Security Basics mailing list archives

RE: Securing workstations from IT guys


From: "Nick Vaernhoej" <nick.vaernhoej () capitalcardservices com>
Date: Wed, 28 Nov 2007 14:43:52 -0600

On the key logger issue, I realize it is within the companies right if
policies are in place.
My person however would likely find it incredibly offensive if a key
logger was installed on my PC because my PC is in a batch of suspected
PC's.
And I can't help wondering if here in a banking environment if the idea
of key loggers were brought up I might question the integrity of the
person bringing it up.

I believe there are better ways, supported by policies, log files,
auditing of access, and separation of duties.
So far it makes me warm and fuzzy to see the majority (so far) leans in
the same direction.

Nick Vaernhoej
"Quidquid latine dictum sit, altum sonatur."


-----Original Message-----
From: Frary, Brock [mailto:Brock.Frary () 53 com]
Sent: Wednesday, November 28, 2007 2:39 PM
To: Petter Bruland; Nick Vaernhoej; security-basics
Subject: RE: Securing workstations from IT guys

Technically no.  Assuming the company has the proper policies in place,
the company can install any kind of software and/monitoring tools they
want.  Moreover most companies use a logon banner that indicate your
activities will be monitored.  Finally the equipment is a "company owned
asset" - meaning they can do anything they want with it...installing key
loggers if they wish.


Brock

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Petter Bruland
Sent: Wednesday, November 28, 2007 1:11 PM
To: Nick Vaernhoej; security-basics
Subject: RE: Securing workstations from IT guys

I think installing key logger software is stepping over the line.
Although it's company assets, isn't there some sort of privacy law that
makes this illegal?

-Petter

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Nick Vaernhoej
Sent: Tuesday, November 27, 2007 4:41 PM
To: security-basics
Subject: RE: Securing workstations from IT guys

A key logger? At what point are we crossing the line of common decency
towards co-workers?
I realize it is company property and all, but if you log access to
sensitive files and audit these logs do you really need to be more
intrusive?

This is not an attack, more a tagged on question to everyone?
Is keystroke logging commonly accepted by you?

Nick Vaernhoej
"Quidquid latine dictum sit, altum sonatur."


-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Vandenberg, Robert
Sent: Tuesday, November 27, 2007 11:18 AM
To: security-basics
Subject: RE: Securing workstations from IT guys


Those are good points.

I would recommend that you put in a keystroke logger program with the
written approval of your upper management on the PCs in question and
then download the logs each day.  That way you are able to create a
forensics "e-Trail" that can be used to confront/counsel/etc. them.  I
would also make sure that you look at your documenation and ensure that
each IT person has signed a document stating that they will not use
their abilities improperly.  Combine those two and you have a means of
pursuing them legally.


This electronic transmission is intended for the addressee (s) named
above. It contains information that is privileged, confidential, or
otherwise protected from use and disclosure. If you are not the intended
recipient you are hereby notified that any review, disclosure, copy, or
dissemination of this transmission or the taking of any action in
reliance on its contents, or other use is strictly prohibited. If you
have received this transmission in error, please notify the sender that
this message was received in error and then delete this message.
Thank you.

This e-mail transmission contains information that is confidential and
may be privileged.   It is intended only for the addressee(s) named
above. If you receive this e-mail in error, please do not read, copy or
disseminate it in any manner. If you are not the intended recipient, any
disclosure, copying, distribution or use of the contents of this
information is prohibited. Please reply to the message immediately by
informing the sender that the message was misdirected. After replying,
please erase it from your computer system. Your assistance in correcting
this error is appreciated.

This electronic transmission is intended for the addressee (s) named above. It contains information that is privileged, 
confidential, or otherwise protected from use and disclosure. If you are not the intended recipient you are hereby 
notified that any review, disclosure, copy, or dissemination of this transmission or the taking of any action in 
reliance on its contents, or other use is strictly prohibited. If you have received this transmission in error, please 
notify the sender that this message was received in error and then delete this message.
Thank you.


Current thread: