all setup and activity should be logged
    > with who, date, time, location, etc.
    >
    > best regards,
    > computer-investigators.com
    
    
    
    
    -----------------------------------------------------------------
    
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see:
    
    http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Fri Jul 13 2001 - 16:43:36 PDT