{"id":179748,"date":"2021-08-30T02:47:00","date_gmt":"2021-08-30T07:47:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/"},"modified":"2021-08-30T02:47:00","modified_gmt":"2021-08-30T07:47:00","slug":"employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/","title":{"rendered":"Employee Surveillance: Amazon Exploring the Feasibility of Keystroke Tracking Plan"},"content":{"rendered":"

Amazon Exploring the Feasibility of Keystroke Tracking Plan<\/h2>\n

An internal document obtained by Motherboard revealed Amazon\u2019s plan<\/a> to track employee\u2019s keystroke entries. The tech and e-commerce giant plans to curb ever-increasing data leaks using this type of surveillance. Imposters, rogue employees, and hackers routinely compromise customers\u2019 confidential information.<\/p>\n

Amazon is considering deploying advanced keystroke tracking tools. A company known as BehavioSec is working with the e-commerce firm to license specialized tools capable of enhancing system surveillance. The vendor\u2019s software relies on behavioral biometrics to determine the nature of user activity. Behavioral biometrics eliminates the need to depend on static data or personally identifiable information.<\/p>\n

Profiles generated by BehavioSec\u2019s software make it easier to detect suspicious activity. Amazon shortlisted BehavioSec\u2019s product based on privacy considerations. Other tools considered by the firm presented privacy challenges linked to keystroke data collection.<\/p>\n

\"Amazon<\/p>\n

Closing Security Gaps<\/h3>\n

According to the internal document, Amazon detected several breaches that compromised customers\u2019 sensitive data. In one of the incidents, an imposter illegally accessed customer data by posing as a service agent. For this reason, the company is looking to deploy an effective IT security solution to verify users\u2019 identities and monitor device usage.<\/p>\n

The security gaps present a serious threat that could damage customers\u2019 confidence and Amazon\u2019s reputation. Data exfiltration is a major concern for the management team since many employees work from home. Amazon plans to thwart threats that arise under various conditions, including unauthorized access via a device that an employee forgot to lock.<\/p>\n

It aims to eliminate imposter takeover by 2022 since employee and customer data security is a top priority. The company stated that it regularly explores and tests wide-ranging cybersecurity technologies to bolster data protection measures. However, it is mindful of the need to achieve a delicate balance between\u00a0monitoring employee activity<\/a>\u00a0and remaining compliant with privacy laws.<\/p>\n

Managing Employee Activity<\/h3>\n

The internal document also revealed that outsourced workers in the Philippines and India present a higher risk of data exfiltration. Most of the recorded incidents happen in these countries. Hence, Amazon is hoping that BehavioSec\u2019s solution will address the problem.<\/p>\n

In general, companies rely on the employee-manager team to enhance security controls. However, the remote work trend introduced a new dynamic that compromised companies\u2019 basic security controls. When employees work from home, it becomes difficult to detect all unauthorized access to sensitive data.<\/p>\n

Under such circumstances, companies need to find viable solutions to compensate for the reduced controls. Experts believe that keystroke monitoring is a security feature that remote workers should expect to find on company devices in the future. BehavioSec\u2019s profiling mechanism plays an essential role in helping companies detect sophisticated cyber attacks.<\/p>\n

Highly skilled hackers often gain access to corporate systems and remain undetected for lengthy periods. Behavioral profiling detects such intrusions by monitoring anomalous patterns and user behaviors. This approach detects patterns in one or more connected devices. For instance, security software will raise a red flag if a video surveillance camera connects to a suspicious domain.<\/p>\n

In Amazon\u2019s case, behavioral profiling makes it easier to identify compromised devices. Many of the company\u2019s customer service agents work remotely in shared residences. Meanwhile, some agents store their devices on properties with poor physical security.<\/p>\n

Employee Surveillance Key Considerations<\/h3>\n

Federal law allows businesses to monitor their employees\u2019 activities under specific circumstances. Several states also provide regulatory guidelines on the subject. However, transparency is a key component of employee monitoring practices. Failing to inform employees about workplace or digital surveillance may result in legal action.<\/p>\n

In some cases, the law does not compel companies to inform employees about surveillance activities.\u00a0The (ECPA) Electronic Communications Privacy Act of 1986<\/a>\u00a0legalizes surveillance for organizations with a legitimate business reason to monitor employees. As such, employers can view emails composed and sent by employees.<\/p>\n

On the other hand, a different regulatory framework deals with web activity surveillance. It allows companies to track keystrokes and web browsing activity on corporate devices and networks. Employers should use information from the monitoring activities for internal purposes only. Sharing information with third parties is against the law.<\/p>\n

Similarly, the law compels employers to safeguard the collected information to prevent unauthorized access. Employees can initiate legal action against an employer if with sensitive information leaks following a data breach.<\/p>\n

These regulatory requirements necessitate a cautious deployment of keystroke tracking tools and other surveillance software. Thus, Amazon is treading carefully when it comes to the employee monitoring tool it wants to use.<\/p>\n","protected":false},"excerpt":{"rendered":"

Amazon Exploring the Feasibility of Keystroke Tracking Plan An internal document obtained by Motherboard revealed Amazon\u2019s plan to track employee\u2019s keystroke entries. The tech and e-commerce giant plans to curb ever-increasing data leaks using this type of surveillance. Imposters, rogue employees, and hackers routinely compromise customers\u2019 confidential information. Amazon is considering deploying advanced keystroke tracking…<\/p>\n","protected":false},"author":5,"featured_media":159484,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[64],"class_list":["post-179748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-techbytes"],"acf":[],"yoast_head":"\nEmployee Surveillance: Amazon Exploring the Feasibility of Keystroke Tracking Plan - IT Services in Virginia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employee Surveillance: Amazon Exploring the Feasibility of Keystroke Tracking Plan - IT Services in Virginia\" \/>\n<meta property=\"og:description\" content=\"Amazon Exploring the Feasibility of Keystroke Tracking Plan An internal document obtained by Motherboard revealed Amazon\u2019s plan to track employee\u2019s keystroke entries. The tech and e-commerce giant plans to curb ever-increasing data leaks using this type of surveillance. Imposters, rogue employees, and hackers routinely compromise customers\u2019 confidential information. Amazon is considering deploying advanced keystroke tracking…\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Services in Virginia\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-30T07:47:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ntegrait.com\/wp-content\/uploads\/2021\/08\/Amazon-Keylogger.jpg\" \/>\n<meta name=\"author\" content=\"Steve West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/\",\"url\":\"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/\",\"name\":\"Employee Surveillance: Amazon Exploring the Feasibility of Keystroke Tracking Plan - IT Services in Virginia\",\"isPartOf\":{\"@id\":\"https:\/\/www.ntegrait.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2021\/08\/Amazon-Keylogger-1.jpg\",\"datePublished\":\"2021-08-30T07:47:00+00:00\",\"dateModified\":\"2021-08-30T07:47:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/#primaryimage\",\"url\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2021\/08\/Amazon-Keylogger-1.jpg\",\"contentUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2021\/08\/Amazon-Keylogger-1.jpg\",\"width\":724,\"height\":483},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ntegrait.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Employee Surveillance: Amazon Exploring the Feasibility of Keystroke Tracking Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ntegrait.com\/#website\",\"url\":\"https:\/\/www.ntegrait.com\/\",\"name\":\"IT Services in Virginia\",\"description\":\"Ntegra IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ntegrait.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\",\"name\":\"Steve West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"caption\":\"Steve West\"},\"description\":\"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.\",\"url\":\"https:\/\/ntegrait.com\/author\/swestntegrait-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Employee Surveillance: Amazon Exploring the Feasibility of Keystroke Tracking Plan - IT Services in Virginia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/","og_locale":"en_US","og_type":"article","og_title":"Employee Surveillance: Amazon Exploring the Feasibility of Keystroke Tracking Plan - IT Services in Virginia","og_description":"Amazon Exploring the Feasibility of Keystroke Tracking Plan An internal document obtained by Motherboard revealed Amazon\u2019s plan to track employee\u2019s keystroke entries. The tech and e-commerce giant plans to curb ever-increasing data leaks using this type of surveillance. Imposters, rogue employees, and hackers routinely compromise customers\u2019 confidential information. Amazon is considering deploying advanced keystroke tracking…","og_url":"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/","og_site_name":"IT Services in Virginia","article_published_time":"2021-08-30T07:47:00+00:00","og_image":[{"url":"https:\/\/www.ntegrait.com\/wp-content\/uploads\/2021\/08\/Amazon-Keylogger.jpg","type":"","width":"","height":""}],"author":"Steve West","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve West","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/","url":"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/","name":"Employee Surveillance: Amazon Exploring the Feasibility of Keystroke Tracking Plan - IT Services in Virginia","isPartOf":{"@id":"https:\/\/www.ntegrait.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/#primaryimage"},"image":{"@id":"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2021\/08\/Amazon-Keylogger-1.jpg","datePublished":"2021-08-30T07:47:00+00:00","dateModified":"2021-08-30T07:47:00+00:00","author":{"@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79"},"breadcrumb":{"@id":"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/#primaryimage","url":"https:\/\/ntegrait.com\/wp-content\/uploads\/2021\/08\/Amazon-Keylogger-1.jpg","contentUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2021\/08\/Amazon-Keylogger-1.jpg","width":724,"height":483},{"@type":"BreadcrumbList","@id":"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ntegrait.com\/"},{"@type":"ListItem","position":2,"name":"Employee Surveillance: Amazon Exploring the Feasibility of Keystroke Tracking Plan"}]},{"@type":"WebSite","@id":"https:\/\/www.ntegrait.com\/#website","url":"https:\/\/www.ntegrait.com\/","name":"IT Services in Virginia","description":"Ntegra IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ntegrait.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79","name":"Steve West","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","caption":"Steve West"},"description":"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.","url":"https:\/\/ntegrait.com\/author\/swestntegrait-com\/"}]}},"_links":{"self":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/179748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/comments?post=179748"}],"version-history":[{"count":0,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/179748\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media\/159484"}],"wp:attachment":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media?parent=179748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/categories?post=179748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/tags?post=179748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}