computer and internet surveillance technologies in the workplace andrew schulman software litigation...

11
Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US

Upload: elinor-pitts

Post on 29-Dec-2015

214 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net

Computer and Internet Surveillance Technologiesin the Workplace

Andrew Schulman

Software litigation consultant

Fellow, Privacy Foundation, US

[email protected]

Page 2: Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net

Demonstration: Keystroke, Window, and URL Logging

WinWhatWhere Investigator

http://www.winwhatwhere.com

Page 3: Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net
Page 4: Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net

Demonstration: Screenshot Capture

Webroot WinGuardian

http://www.webroot.com/

Page 5: Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net

Why Monitor Employees?(MacWorld 1993 survey) Monitor work flow: 29.2% Investigate theft: 29.2% Investigate espionage: 21.5% Review performance: 9.2% Prevent harassment: 6.2% Seek missing data: 3.1% Seek illegal software: 3.1% Prevent personal use: 3.1%

Page 6: Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net

Driving ForcesLow cost, readily availableB2C products looking for B2B market IT desire to regain control

Page 7: Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net

Important Distinctions Filter/block vs. monitor Log everything vs. specific trigger Content/body vs. traffic data/headers Client vs. server Continuous vs. spot/random/response Aggregate vs. individual Monitor work vs. monitor the worker Storage vs. interception

Page 8: Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net

Network-based Monitors eSniff (hardware) SurfControl LittleBrother, CyberPatrol,

SurfWatch, SuperScout TeleMate eSpective, NetSpective Adavi SilentWatch NetPartners WebSense Enterprise Elron WebInspector, MessageInspector MailSweeper, MIMESweeper, WebSweeper,

PornSweeper, SecretSweeper

Page 9: Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net

Client-based MonitorsWinWhatWhere InvestigatorWebroot WinGuardianSpectorSoft Spector, eBlaster

Page 10: Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net

Hybrid (Client/Server) MonitorsTrisys InsightWards Creek Game Warden

Page 11: Computer and Internet Surveillance Technologies in the Workplace Andrew Schulman Software litigation consultant Fellow, Privacy Foundation, US undoc@sonic.net

Future TrendsConvergence (voice mail, fax, copy) “Universal inbox” (attachments)Gadgets, wireless, GPS