The Supreme Court case stems from the U.S. Court of Appeals for the 9th Circuit case, Quon v. Arch Wireless Operating Co. Sgt. Jeff Quon, a member of the Ontario, Calif., police department’s SWAT team shows that it is not enough to have a policy in some countries, management also needs to clearly and consistently and publically communicate it and to take action when aware of each case of non compliance .
Meanwhile the need for such policies can be seen in these comments from companies that use Spectorsoft for montioring their system use and user compliance.
“Spector 360 showed us that USB drives were used, who used them, plus the actual USB drives used, including the device ID. That was fantastic … we were able to verify the actual device. The students handed over the USB drives, Russell Moore, Plainfield Community School District
• “One of the most alarming things we saw with Spector 360 was that someone had moved 9,000 files. This really stood out to us … the volume of activity just seemed too high. Other users showed perhaps 100 to 200 documents transferred. We definitely were concerned about loss of sensitive data. As it turned out, the activity was proactive … the user was actually transferring one network to another. He had downloaded 4,500 files from one network, and then uploaded that information to another network he was working on. It WAS a work issue, and thanks to Spector 360 we were able to determine that … we were able to determine what was real.”
— Franklin Arosemena, INCA
• “I discovered one of our engineers was doing work for the competition. Using Spector and looking over its reports, proprietary data – another company’s product information – came across my PC. MY COMPETITION was forwarding confidential data regarding its product line … it was almost embarrassing.” — Jane Terry, Ajax Boiler
• “One employee was getting ready to leave and was transferring files via email. This was important data, like the customer list. We caught her dead. It’s against the law. It’s company property, not the employee’s.” — Chuck Benedon, Ashton Financial
• In one case, a high level employee at a BoldFont customer gave notice … nothing very dramatic on the face of it. Shortly after learning of the individual’s decision to leave, however, management became suspicious. “It was suspected he was planning to take customers to a competitor. SpectorSoft’s software allowed us to intercept the drafting of word documents and emails that revealed his intentions with a competing firm. With this information, the company was able to take steps to perform damage control, and no customers were lost.” — Alex Hansen, BoldFont Communications
• A BoldFont customer used SpectorSoft monitoring technology to keep an employee from dropping a bomb … almost literally. The company in this case is a Defense contractor involved in work surrounding a well-known high-tech Air Force aircraft. Hansen relates: “There was confidential information stolen related to the Stealth Bomber program. It was not treason, but another firm was trying to take the contract.” Thanks to SpectorSoft monitoring technology – also known for its unrivaled stealth – the plot was uncovered before those involved had a chance to pull it off. — Alex Hansen, BoldFont Communications
• “We had one instance in which an individual was connecting to a former employer’s server, and moving information back and forth. The other company just happens to be our competition.” — Keith Becker, Illinois Wholesale Cash Register
• “Not everyone will need to review all the data Spector 360 provides. But it is a good comfort to know that if something goes over the edge – like theft or leaking of proprietary information – we have what we need to watch it and deal with it. If there’s ever any question … that’s where SpectorSoft shines for me.” — Eugene O’Neal, Carlile Transportation Systems