riptides
Super Member
Information Systems security is a pretty broad area of coverage. I find that "administrators" are usually clued into product sets that "monitor" web based access.
The real issue here is undeniable proof, "non-repudiation" that YOU, were in FACT logged into your computer at a PROVEN point in time, and that YOU, were pressing keys or clicking the mouse, going to some "unclean" web-site.
It opens up a major can of worms, by saying prove it was me on my computer.
-Mike Z. /forums/images/graemlins/grin.gif
The real issue here is undeniable proof, "non-repudiation" that YOU, were in FACT logged into your computer at a PROVEN point in time, and that YOU, were pressing keys or clicking the mouse, going to some "unclean" web-site.
It opens up a major can of worms, by saying prove it was me on my computer.
-Mike Z. /forums/images/graemlins/grin.gif