1 / 11

Computer and Internet Surveillance Technologies in the Workplace

Computer and Internet Surveillance Technologies in the Workplace. Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net. Demonstration: Keystroke, Window, and URL Logging. WinWhatWhere Investigator http://www.winwhatwhere.com.

Download Presentation

Computer and Internet Surveillance Technologies in the Workplace

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer and Internet Surveillance Technologiesin the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net

  2. Demonstration: Keystroke, Window, and URL Logging WinWhatWhere Investigator http://www.winwhatwhere.com

  3. Demonstration: Screenshot Capture Webroot WinGuardian http://www.webroot.com/

  4. Why Monitor Employees? (MacWorld 1993 survey) • Monitor work flow: 29.2% • Investigate theft: 29.2% • Investigate espionage: 21.5% • Review performance: 9.2% • Prevent harassment: 6.2% • Seek missing data: 3.1% • Seek illegal software: 3.1% • Prevent personal use: 3.1%

  5. Driving Forces • Low cost, readily available • B2C products looking for B2B market • IT desire to regain control

  6. Important Distinctions • Filter/block vs. monitor • Log everything vs. specific trigger • Content/body vs. traffic data/headers • Client vs. server • Continuous vs. spot/random/response • Aggregate vs. individual • Monitor work vs. monitor the worker • Storage vs. interception

  7. Network-based Monitors • eSniff (hardware) • SurfControl LittleBrother, CyberPatrol, SurfWatch, SuperScout • TeleMate eSpective, NetSpective • Adavi SilentWatch • NetPartners WebSense Enterprise • Elron WebInspector, MessageInspector • MailSweeper, MIMESweeper, WebSweeper, PornSweeper, SecretSweeper

  8. Client-based Monitors • WinWhatWhere Investigator • Webroot WinGuardian • SpectorSoft Spector, eBlaster

  9. Hybrid (Client/Server) Monitors • Trisys Insight • Wards Creek Game Warden

  10. Future Trends • Convergence (voice mail, fax, copy) • “Universal inbox” (attachments) • Gadgets, wireless, GPS

More Related