Worried about
unauthorized
use of your
computer system?


D2 TM PC & Network
Supervisory Software

Who's using your company's computers?

Are they working, or playing games and surfing the Internet?
Accessing your confidential files?
Leaking proprietary data by E-Mail?
Downloading illegal files or images?
Storing personal info on company PCs?
Committing fraud against the company?
Juggling the company payroll records?
Using E-Mail for "Flames" or "Sexual Harassment?

According to the technology newspaper, ComputerWorld,
respondents to an Ernst & Young LLP survey
were almost twice as likely to cite hackers, rather than employees,
as security dangers.

However, studies have shown that the OVERWHELMING
majority of security breaches
come from inside the company...

With D2 you can supervise your company's computers,
whether you have a handful of stand-alone PCs in a single office,
or a world-wide intranet... and you can do it from the comfort
of your own PC, anywhere in the world.

What is D2?

D2 allows for full remote monitoring
of company PCs via the Internet/Intranet.

Why do I need D2 ?

D2 is a PC and network supervisory software package that allows
system administrators and/or computer owners to
LEGALLY monitor computer usage by employees or others.

Don't you think you should know
what others are doing on your computers?

What do we mean by "legally?"

In 1992, the United States Department of Justice issued a statement that was reaffirmed in 1997 which stated that systems administrators MAY be subject to criminal and civil liability for using keystroke loggers and other monitoring software without notification. The penalty could be up to five years imprisonment and up to a two hundred and fifty thousand dollar fine…

* "absent clear guidance from the courts, we believe it is advisable for system administrators who will be engaged in such monitoring to give notice to those who would be subject to monitoring that, by using the system, they are expressly consenting to such monitoring. Since it is important that unauthorized intruders be given notice, some form of banner notice at the time of signing on to the system is required. Simply providing written notice in advance to only authorized users will not be sufficient to place outside hackers on notice." *

* CERT Advisory CA-92.19

Original Issue Date: December 7, 1992
Last Revised: September 19,1997
Read the CERT advisory HERE

Even the F.B.I. suggests the use
of a banner warning if keystroke monitoring is used!
Read the F.B.I. advisory HERE

What does D2™ do?

D2™ provides a legally compliant supervisory notice at boot-up
and periodically reaffirms possible system monitoring.

D2™ logs all keystrokes typed on the installed computer
and transmits them via the Internet/Intranet
to the company software command center
anywhere in the world.

D2™ also allows complete remote access and FTP


To order D2TM worldwide click HERE


Codex Data Systems, Inc.
167 Route 304
Bardonia, New York 10954 USA
Tel: 914-627-0011
Fax: 914-627-0211

E-Mail: sales@codexdatasystems.com

Back to Home Page

© Copyright 1998-1999 CodexDataSystems, Inc All Rights Reserved