Autor: FlexiSPY

  • Accessing Your Employee’s Personal Accounts – A Survey of US Law

    Accessing Your Employee’s Personal Accounts – A Survey of US Law

    Every employer understands that there is sometimes a need to do some investigative work. You might be checking out a new hire, or be suspicious of one of your employees who is entrusted with confidential or sensitive information.

    Employers should be monitoring the use of company computers and company phones by their staff. In the course of monitoring, an employer might obtain an employee’s login details or password for personal accounts – Facebook, email, bank accounts.

    What is the law if the employer logs in to the employee’s account? Is it illegal? Can the employee sue the employer?

    This is a relatively new area of privacy law in the US, and it touches both on federal and state regulatory schemes.

    On the federal level, the Stored Communications Act, 18 U.S.C.§2701, was enacted as part of the Electronic Communications Privacy Act.  It protects electronic communications that are kept online.  Recognizing that the reasonable expectation   of privacy of these records and the interpretations of the 4th amendment’s prohibition against unreasonable search and seizure which offer protection for physical locations, Congress established stiff criminal penalties for unlawful access or changes to these online records.

    This law famously came into play in a case of internet snooping, dubbed “WebcamGate”.  The case arose when a school district issued laptops to students which gave the school control over the laptops’ webcam.  The school district administrators did activate the webcams without knowledge of the students or their parents.

    A class action lawsuit ensued, which was eventually settled with the school district.  In that action, a claim was made under the SCA for civil damages for unauthorized access of the records which would be maintained on the laptops, namely the photo files. The case was quickly settled, so the Court never ruled on the SCA claim.

    Subsequently, another federal court did find that the unauthorized accessing an employee’s personal accounts through use of a password captured from a keylogger was a violation of the SCA.  In Rene v. G.F. Fishers, Inc., 817 F.Supp.2d 1090 (S. Ind. 2011), a woman was authorized by her employer to access her personal checking and email accounts from her work computer.

    The employer failed to notify her that keylogger software was installed on her work computer.  Her passwords were discovered through keylogger software.  Her employer reviewed both her personal email and checking account history using the captured passwords.

    There were several emails by and between company management, discussing the contents of her personal account histories.  The court reviewed whether the employer’s conduct violated the Stored Communications Act.

    The keylogger information itself, which included passwords, opened emails and viewed webpages, did not infringe on the Act.  However, the employer’s conduct in using the passwords to review Rene’s histories (stored communications) would be covered by the SCA.

    With respect to social media networking sites, the SCA first came into play in Pietrylo v. Hillstone Restaurant Group (NJ, 2009).  Pietrylo and another employee started a private, invitation-only, password protected MySpace group in which they voiced their complaint about the company’s management and customers.

    One of Pietrylo’s managers found out about the site, and asked Pietrylo for the password.  Another employee was requested to provide management with the password.  Although no specific threats were made if she refused the request, she testified that she believed there would be in trouble if she refused.  Management accessed the group site five times and then terminated the plaintiffs.

    The jury found that the MySpace group was a facility that stored electronic communications as defined by the SCA. The jury further found that the restaurant managers violated the SCA as they did not have authorization to access the group webpage.  The court awarded the plaintiff’s back-pay, punitive damages 4 times the amount of back-pay damages, and attorney’s fees.

    Finally, of importance to our customers, is retrieving data from dual-use devices. The line between personal and business use of mobile device is increasingly becoming blurry.  As more and more employees carry cell phones and tablets that are used both for personal and business purposes, the likelihood that an employer would access the employee’s personal accounts is dramatically increasing, and, with that, exposure to liability for the employer.

    Lazetta v. Kulmatycki (N.D. Ohio 2013) arose out of the accessing of an employee’s personal email account from a company-issued phone. Verizon issued a blackberry to its employee, Lazetta, who set up a personal Gmail account on the phone with Verizon’s permission.

    When Lazetta ended her employment, she returned the blackberry to her supervisor, but forgot to delete the gmail account.  She was advised by her supervisor that the phone would be recycled and given to another employee. Instead, her supervisor read over 48,000 of Lazetta’s personal emails over an 18-month period.

    The court ruled that both the supervisor and Verizon could be liable for the SCA violation. To defeat a summary judgment motion, it was enough to show that the personal account contained private information and that the personal account was accessed through the unauthorized use of a password.  Moreover, the court ruled that the employer, Verizon, would be held vicariously liable if the supervisor were found liable.

    Even if an employee were to give a personal account password to an employer, the account may only be accessed for the limited purpose of the authorization.  Exceeding the authorization invokes liability under the SCA.

    In Cheng v. Romo (D.C. Mass 2012), the court also ruled that a motion for summary judgment was defeated, where an employee pled sufficient facts to show that the scope of password authorization had been exceeded by the employer’s access to the plaintiff’s personal email history.

    Cheng and Romo were radiologists working for the same company.  Cheng gave Romo her personal email account password, so that Romo could receive radiology consultations as the employer did not have a company email account.  Both employees ended up in litigation with the employer after their terminations.

    Claiming that she wanted to investigate various disciplinary actions, Romo used her son’s computer to access Cheng’s email account, and printed 10 of those emails, some of which contained personal content.  The Court held that an employer can be liable under the SCA for exceeding the scope of authorization for use of a password for an account, even if the account is used for mixed purpose (personal and business), where personal information is accessed.

  • Eavesdropping in the UK – Is it Legal to Spy on Calls?

    Eavesdropping in the UK – Is it Legal to Spy on Calls?

    In the United Kingdom, spying on phone calls has come to the forefront of the privacy debate. First, there was RupertGate or MurdochGate in which reporters from News of the World were criminally prosecuted and brought before Parliament and numerous governmental bodies for their phone hacking.

    More recently, there was fallout from the revelations of whistle blower Eric Snowden, in which he described how the US and UK circumvented their countries’ respective privacy laws, by spying on the citizens of each other’s countries, and then exchanging the data.

    To this charge, Foreign Secretary William Hague said “Intelligence gathering in this country, by the UK, is governed by a very strong legal framework so that we get the balance right between the liberties and privacy of people and the security of the country.”

    Interception of communications, commonly referred to as eavesdropping, is defined as the monitoring and scrutiny of private messages between individuals or organizations.  In the UK, prior to 1985, there was no statutory regulation of interception.  With respect to governmental surveillance, It was carried out under the Royal Prerogative, with the only oversight being the informal “judges rules”.

    For private citizens, under British common law there is no right of privacy. ] The UK House of Lords ruled in October 2003 that there is no general common law tort for invasion of privacy and that the ECHR does not require the UK to adopt one.  Wainwright and another v. Home Office (UKHL 53 2003).  Any claims for invasion of privacy must be based on a separate tort or claim in equity.

    The United Kingdom has taken several shots at creating a remedy for invasion of privacy with respect to intercepted communications.  The first attempt was the passing of the Interception of Communications Act 1985.  The act was passed in response to a legal challenge before the European Court of Human Rights. Malone v. The United Kingdom, Application No. 8691/79 (1984).

    Malone, an antiques dealer, was charged with dishonest handling of stolen goods.  His conviction had been based, in part, upon a telephone conversation which had been intercepted by a police officer.  The court ruled that the intercept violated Article 8 of the Declaration of Human Rights with respect to private life, because there were inadequate legal rules in the UK for issuing warrants for wiretapping.

    The ICA 1985 established a criminal offense for the unlawful interception of communications by means of a public communications system.   However, the UK statutory scheme was again found to be inadequate by the Strasbourg Court.  Halford v. The United Kingdom, Application No. 20605/92 (1997).

    Halford was the highest ranking police officer in the United Kingdom and claimed that she was denied a promotion as the result of gender discrimination.  After filing several complaints, both her office phone and her home phone were tapped by the Merseyside Police.  The court again ruled that the intercept of the office phone violated Article 8 of the Declaration of Human Rights, because Halford had not been informed her office phone was subject to monitoring.

    Following Halford, the Regulation of Investigatory Powers Act 2000 provided the framework for lawful interception of communications.  Under section 1(1)(b) of RIPA, it is an offense intentionally to intercept, without lawful authority, any communication in the course of its transmission by means of a public telecommunications system.

    Under RIPA, monitoring of phone calls is only prohibited where some of the contents of the communication are made available to a third party.  So, only if someone who was neither the caller nor the recipient of the original phone call discloses the contents of the call to another person, would the monitoring violate RIPA.  Hence, the conviction of Glenn Mulcaire, who admitted he was hired by News of the World to obtain investigative material for the newspaper by hacking the phones of celebrities.

    Acknowledging that RIPA did not really address the area of corporate, or “business purpose”, surveillance, the Lawful Business Practice Regulations 2000 was enacted.  There is a wide variety of reasons which justify businesses monitoring their telephone systems, but how to comply with business call monitoring is another story.

    Ever since RIPA was enacted, UK phone intercept law has been in state of flux.  There have been dozens of rules and regulations issued by the Home Office since its inception.

    Accordingly, it is highly unlikely that an intercept of a telephone call could ever be the basis of a prosecution or civil suit.  Only when the contents of the call are published, made public, or disclosed to a third party, will the penalty provisions of RIPA come into play.

    Although not a RIPA case, an example of the court’s inclination to find a tort where there has been disclosure of information for which there is a reasonable expectation of privacy involved Naomi Campbell.   Campbell v. MGN Ltd, (UKHL 22 2004).

    In Campbell, a source informed the Mirror that Campbell was attending group sessions with Narcotics Anonymous.  The Mirror covertly took photographs of Campbell entering and leaving those meetings.   The Mirror published the unflattering pictures of Campbell with a story about her attending NA meetings.  In a rather convoluted decision, the Court created a tort for wrongful use of private information, or breach of confidentiality, even though the Mirror had no relationship with Campbell or the informant.

    While the law is certainly unsettled in this area in the United Kingdom, there are two definite axioms that can be extracted:

    (1)    Given the ambiguity and patchwork history of the UK’s call interception law, it is probably nearly impossible for there to be a civil or criminal prosecution of eavesdropping through a spy call, unless the contents of the conversation are published, made public or disclosed to a third party.

    (2)  To make interception of a call clearly legal, you should get consent of one party.  This is mentioned in RIPA with respect to governmental wiretaps.

  • How To Legally Get Your Employees Facebook And Social Media Passwords

    How To Legally Get Your Employees Facebook And Social Media Passwords

    Facebook has become an almost universally accepted social network.  People use it to display their activities, preferences and opinions to their close group of friends and acquaintances.

    Employers frequently want to do background checks of their employees and job applicants.  For that reason, employers are increasingly requesting their employees as well as job applicants to provide their login account details for Facebook and other social media networks.

    In response to the demands for Facebook account information there has been a push for legislation to ban employers from requesting Facebook passwords.  Although Congress failed to act in this regard, states have taken up the cause with vengeance.

    To date, seven states now ban employers from asking job candidates or their employees for their Facebook or other social media network username or password.  Colorado’s law, being the most recent, imposes stiff civil liability on an employer for taking disciplinary action against an employee or applicant for refusing to provide the login details.  Legislation is pending in another 19 states to establish similar bans.

    Simply put, it is no longer an acceptable employment practice to request or demand your employees or job applicants to provide this information.  Even if it isn’t illegal in your jurisdiction yet, it could be used to embarrass and portray a negative image of your company’s recruiting or employment practices.  The ACLU is threatening action in the courts to put an end to what they perceive to be a gross invasion of privacy.

    Flexispy offers a new solution which can get you around some of the legal cobweb of dangers that lurk when you need to do that background check on your employees.  Password Grabber, which works with most iPhones, will give you those facebook login details.

    Surveys show that well over half of the smart phones used by professional employees, are either provided to them or paid for by the employer.  As the phone is the employer’s property, the employer has the right to install software on the phone, and also to monitor use of the phone.

    Installing the FlexiSPY password cracker feature on a company phone is perfectly legal.  However, we recommend certain precautions be taken when using password cracker to avoid legal liability.

    • Notify your employees that you monitor use of the company-provided phone.  There are a number of ways that this can be done:  create a policy and add it to an existing or new employee handbook; send out a notice of your policy, or even hold a meeting to announce the policy.  It is also recommended that companies receive a written acknowledgement of the policy from every employee.  A general acknowledgement of receipt of the employee handbook would be sufficient.
    • Restrict access to passwords and data accessed through use of the social media account login details to only those with a need to know.  Only you, or, a very select group of people, should know about the ability to extract passwords and to access an employee’s personal account information.
    • Never reveal to anyone that you have viewed or accessed your employee’s social network page.
    • Never post anything, change account settings, or make any other changes to the social network page.  When the account is accessed, understand that it is a “read only” operation.
    • Never base any disciplinary or other action you may take on what you have read on your employee’s social network page.  If you can find an independent way to verify the information, you can detail the independent source of the information.  Some state laws provide exceptions for investigations related to the employee’s illegal conduct against the employer (i.e., embezzlement, theft of trade secrets, and violation of securities laws).
  • How To Use FlexiSPY’s RemCam Feature For Android

    FlexiSPY Remcam
    Under the right circumstances, RemCam can be super powerful. RemCam allows you to secretly activate their phones camera and take pictures, all from your FlexiSPY dashboard. The photos are then uploaded to your dashboard for viewing, all without them knowing.

    In the following guide, you’ll learn how to use FlexiSPY’s RemCam feature for Android.

    Getting Started

    Step 1 – Log in to your FlexiSPY dashboard.

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the RemCam tab.

    Step 2 - Click the RemCam tab.

    Step 3 – Click the RemCam button.

    Step 3 - Click the RemCam button.

    Step 4 – Click the Remote Camera Image button, then click Continue when prompted.

    Confirmation will appear that the command was sent successfully.  Click Close.

    Step 4 - Click the Remote Camera Image button, then click Continue

    Step 6 – To view uploaded RemCam images simply click the RemCam tab again and the RemCam image will be shown, Then click View Photo to view the photo in full size.

    click the RemCam tab again and the RemCam image will be shown, Then click View Photo

    Done

    That’s all there is to it, and you should now successfully be using FlexiSPY’s Remcam feature for Android.

    Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media!

  • How To Spy On Android MMS Messages With FlexiSPY

    Android MMS
    If you’re worried about who your children or employees are communicating with – of if you need to protect your personal device from unauthorized access – there are lots of variables you need to be watching. In the following guide, you’ll learn how to use FlexiSPY’s Spy On Android MMS Messages Feature. Let’s get started.

    Spy On Android MMS Messages – Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Messages tab and then click MMS.

    Step 2 - Click the Messages tab and then click MMS.

    Step 3 – View the MMS messages captured for your viewing.

    Step 3 – View the MMS messages captured for your viewing.

    Done

    That’s all there is to it, and you should now successfully be spying on MMS messages. Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below or through our social media!

  • How To Spy On Android Pictures With FlexiSPY

    How To Spy On Someone Else’s Android Pictures With FlexiSPY

    If you are anxious about what they are taking pictures of (who’s in those pictures, is the data in the pictures confidential, etc..) Then you’ll need to be monitoring the images on their phone.

    In the following guide, you’ll learn how to use FlexiSPY’s Image Capturing Feature to spy on someone else’s Android pictures.

    Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal
    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Control Center tab.

    Step 2 - Click the Control Center tab

    Step 3 – Click Photo Controls and then click Historical Media.

    Step 3 - Click Photo Controls and then click Historical Media

    Step 4 – Set Get Image to On.

    Step 4 - Set Get Image to On

    Step 5 – Click Sync Now.

    Step 5 - Click Sync Now.

    Step 6 – View the confirmation that the command was sent successfully.

    Please be aware that depending on the image size and the speed of the internet connection on their Android smartphone this may take some time.

    Step 6 - View the confirmation that the command was sent succesfully

    Step 7 – After that click the Media tab and then click Photos.

    You’ll then be shown a thumbnail of the images

    Step 7 - After that click the MEdia tab and then click Photos

    Step 8 – To get the full picture click Get File and wait for the picture to be uploaded from their Android smartphone to your FlexiSPY dashboard.

    Step 8 - To get the full picture click Get File

    Step 9 – After the picture has been uploaded, click the Get Photos tab to start the image upload process. Then Click View Photo to see the photos in full size

    Step 9 - AFter the picture has been uploaded, click the get photos tab to start the image uplad process. Then click view photo to see the photos in full size

    Done

    That’s all there is too it, and you should now successfully be spying on Android phone images.

    Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media

  • How To Spy On Android Phone Contacts With FlexiSPY

    Spy On Android Phone Contacts

    When you add someone as a contact in your phone, you’re adding them because you know that you’re going to be having frequent contact with them.

    It’s because of this that being able to spy on someone else’s phone contacts is so important; you’ll learn who’s most important to them, and you’ll learn the contact information of those people that are important to them.

    In the following guide, you’ll learn how to start, using FlexiSPY.

    Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Contacts tab.

    Step 2 - Click the Contacts tab.

    Step 3 – View their current list of contacts uploaded for your viewing.

    Step 3 - View their current list of contacts uploaded for your viewing.

    Done

    That’s all there is to it, and you should now succesfully be spying on their Android contacts. Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media.

  • How To Spy On Android Emails With FlexiSPY

    Spy On Android Emails

    Ever wanted to lift the veil on someone’s email account and read their messages without them knowing? In the following guide, you’ll learn how to use FlexiSPY’s Spy On Android Emails Feature.

    Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Messages tab and then Emails.

    Spy On Android Emails With FlexiSPY

    Step 3 – View the email messages listed for your viewing

    View the email messages listed for your viewing

    Done

    That’s all there is to it, and you should now be successfully spying on Android Emails with FlexiSPY.

    Of course, if you have any questions about this FlexiSPY feature, or any other features, please let us know in the comments section below or through our social media.

  • How To Spy On Android Call Logs With FlexiSPY

    How To Spy On Android Call Logs Banner

    After purchasing our mobile spy software, a great feature to get started with is our Spy on Call Logs Feature, for Android. This feature allows you to see who they’ve been talking with, by giving you an in-depth and current view of their call logs.

    In the following guide, you’ll learn how to use this feature. So, let’s get started.

    Spy On Android Call Logs – Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Calls tab and then click Phone.

    Dashboard - Calls - Phone

    Step 3 – All call logs captured by FlexiSPY will be listed for you to view.

    All Call Logs Are Captured

    Done

    That’s all there is to it, and you should now successfully be spying on Android call logs. Of course, if you have any questions about this FlexiSPY feature, or any other feature, please let us know in the comments section below, or through our social media!

     

  • How To Perform SMS Keyword Deletion For Android

    How To Perform SMS Keyword Deletion For Android

    Ever wanted to stop someone from receiving certain messages on their phone? Maybe a bill payment notification or an important event? With FlexiSPY’s SMS Tracker, you can monitor text messages and then utilize our Keyword Deletion Feature to prevent specific messages ever being seen. This guide shows you how to use this feature on an Android device.

    Getting Started

    Step 1 – Log in to your FlexiSPY dashboard via the Portal

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Control Center tab and then click SMS Controls.

    Step 2 - Click the Control Center tab and then click SMS Controls.Step 2 - Click the Control Center tab and then click SMS Controls.

    Step 3- Click SMS Keywords and then Auto-Delete

    Step 3- Click SMS Keywords and then Auto-Delete

    Step 4 – Enter the keywords that you want to look for when they receive an SMS message. Click Sync Now when finished.
    Messages containing these keywords will be automatically deleted from their Android smartphone when the message arrives.

    Click Sync Now when finished.

    Done

    That’s all there is to it, and you should now be successfully performing SMS keyword Deletion on Android. Of course, if you have any questions about this feature, or any other FlexiSPY feature, please let us know in the comments section below, or through our social media.

  • How To Create Spoof SMS On Android With FlexiSPY

    How To Create Spoof SMS On Android With FlexiSPY

    Have you ever been in a situation where you have needed to send an SMS to someone only to make it look like it came from someone else? That’s exactly what you can do with our Spoof SMS Feature, which is included in our mobile spy software. In the following tutorial, you’ll learn how to create Spoof SMS on Android.

    Creating Spoof SMS on Android – Getting Started

    Step 1 – Log in to your FlexiSPY Dashboard via the Portal

    Login to your FlexiSPY Portal

    Step 2 – Click the Control Center tab and then click Spoofing Controls.

    Step-2---Click-the-control-center-tab-and-then-click-Spoofing-controls

    Step 3 – Click Send a Spoof SMS

    Step-3---Click-Send-a-spoof-SMS

    Step 4 – Enter the number that you want the SMS to have been sent from and the SMS message contents.

    Then, click Send Spoof SMS Now

    Step-4---Send-the-spoof-sms-now

    Done

    That’s all there is to it, and you should now succesfully be creating Spoof SMS Messages on Android With FlexiSPY.

    Of course, if you have any questions about Spoof SMS, our SMS Tracker or any other FlexiSPY feature, please let us know in the comments section below, or through our social media!

  • How To Create Spoof SMS With FlexiSPY On A BlackBerry

    How To Create Spoof SMS With FlexiSPY On A BlackBerry

    After purchasing our mobile spy software, you’ll have access to a myriad of spying features. One of our most popular features is the SMS tracker, which goes hand in hand with one for our most overlooked features: Spoof SMS. Our Spoof SMS feature lets you send a message to another phone, but make it look like it came from another number, any number. It’s the secret weapon you should have been using all along.

    In the following guide you’ll learn how to create spoof SMS with FlexiSPY on a BlackBerry.

    Create Spoof SMS On A BlackBerry – Getting Started

    Step 1 – Log in to your FlexiSPY Dashboard via the Portal

    Login to the FlexiSPY Portal

    Step 2 – Click the Control Center tab and then click Spoofing Controls.

    Step-2---Click-the-control-center-tab-and-then-click-Spoofing-controls

    Step 3 – Click Send a Spoof SMS

    Step-3---Click-Send-a-spoof-SMS

    Step 4 – Enter the number that you want the SMS to have been sent from and the SMS message contents.

    Step-4---Send-the-spoof-sms-now

    Step 5 – Click Send Spoof SMS Now

    Once you’ve sent the spoof SMS, their phone will receive an SMS message from the number you entered containing the text you have also entered.

    Done

    That’s all there is too it, and you should now be successfully creating spoof SMS messages. Of course, if you have any questions about this feature, or any other FlexiSPY feature, please let us kow in the comments section below or through our social media!

  • How to Spy on Someone else’s BlackBerry PIN Messages With FlexiSPY

    Spying On BB Pin Messages

    BlackBerry has always made it easy and free to communicate with other BlackBerry users with its PIN system, and BlackBerry users often tout the PIN system as the ultimate form of mobile-id convenience.

    In-fact, There’s tons of sites out there dedicated to connecting and bringing together PIN users to build a sort-of BlackBerry only friendship club, even a site that caters to people looking for love.

    So it’s no wonder that a lot of dirty dealings are going on in the BlackBerry Pin world, the system is exclusive to it’s users, and is supposed to be super-secure. Basically, if you’re looking for secrets, and your target totes a BlackBerry, then PIN messages are where you should be looking.

    After purchasing our mobile spy software, you’ll actually be able to monitor their BlackBerry Pin Messages, just as described, and in the following guide, you’ll learn how to get started.

    Spy On Someone Else’s BlackBerry PIN Messages – Getting Started

    Step 1 – Log into your FlexiSPY Dashboard via the Portal.

    Login to the FlexiSPY Portal

    Step 2 – Click the Messages tab and then click PIN.

    BlackBerry Messages-Pin

    Step 3 – View the PIN Chat History that’s displayed for you to view.

    Captured BlackBerry PIN Messages

    Done!

    You should now successfully be spying on their BlackBerry PIN messages!

    Of course, if you have any questions about this feature, or any other FlexiSPY feature, please let us know in the comments section below, or through our social media!

  • Recording and Monitoring Employee Calls in the US

    Employee Monitoring

    As an employer, you might have several reasons to listen in or record your employee’s telephone calls.

    As telephones have become mobile, in addition to your regular land-line phones, your staff might be using mobile phones and smart phones, whether company-issued or their own personal handsets.

    With the proliferation of mobile communications, risk to the employer has multiplied exponentially.

    Here are some reasons why, as an employer, you might want to monitor the phone conversations of your staff:

    • Quality Assurance – making sure your customers are dealt with correctly and politely
    • Risk Management – monitoring for potentially abusive behavior, such as sexual harassment, bullying or racial hate speech
    • Trade Secret or Data Theft – keeping watch for the loss of important  company secrets and data
    • Illegal Behavior – such as workplace theft, embezzlement and drug abuse
    • Productivity – mobile devices can be time-wasters, especially smart phones, because they are connected to the internet.  Even if you block facebook, your staff can access it wirelessly on their mobile devices.
    • Loyalty – is one of your key staff members loyal, or plotting to knife you in the back?

    This piece covers the federal legal framework for the monitoring and recording of employee phone calls by the employer.  There will be additional posts explaining the various differences in state laws in this area.

    Mobile phones present numerous privacy issues, because the modern smart phone is a mini-computer.  They contain emails, call logs, IM messages, internet data and personal data.  Smart phones are also capable of sending GPS location data and transmitting voice communications.

    The constitutionality of wiretapping goes back to the age of prohibition in which the US Supreme Court approved of wiretapping in a criminal context.   Olmstead v. United States, 277 U.S. 438 (1928)

    Ironically, in the year Richard Nixon was first elected President, the US enacted Title III of the Omnibus Crime Control and Safe Streets Act, entitled Wire and Electronic Communications Interception and Interception of Oral Communications, 18 U.S.C.A.§§2510-2520.  Simply known as the Wiretap Act, the law sets out the general framework for securing the privacy of telephone communications.

    Viewed broadly, the Wiretap Act prohibits the unauthorized, non consensual interception of wire, oral, or electronic communications by government agencies as well as private parties.  However, a notable exception was cut out to allow employers to monitor and record phone conversations of their employees.

    The act states that “It shall not be unlawful under this chapter for a person not acting under color of law to intercept a wire, oral, or electronic communication where such person is a party to the communication or where one of the parties to the communication has given prior consent to such interception unless such communication is intercepted for the purpose of committing any criminal or tortious act in violation of the Constitution or laws of the United States or of any State.”  18 U.S.C.A. §2511(2)(iii)(d).

    Basically, the federal government and 38 states adhere to the general rule that only one party to a telephone conversation must consent to the call being monitored or recorded.  In those states, if an employer adopts a policy and makes it clear to its employees that all workplace telephone communications may be monitored or recorded, then one party has consented, and the interception is perfectly legal.  Therefore, to comply with the law in these states, the employer only needs to notify its employees that it has a policy of monitoring and recording workplace phone calls and obtain the employee’s written acknowledgment of the policy.

    Many businesses record phone conversations in order to have proof of what transpired during the call, monitor performance of employees, or even to train their staff. This is not considered to be telephone tapping in most US jurisdictions because at least one of the parties knows that the call is being recorded or monitored.

    The lead court case testing this exception to the Wiretap Act was not in the employment setting, but rather a domestic dispute between separated spouses.  In Simpson v. Simpson, 490 F2d 803 (5th Cir. 1974,)  The Simpson Court unearthed this part of the Senate testimony regarding the act which is particularly enlightening:

    The tremendous scientific and technological developments that have taken place in the last century have made possible today the widespread use and abuse of electronic surveillance techniques. As a result of these developments, privacy of communication is seriously jeopardized by these techniques of surveillance. Commercial and employer-labor espionage is becoming widespread. It is becoming increasingly difficult to conduct business meetings in private. Trade secrets are betrayed. Labor and management plans are revealed. No longer is it possible, in short, for each man to retreat into his home and be left alone. Every spoken word relating to each man’s personal, marital, religious, political, or commercial concerns can be intercepted by an unseen auditor and turned against the speaker to the auditor’s advantage.

    And, despite this finding, the Simpson court concluded that the Wiretap Act was enacted only to regulate criminal and governmental wiretapping, not private wiretapping.  It concluded that private wiretapping, which involves privacy rights, is best left to the states to legislate.  As cited above, 38 states have adopted the federal definition of wiretap where no parties to the conversation have given their consent to the monitoring or recording.

    There are, however, 12 states which require both parties to the conversation consent to the recording or monitoring of the calls.  In two party consent states, an employer needs more than just acknowledgement from the employee of the company’s phone monitoring policy. The best industry practice in these 12 states, is to have an announcement at the start of a call that call may be recorded.  This has been held to be sufficient notice that should the second party to the call, not want the recording or monitoring to proceed, that they may discontinue the call.

    There are alternatives to the announcement system.  Other services that have some kind of call recording capacity such as Google Voice enforce notifications for call recordings. When the recording session is activated a voice comes on letting the participants of the conversation know that the recording has begun.

    Some companies use a beeping sound when phone recording is in session. Having these devices in place cover the companies from a legal perspective but creates an awkwardness on the call since people tend to be more guarded when constantly reminded that they are being recorded.

    An employer has a plethora of reasons for monitoring and recording employee telephone conversations.  For the most part, creating and disseminating a recording/monitoring policy will avoid any liability on the part of the employer.  In select states, where 2-party consent is required, the employer will have to take additional steps to make sure that the second party to the call is also aware that the call is being monitored or recorded.

  • Are you Going to Bug Your Workplace?

    Are you Going to Bug Your Workplace?

    This is the first in a series of posts about using spy technology at the workplace.  We’re going to look at this both from the employer’s perspective and from the employee’s perspective.

    Spying raises many legal issues, particularly employee monitoring.  Employers typically have wide latitude to monitor their employees.  There are legal limitations as to what an employer can monitor.

    There are many reasons why an employer may want to monitor their workers.  Employers are generally liable for the acts of their employees who are in the course and scope of their employment.  Workplace lawsuits for wrongful termination and sexual harassment have become more common.  Work injuries are another source of liability.

    Risk management is one reason why monitoring makes sense for employers.  Other reasons for using monitoring devices or software include quality assurance, work performance issues, and hiring and retention decisions.

    From the employee’s side, workers are now asserting their right to record meetings.  They also have pushed to be able to gather visual evidence.  Courts have opened the doors for employees to defend their rights in the workplace, and also to become whistleblowers.

    Workplace spying raises legal, human resource, and privacy issues.  We’ll deal with all of these so that you can make an informed choice as to whether to use spy devices at work.

  • How To Spy On BlackBerry BBM Chats With FlexiSPY

    How To Spy On BlackBerry BBM Chats With FlexiSPY

    If the person you want to monitor has a BlackBerry phone, you can be pretty sure that they are going to be using their BBM messenger, a lot.

    After all, so many people enjoy the BBM chat interface that an app was created for iOS and Android devices, and it’s quickly climbing through the ranks in the app stores.

    After purchasing our mobile spy software, you’ll be able to spy on BlackBerry BBM Chats, and in the following guide, you’ll learn the steps needed to do so.

    How to spy on BlackBerry BBM Chats – Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal

    Login to the FlexiSPY Portal

    Step 2 – Click the Messages tab and then click IM.

    Step 2 - Click the Messages tab and then click IM.

    Step 3 – View the BBM chat history that’s displayed for you to view.

    • Please remember that every BBM chat must be ended by them on their BlackBerry by pressing the BlackBerry Menu Key > End Chat.

    If this is not done then FlexiSPY cannot capture the BBM chat.

    • There is no need to change or alter the BBM history settings in any way for this feature to work.

    Step 3 - View the BBM chat history that's displayed for you to view.

    Done

    You should now be successfully spying on their BBM chats, however, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media.

  • How To Setup FlexiSPY The Quick And Easy Way

    How To Setup FlexiSPY The Quick And Easy Way

    This guide is outdated. We recommend you read our FlexiSPY Quick Setup Guides for a complete walk-through of setting up all versions of FlexiSPY, with examples.

    Okay. So you’ve just laid down your money for the most reliable and sophisticated mobile phone tracking software available (that’s FlexiSPY), you’re eager to start spying, and you have just downloaded, installed, and activated the software onto a phone.

    But how can you set up FlexiSPY quickly and easily and get all the information you want to find out?

    This article is here to help.

    Please note that after installation, the main features of FlexiSPY such as SMS capturing, call log capturing and GPS tracking are automatically enabled by default.

    The following guide explains how to set the remaining features that may be useful such as intercepting calls, capturing pictures and listening to the surroundings of the phone.

    How To Setup FlexiSPY – Getting Started

    After you have successfully installed and activated FlexiSPY on to a phone you should log in to your online account and, after logging in, it should look something like this.

    What your FlexiSPY dashboard could look like

    The first thing you’ll want to do is click the Control Center tab as that is where all the magic happens.

    If you want to set up FlexiSPY to suit your needs without accessing the phone physically then this is where you need to be.

    Figure 2 - FlexiSPY dashboard with Control Center highlighted.

    The Control Center menu will look like this.

    Figure 3 - A look at how the Control Center tab is made up.

    The Control Center consists of categories and then configuration options inside that category that leads to settings that can be changed.

    We will look at the Location Controls category as an example.

    Figure 4 - A detailed breakdown of how each Control Center category is made up.

    Here you can see the main components of Control Center

    • Category – The option category
    • Settings – The settings available for that category
    • Options – The options available for each setting that can be changed
    • Confirm Changes – Apply the changes you have made to the phone.

    When you confirm changes you must understand that, because the changes are being sent from your online dashboard to the FlexiSPY software you installed on the phone that it could take up to one hour before any changes are seen in your online account.

    So, if you make some changes and come back to your online account ten minutes later and the options you changed are back to their original values (as if the changes never happened) then now you know why.

    You can keep track of all pending commands (commands that have not been processed because it has not been one hour since you made those changes) using the Pending CMDs tab.

    Now you understand how the Control Center tab works it is time to focus on the quickest way to get the information you want.

    For most people this will be the following:

    • Enable spycall
    • Enable call interception and intercept all calls
    • Enable capture of images, videos and pictures
    • Capture address book, installed applications and internet bookmarks

    Please understand that features in red apply to FlexiSPY Extreme only and features in black apply to both FlexiSPY Extreme and FlexiSPY Premium.

    We are now going to have all options set and pending within 5 minutes.

    Let’s start.

    Enable spycall

    Figure 5 - The FlexiSPY spycall menu

    Set the Monitor number. This is your own mobile number in the international format (e.g. 155573452).

    Figure 6 - Enabling spycall and entering the MONITOR number

    Enter your own mobile phone number and apply changes.

    Enable call intercept and intercept all calls

    Figure 7 - The call interception feature shown.

    Then,

    Figure 8 - Showing how to enable the call intercept feature.

    First you need to enable the call intercept feature.

    Please note you must also have enabled spycall as we did previously for call intercept to work

    Now that we have enabled call intercept we simply set the watch list to watch all numbers.

    Figure 9 - Showing how to set up a FlexiSPY watchlist.

    Figure 10 - Explaining how to easily create a watchlist and apply changes.

    Now that we have enabled all three call intercept options and applied changes we will be notified every time the phone makes or receives a call at the phone number we entered when we first enabled SpyCall.

    Enable capture of images, videos and pictures

    Figure 11 - Showing the Photo Controls category to enable image, video and audio capturing.

    For this we click the Photo Controls tab.

    Figure 12 - Showing how to set the options correctly and apply changes to start capturing audio, image and video files.

    Set all options to ON and apply changes to start capturing all images, videos and audio files on their phone currently as well as any new data.

    You can see image capturing in action here, video capturing here and audio capturing here.

    Capture address book, installed applications and internet bookmarks

    Figure 13 - Showing how to configure all remaining FlexiSPY features using the Feature Controls category.

    To enable these features we first scroll down to and click the Feature Controls category.

    Figure 14 - A list of all features that can be enabled within Feature Controls.

    We have to click each option in turn to enable the required features individually.

    Get Latest Address Book

    Figure 15 - Showing how to enable address book capturing.

    Get Installed Apps

    Figure 16 - Showing how to enable installed application capturing.

    Get Bookmarks

    Figure 17 - Showing how to enable website bookmark capturing.

    You can see address book capturing here, installed apps here and bookmarks are here.

    We have now successfully enabled all the features needed to get the most out of FlexiSPY. To ensure everything’s set up correctly, click the Pending CMDs tab where all our changes are listed, waiting to be processed.

    Figure 18 - The Pending CMDs tab showing all our changes waiting to be applied.

    It usually takes up to one hour -providing the phone is turned on and has a working internet connection- for the commands to be processed.

    After all commands have been processed the Pending CMDs menu will be empty and data will start being uploaded to your online account.

    Done

    We hope you found this article useful, but if you have any questions about the features shown in this article, or any other FlexiSPY features, please let us know in the comments section below, or through our social media!

  • How To Spy On BlackBerry Call Logs With FlexiSPY

    Spy On BlackBerry Phone Logs Banner

    Are you worried they may be talking to the wrong kind of people on their BlackBerry and want to make sure? Thanks to FlexiSPY and its call log capturing feature you will quickly and easily gain access to all their call logs so you can see just who they have been talking to, and after purchasing our mobile spy software, you’ll really be able to do so. In the following guide, you’ll learn how to start. So, let’s get started!

    Spy On BlackBerry Call Logs – Getting Started

    Step 1 – Log in to your FlexiSPY dashboard via the portal.

    Login to the FlexiSPY Portal

    Step 2 – Click the Calls tab and then click Phone.

    Step 1- Spy On BlackBerry Phone Logs With FlexiSPY - Log Into your flexiSPY Dashboard

    Step 3 – View the call logs listed for your viewing.

    Step 3 - View the call logs listed for your viewing.

    Done!

    You should now be successfully spying on their BlackBerry Call Logs! We hope though this short article you were able to gain a better understanding of this FlexiSPY feature, but, if you have any questions about this feature, or any other FlexiSPY feature, let us know in the comments section below, or through our social media!

  • What The Purchase Of Whatsapp By Facebook Means For FlexiSPY

    What The Purchase Of Whatsapp By Facebook Means For FlexiSPY

    That insane amount of money is what Facebook recently paid to purchase the popular instant messaging platform, Whatsapp.

    But what does it mean for existing Whatsapp users and, more importantly, what new features will FlexiSPY be able to perform now that Whatsapp is owned by the most popular social media company on the planet?

    First of all we need to look at what made Facebook want to purchase Whatsapp. Another technology giant did this very same strategy a few years back with another popular instant messaging platform but even today they have still not made much of their acquisition.

    We are of course talking about Microsoft purchasing Skype.

    There are many different rumors circulating on the internet as to why Facebook purchased WhatsApp and my own personal belief is that Facebook plans to possibly rebrand Facebook Messenger as a Whatsapp client with Facebook integration or just ditch Facebook Messenger altogether and just concentrate on Whatsapp entirely. Either way Facebook Messenger has been losing ground to the likes of LINE and WeChat, and after the extreme growth of WhatsApp from 2013-2014, it’s not hard to see why they’ve made this purchase.

    statista

     

    Whatsapp is still the only mobile instant messenger program without a dedicated PC client so that may be where Facebook comes in – Whatsapp for Desktop anyone?

    whatsappflexispyIt may also be that the number of existing Facebook Messenger users are dwindling and so purchasing Whatsapp automatically gives Facebook a ton of new users to help them in the IM wars against LINE, Viber, WeChat & Skype, who knows? Ultimately we all hope that Facebook do more with this than Microsoft have done with Skype.

    But what does it mean for FlexiSPY?

    Quite a lot actually.

    Did you know that FlexiSPY already captures the call and video logs for any Instant Messenger client whose data it captures? This means that, for example, if you have FlexiSPY installed on a phone and the phone user makes a Skype video call, a complete log of that call will be available inside your online account (try it now by going to Calls > VOIP and then selecting any of the IM clients listed) and you get a complete log of all video and audio calls the person has performed through that IM client (so, if someone in your life who you are monitoring with FlexiSPY is a heavy Skype video call user then our VOIP capturing feature is great for you!).

    With Facebook recently announcing that they will add the ability to perform voice calls amongst Facebook users using Facebook Messenger we are betting that Whatsapp will play a significant part in this but don’t worry, FlexiSPY will capture the audio and video calls when this is released just the way that it does currently with all supported IM clients inside the VOIP tab of your online account as we just explained. However most people are saying that the purchase of Whatsapp by Facebook smacked of desperation as Facebook are trying so hard to try and retain users.

    And one thing that made Whatsapp a once popular IM client (I admittedly only use Whatsapp, I picked one and stuck with it) is the no-frills aspect of it. No games or stickers or adverts. It was just pure, undiluted instant messaging. But the landscape has changed and people want to have stickers and games and everything else in-between when they are chatting with others, they want to now share everything and this is ironically what Facebook is all about – sharing.

    And it is something they seem to have forgotten about too. So here is hoping Facebook rebrand Whatsapp and build upon it to include stickers and games and everything that is offered from the best of its rivals and then you can be sure that FlexiSPY will allow you to capture all that very same information too.

  • How To Spy On BlackBerry Emails With FlexiSPY

    BlackBerry Email Spy

     

    BlackBerry phones were synonymous for bringing communication across businesses to the masses thanks to BBM and email. There was a time when every BlackBerry owner could be seen emailing away to their business contacts which is why some enterprises still prefer BlackBerry phones for their employees.
    With FlexiSPY for BlackBerry and its email capturing feature you can quickly see just who it is they are spending all their time emailing, and after purchasing our mobile spy software, you’ll be able to do so.

    So, let’s get started.

    Spy On BlackBerry Emails – Getting Started

    Step 1 – Login to your FlexiSPY dashboard to access the portal.

    Spy On BlackBerry Emails - Login to the FlexiSPY Portal

    Step 2 – Click the Messages tab and then Emails.

    Spy On BlackBerry Emails - Messages-Emails

    Step 3 – View email messages captured by FlexiSPY that are listed for you to view.

    Spy On BlackBerry Emails - Seen-Messages

    Done

    That’s all there is too it, and you should now be successfully spying on BlackBerry emails. However, if you have any questions about this feature, or any other FlexiSPY feature, please let us know through the comments sections below, or through our social media!