Keystrokes and mouse clicks go only so far, you need the program that
captures screen images too. The additional security you mention only permits
access to data, which like auditing is not proof of anything if they are
working
with data pertinent to their job. You need to catch them transferri
Thought I would see if this might be expanded to what do you do if you had
someone in your organization you thought was stealing company priority
information (source code, data, etc)
I would think that if that person were working on a company supplied PC then
the company could install some sort of
2 matches
Mail list logo