Presentation is loading. Please wait.

Presentation is loading. Please wait.

Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.

Similar presentations


Presentation on theme: "Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key."— Presentation transcript:

1 Keyloggers At Work Jason Clark

2 History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key loggers came before hardware key logging devices 2

3 Types of key loggers 2 types of key loggers Software Hardware 3

4 Software do not require physical access to the user’s computer. can be manually downloaded or secretly downloaded as spyware will upload the logged data to a remote drive or email 4

5 Hardware connects between the user’s keyboard and monitor easy to hide data is stored on a mini hard drive located within the device 5

6 Why are they being used? Web browsing Social networking, such as FaceBook, Twitter On-line entertainment, such as gaming, YouTube, blogs Private E-mail correspondence Instant messaging Skype File sharing over P2P networks 6

7 The problem… There is potential for invasion of privacy! Gain access to any personal emails See web searches See instant messages 7

8 Is it legal? Short answer, yes.. There is currently no federal law that has been interpreted to prohibit their surreptitious use. 8

9 Electronic Communications Privacy Act The ECPA could potentially prevent keystroke theft, but thus far the protections it offers have not been extended to keyloggers. 9

10 For example… Rene v. G.F. Fishers, Inc 10

11 So is it ethical? …not really! 11

12 Conclusion Although using key loggers at a place of employment works and is legal, there are more ethical ways to ensure productivity without the risk of invading someone’s privacy. 12

13 Resources http://www.securelist.com/en/analysis?pubid=204791931 http://searchmidmarketsecurity.techtarget.com/definition/keylogger http://www.fortunemanning.co.nz/Publications/Employment+Law/Privacy+Iss ues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Perso nal+Information.htmlhttp://www.fortunemanning.co.nz/Publications/Employment+Law/Privacy+Iss ues+Employer+Using+Keystroke+Monitoring+To+Collect+Employees+Perso nal+Information.html http://usatoday30.usatoday.com/money/workplace/2010-03-17- workplaceprivacy15_CV_N.htmhttp://usatoday30.usatoday.com/money/workplace/2010-03-17- workplaceprivacy15_CV_N.htm http://www.parxy.com/history-keyloggers.html http://jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act- regulation-of-keyloggers-in-the-workplacehttp://jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act- regulation-of-keyloggers-in-the-workplace http://www.ehow.com/list_7252161_problems-keyloggers.html http://news.cnet.com/8301-13578_3-10099123-38.html 13


Download ppt "Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key."

Similar presentations


Ads by Google