Download presentation
Presentation is loading. Please wait.
Published byLilian Miranda Smith Modified over 9 years ago
1
Keyloggers At Work Jason Clark
2
History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key loggers came before hardware key logging devices 2
3
Types of key loggers 2 types of key loggers Software Hardware 3
4
Software do not require physical access to the user’s computer. can be manually downloaded or secretly downloaded as spyware will upload the logged data to a remote drive or email 4
5
Hardware connects between the user’s keyboard and monitor easy to hide data is stored on a mini hard drive located within the device 5
6
Why are they being used? Web browsing Social networking, such as FaceBook, Twitter On-line entertainment, such as gaming, YouTube, blogs Private E-mail correspondence Instant messaging Skype File sharing over P2P networks 6
7
The problem… There is potential for invasion of privacy! Gain access to any personal emails See web searches See instant messages 7
8
Is it legal? Short answer, yes.. There is currently no federal law that has been interpreted to prohibit their surreptitious use. 8
9
Electronic Communications Privacy Act The ECPA could potentially prevent keystroke theft, but thus far the protections it offers have not been extended to keyloggers. 9
10
For example… Rene v. G.F. Fishers, Inc 10
11
So is it ethical? …not really! 11
12
Conclusion Although using key loggers at a place of employment works and is legal, there are more ethical ways to ensure productivity without the risk of invading someone’s privacy. 12
13
Resources http://www.securelist.com/en/analysis?pubid=204791931 http://searchmidmarketsecurity.techtarget.com/definition/keylogger http://www.fortunemanning.co.nz/Publications/Employment+Law/Privacy+Iss ues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Perso nal+Information.htmlhttp://www.fortunemanning.co.nz/Publications/Employment+Law/Privacy+Iss ues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Perso nal+Information.html http://usatoday30.usatoday.com/money/workplace/2010-03-17- workplaceprivacy15_CV_N.htmhttp://usatoday30.usatoday.com/money/workplace/2010-03-17- workplaceprivacy15_CV_N.htm http://www.parxy.com/history-keyloggers.html http://jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act- regulation-of-keyloggers-in-the-workplacehttp://jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act- regulation-of-keyloggers-in-the-workplace http://www.ehow.com/list_7252161_problems-keyloggers.html http://news.cnet.com/8301-13578_3-10099123-38.html 13
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.