mailing list archives
RE: FW: Securing workstations from IT guys
From: Eric White <ewhite () ssc wisc edu>
Date: Thu, 29 Nov 2007 10:26:36 -0600
I'm not sure this this illegal in the U.S. I believe the company owns the
assets (PC, network, phones, servers, etc), and can monitor them as they see
fit. You can argue the ethics of such a thing, but I don't see how it's
If an employer states something along the lines of "all company property if
for authorized use only and all use of property may be monitored and logged"
and I agree to this policy (either by signing paperwork when I'm hired or by
clicking through this message when I login), I shouldn't be surprised when
my actions are in fact monitored, should I?
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On
Behalf Of Jan Heisterkamp
Sent: Thursday, November 29, 2007 7:19 AM
To: Nick Vaernhoej
Subject: Re: FW: Securing workstations from IT guys
Nick Vaernhoej schrieb:
A key logger? At what point are we crossing the line of common decency
Precisely the question has to be:" At what point are we crossing the line of
common demency [...]
1. The use of keylogger in a company environment without employees consent
or judicial decree is ilegal and will bring your company in serious problems
2. For that, your forensic "e-Trail" is nothing worth due the fact that the
information you received from the keystroking-logs does not comply with
legal reqirements in order to be accepted as evidence in a trial.
3. The time you afford for a general monitoring of all users keystroke logs
is wasted time and costs your company money
4. There are enough other ways to secure workstations properly
From: listbounce () securityfocus com
[mailto:listbounce () securityfocus com]
On Behalf Of Vandenberg, Robert
Sent: Tuesday, November 27, 2007 11:18 AM
Subject: RE: Securing workstations from IT guys
Those are good points.
I would recommend that you put in a keystroke logger program with the
written approval of your upper management on the PCs in question and
then download the logs each day. That way you are able to create a
forensics "e-Trail" that can be used to confront/counsel/etc. them. I
would also make sure that you look at your documenation and ensure
that each IT person has signed a document stating that they will not
use their abilities improperly. Combine those two and you have a
means of pursuing them legally.
This electronic transmission is intended for the addressee (s) named
above. It contains information that is privileged, confidential, or
otherwise protected from use and disclosure. If you are not the intended
recipient you are hereby notified that any review, disclosure, copy, or
dissemination of this transmission or the taking of any action in reliance
on its contents, or other use is strictly prohibited. If you have received
this transmission in error, please notify the sender that this message was
received in error and then delete this message.
Grupo Ampersand S.A.
IT-Security Consultants & Auditors
Apdo. 924 Escazu 1250
Costa Rica C.A.
Re: FW: Securing workstations from IT guys kurt . kessler (Nov 29)
- Re: RE: Securing workstations from IT guys, (continued)