Home page logo

basics logo Security Basics mailing list archives

RE: FW: Securing workstations from IT guys
From: "Craig Wright" <Craig.Wright () bdo com au>
Date: Fri, 30 Nov 2007 08:46:46 +1100

Only in Federal Government, A federal university and selected other
cases is this illegal in most states in the US (see at will employment

Many firms/companies can not do this due to Union rules (but this is not
a legal issue).


Craig Wright
Manager of Information Systems

Direct : +61 2 9286 5497
Craig.Wright () bdo com au
+61 417 683 914

BDO Kendalls (NSW)
Level 19, 2 Market Street Sydney NSW 2000
GPO BOX 2551 Sydney NSW 2001
Fax +61 2 9993 9497

Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within 
those States and Territories of Australia where such legislation exists.

The information in this email and any attachments is confidential.  If you are not the named addressee you must not 
read, print, copy, distribute, or use in any way this transmission or any information it contains.  If you have 
received this message in error, please notify the sender by return email, destroy all copies and delete it from your 

Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls.  
You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or 
Director of BDO Kendalls.  It is your responsibility to scan this communication and any files attached for computer 
viruses and other defects.  BDO Kendalls does not accept liability for any loss or damage however caused which may 
result from this communication or any files attached.  A full version of the BDO Kendalls disclaimer, and our Privacy 
statement, can be found on the BDO Kendalls website at http://www.bdo.com.au or by emailing administrator () bdo com au 

BDO Kendalls is a national association of separate partnerships and entities.

-----Original Message-----

From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Eric White
Sent: Friday, 30 November 2007 3:27 AM
To: 'Jan Heisterkamp'; 'Nick Vaernhoej'
Cc: 'security-basics'
Subject: RE: FW: Securing workstations from IT guys

I'm not sure this this illegal in the U.S.  I believe the company owns
assets (PC, network, phones, servers, etc), and can monitor them as they
fit.  You can argue the ethics of such a thing, but I don't see how it's

If an employer states something along the lines of "all company property
for authorized use only and all use of property may be monitored and
and I agree to this policy (either by signing paperwork when I'm hired
or by
clicking through this message when I login), I shouldn't be surprised
my actions are in fact monitored, should I?  

Eric White                           

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
Behalf Of Jan Heisterkamp
Sent: Thursday, November 29, 2007 7:19 AM
To: Nick Vaernhoej
Cc: security-basics
Subject: Re: FW: Securing workstations from IT guys

Nick Vaernhoej schrieb:

A key logger? At what point are we crossing the line of common decency


Precisely the question has to be:" At what point are we crossing the
line of
common demency [...]

1. The use of keylogger in a company environment without employees
or judicial decree is ilegal and will bring your company in serious

2. For that, your forensic "e-Trail" is nothing worth due the fact that
information you received from the keystroking-logs does not comply with
legal reqirements in order to be accepted as evidence in a trial.

3. The time you afford for a general monitoring of all users keystroke
is wasted time and costs your company money

4. There are enough other ways to secure workstations properly


-----Original Message-----
From: listbounce () securityfocus com 
[mailto:listbounce () securityfocus com]
On Behalf Of Vandenberg, Robert
Sent: Tuesday, November 27, 2007 11:18 AM
To: security-basics
Subject: RE: Securing workstations from IT guys

Those are good points.

I would recommend that you put in a keystroke logger program with the 
written approval of your upper management on the PCs in question and 
then download the logs each day.  That way you are able to create a 
forensics "e-Trail" that can be used to confront/counsel/etc. them.  I

would also make sure that you look at your documenation and ensure 
that each IT person has signed a document stating that they will not 
use their abilities improperly.  Combine those two and you have a 
means of pursuing them legally.

This electronic transmission is intended for the addressee (s) named
above. It contains information that is privileged, confidential, or
otherwise protected from use and disclosure. If you are not the intended
recipient you are hereby notified that any review, disclosure, copy, or
dissemination of this transmission or the taking of any action in
on its contents, or other use is strictly prohibited. If you have
this transmission in error, please notify the sender that this message
received in error and then delete this message.
Thank you.

Grupo Ampersand S.A.
IT-Security Consultants & Auditors
Apdo. 924  Escazu 1250
Costa Rica C.A.
Phone: (506)588-0432
ceo_at_ampersanded.com  [corp.]
janheisterkamp_at_web.de [priv.]

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]