Who's using your company's computers?
Are they working, or playing games and surfing the Internet?
According to the technology newspaper, ComputerWorld,
However, studies have shown that the OVERWHELMING
With D2 you can supervise your company's computers,
What is D2?
D2 allows for full remote monitoring
Why do I need D2 ?
D2 is a PC and network supervisory software package that allows
Don't you think you should know
What do we mean by "legally?"
In 1992, the United States Department of Justice issued a statement that was reaffirmed in 1997 which stated that systems administrators MAY be subject to criminal and civil liability for using keystroke loggers and other monitoring software without notification. The penalty could be up to five years imprisonment and up to a two hundred and fifty thousand dollar fine
* "absent clear guidance from the courts, we believe it is advisable for system administrators who will be engaged in such monitoring to give notice to those who would be subject to monitoring that, by using the system, they are expressly consenting to such monitoring. Since it is important that unauthorized intruders be given notice, some form of banner notice at the time of signing on to the system is required. Simply providing written notice in advance to only authorized users will not be sufficient to place outside hackers on notice." *
* CERT Advisory CA-92.19
Original Issue Date: December 7, 1992
Even the F.B.I. suggests the use
What does D2 do?
D2 provides a legally compliant supervisory notice at boot-up
D2 logs all keystrokes typed on the installed computer
D2 also allows complete remote access and FTP
Accessing your confidential files?
Leaking proprietary data by E-Mail?
Downloading illegal files or images?
Storing personal info on company PCs?
Committing fraud against the company?
Juggling the company payroll records?
Using E-Mail for "Flames" or "Sexual Harassment?
respondents to an Ernst & Young LLP survey
were almost twice as likely to cite hackers, rather than employees,
as security dangers.
majority of security breaches
come from inside the company...
whether you have a handful of stand-alone PCs in a single office,
or a world-wide intranet... and you can do it from the comfort
of your own PC, anywhere in the world.
of company PCs via the Internet/Intranet.
system administrators and/or computer owners to
LEGALLY monitor computer usage by employees or others.
what others are doing on your computers?
Last Revised: September 19,1997
Read the CERT advisory HERE
of a banner warning if keystroke monitoring is used!
Read the F.B.I. advisory HERE
and periodically reaffirms possible system monitoring.
and transmits them via the Internet/Intranet
to the company software command center
anywhere in the world.
E-Mail: sales@codexdatasystems.com