{"id":5975,"date":"2014-03-17T14:35:18","date_gmt":"2014-03-17T07:35:18","guid":{"rendered":"http:\/\/blog.flexispy.com\/?p=5975"},"modified":"2016-11-09T10:35:44","modified_gmt":"2016-11-09T03:35:44","slug":"keyloggers-in-the-workplace","status":"publish","type":"post","link":"https:\/\/blog.flexispy.com\/ko\/keyloggers-in-the-workplace\/","title":{"rendered":"Keyloggers In The Workplace &#8211; Is It Legal And Should it be Mandatory?"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4587\" src=\"https:\/\/i0.wp.com\/blog.flexispy.com\/wp-content\/uploads\/2014\/03\/BannerSpy.jpg?resize=683%2C390&#038;ssl=1\" alt=\"Keyloggers in the workplace\" width=\"683\" height=\"390\" \/><\/p>\n<p>The use of Keyloggers by employers is becoming commonplace. As an employer, you should be asking, what is a Keylogger? Is it legal to monitor my workforce, and, should I be monitoring my employees?<\/p>\n<p>A Keylogger is a computer program designed to record every action on a personal computer. This not only includes every keystroke, but also every website visited, every email read or sent, every password entered, and any applications or programs run on the PC.<\/p>\n<p>In examining U.S. law in this area, it has been noted that there is no federal statutory framework which covers the use of Keyloggers by employers. The <a href=\"http:\/\/www.law.cornell.edu\/uscode\/text\/18\/part-I\/chapter-119\"><span style=\"text-decoration: underline;\">Electronic Communication Privacy Act<\/span><\/a> (ECPA), the <span style=\"text-decoration: underline;\"><a href=\"https:\/\/it.ojp.gov\/privacyliberty\/authorities\/statutes\/1285\">Federal Wiretap Act<\/a><\/span> (FWA) and the <span style=\"text-decoration: underline;\"><a href=\"http:\/\/www.law.cornell.edu\/uscode\/text\/18\/part-I\/chapter-121\">Stored Communication Act<\/a><\/span> (SCA), all of which could reach Keylogger activity, have never been extended to protect computer privacy in the workplace, or even in the home.<\/p>\n<p>So, while judicial interpretation of the ECPA has broadened its scope, it still does not reach Keylogger technology. As a result of that legislative gap, state courts have searched their own legislative schemes in an attempt to protect the privacy of computer operators.<\/p>\n<p>For instance, a federal court in Indiana heard a case in which a woman was authorized by her employer to access her personal checking and email accounts from her work computer. The employer failed to notify her that they had installed Keylogger software on her work computer. <a href=\"http:\/\/scholar.google.com\/scholar_case?case=13148712280933713558&amp;q=Rene+G+F+Fishers&amp;hl=en&amp;as_sdt=2003\">Rene v. G.F. Fishers, Inc., 817 F.Supp.2d 1090 (S. Ind. 2011)<\/a><\/p>\n<p>The employer used the password discovered through the Keylogger software, and reviewed both her personal email and checking account history. There were several emails between company management, discussing the contents of those histories.<\/p>\n<p>Importantly for employers, the federal court ruled that the FWA was inapplicable, because the keystrokes recorded by the Keylogger software remained on the PC, and were never transmitted through interstate commerce.<\/p>\n<p>The court, however, went on to review whether the employer\u2019s conduct violated the state of Indiana\u2019s wiretap act. The court noted that the Indiana statute does not include the requirement that the communication be intercepted through interstate commerce, and, therefore, held that the state wiretap law was applicable to Rene\u2019s claim.<\/p>\n<p>Additionally, the federal court ruled that the Stored Communications Act, was also applicable to Rene\u2019s claim. The Keylogger information itself, which included passwords, opened emails and viewed webpages, did not infringe on the Act.\u00a0 However, the employer\u2019s conduct in using the passwords to review Rene\u2019s histories (stored communications) would be covered by the SCA.<\/p>\n<p>Other states have held that the use of a Keylogger violates state privacy laws. In a New Hampshire decision, a court held that obtaining a password through use of a Keylogger, and then using the password to access the computer user\u2019s email history does violate the state\u2019s wiretap act. In <a href=\"http:\/\/www.courts.state.nh.us\/superior\/orders\/walters.pdf\"><span style=\"text-decoration: underline;\">State of New Hampshire v. Walters<\/span><\/a>, the court excluded any evidence related to emails which were uncovered by the former housemate of the defendant, because the emails were obtained in violation of the wiretap act which protects privacy from illegal interception of wire communications.<\/p>\n<p>The WPA is a criminal wiretapping law, so it is no surprise that the use of a Keylogger by an employer can be prosecuted. In <span style=\"text-decoration: underline;\">Ropp v. United States<\/span>, 347 F.Supp.2d 831 (CD Cal. 2004), a California federal court considered whether an employer\u2019s use of a Keylogger could violate the criminal provisions of the WPA.<\/p>\n<p>Ropp, worked as a manager for an insurance company and installed a Keylogger on the computer of one of his subordinates. The court began its inquiry by noting that the WPA affords greater privacy protection to wire and oral communications as opposed to electronic communications.<\/p>\n<p>The federal court dismissed the indictment against Ropp, finding the Keylogger only intercepted internal communications between the keyboard and the CPU, as opposed to the signal being intercepted on transmission to the company\u2019s network, which was attached to interstate commerce.<\/p>\n<p>The <span style=\"text-decoration: underline;\">Ropp<\/span> decision, however, did not put the issue to rest in California. In <a href=\"http:\/\/hr.cch.com\/cases\/Brahmana.pdf\"><span style=\"text-decoration: underline;\">Brahmana v. Lembo<\/span><\/a>(N.D. Cal. 2011), the federal court questioned Ropp\u2019s restrictive interpretation of the definition of electronic communications found in the WPA.<\/p>\n<p>Brahmana was a sales manager for a VOIP company located in Silicon Valley. Brahmana discovered that emails he had sent on his work computer had been read by the company president through a Keylogger which was installed on Brahmana\u2019s computer. In light of the fact that the keystrokes had been read over the company\u2019s network, the court concluded that there were sufficient facts to allow the case to proceed through discovery as the network might have affected interstate commerce.<\/p>\n<p>We started this discussion by asking what a Keylogger is. The Keylogger in R<span style=\"text-decoration: underline;\">opp<\/span> was actually a machine which recorded the keystrokes of a PC\u2019s keyboard as they were traveling from the keyboard to the PC. In <span style=\"text-decoration: underline;\">Brahmana<\/span>, the Keylogger was a network analyzer, which records all the activity of a PC through a network connection to a server.\u00a0 The advancement of Keylogger technology probably puts it squarely within the prohibitions of the ECPA and WPA.<\/p>\n<p>The second question was whether the use of a Keylogger by an employer is illegal. Here\u2019s a list of points to ensure that the employer\u2019s use of a Keylogger stays within both state and federal law:<\/p>\n<ul>\n<li>As the workplace PC is the employer\u2019s property, the employer may install a Keylogger on an employee\u2019s PC without concern for trespass.<\/li>\n<li>Use of a networked Keylogger probably violates federal and state privacy and wiretap laws and requires the consent of the monitored employee. An employer should disseminate a policy stating that all employee work stations are monitored and have the employee acknowledge receipt of that policy. This will satisfy the consent requirement to take the monitoring outside of the wiretap laws.<\/li>\n<li>An employer should not allow anyone access to passwords for an employee\u2019s private accounts which are recovered through use of the Keylogger. Under no circumstances should an employer use the passwords to browse the employee\u2019s private account history. To do so risks a serious civil damage recovery under the Stored Communications Act.<\/li>\n<\/ul>\n<p>This takes us to the last question, should you, as an employer, be monitoring your employees through use of a Keylogger.<\/p>\n<p>This question is answered with a resounding, \u201cYES\u201d.<\/p>\n<p>In the risk management arena, there are too many potential liabilities carried by providing employees with unlimited network and internet access. These liabilities include:<\/p>\n<p>\u2022\u00a0\u00a0 Damage to Business \u2013 making sure communications with persons outside your company are correct, polite and consistent with your business goals<\/p>\n<p>\u2022\u00a0\u00a0 Risk Management \u2013 monitoring for potentially abusive behavior, such as sexual harassment, bullying or racial hate speech<\/p>\n<p>\u2022\u00a0\u00a0 Trade Secret or Data Theft \u2013 keeping watch for the loss of important\u00a0 company secrets and data<\/p>\n<p>\u2022\u00a0\u00a0 Illegal Behavior \u2013 such as workplace theft, embezzlement and drug abuse<\/p>\n<p>\u2022\u00a0\u00a0 Productivity \u2013 the internet and computers can be time-wasters.\u00a0 Even if you block Facebook, there are other time-wasting websites, games and other forms of entertainment which can seriously impact on productivity.<\/p>\n<p>\u2022\u00a0\u00a0 Loyalty \u2013 is one of your key staff members loyal, or plotting to knife you in the back?<\/p>\n<p>In light of these liabilities, it almost seems like use of Keyloggers in the workplace by should be mandatory. Just make sure to keep within the law, by publicizing and receiving acknowledgement of your monitoring policy, keeping the persons with access to the Keylogger data to an absolute minimum, and never using any private passwords obtained from the <a title=\"Project BlueBlood\" href=\"\/?p=5737\">Keylogger<\/a> to access the employee\u2019s private accounts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The use of Keyloggers by employers is becoming commonplace. As an employer, you should be asking, what is a Keylogger? Is it legal to monitor my workforce, and, should I be monitoring my employees? A Keylogger is a computer program designed to record every action on a personal computer. This not only includes every keystroke, [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[131],"tags":[],"class_list":["post-5975","post","type-post","status-publish","format-standard","hentry","category-the-lawyers-view"],"_links":{"self":[{"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/posts\/5975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/comments?post=5975"}],"version-history":[{"count":1,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/posts\/5975\/revisions"}],"predecessor-version":[{"id":14608,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/posts\/5975\/revisions\/14608"}],"wp:attachment":[{"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/media?parent=5975"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/categories?post=5975"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.flexispy.com\/ko\/wp-json\/wp\/v2\/tags?post=5975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}