110 likes | 280 Views
Computer and Internet Surveillance Technologies in the Workplace. Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net. Demonstration: Keystroke, Window, and URL Logging. WinWhatWhere Investigator http://www.winwhatwhere.com.
E N D
Computer and Internet Surveillance Technologiesin the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net
Demonstration: Keystroke, Window, and URL Logging WinWhatWhere Investigator http://www.winwhatwhere.com
Demonstration: Screenshot Capture Webroot WinGuardian http://www.webroot.com/
Why Monitor Employees? (MacWorld 1993 survey) • Monitor work flow: 29.2% • Investigate theft: 29.2% • Investigate espionage: 21.5% • Review performance: 9.2% • Prevent harassment: 6.2% • Seek missing data: 3.1% • Seek illegal software: 3.1% • Prevent personal use: 3.1%
Driving Forces • Low cost, readily available • B2C products looking for B2B market • IT desire to regain control
Important Distinctions • Filter/block vs. monitor • Log everything vs. specific trigger • Content/body vs. traffic data/headers • Client vs. server • Continuous vs. spot/random/response • Aggregate vs. individual • Monitor work vs. monitor the worker • Storage vs. interception
Network-based Monitors • eSniff (hardware) • SurfControl LittleBrother, CyberPatrol, SurfWatch, SuperScout • TeleMate eSpective, NetSpective • Adavi SilentWatch • NetPartners WebSense Enterprise • Elron WebInspector, MessageInspector • MailSweeper, MIMESweeper, WebSweeper, PornSweeper, SecretSweeper
Client-based Monitors • WinWhatWhere Investigator • Webroot WinGuardian • SpectorSoft Spector, eBlaster
Hybrid (Client/Server) Monitors • Trisys Insight • Wards Creek Game Warden
Future Trends • Convergence (voice mail, fax, copy) • “Universal inbox” (attachments) • Gadgets, wireless, GPS