Originally Posted By: Glock-A-Roo
1) how do you get around the keyloggers that are on your work computers? Most larger companies log all computer input, not just web history. Makes things much easier on the HR department for both personnel and corporate espionage issues.


This is actually harder to do than you might think. Logging all Internet access is pretty easy (it isn't cheap to do it well, but it isn't hard). Logging all access to files is tougher but do-able. Logging all network access is hard. Logging keystrokes sounds easy to do but you need to deliberately neuter or compromise your workstation security software to do it, as well as spend a lot of time and effort reviewing the logs. Almost none of my customers have attempted to do this. This is very rare outside of high-security government facilities.

Logging Internet access from company networks and workstations is generally legal, but make sure you have a written policy in place to support it. Logging email is a federal felony without a written policy and some evidence that the end-user was aware of the policy. Logging keystrokes is a dicey area of law; you'd most likely end up with civil liability and criminal liability is a real possibility. Consult an attorney first.

Quote:
2) don't Google and Apple store all their customers' smartphone data on company servers? Don't they claim access to everything that goes thru your phone?


They log usage information but do not (as far as I know) log keystrokes/button pushes or log the activities of third party apps.