Re: Untrusted Access (Was how to log IND$FILE)

2008-04-20 Thread Kenneth E Tomiak
Keystrokes and mouse clicks go only so far, you need the program that captures screen images too. The additional security you mention only permits access to data, which like auditing is not proof of anything if they are working with data pertinent to their job. You need to catch them transferri

Untrusted Access (Was how to log IND$FILE)

2008-04-18 Thread Lizette Koehler
Thought I would see if this might be expanded to what do you do if you had someone in your organization you thought was stealing company priority information (source code, data, etc) I would think that if that person were working on a company supplied PC then the company could install some sort of