Author: FlexiSPY

  • FlexiSPY VS stealthgenie | Which One Is 100% Undetectable?

    This article shows why stealthgenie’s claim of stealth doesn’t guarantee you’ll stay hidden — and also shows the two ways that stealthgenie can be discovered on an iPhone

    What you are about to read is the result of tests carried out to verify claims by stealthgenie that their product is 100% undetectable to the person using the monitored cell phone. We put their words to the test – along with similar claims by other manufacturers – and let the facts show which cell phone monitoring software actually delivers on the promise to protect customers from being detected.

    We take you through the procedure and examine the results as we test a commercially available copy of stealthgenie for invisibility on both an iPhone 4 and 5s.

    We also compare the anti-detection capabilities of both FlexiSPY and stealthgenie with a side-by-side test that clearly demonstrates why FlexiSPY is the best mobile monitoring software for those who want to stay invisible at all times.

    stealthgenie’s Claim: Their Software Stays Hidden

    StealthGenie advertise that their software is 100% hidden
    stealthgenie advertise that their software is 100% hidden

    Strictly speaking, their claim is true: stealthgenie’s software app icon can be hidden on the target phone. But what isn’t mentioned are the side effects that a mobile spy app causes that will attract attention and cause you to be detected.

    How to find the stealthgenie spy application on an iPhone

    To help you quickly understand how we uncovered stealthgenie, there are two important things you need to understand about the iPhone’s design. These things must be carefully considered by the spyphone developer if the application is to remain completely invisible.

    The first is the Permissions Settings, and the second is the impact of the starting state of the device at the time it is jailbroken.

    If you’re not already familiar with this term here’s the general idea: Before installing any mobile monitoring software on an iPhone, you have to “jailbreak” it to allow full access so you can install your choice of programs. We’ll talk more about why doing this can be fatal to spyphone invisibility, but first let’s look at Permissions.

    Permissions

    Any application that runs on an iPhone, and needs to use the services listed here also needs to be granted special permissions.

    • Sending Data
    • Using GPS
    • Using the microphone

    These permissions are granted in the following Settings menus of the iPhone:

    • Settings > Cellular
    • Settings > Location Services
    • Settings > Microphone

    In each of these menus, you will find the name of the application that is requesting permissions.

    This is a dead giveaway that the spy app is installed on the iPhone.

    In our test, stealthgenie did not come up in any of the three menus.

    But checking a little further we discovered that stealthgenie did not appear in Settings & Microphone because when we tried to activate the remote recording feature they advertise on their website, the microphone failed to open.

    So while stealthgenie was indeed not visible in the Settings menu during our test, this random by-product of an apparent operational irregularity should not be confused with FlexiSPY’s designed-in and airtight undetectability.

    And we don’t require customers to sacrifice an important spy feature in order to achieve promised invisibility. Another issue that reveals the presence of their monitoring app is easy for anyone to spot: the text command which remotely activates Stealthgenie’s recording feature shows up right in the target phone’s SMS inbox — notifications and all.

    The cydia icon is showing in the app directory
    The cydia icon is showing in the app directory

    Impact Of Jailbreaking

    Before installing any application, the iPhone is in one of these two states:

    Not yet jailbroken.

    Already jailbroken by the user.

    After the installation of a spy application, care must be taken to ensure that there is no sign on the target phone that anything has been changed. But the thing is once you jailbreak a cell phone, an icon labeled “Cydia” appears in the app directory.

    So for a spyphone app to remain undetected you need these conditions:

    – If the cell phone was not jailbroken before, there must be no Cydia icon visible.

    – If it was already jailbroken, the installation package list must appear unchanged.

    The Not Jailbroken Device

    If the iPhone you want to monitor wasn’t jailbroken before, the sudden appearance of the Cydia icon will announce the presence of spy software.

    Though it’s a simple matter to remove the Cydia by including in the software an easy way to remove the icon, but no such feature is offered on the stealthgenie product. That means it’s likely that Cydia will show up in the target phone’s apps directory, just like in the example seen here:

    The Jailbroken Device

    An app that stealthgenie introduces
    An app that stealthgenie introduces

    If the device is already jailbroken, the Cydia icon will already be known to the person using the target phone — however they do not expect to see an unfamiliar installation package. stealthgenie introduces an additional installation package on the cell phone called Mobile Developer which could raise suspicion that the software has been installed.

    The image below shows how opening up the Cydia program plainly reveals a listing for the Mobile Developer package, another way using stealthgenie to monitor a cell phone is a major risk to your concealment.

    While it is easy to remove the telltale listing with one tap, most people are unlikely to know this. FlexiSPY deals with this problem by automatically deleting the package source when installation has finished.

    We knew for sure the listing “Mobile Developer” was stealthgenie because it was the only program we installed on to our iPhone after jailbreaking it. That, and the fact that it’s the only icon for a well-known, reputable app like Facebook or is part of the iPhone software such as Maps.

    What We Found: stealthgenie Is Ultimately Detectable.

    When stealthgenie says on its website that its software runs in stealth mode, perhaps what they really mean is that their application does not have an icon. However, this is not the same thing as being undetectable or invisible, because there are still clear traces of stealthgenie’s presence.

    We recommend that users of stealthgenie hide the Cydia icon, and we provide instructions on how FlexiSPY gives you that option here.

    So while stealthgenie claims their software “will never be found”, it doesn’t guarantee the ultimate goal of keeping yourself hidden from the phone’s user. Put simply – you either stay absolutely invisible and the spy phone software you’re using works, or you don’t and it doesn’t.

    The Final Word: stealthgenie Is Visible On An iPhone In Two Distinct Places

    Successful cell phone monitoring ultimately depends on you not being discovered. FlexiSPY was designed for 100% mobile phone monitoring concealment. So for anyone looking for powerful cell phone monitoring capability and the confidence that at the end of the day you won’t be revealed — these facts speak louder than promises and hype: FlexiSPY hides the app and has you covered.

    Appendix

    Below you can find the detailed specifications of stealthgenie and FlexiSPY used in our visibility tests.

    the detailed specifications of both FlexiSPY and StealthGenie applications
    the detailed specifications of both FlexiSPY and stealthgenie applications

    Stay tuned for further blog pieces as we face-off FlexiSPY against all other major spy phone competitors to show that, when we say FlexiSPY really is the best spy phone software and really is 100% undetectable once installed, we have the evidence to prove it.

    You can see how FlexiSPY stacked up against the remaining competitors for software visibility by clicking the links below.

  • FlexiSPY VS mspy | One Of Them Isn’t Invisible

    Update 5/26/2015

    – Mspy’s application is now completely visible, and is unable to be hidden.

    If you are reading this it’s probably because you need to monitor a cell phone, but are worried about getting discovered. You’ve seen mspy’s claim that their product is completely invisible, but the reality is this does not include keeping you hidden. This article clearly demonstrates exactly how their software is detected by showing you the 3 places where mspy is visible on the target phone.

    To see if their software is truly 100% undetectable on the target phone as claimed, we purchased a commercially available copy of mspy and thoroughly tested its stealth capabilities using an iPhone 4 and 5s. This article details how the test was conducted, and lets the results alone show which spy phone app only talks about invisibility and which one proves it by actually being invisible.

    You’ll see FlexiSPY’s and mspy‘s anti-detection features compared side-by-side, and get a clear understanding why FlexiSPY is the best-choice mobile phone monitoring application for anyone who wants to stay completely hidden.

    mspy says their software can’t be seen

    Take a look at the below screen grab from mspy’s website that advertises their software as being undetectable. You might be impressed the words “100% invisible”, but does that mean everywhere on the target phone?

    invisiblemode
    mspy advertises itself as completely hidden

    Although mspy does keep their app icon hidden, they don’t mention the other signs created by any mobile spy app that will make it easily visible and quickly reveal that the target phone is being remotely monitored.

    Here’s how to find mspy on an iPhone

    Before going into how we uncovered mspy on our test device, we should to explain a couple of important iPhone technical features that interact with any spy phone software. Developers must take great care in designing these features to ensure that the software remains hidden.

    The first of these possible threats is found in the Settings menu under Application Permissions. Next is the starting state of the device— whether or not it is jailbroken prior to installation of the spy phone software.

    For those not clear on what jailbreak means, it’s really quite simple. In order to install cell phone monitoring app on an iPhone, you must first gain special access that allows you to install your choice of software. This is referred to as “jailbreaking”. A little later we’ll explain what happens when you jailbreak an iPhone and how it can reveal your monitoring activities. But first, a look at Permissions.

    App Permissions will reveal mspy

    An application which is running on an iPhone has to “ask permission” from the phone’s operating system any time it’s required to send data, use the GPS or open the microphone.

    You can see these permission requests in the iPhone’s Settings menus. When you tap open any of the menus shown below you’ll see the name of the permission-seeking application.

    • Settings > Cellular
    • Settings > Location Services
    • Settings > Microphone

    This is such an obvious program installation red flag that anyone searching for spy phone software will go straight to the Settings menus before checking anything else on the phone.

    When we tested our copy of mspy, their software revealed two tell-tale listings in the Permissions menu. First, mspy asked permission to open the Microphone when we activated their ambient recording feature. And as you can see in the screen grab below, mspy also shows up under Location Services when it checks the iPhone’s GPS location for upload to the customer’s online account, something that can quickly draw attention and lead to the monitoring app getting discovered.

    mspy_clearly_not_hidden
    Here’s mspy – clearly not hidden..

    Either one of these Permissions requests alone is enough to get you discovered using mspy to monitor a mobile device.

    But there are more, even easier ways to spot mspy’s software installed on an iPhone.

    Jailbreaking can kill spy phone stealth

    An iPhone prior to software installation is either Already jailbroken or Not Yet jailbroken. Each of these possible mobile device starting states presents a different threat to concealment.

    After monitoring software is installed on a mobile, it’s crucial that there is nothing visible on the target phone that would reveal internal changes have been made.

    Here’s where one small detail can turn out to be fatal to invisibility:

    Whenever you jailbreak a mobile device, an icon called “Cydia” pops up in the App Directory.

    But if you install a monitoring app on a device that’s already been jailbroken, the new program can be seen in other places on the target phone.

    This means that, to keep a spy phone app absolutely hidden you need to neutralize whichever one of the detection threats shown below applies to you. The target phone’s starting state tells you which risk to you’ll need to avoid:

    Not Yet jailbroken: The Cydia icon must not be visible on target phone

    Already jailbroken: The existing installation package list must not show any changes. (More about this a little later)

    Cydia Exposed

    The cydia icon is showing in the app directory
    The cydia icon is showing in the app directory

    Here you can see what it looks like when the Cydia icon suddenly appears in the app directory of a previously un-jailbroken iPhone. This is what happens on the target when you install mspy, and it will get you discovered:

    So if the phone isn’t jailbroken, keeping Cydia out of sight on the target phone is a must-have condition to you staying hidden.
    We found that when using mspy there are several steps necessary to hide the Cydia icon. First, you have to open the Cydia program and access the mspy repository. The next screen grab shows just one step of the multi-step Cydia-hiding process:

    You have to do this because mspy has included an additional application inside the repository that must be installed–and the iPhone restarted–before Cydia icon is hidden.

    There is nothing to tell the customer that additional steps are required to hide the Cydia icon, and the instructions for doing this can only be found in the Help section of the mspy online account.

    The fact that you have to go back into the mspy repository and install an additional application in order to hide Cydia raises the risk of detection. Many customers will either forget or be unable to complete the required steps, making it more likely that they will be discovered while using mspy.

    NOT jailbroken phone can get you detected

    As you’ve learned, when you install spy phone software on an iPhone which is not yet jailbroken the Cydia icon shows up on the target phone, drawing attention and raising suspicions.

    To a software developer who is truly in touch with the product’s customers, designing a spy phone app that allows the Cydia icon to be quickly and conveniently hidden just makes good sense and is not difficult to do.

    Trying to hide Cydia using mspy requires you to install an additional program and restart the phone, and the software doesn’t let you know more steps are required.

    ALREADY jailbroken phone threatens monitoring stealth

    If the target phone has already been jailbroken, then the Cydia icon will already be visible and won’t attract any unwanted attention. But what will stand out is the upgrade notification appearing within Cydia that shows the requesting app. And that’s exactly what happens with mspy.

    When you install mspy on a previously jailbroken phone, an upgrade notification bubble appears along with the listing for the software installation package. Once the upgrade notification is seen, all it takes is a couple clicks to entirely remove the app from the target phone.

    Here's mSpy showing itself again.
    Here’s mspy showing itself again.

    Furthermore, even if mspy is upgraded via Cydia, the notification bubble will not go away. This will cause even more suspicion which could lead to the app being removed entirely.

    This next image shows how easy it is to spot these two threats to your concealment while using mspy:

    mspy’s software design requires specific actions to remove clear traces of invisibility on the target phone. FlexiSPY takes care of this for you by automatically deleting the package source, so no installation listing or attention bubble will ever appear.

    Since we didn’t install any other apps on our test phone after it was jailbroken, we know that the listing “iPhoneInternalService” is actually mspy and not some easily recognizable apps like Facebook or phone software such as Maps.

    Bottom Line: mspy CAN be detected on an iPhone

    mspy’s website says their software runs in “100% invisible mode”, but what this means is simply that their app does not have an icon. But not having an icon is not guarantee of 100% invisibility.

    So if you’re using mspy, our advice is to make a list of potential stealth threats so you won’t forget that you have to deal with each of them if you don’t want to be discovered.

    Or you can take a look here and see how FlexiSPY lets you get truly invisible with just one click.

    mspy’s claim that their app “…cannot be detected by your target…” is not a promise they you won’t be uncovered. The point is, there is no gray area when it comes to cell phone monitoring software. It either actually does what it claims and keeps you hidden on the target phone, or it lets you be detected.

    Just remember this and you’ll stay hidden…

    To successfully monitor an iPhone without being detected, you need a spyphone app that’s always invisible in all areas of the target phone. So if you’re looking for the most powerful cell phone monitoring features available plus the confidence that you will never be detected, the truth is in the facts: FlexiSPY takes care of everything you need to always stay invisible, everywhere on the target phone.

    Appendix

    Below are listed detailed specifications of mspy and the iPhones used for testing.

    mspy-chart
    A chart of the specifications of both FlexiSPY and mspy applications

    Stay tuned for further blog pieces as we face-off FlexiSPY against all other major spy phone competitors to show that, when we say FlexiSPY really is the best spy phone software and really is 100% undetectable once installed, we have the evidence to prove it.

    You can see how FlexiSPY stacked up against the remaining competitors for software visibility by clicking the links below.

  • FlexiSPY vs mobistealth | One’s Invisible The Other Isn’t

    FlexiSPY vs mobistealth | One’s Invisible The Other Isn’t

    Summary

    This article will clearly demonstrate why mobistealth’s invisibility claim does NOT include keeping you hidden, by uncovering the place on an iPhone where mobistealth can be seen that will give you away every time.

    You will read a detailed explanation of how we tested the accuracy of mobistealth‘s claim that their cell phone monitoring software is undetectable on the target phone. We present the facts that clearly show which spy phone software only says it protects you from being found out and which one actually delivers true mobile monitoring invisibility.

    We explain our testing methodology and look at the test results using a commercially available copy of MobiStealth installed on an iPhone 4 and 5s.

    You’ll see FlexiSPY’s and mobistealth‘s anti-detection features compared for detectability, and why FlexiSPY is the best mobile phone monitoring application for anyone who wants to stay totally hidden.

    mobistealth Says Their Software Is 100% Undetectable

    What you see below is an actual screen grab from mobistealth’s website where they claim their software is invisible. While it says right there: “No One Will Ever Know They Are Being Monitored”, the site doesn’t warn you about the other ways mobistealth can be easily detected on the target phone.

    ultimate-cell-phone-monitoring-software
    From the mobistealth website. They are clearly advertising as being hidden with the line “No One Will Ever Know They Are Being Monitored”

    While it is true that mobistealth hides the app icon on the target phone, what they don’t tell you about are other traces created by a mobile spy app which will quickly show that the target phone is being monitored.

    Find mobistealth on an iPhone? It’s Easy.

    Before explaining how we located the mobistealth software on the iPhone, we should first take a look at two important iPhone technical features that apply to any spy phone program. Spyphone developers have to be sure these features are properly designed if the software is to stay absolutely invisible.

    First, there are the application permissions found in the Settings menu. The second is the device’s starting state: jailbroken or not jailbroken.

    If you’re not exactly sure what jailbreaking is, the idea is simple: If you want to install a mobile phone spying app on an iPhone, it’s necessary to get special access that allows you to install the programs you want to use, or “jailbreak” the device. Later in the article you’ll see what happens on the iPhone when you do this, and how it can get you discovered. First, let’s look at Permissions.

    Application Permissions will get you discovered

    When an application which is running on an iPhone has to send data, use the GPS or microphone, it must first get special permission from the phone’s operating system.

    These permissions are displayed in the iPhone’s Settings menus as shown below:

    • Settings > Cellular
    • Settings > Location Services
    • Settings > Microphone

    If you simply tap open any of these menus you can see the name of the application requesting the permissions.

    This is a sure giveaway that monitoring software has been installed on the iPhone and is one of the first places someone searching for spy phone software will check.

    When we tested our copy of mobistealth, their software did indeed stay hidden in the location services and cellular permissions menus. And although it also did not appear in Settings > Microphone, we found that this was only because the audio recording feature mobistealth offers as part of their software failed to work. Therefore we could not determine for sure whether mobistealth is visible in Settings > Microphone, even if the feature can be made to function as advertised. But digging a little further we uncovered something about the associated function that makes the question of invisibility in this menu a moot point.

    The SMS message command needed to activate remote audio recording could actually be seen, giving the target phone’s user a clear sign that mobistealth has been installed.

    FlexiSPY removes this detection risk by making sure our software is always hidden in the Permissions menus, and that remote command text messages are never visible on the target phone.

    As simple as these invisibility threats are to find, there’s an even easier way to detect a mobile monitoring app on a cell phone.

    Jailbreaking can ruin invisibility

    Before you install any software the iPhone will be in one of two states:

    Either the target phone is NOT YET jailbroken or it is ALREADY jailbroken.

    Once you install spy software on a cell phone, you have to be sure there is no sign on the target phone that indicates anything has been changed internally. And this is how one small but crucial detail will give you away– any time a mobile phone is jailbroken, an icon labeled “Cydia” appears in the app directory.

    So in order for a mobile monitoring app to be 100% hidden, the following two conditions must be met at the time of installation:

    – If the mobile phone was not previously jailbroken, the Cydia icon must not be visible.

    – If it’s already jailbroken, the existing installation package list must not show any changes.

    Phone NOT jailbroken a detection risk

    This Cydia Icon is definitely going to look strange to the owner of the phoneThis Cydia Icon is definitely going to look strange to the owner of the phone
    This Cydia Icon is definitely going to look strange to the owner of the phone

    The below grab from an iPhone that was not jailbroken before mobile monitoring software was installed clearly shows the Cydia icon in the app directory just as it looks on the target device. That icon’s sudden appearance is more than likely to attract attention and raise suspicion that the device is being remotely monitored.

    Solving the Cydia icon problem is a simple matter of designing the software so that the Cydia icon can be removed, but mobistealth’s software doesn’t include any such feature.

    Phone ALREADY jailbroken causes suspicion

    On an already-jailbroken iPhone, the presence of the Cydia icon will already be familiar to the person using it, but what will make them suspicious is the sudden appearance of an unknown installation package. And this is exactly what happens because mobistealth puts an additional Installation Package called SBTerminal onto the iPhone.

    Here below you can see that their Installation Package listing is plainly visible in the Sources menu. This is an obvious red flag that will quickly draw attention to the fact that mobistealth’s software is running on the target phone:

    Although it’s actually quite simple to tap and delete the tell-all listing, many people are not aware of this. But with FlexiSPY there’s nothing to tap away, because our software automatically deletes the package source once the installation is complete.

    Here's MobiStealth being shown at vyk..
    Here’s mobistealth being shown at vyk..

    How did we identify “vyk.me” as mobistealth? It clearly is not a trusted app like Twitter, nor is it part of the iPhone’s software like Maps. Plus— we made sure that no other software besides mobistealth was installed after jailbreaking our test phone­.

    Our finding: You can detect mobistealth on an iPhone

    mobistealth claims on their website “No One Will Ever Know They Are Being Monitored”, but what this actually means is their software runs without displaying an icon. Our point is that “no icon” is not a guarantee of absolute concealment, because there are other clear signs of mobistealth on the iPhone.

    Our advice to mobistealth customers: get that Cydia icon hidden if you don’t want to get discovered.

    We show you here how FlexiSPY lets you do this with just one click.

    mobistealth‘s claim that “No One Will Ever Know They Are Being Monitored” doesn’t actually say it will keep you fully concealed. The true test of any mobile phone monitoring software is strictly pass/fail — it either keeps you hidden from the phone’s owner, or allows you to be detected.

    What this all means to you

    Seen from the developer’s viewpoint, spyphones should be called “Monitoring Concealment” apps, because a properly designed spyphone will have invisibility in all areas of the target phone as its top priority. So for someone who needs powerful mobile phone monitoring capabilities and the assurance they will never be detected, the facts confirm it: FlexiSPY hides the app and keeps you concealed.

    Appendix

    Below you can find the detailed specifications of MobiStealth.

    MobiStealth Specs
    For reference, this chart shows the specifications of mobistealth used in our tests.

    Stay tuned for further blog pieces as we face-off FlexiSPY against all other major spy phone competitors to show that, when we say FlexiSPY really is the best spy phone software and really is 100% undetectable once installed, we have the evidence to prove it.

    You can see how FlexiSPY stacked up against the remaining competitors for software visibility by clicking the links below.

  • How FlexiSPY’s Remote Update Protects Your Investment

    updatebanner

    The Problem With Software Updates

    We have a love/hate relationship with software updates—right?.

    Whether it’s MS Windows—just when you’re shutting down—or yet another Facebook update on your mobile phone, updates can bring joy and despair.

    Joy, because you should be getting improvements.

    Despair, because you KNOW it’s bound to break something else—like the spyphone software you just installed on a cellphone. For example, every time there is new feature added to a mobile instant messaging program , it’s pretty likely to crash your mobile monitoring spy software.

    Not with FlexiSPY­­! Read on to see how FlexiSPY deals with application software updates changes that are incompatible, and how it will keep delivering you spy information, without you having to physically reinstall.

    FlexiSPY Remote Updates Solves The Problem

    Because you’re capturing information from many different apps (Facebook, Line, WhatsApp, Email, etc.), any updates to those individual apps can become a critical issue. As soon as your Target user updates one of the apps you’re monitoring, there is always a chance the new version of that app may interfere with FlexiSPY’s ability to continue capturing it. Of course this is true for all monitoring software, but while you’re often SOL with other brands, FlexiSPY has designed its software to avoid that problem.

    Generally there are two things to consider when one of the apps you’re monitoring gets updated. The first is how quickly your spy software can release an update to capture the new versions of those apps. Assuming they are on the ball and make adjustments quickly to keep up with the changes, you’ll still need to find a way to get your Target device back so you can reinstall the updated version of your spy software.

    This is often a problem for many customers, and in that case you wouldn’t receive further data from the broken apps until you could reclaim your Target device to reinstall your spy software, assuming there was an update available for it.

    FlexiSPY makes this easier in two very important ways.

    Unlike other companies, our developers work around the clock to release updates for your software as soon as possible, whenever any of your monitored apps receive a critical update.

    accountsettingupdate

    And when updates are available, you’ll see an “Update” button in your Dashboard. Pushing this button initiates a remote update that should happen within the next 24 hours, or at the next successful device connection. This is a remote process that does not require you to retrieve the phone to update the software.

    updateavailable

    This is an important difference between FlexiSPY and other brands. We know it’s often difficult to get the phone back, especially if you don’t often see the person you’re monitoring, or even impossible if they are travelling or physically in a different area.

    Remote Update is another way that FlexiSPY is looking out for you, making it easier to keep monitoring your data and protecting your investment when an update is needed – even if you can’t get the phone back to reinstall.

    You shouldn’t have to pay extra for security, and with FlexiSPY it’s built right in.

    Note: Remote Updates are currently available for iPhone target phones only. FlexiSPY is doing its best to bring you the latest cool features to all our phone platforms – please stay tuned!

  • Does Mobile Spy Actually Capture Twitter or Facebook – Can anyone help us?

    Does Mobile Spy Actually Capture Twitter or Facebook – Can anyone help us?

    Mobile Spy appear to be a reputable company when it comes to spy phone software, therefore the news that they are the only ones capturing Twitter intrigued us enough to try it out and see this was really true.

    Unfortunately, we were unable to get this feature, along with the Facebook spy to work—despite several calls to Mobile Spy support.

    This article will detail what we did in theR hope that someone out there can help us figure out how to solve the problem so we can advise Mobile Spy support staff who can then use that information to help their own customers.

    Mobile Spy Twitter Test Results

    In order to properly test Mobile Spy we had to first root our Android phone and prepare it for capturing instant messaging conversations according to Mobile Spy’s requirements.

    1. We made sure the Android phone was rooted before installing Mobile Spy
    2. We had installed Facebook, Twitter & Whatsapp and were logged in
    3. We made sure that Mobile Spy (SIM Toolkit) received superuser permissions
    4. We made sure that we had enabled Facebook, Whatsapp and twitter capturing inside Mobile Spy itself using the Logging Options menu.
    Figure 1- We rooted our Android phone and installed Facebook, Whatsapp and Twitter
    Figure 1- We rooted our Android phone and installed Facebook, Whatsapp and Twitter

    With our Android phone correctly set up we set about installing Mobile Spy and started creating some instant messaging data for Mobile Spy to capture and upload to the online account.

    Unfortunately none of the Twitter data that we created was uploaded by Mobile Spy.

    Figure 2- Mobile Spy failed to capture any Twitter data.
    Figure 2- Mobile Spy failed to capture any Twitter data.

    This meant that we had to contact Mobile Spy support.

    We logged on to Mobile Spy livechat and after providing our registered email address and order number we then proceeded to ask our question.

    Why was no Twitter data being uploaded?

    Had we correctly rooted the Android phone?

    The first response we received to our question was the obvious one – had we rooted the phone?

    We explained that we had and we were told to open up the SuperSU program (SuperSU is the program that is installed after rooting an Android phone and which grants Mobile Spy the permissions it needs to function) and check the settings for Mobile Spy.

    The first thing we were told to check is the permission settings for Mobile Spy itself (SIM Toolkit). The Mobile Spy support staff thought that Mobile Spy had not been granted superuser permissions and that was why no Twitter data was being uploaded.

    We had set our Android phone so that Mobile Spy was automatically granted the permissions it needed to work.

    Figure 3- Our Android phone had been properly rooted and set up for Mobile Spy.
    Figure 3- Our Android phone had been properly rooted and set up for Mobile Spy.

    We told support this and we were then told to uninstall the software, reinstall and try again.

    We uninstalled and reinstalled the software whilst still in a live chat with the support team. We were then told that everything would now work because the software had been reinstalled.

    Unfortunately this was not the case.

    We sent some more tweets and checked back in to the Mobile Spy online account but no Twitter data was uploaded. In fact the message inside the online account stated this.

    Figure 4- No Twitter data was uploaded by Mobile Spy even though they advertise to capture it.
    Figure 4- No Twitter data was uploaded by Mobile Spy even though they advertise to capture it.

    We contacted Mobile Spy support again. We explained that we had already made sure that Mobile Spy had been granted the required superuser permissions in order to function. This time support asked us once again to check SuperSU and the permission settings for Mobile Spy.

    Had we set the correct root permissions for Mobile Spy to work?

    They wanted us to check the global default settings for Mobile Spy itself in case it had been set to not receive superuser permissions in which case that could be the cause for no Twitter data to be uploaded. Without gaining superuser permissions Mobile Spy would not work properly and that could have been the reason no Twitter data was being captured.

    On our Android phone we set the global permissions for Mobile Spy to be ‘Enabled’ which was the exact same thing that the Mobile Spy support staff asked us to do. We were then assured that now, because SuperSU had granted Mobile Spy the correct rooting permissions that features that require root permission (and this includes capturing Twitter) would work.

    After sending some more tweets and generating some general Twitter activity we checked our online account once more to see if Twitter had been captured.

    Figure 5- We had enabled Superuser and we disabled notifications upon Mobile Spy's request.
    Figure 5- We had enabled Superuser and we disabled notifications upon Mobile Spy’s request.

    Unfortunately it was the same and no Twitter data was uploaded.

    We contacted Mobile Spy support a third time. This time Mobile Spy support asked us to check the settings for superuser notifications. Superuser notifications are notifications which display when a program has been granted superuser permissions.

    Did we correctly configure the notification status of SuperSU?

    With this option enabled, every time Mobile Spy needs permissions to function a message would be displayed on the screen. Ideally spy phone software needs to be discrete and hidden at all times so we understood why the Mobile Spy support staff wanted us to set the superuser notifications option to be disabled. We were then told to uninstall the software again and reinstall it. When we reinstalled it, as you would expect, because we had set superuser notifications to be disabled no notice appeared on the screen saying that Mobile Spy had been granted superuser permissions.

    Support then told us to log in to Mobile Spy on our Android phone, then log out, restart the phone and log back in again. We did all of these steps and Mobile Spy support assured us now that everything definitely would work.

    So we generated some more Twitter data and waited, giving it time to be uploaded (Mobile Spy support told us it can take up to an hour for data to be uploaded), before we checked our online account again.

    Unfortunately still no data again was uploaded.

    Mobile Spy then asked us to install an older version to try that. This used a completely different download URL and program name.

    Did an older version of Mobile Spy solve the problem?

    When this was installed it still mentioned ‘Mobile Spy’ and everything looked and functioned the same however we knew this was an older version because in the online documentation the name of Mobile Spy once it was installed on the Android phone was not the same as the latest version.

    Figure 6- Mobile Spy gave us an older version of the software to try which we identified by the name..
    Figure 6- Mobile Spy gave us an older version of the software to try which we identified by the name..

    We installed this older version on to our rooted Android phone and set it up exactly as we had done before. Again we generated some Twitter data for Mobile Spy to capture. Unfortunately though the results were the same – nothing was uploaded.

    But how can we be sure that the issue is with Mobile Spy and not our Android phone?

    By testing the capturing of Whatsapp and Facebook also.

    Did Mobile Spy otherwise capture Facebook and Whatsapp?

    Both of these need root access on an Android phone for Mobile Spy to capture it.

    So we set about generating data for both Facebook and Whatsapp on our Android phone.

    Figure 7- Our test data for Facebook and Whatsapp to see if Mobile Spy would capture it.
    Figure 7- Our test data for Facebook and Whatsapp to see if Mobile Spy would capture it.

    Unfortunately Mobile Spy failed to capture Facebook.

    Figure 8- Mobile Spy also failed to capture Facebook.
    Figure 8- Mobile Spy also failed to capture Facebook.

    However it did capture Whatsapp.

    This proves that our Android phone was successfully rooted properly otherwise this would not be able to happen.

    Figure 9- Mobile Spy successfully captured Whatsapp.
    Figure 9- Mobile Spy successfully captured Whatsapp.

    However even though Mobile Spy successfully managed to capture Whatsapp it captured the text only. Many of the key elements provided by rich media such as emoticons and stickers were not uploaded. When it comes to clarity of information, especially when capturing instant messaging conversations, you cannot afford to miss out on any details – no matter how small they may seem.

    Why capturing all details of an instant message is vital

    One well-placed sticker inside a conversation or a well-timed smiley face can change or set the tone of an entire conversation. If you are capturing that information you need to make sure that all elements of an instant messaging conversation are being captured because nowadays just capturing the text is not enough.

    This is why FlexiSPY not only captures the most instant messaging programs (they capture nine compared to Mobile Spy’s six) they also capture much more of the chat data giving you all the details of every instant messaging conversation that takes place in an easy to read format so it looks exactly like it did on the phone.

    So, if you are currently a Mobile Spy customer and you are able to get Facebook and Twitter to be captured on a rooted Android phone please let us know how you did it in the comments below.

  • The Best Spy Phone Software For Spying On Instant Messaging Is The One That Captures The Most IM’s!

    The Best Spy Phone Software For Spying On Instant Messaging Is The One That Captures The Most IM’s!

    Social messaging applications like Facebook and Whatsapp, have replaced SMS as the preferred way to chat to friends. That’s because, unlike SMS, they are free, not to mention IM is more fun as it lets you send stickers, pictures and other rich media as part of your message.

    For example, sending a cute kitten sticker, or a smiley with love heart eyes, will put a smile one even the sourest of faces – right?

    That’s why it’s clear that if you really want to understand someone’s secrets, you NEED to be able to spy on as many instant messaging applications as possible— the chances are extremely high that they will be using one, if not several, social messaging applications.

    FlexiSPY Captures The Most IM’s

    All of our competitors advertise that they capture instant messaging but how do you measure which software actually captures the most instant messaging content for your money?

    As the picture to the right shows, with some competitors, important details are missing from the captured Facebook conversation — the missing information could be vital to understanding the whole conversation.

    What-They-Dont-Capture-1024x744

    And how do you know what really is the best spy phone software if you want to spy on Whatsapp, Facebook, Viber, Skype, and other popular IM apps?

    To answer this, we looked at the competition like mSpy, MobiStealth, and Mobile Spy and counted the actual number of instant messaging apps that they could spy upon.

    We looked at how they displayed the data—did they present it the way it was actually displayed on a mobile phone, or did they use a simple grid which makes it hard to understand the flow of the conversation.

    We also looked at the ability of FlexiSPY competitors to spy on the rich media like pictures and stickers that are such a cool part of the social messaging experience. To learn more about how we test IM capturing capabilities of ourselves, and our competitors, read our in-depth article on IM testing

    The results were obvious.

    FlexiSPY supports more social media and instant messaging programs than any other competitor.

    FlexiSPY Also Captures The Most Rich Media

    IM AppFlexiSPYmSpyMobistealthMobile Spy
    Facebook
    Facebook Messenger
    Viber
    iMessage
    Skype
    WeChat
    WhatsApp
    LINE
    BBMBlack Berry Icon
    BB PINBlack Berry IconBlack Berry Icon
    Twitter
    Google+ Hangouts
    Realistic Conversation ViewYes
    KiK Messenger
    Telegram
    Tinder
    Instagram
    QQ
    Hike Messenger
    In our tests, for example, mSpy also failed to capture Facebook stickers and images.

    Mobile Spy does not capture emoticons for Whatsapp and Mobistealth failed to capture any IM programs at all.

    What’s more FlexiSPY is the only spy phone software which displays the instant messaging conversation inside the online account just like it appears on the actual phone itself.

    No other competitor offers this level of detail and compatibility capturing instant messaging, as shown in the detailed chart below.

    But rather than resorting to hyperbole or superlatives, we simply look at the facts and can say that when it comes to spying on Facebook, Viber, Whatsapp, Skype, iMessage, BBM, PIN, Wechat, LINE, FlexiSPY is scientifically the most powerful. So why not head back over to the main site and explore everything that FlexiSPY can do for you?

    Explore All Our Great Features

  • Monitoring Employees Smartphone GPS Locations With FlexiSPY

    Monitoring Employees Smartphone GPS Locations With FlexiSPY

    There are lots of GPS tracking devices out on the market.  As an employer, you can install one on a company car, no problem.  Install it on an employee’s ID badge, yep.  Install one on an employee’s personal car . . . yes. And under certain circumstances you can install one to do limited tracking on your workers who use their personal car for work tasks outside the office.

    However installed GPS tracking devices have one major limitation. They only track your employee’s car’s location. They don’t track your employee.

    How can you track your employee’s location?  How can you see if your employee has decided to go to the racetrack instead of attending that expensive seminar you paid for?

    One way might be to use an employee’s ID badge as a tracker. The problem with this is it only works inside the workplace, and the device becomes ineffective when removed by the employee.

    Smart phones are amazing devices, because they can track and transmit locations just as accurately as installed GPS devices.  As a result of the need to accurately locate 911 callers, phone GPS transmitters have become almost universal in phones – in fact, many states require phones to be sold with the transmitters installed.  What’s more amazing is that the law treats the two devices – GPS transmitting devices and phones – differently, even though they provide similar data.

    Employee GPS Tracking Laws

    The use of GPS tracking technology for locating employees in the workplace has now become fairly widespread. More than 53% of all employers are using GPS technology to track their vehicles and workers. It is now cost effective for employers with as few as 8 staff members to use some type of technology to track their employees’ locations.

    An examination of two recent appellate decisions in the State of New York demonstrates why the courts will apply different standards to determine whether GPS tracking is legal for employers depending on whether the tracking is done by an installed device in a car, or whether the tracking is done on a smart phone.

    In examining the legality of using a GPS tracking device, it is important to first look at whether there are limitations on its use due to privacy issues.

    First, No federal statute prohibits employers from using GPS tracking on cellular phones  to locate the positions of their employees. And, second, the only state to require notice that an employer is using GPS tracking on a cell phone is Connecticut. California and Texas have recently passed legislation requiring notification when a tracking device is placed on a car.

    Therefore, there are no statutory limitations on an employer location tracking its employees with a GPS tracking device.

    we recommend that all employers give notice of this policy and have its employees acknowledge the policy in writing.

    Three states now would require that an employer notify its employees that it does use GPS tracking technology to monitor the location of its employees during work hours.  This is not a major limitation.  In fact, we would recommend that all employers give notice of this policy and have its employees acknowledge the policy in writing.

    Although there are no statutory privacy laws that would significantly restrict using GPS location tracking technology in the workplace, courts have begun to consider this matter, and have laid down some guidelines on the limits that might be placed under state law on this type of monitoring.

    Courts have traditionally found a low expectation of privacy regarding workplace monitoring.  Unless the invasion of privacy is unreasonable to the extent that it implicates highly personal information about the worker, the monitoring is found not to have violated the worker’s privacy rights.

    Prior to GPS, in determining whether there was an invasion of privacy, courts examined whether there was penetration of a zone in which a person would reasonably expect privacy, and whether the intrusion was offensive in light of the motives and objectives of the intruder.  (See, Miller v. NBC, 187 Cal.App.3d 1463, 232 Cal.Rptr. 668 1986) and Shulman v. Group W Productions, 18 Cal.4th 200, 955 P.2d 469, 74 Cal.Rptr.2d 843 1998.

    Monitoring Employees GPS Locations – The First Case

    The first employee GPS monitoring case came from New York.  In Cunningham v. New York State Dept. of Labor (2013 NY Slip Op 04838), New York’s Appellate Division heard a case in which the employee was subjected to discipline based on evidence obtained through the use of a GPS tracking device installed on his personal car.

    Michael Cunningham worked in the state’s department of labor in a management position.  He was a 20-year veteran of the department and much of his work was performed either in the field or in remote locations.

    His employer suspected that he was submitting false time reports and taking unauthorized absences.  They believed he was claiming he was on extended business trips, when he had actually returned home much earlier than his timesheets showed.

    The employer hired an investigator to follow his car to confirm their suspicions.  Cunningham was successfully able to elude the tailing investigator several times.  Thereafter, the employer attached a GPS tracking device to the wheelbase of Cunningham’s personal car, without Cunningham’s knowledge.

    The employer tracked the movements of Cunningham’s car for one month.  During that time period, the GPS tracking device required two replacements.  Through the evidence obtained by the tracking device, the employer brought disciplinary charges against Cunningham which resulted in termination of his employment.

    The reviewing court found that the use of GPS tracking device to confirm suspicions about Cunningham’s absences and timekeeping records was reasonable.  It further held that tracking the car’s movements for one month was a reasonable length of time.

    However, the court also ruled that the search was excessively intrusive.  Because the employer was tracking the movements of Cunningham’s car 24/7, and this would include considerable time periods when Cunningham made no claim that he was working, the search exceeded its permissible scope.  The employer, who replaced the GPS device twice during the surveillance, could easily have removed it when Cunningham took a personal vacation.  The court found that the employer failed to make a reasonable effort to avoid tracking Cunningham when he was outside of business hours.

    A few months later, the U.S. Supreme Court stepped into the fray in a criminal case, but may have dealt a blow to the use of GPS devices which are attached to cars.  In United States v. Jones 132 S. Ct. 949, 565 U.S. ___ (2012), Justice Scalia reasoned that the trespass involved in placing a GPS device in a car invades a person’s privacy.  The concurring opinion, moreover, suggested that any long-term GPS tracking would be an invasion of privacy because it would reveal a wide range of personal information, including familial, political, religious and sexual associations.

    Cell phones, however, have not received equal treatment from the courts.  In United States v. Skinner 690 F.3d 772 (6th Cir. 2012), the Court held that there is no reasonable expectation of privacy attached to the location transmitting signal of a cellular phone.  If there was, it would be an invasion of privacy to use scent smelling dogs to trace a suspect.  In Skinner, the Court explicitly differentiated placing a GPS device in a car in the Jones case, from using a person’s cell signal to track location.  The former involves a trespass, the latter does not.

    With the preferential privacy treatment given to cell phones over placing GPS devices in cars, it would seem logical that employers should use the GPS tracking technology in cell phones, as opposed to placing a device in an employee’s personal car.  While there are still good business reasons for GPS tracking company-issued cars, tracking the movements of employees may be more important, especially in this age of telecommuting and distant working.

    In a poll of professionals across the US, 56% of polled professionals had their smart phones paid for by the employer.

    Therefore, employers can issue phones that have GPS tracking software installed, to allow them to monitor their employee locations.  Again, we would recommend that notification be made to the employee, especially because there may be tracking in off-work hours.  This is an attractive alternative to the stealth, and, ultimately failure, employed in the Cunningham case, where the tracking becomes so pervasive that it is held to violate the worker’s reasonable expectation of privacy.

  • Scammed by Spyphone Software? Here’s What To Do

    Scammed by Spyphone Software? Here’s What To Do

    At Flexispy, we are always trying to get consumers the best value for their money. As part of achieving that goal, we actually buy and test all Spyphone software on the market. That way, we can tell customers what they can expect when they purchase any brand of Spyphone software.

    One thing we abhor is companies that sell Spyphone apps that plain just don’t work. This makes the entire industry look bad. We want customers to come to us because our products are the best on the market. When customers spend their hard-earned money on something that doesn’t work, that often means they give up, reasoning all Spyphone software is a scam.

    With that in mind, we would like to share our experience with one particular brand.

    We purchased the software, Cell Spy Stealth, on February 6, 2014 from the website, www.iphone-spy-app.com. The cost was $27.00. When we clicked the button to make the purchase, we were redirected to http://www.cellspymonitoringsoftware.com.

    We were intrigued by their website, because they advertise that you can install the software on a target phone, without having physical access to that phone and then intercept any call made or received on the target phone.

    Cellspymonitoring screenshot

    After purchasing the software, we downloaded it as instructed, we tried installing it on the android platform, the iOS platform and the Blackberry platform. The installation was unsuccessful on all three.  Our company has technicians with years of experience installing Spyphone software onto phones. And, even they couldn’t get this app to work.

    As instructed by their website, we submitted a ticket to their support team. We asked for a refund, because the software wouldn’t install. On their website, they guarantee customer satisfaction with the product and promise a full refund if dissatisfied with the product within 30 days of the purchase, no questions asked.

    Really an iron clad guarantee?

    biglinebreak

    After submitting our ticket for a refund, we received this email from [email protected]

    Here's their repsonse to our request

    biglinebreak

    We never heard from them again. Yep, $27 down the drain. What a rip-off! But, you don’t have to kiss your money goodbye. At Flexispy, we’re going to help you get your money back.

    How to raise a dispute, and do a chargeback on your credit card

    When you purchase any software, take the time to read the legal disclaimer and the terms and conditions of the purchase. It will save you a lot of headaches and disappointment down the road. Here’s the relevant legal disclaimer for our purchase:

    Software Download Return Policy:  All sales final. In-store credit only.

    If there is a problem with the download, please contact us via email for a quick resolution.

    Ummmm . . . what happened to my iron-clad 100% money back guarantee?

    Never fear. With a credit card purchase, you can always get your money back. It may take a little time, but don’t let the scammers win.

    But didn’t the company’s email say that it is illegal to file false and fraudulent chargebacks and disputes with my credit card company?

    LOL, the scammers who sold you worthless software and took your hard-earned money are threatening you with legal action if you file a chargeback?

    It is your right as a credit card customer to file a chargeback or dispute, if the product you purchased does not conform to your reasonable expectations as a consumer based on the marketing information provided by the seller.

    So, here’s what we did to get our money back.

    We first contacted our credit card company and informed them that we want to file a chargeback for this purchase. We told them the date and amount of charge. They emailed us a form to complete, which identifies the seller, the charge and the reason for the chargeback. We emailed it back with a copy of our emails with the seller. Our credit card company investigates, tries to get a response from the seller, and then reverses the charge. Simple as that.

    But we didn’t stop there.

    How to file a complaint with the payment gateway provider

    When you purchase something on a website, usually your purchase goes into a shopping cart, and when you checkout to pay, you are taken to a different website, called the Payment Gateway.  The payment gateway is the lifeblood of the ecommerce seller, because it processes all its credit card transactions.

    Payment gateways carefully watch the number of chargebacks and refunds for credit card transactions that they process, as there can be a risk if the amounts are particularly large. They may close their payment gateway service to the seller, or charge higher transaction fees, if they detect a pattern suggesting potential consumer fraud. Payment gateway providers are particularly interested in refund policies and whether the seller is living up to the refund policy as it is presented to the customer on the seller’s website.

    CellSpyMonitoringSoftware uses Plimus as its payment gateway provider.  Plimus is a very reputable company, and handles a lot of ecommerce software credit card transactions.  Plimus has its own support system for handling complaints that cannot be resolved with the seller.

    We submitted our ticket to Plimus’ service center so that we could escalate our request for refund. We do not expect Plimus will be able to get our refund, as that usually has to be obtained through a credit card chargeback. However, we are certain that our email has created a red flag about this seller and that Plimus may take some action as a result of this.

    So, don’t accept that the Spyphone software you purchased is just a scam and that you threw away your money. Get your money back through a credit card chargeback and take the seller to task.

    Or, why don’t you try Spyphone software that works? Flexispy will discount your purchase of our product in exchange for turning over your current Spyphone license key to us. Get the results you want, and trade in that worthless app. Go with the first and proven leader in Spyphone technology. 

  • How To Use FlexiSPY’s Spy On Call Logs Feature For iPhone

    Use FlexiSPY's Call Logs Feature On iPhone Banner

    After purchasing our iPhone Tracker software, one of the first things you might want to take a look at is the Spy on Call Logs Feature. This feature lets you monitor who they’ve been talking to, by giving you an in-depth and current view of their iPhone call logs. In the following guide, you’ll learn how to start using this feature. So, let’s get started.

    Spy On Call Logs – Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal

    Login to your FlexiSPY Dashboard via the Portal

    Step 2 – Click the Calls tab and then click Phone.

    Step 2 - Click the Calls tab and then click Phone

    Step 3 – View the call logs captured by FlexiSPY listed for your viewing.

    Step 3 – View the call logs captured by FlexiSPY listed for your viewing.

    Done

    That’s all there is too it, and you should now successfully be monitoring their call logs. Depending on your automatic upload settings, the call logs will update every time a call takes place, you’ll see the contact name, phone number, call duration, and date & time. This really does give you a good view into what they’ve been up to. So head over to our iPhone Tracker page and see all of the great monitoring abilities that FlexiSPY gives you.

    If you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media!

  • GPS Tracking – How Far Can the Employer Go?

    GPS Tracking – How Far Can the Employer Go?

    There are many reasons an employer may want to use GPS location tracking technology to monitor the whereabouts of its employees.

    These are some examples of where GPS tracking might provide some degree of help in the workplace:

    • You suspect an employee of misusing company time to conduct personal business;
    • You suspect an employee is engaged in illegal behavior, such as pilferage or drug use;
    • You suspect an employee is misusing company paid sick leave;
    • You suspect an employee of misappropriating company secrets or colluding with a competitor;
    • You are concerned about whether an employee is on a personal diversion rather than his appointed task when using his personal vehicle.

    These however,  are only a few examples of where an employer may consider engaging in Geo-location to confirm reasonable suspicions about a particular employee.

    The question then arises, what can the employer legally do to obtain some evidence to confirm these suspicions?

    For company-owned vehicles, the law is clear that an employer may put a GPS tracking device on the vehicle. The company-owned vehicle is the employer’s property, and its use for a business purpose is an extension of the workplace.

    Car Capture
     

    In O’Connor v. Ortega  480 US709 (1987), the US Supreme Court held that workplace searches never require a warrant. Also see,  Matter of Caruso v. Ward72 NY2d 432 (1988)(applying New York law, random workplace drug testing does not require a warrant).

    But what about placing a GPS tracking device on an employee’s personal car? Is this ever legal?  What restrictions and limitations apply?

    Employers now have guidance in this matter.

    In Cunningham v. New York State Dept. of Labor (2013 NY Slip Op 04838), New York’s Appellate Division heard a case in which the employee was subjected to discipline based on evidence obtained through the use of a GPS tracking device installed on his personal car.

    Michael Cunningham worked in the state’s department of labor in a management position. He was a 20-year veteran of the department and much of his work was performed either in the field or in remote locations.

    His employer suspected that he was submitting false time reports and taking unauthorized absences. They believed he was claiming he was on extended business trips, when he had actually returned home much earlier than his timesheets showed.

    The employer hired an investigator to follow his car to confirm their suspicions. Cunningham was successfully able to elude the tailing investigator several times. Thereafter, the employer attached a GPS tracking device to the wheelbase of Cunningham’s personal car, without Cunningham’s knowledge.

    The employer tracked the movements of Cunningham’s car for one month. During that time period, the GPS tracking device required two replacements. Through the evidence obtained by the tracking device, the employer brought disciplinary charges against Cunningham which resulted in termination of his employment.

    handwithgps

    The reviewing court found that the use of GPS tracking device to confirm suspicions about Cunningham’s absences and timekeeping records was reasonable.  It further held that tracking the car’s movements for one month was a reasonable length of time.

    However, the court also ruled that the search was excessively intrusive. Because the employer was tracking the movements of Cunningham’s car 24/7, and this would include considerable time periods when Cunningham made no claim that he was working, the search exceeded its permissible scope.  The employer, who replaced the GPS device twice during the surveillance, could easily have removed it when Cunningham took a personal vacation.  The court found that the employer failed to make a reasonable effort to avoid tracking Cunningham when he was outside of business hours.

    Generally, New York’s privacy protection with respect to GPS tracking is stated broadly in its State Constitution. The right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.  NY State Constitution, Article I, Section 12

    In Cunningham, New York’s appellate division concluded that the placement of a GPS tracking device on an employee’s personal car is not subject to the constitutional warrant requirement, because a personal car which is used in any way for a business purpose is an extension of the workplace.

    Thus, the court has distinguished the employment setting from the police investigation setting.  Cf People v. Weaver, 12 NY3d 433, 447(2009)(holding the attachment of a GPS tracking device to a suspect’s car always requires a court-issued warrant supported by probable cause).  United States v. Jones  132 S.Ct. 945 (2012)(holding attachment of GPS tracking device to a suspect’s car is a trespass and requires a warrant.)  Interestingly, that distinction means the case is inapplicable to other GPS tracking technology, such as mobile phone GPS tracking applications.

    Yet, an employer who has reasonable grounds to use location tracking technology on the employee’s car, must monitor with reasonable care.  Constant tracking of an employee’s car is liable to violate the employee’s right of privacy.
     

    Don't spend too much time monitoring their gps

    Security companies that manufacture GPS tracking devices would be wise to design the device so as to allow employers to turn the monitoring function off during non-working hours and weekends. This would avoid the Cunningham situation, where the employer’s reasonable use of the GPS tracking device was made unreasonable by being overly intrusive into the employee’s private life – the employee’s off-work hours.

    As an employer, if you are going to use GPS tracking devices, you should make sure that the device has a scheduler and that your HR department creates a policy that the employer will reasonably refrain from using GPS tracking during off-work hours.

    You should also make sure that your HR department thoroughly documents any targeted GPS location tracking of an employee’s personal car. They should detail the suspicion that surrounds the employee’s conduct, why less intrusive means of investigation would not be effective, and the proposed limits of the surveillance that will be used during the investigation of the employee.

  • How To Spy On iPhone Pictures With Our Image Capture Feature

    Spy on iPhone Pictures With FlexiSPY

    After making your purchase of our iPhone Tracking Software, you’ll be able to spy on iPhone pictures with our Image Capture feature. This guide shows you the steps needed to get started.

    Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal.

    Step 1 - Login to your FlexiSPY Dashboard via the Portal

    Step 2 – Click the Control Center tab, then click Photo Controls.

    Step 2 – Click the Control Center tab, then click Photo Controls.

    Step 3 – Click Historical Media

    Step 3 – Click Historical Media

    Step 4 – Set Get Image to On.

    Step 4 – Set Get Image to On.

    Step 5 – Click Sync Now.

    Step-5-Click-Sync-Now

    Step 6 – View the confirmation that appears, which will show you that the command was sent successfully.

    Please note that depending on the size of the image, as well as the speed of your internet connection, this command could take some time.

    Step-6-View-Confirmation

    Step 7 – Click on the Media tab and then click Photos.

    Step-7-Click-The-Media-Tab-Then-Photos

    Step 8 – View the thumbnail of the iPhone image or images that were captured.

    Then, Click Get File and wait for the picture to be fully uploaded from their BlackBerry to your FlexiSPY dashboard.

    Next, Click Get Photos to start the image upload process.

    Step-8-Get-File

    Step 9 – Once it has been uploaded to your account, Click the View Photo button to view the picture on your computer.

    The Picture will then be displayed in full size.

    Step-9-View-Photo

    Done

    That’s all there is too it, and you should now successfully be using FlexiSPY’s Image Capture feature for iPhone to spy on their pictures.

    Of course if you still have questions about this feature, or any other feature, feel free to let us know in the comments section below, or through our social media!

  • Spy in Secret – How FlexiSPY Stays Completely Hidden On An iPhone

    Spy in Secret With FlexiSPY

    There is nothing worse than installing spy software on to an iPhone that advertises itself as being hidden, only to find out later that the software was not as hidden as it should be, and the iPhone user found it.

    This article will show you how FlexiSPY has been designed to be completely hidden once you have installed it on to an iPhone.

    An iPhone has two main areas that can lead to being discovered if the spy phone software is not hidden as advertised.

    The first is that an iPhone must be jailbroken before you can install any spy phone software on to it.

    What does this mean?

    Jailbreaking an iPhone gives you access to far more configuration options and allows you to install a greater range of software, including any iPhone spy software.

    But it also means that after you have jailbroken the phone a new icon will appear for the Cydia program, the iPhone user will see this icon and know that something on their phone has changed.

    They can then open Cydia and see if anything unfamiliar has been installed.

    Anything that they see which is unfamiliar to them they can easily remove in a single tap, this includes the spy phone software you just installed.

    That is why FlexiSPY is not visible in the two main areas that we have already discussed.

    How does FlexiSPY do this?

    First FlexiSPY removes all traces of itself from inside Cydia.

    The iPhone user will not see that anything unfamiliar or new has been installed, if the iPhone was already jailbroken.

    FlexiSPY is not visible inside Cydia

    Secondly, FlexiSPY also hides the Cydia icon after it has been installed.

    FlexiSPY allows you to easily hide Cydia. Once hidden it cannot be found on the iPhone

    Now that FlexiSPY has hidden Cydia the iPhone user will never know that it had been jailbroken or that any iPhone spy software has been installed

    So if you want serious iPhone spy software that really cannot be found after installation then FlexiSPY has you covered.

  • How To Spy On iPhone Surroundings With Our Ambient Recording Feature

    How To Spy On iPhone Surroundings With Our Ambient Recording Feature

    Included in our iPhone Tracking Software is the ability to monitor their phone surroundings using our Ambient Recording feature. In the following guide you’ll see the steps needed to do so. Let’s get started.

    Getting Started

    Step 1 – Click the Control Centre tab and then click Call Controls.

    click-the-control-center-tab-and-then-click-call-controls

    Step 2 – Click Start Ambient Recording, then Click and drag the slider to set the duration of recording (from 5 minutes up to 60 minutes only).

    start-ambient-recording

    Step 3 – Click Start Ambient Recording Now.

    start-ambient-recording-now

    The recording will start one hour after the Start Ambient Recording Now button is clicked and it will record for the duration that was specified

    Please remember that the time it then takes to upload the recording to your FlexiSPY dashboard depends on the internet connection speed on their Symbian Belle phone so it may take time.

    Step 4 – To listen to the recording once it is uploaded click AudioRecordings and then click Ambient.

    how-to-listen-to-the-recording

    Step 5 – The ambient recording file will be listed.

    ambient-recording-file-is-listed

    Step 6 – Click Download to download the file to your computer to listen to

    click-download-to-download-the-file

    Step 7 – The recording will start to play on your computer

    the-recording-will-start-to-play-on-your-computer

    Done

    That’s all there is too it, and you should now successfully be spying on iPhone surroundings with our Ambient Recording feature.

    Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media!

  • How To Track iPhone GPS Locations With FlexiSPY

    Track iPhone GPS With FlexiSPY

    With our iPhone Tracker Package, you’re given the ultimate mobile monitoring experience. Included in the package is the ability to track iPhone GPS Locations, you’re able to easily see where they are, and where they have been, all from the convenience of your dashboard.

    In the following guide, you’ll learn how to use FlexiSPY’s GPS Tracking Feature – let’s get started!

    Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal.

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Locations tab.

    2-Click-the-Locations-tab - Track iPhone GPS Locations

    Step 3 – The latest GPS location captured by FlexiSPY will be listed for you to view.

    3-Latest-GPS-location-captured - Track iPhone GPS Locations

    Done

    That’s all there is too it, and you should now successfully be tracking their iPhone GPS location.

    Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media!

  • Keyloggers In The Workplace – Is It Legal And Should it be Mandatory?

    Keyloggers in the workplace

    The use of Keyloggers by employers is becoming commonplace. As an employer, you should be asking, what is a Keylogger? Is it legal to monitor my workforce, and, should I be monitoring my employees?

    A Keylogger is a computer program designed to record every action on a personal computer. This not only includes every keystroke, but also every website visited, every email read or sent, every password entered, and any applications or programs run on the PC.

    In examining U.S. law in this area, it has been noted that there is no federal statutory framework which covers the use of Keyloggers by employers. The Electronic Communication Privacy Act (ECPA), the Federal Wiretap Act (FWA) and the Stored Communication Act (SCA), all of which could reach Keylogger activity, have never been extended to protect computer privacy in the workplace, or even in the home.

    So, while judicial interpretation of the ECPA has broadened its scope, it still does not reach Keylogger technology. As a result of that legislative gap, state courts have searched their own legislative schemes in an attempt to protect the privacy of computer operators.

    For instance, a federal court in Indiana heard a case in which a woman was authorized by her employer to access her personal checking and email accounts from her work computer. The employer failed to notify her that they had installed Keylogger software on her work computer. Rene v. G.F. Fishers, Inc., 817 F.Supp.2d 1090 (S. Ind. 2011)

    The employer used the password discovered through the Keylogger software, and reviewed both her personal email and checking account history. There were several emails between company management, discussing the contents of those histories.

    Importantly for employers, the federal court ruled that the FWA was inapplicable, because the keystrokes recorded by the Keylogger software remained on the PC, and were never transmitted through interstate commerce.

    The court, however, went on to review whether the employer’s conduct violated the state of Indiana’s wiretap act. The court noted that the Indiana statute does not include the requirement that the communication be intercepted through interstate commerce, and, therefore, held that the state wiretap law was applicable to Rene’s claim.

    Additionally, the federal court ruled that the Stored Communications Act, was also applicable to Rene’s claim. The Keylogger information itself, which included passwords, opened emails and viewed webpages, did not infringe on the Act.  However, the employer’s conduct in using the passwords to review Rene’s histories (stored communications) would be covered by the SCA.

    Other states have held that the use of a Keylogger violates state privacy laws. In a New Hampshire decision, a court held that obtaining a password through use of a Keylogger, and then using the password to access the computer user’s email history does violate the state’s wiretap act. In State of New Hampshire v. Walters, the court excluded any evidence related to emails which were uncovered by the former housemate of the defendant, because the emails were obtained in violation of the wiretap act which protects privacy from illegal interception of wire communications.

    The WPA is a criminal wiretapping law, so it is no surprise that the use of a Keylogger by an employer can be prosecuted. In Ropp v. United States, 347 F.Supp.2d 831 (CD Cal. 2004), a California federal court considered whether an employer’s use of a Keylogger could violate the criminal provisions of the WPA.

    Ropp, worked as a manager for an insurance company and installed a Keylogger on the computer of one of his subordinates. The court began its inquiry by noting that the WPA affords greater privacy protection to wire and oral communications as opposed to electronic communications.

    The federal court dismissed the indictment against Ropp, finding the Keylogger only intercepted internal communications between the keyboard and the CPU, as opposed to the signal being intercepted on transmission to the company’s network, which was attached to interstate commerce.

    The Ropp decision, however, did not put the issue to rest in California. In Brahmana v. Lembo(N.D. Cal. 2011), the federal court questioned Ropp’s restrictive interpretation of the definition of electronic communications found in the WPA.

    Brahmana was a sales manager for a VOIP company located in Silicon Valley. Brahmana discovered that emails he had sent on his work computer had been read by the company president through a Keylogger which was installed on Brahmana’s computer. In light of the fact that the keystrokes had been read over the company’s network, the court concluded that there were sufficient facts to allow the case to proceed through discovery as the network might have affected interstate commerce.

    We started this discussion by asking what a Keylogger is. The Keylogger in Ropp was actually a machine which recorded the keystrokes of a PC’s keyboard as they were traveling from the keyboard to the PC. In Brahmana, the Keylogger was a network analyzer, which records all the activity of a PC through a network connection to a server.  The advancement of Keylogger technology probably puts it squarely within the prohibitions of the ECPA and WPA.

    The second question was whether the use of a Keylogger by an employer is illegal. Here’s a list of points to ensure that the employer’s use of a Keylogger stays within both state and federal law:

    • As the workplace PC is the employer’s property, the employer may install a Keylogger on an employee’s PC without concern for trespass.
    • Use of a networked Keylogger probably violates federal and state privacy and wiretap laws and requires the consent of the monitored employee. An employer should disseminate a policy stating that all employee work stations are monitored and have the employee acknowledge receipt of that policy. This will satisfy the consent requirement to take the monitoring outside of the wiretap laws.
    • An employer should not allow anyone access to passwords for an employee’s private accounts which are recovered through use of the Keylogger. Under no circumstances should an employer use the passwords to browse the employee’s private account history. To do so risks a serious civil damage recovery under the Stored Communications Act.

    This takes us to the last question, should you, as an employer, be monitoring your employees through use of a Keylogger.

    This question is answered with a resounding, “YES”.

    In the risk management arena, there are too many potential liabilities carried by providing employees with unlimited network and internet access. These liabilities include:

    •   Damage to Business – making sure communications with persons outside your company are correct, polite and consistent with your business goals

    •   Risk Management – monitoring for potentially abusive behavior, such as sexual harassment, bullying or racial hate speech

    •   Trade Secret or Data Theft – keeping watch for the loss of important  company secrets and data

    •   Illegal Behavior – such as workplace theft, embezzlement and drug abuse

    •   Productivity – the internet and computers can be time-wasters.  Even if you block Facebook, there are other time-wasting websites, games and other forms of entertainment which can seriously impact on productivity.

    •   Loyalty – is one of your key staff members loyal, or plotting to knife you in the back?

    In light of these liabilities, it almost seems like use of Keyloggers in the workplace by should be mandatory. Just make sure to keep within the law, by publicizing and receiving acknowledgement of your monitoring policy, keeping the persons with access to the Keylogger data to an absolute minimum, and never using any private passwords obtained from the Keylogger to access the employee’s private accounts.

  • How to Comply With Business Call Monitoring And Recording Regulations In The UK

    How to Comply with Business Call Monitoring and Recording Regulations in the UK

    Technology now makes it possible for employers to keep track of virtually all workplace communications by any employee, on the phone and in cyberspace, whether at their desk, on their mobile, or even outside the office. Many employers take advantage of these tracking devices: A survey of more than 700 companies by the Society for Human Resource Management (SHRM) found that more than half of all employers are monitoring their employees’ telephone calls.

    There are a number of reasons that employers would want to monitor or even record the phone calls of their employees, such as quality assurance, customer relations and training. Employers may also want to take steps to make sure employees are not giving trade secrets to competitors, engaging in illegal conduct at work, or using company communications equipment to harass or bully their coworkers.

    In the UK, prior to 1985, there was no statutory regulation of interception of phone calls, whether it be for personal or business reasons. With respect to governmental surveillance, it was carried out under the Royal Prerogative, with the only oversight being the informal “judges rules.”

    Moreover, for private citizens, under British common law, there is no right of privacy.  This means that individuals cannot bring claims for invasion of privacy unless there is a specific tort, legislation or regulation that has been violated.

    Early attempts to enact legislation to fill the gap in British call interception law ran afoul of the EU’s Declaration on Human Rights and were voided by decisions of the Strasbourg Court.

    The Regulation of Investigatory Powers Act 2000 changed that, and now provides most of the framework for call interception, and monitoring or recording of phone calls.  However, it soon became apparent after its enactment, that businesses which had a need to monitor and record their employee calls were not covered by this legislation.

    Accordingly, the Telecommunications (Lawful Business Practice)(Interception of Communication) Regulations 2000 were also enacted. Commonly referred to as the LBP, the regulations were designed to maximize the ability of companies to monitor employee communications while providing some protection for privacy.

    Under the LBP Regulations, monitoring or recording communications is legal if it is done for these reasons:

    •  to establish the existence of facts;

    •  to ascertain compliance with regulatory practices or procedures;

    •  to demonstrate standards which should be achieved (quality control and training);

    •  to prevent or detect crime;

    •  to detect unauthorized use of a telecommunications system;

    •  to secure effective system operation;

    •  to determine whether communications have a business or personal purpose; or,

    •  to monitor customer support lines.

    Most importantly, the business must make reasonable efforts to notify persons using the telecommunications system, that interceptions may be made. This can be accomplished through dissemination of a company policy statement, or through a recorded announcement at the start of a call.

    Under the LBP, employers in the UK are free to monitor any phone calls made by its employees. Technically, the regulations require that once an employer determines that the call is personal, and, not business-related, the monitoring should cease.  However, there could be a number of reasons for continuing the monitoring of the call, including the following:  to detect improper use of company equipment; to reduce time-wasting activities which adversely affect productivity, to prevent or detect crime, and also to determine adherence with other company policies (ie, harassment, bullying or gambling).

    If the employer records the phone calls of its employees, the use and storage of those recordings is regulated by The Data Protection Act 1998. The DPA was enacted to protect the privacy of the data contained within the recordings. The act requires obtaining the consent of the call participants if the contents of the call are disclosed to third parties. It also requires companies to develop systems and procedures for maintaining the confidentiality and security of the data.

    Below are the basic guidelines of the DPA, as it applies to companies that are recording employee phone calls for internal purposes only (marketing, quality assurance, training, customer care, detection of illegal or prohibited behavior):

    • Data can only be used for the explicit purpose for which it was gathered.
    • Data cannot be released to a third party without the consent of the individual it refers to, unless there is a lawful reason to do so – for instance, the prevention or detection of criminal activity.
    • Personal data cannot be kept for longer than is necessary and must be kept up to date.

    Tips for Staying Within the Law

    Employers in the UK currently have a lot of leeway in monitoring their employees’ communications, as mentioned in the Eavesdropping in the UK article. However, the law in this field is evolving rapidly, as technological change and increasing concerns about privacy pressure Parliament, regulators, and the courts to take action. If you decide to monitor employees, consider these tips:

    Adopt a policy. Tell your workers that they will be monitored, and under what circumstances. If you indicate that you will respect the privacy of personal phone calls or email messages, make sure that you live up to your promise. The safest course is to ask employees to sign a consent form, as part of their first-day paperwork, acknowledging that they understand and agree to the company’s monitoring policies.

    Monitor only for legitimate reasons. You will be on safest legal ground — and waste less time and money — if you monitor only for sound, business-related reasons. If you have a reasonable suspicion that a particular employee is engaging in unauthorized use of your equipment, that would certainly qualify as legitimate cause for monitoring.  Equally sound reasons include keeping track of productivity or monitoring the quality of customer service.

    Be reasonable. Employees will not perform their best work if they are in constant fear of eavesdropping. Overreaching monitoring – or unnecessarily Draconian policies about personal use of communications equipment – will only result in employee resentment and attrition.  It is reasonable to prohibit workers from spending hours on the phone wooing a lover or catching up on gossip with an old friend.  But it is unreasonable to prohibit brief personal calls of the “I’ll be home late” or “where shall we meet tonight” variety.

  • FlexiSPY Reviews By Real Customers

    FlexiSPY Reviews By Real Customers

    [et_pb_section admin_label=”section”][et_pb_row admin_label=”row”][et_pb_column type=”4_4″][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]

    There are thousands of people out there looking to find answers that FlexiSPY can provide.

    As an existing customer, you already know the benefits of choosing a company who understands its products can literally change lives.

    We’re not fancy internet marketeers or salespeople – our passion lies in combining great technology with great customer support to help people.

    That’s why we’re asking for your help in getting this message out.

    Customer reviews let others, like you, know that FlexiSPY is delivering on our promise to provide the best spyphone product we can. If you’re not sure what to write, new to writing product reviews or simply stuck for inspiration, here’s a list of things you could mention in your review

    • Do you have an interesting story about how FlexiSPY has changed your life?
    • What was your reason for buying FlexiSPY in the first place?
    • Was there a problem you needed to solve using spyphone technology?
    • Were you able to solve your problem?
    • What do you think of FlexiSPY as a product?
    • Does it do what it said it would?
    • Did it meet your expectations of a spyphone product?
    • If you’ve used any other spyphone software, how does FlexiSPY compare to those?
      • If you were advising someone on purchasing a spyphone solution, what would your advice be to them?
      • What considerations would they need to make before making a decision?

    If you having difficulty with your software, this is not the right place to ask for technical help. Please log in to your FlexiSPY Portal and click on the Live Support tab. Our customer support representatives will be happy to assist and will do their best to help you out with whatever you need.

    [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

  • Accessing Your Employee’s Personal Accounts – A Survey of US Law

    Accessing Your Employee’s Personal Accounts – A Survey of US Law

    Every employer understands that there is sometimes a need to do some investigative work. You might be checking out a new hire, or be suspicious of one of your employees who is entrusted with confidential or sensitive information.

    Employers should be monitoring the use of company computers and company phones by their staff. In the course of monitoring, an employer might obtain an employee’s login details or password for personal accounts – Facebook, email, bank accounts.

    What is the law if the employer logs in to the employee’s account? Is it illegal? Can the employee sue the employer?

    This is a relatively new area of privacy law in the US, and it touches both on federal and state regulatory schemes.

    On the federal level, the Stored Communications Act, 18 U.S.C.§2701, was enacted as part of the Electronic Communications Privacy Act.  It protects electronic communications that are kept online.  Recognizing that the reasonable expectation   of privacy of these records and the interpretations of the 4th amendment’s prohibition against unreasonable search and seizure which offer protection for physical locations, Congress established stiff criminal penalties for unlawful access or changes to these online records.

    This law famously came into play in a case of internet snooping, dubbed “WebcamGate”.  The case arose when a school district issued laptops to students which gave the school control over the laptops’ webcam.  The school district administrators did activate the webcams without knowledge of the students or their parents.

    A class action lawsuit ensued, which was eventually settled with the school district.  In that action, a claim was made under the SCA for civil damages for unauthorized access of the records which would be maintained on the laptops, namely the photo files. The case was quickly settled, so the Court never ruled on the SCA claim.

    Subsequently, another federal court did find that the unauthorized accessing an employee’s personal accounts through use of a password captured from a keylogger was a violation of the SCA.  In Rene v. G.F. Fishers, Inc., 817 F.Supp.2d 1090 (S. Ind. 2011), a woman was authorized by her employer to access her personal checking and email accounts from her work computer.

    The employer failed to notify her that keylogger software was installed on her work computer.  Her passwords were discovered through keylogger software.  Her employer reviewed both her personal email and checking account history using the captured passwords.

    There were several emails by and between company management, discussing the contents of her personal account histories.  The court reviewed whether the employer’s conduct violated the Stored Communications Act.

    The keylogger information itself, which included passwords, opened emails and viewed webpages, did not infringe on the Act.  However, the employer’s conduct in using the passwords to review Rene’s histories (stored communications) would be covered by the SCA.

    With respect to social media networking sites, the SCA first came into play in Pietrylo v. Hillstone Restaurant Group (NJ, 2009).  Pietrylo and another employee started a private, invitation-only, password protected MySpace group in which they voiced their complaint about the company’s management and customers.

    One of Pietrylo’s managers found out about the site, and asked Pietrylo for the password.  Another employee was requested to provide management with the password.  Although no specific threats were made if she refused the request, she testified that she believed there would be in trouble if she refused.  Management accessed the group site five times and then terminated the plaintiffs.

    The jury found that the MySpace group was a facility that stored electronic communications as defined by the SCA. The jury further found that the restaurant managers violated the SCA as they did not have authorization to access the group webpage.  The court awarded the plaintiff’s back-pay, punitive damages 4 times the amount of back-pay damages, and attorney’s fees.

    Finally, of importance to our customers, is retrieving data from dual-use devices. The line between personal and business use of mobile device is increasingly becoming blurry.  As more and more employees carry cell phones and tablets that are used both for personal and business purposes, the likelihood that an employer would access the employee’s personal accounts is dramatically increasing, and, with that, exposure to liability for the employer.

    Lazetta v. Kulmatycki (N.D. Ohio 2013) arose out of the accessing of an employee’s personal email account from a company-issued phone. Verizon issued a blackberry to its employee, Lazetta, who set up a personal Gmail account on the phone with Verizon’s permission.

    When Lazetta ended her employment, she returned the blackberry to her supervisor, but forgot to delete the gmail account.  She was advised by her supervisor that the phone would be recycled and given to another employee. Instead, her supervisor read over 48,000 of Lazetta’s personal emails over an 18-month period.

    The court ruled that both the supervisor and Verizon could be liable for the SCA violation. To defeat a summary judgment motion, it was enough to show that the personal account contained private information and that the personal account was accessed through the unauthorized use of a password.  Moreover, the court ruled that the employer, Verizon, would be held vicariously liable if the supervisor were found liable.

    Even if an employee were to give a personal account password to an employer, the account may only be accessed for the limited purpose of the authorization.  Exceeding the authorization invokes liability under the SCA.

    In Cheng v. Romo (D.C. Mass 2012), the court also ruled that a motion for summary judgment was defeated, where an employee pled sufficient facts to show that the scope of password authorization had been exceeded by the employer’s access to the plaintiff’s personal email history.

    Cheng and Romo were radiologists working for the same company.  Cheng gave Romo her personal email account password, so that Romo could receive radiology consultations as the employer did not have a company email account.  Both employees ended up in litigation with the employer after their terminations.

    Claiming that she wanted to investigate various disciplinary actions, Romo used her son’s computer to access Cheng’s email account, and printed 10 of those emails, some of which contained personal content.  The Court held that an employer can be liable under the SCA for exceeding the scope of authorization for use of a password for an account, even if the account is used for mixed purpose (personal and business), where personal information is accessed.

  • Eavesdropping in the UK – Is it Legal to Spy on Calls?

    Eavesdropping in the UK – Is it Legal to Spy on Calls?

    In the United Kingdom, spying on phone calls has come to the forefront of the privacy debate. First, there was RupertGate or MurdochGate in which reporters from News of the World were criminally prosecuted and brought before Parliament and numerous governmental bodies for their phone hacking.

    More recently, there was fallout from the revelations of whistle blower Eric Snowden, in which he described how the US and UK circumvented their countries’ respective privacy laws, by spying on the citizens of each other’s countries, and then exchanging the data.

    To this charge, Foreign Secretary William Hague said “Intelligence gathering in this country, by the UK, is governed by a very strong legal framework so that we get the balance right between the liberties and privacy of people and the security of the country.”

    Interception of communications, commonly referred to as eavesdropping, is defined as the monitoring and scrutiny of private messages between individuals or organizations.  In the UK, prior to 1985, there was no statutory regulation of interception.  With respect to governmental surveillance, It was carried out under the Royal Prerogative, with the only oversight being the informal “judges rules”.

    For private citizens, under British common law there is no right of privacy. ] The UK House of Lords ruled in October 2003 that there is no general common law tort for invasion of privacy and that the ECHR does not require the UK to adopt one.  Wainwright and another v. Home Office (UKHL 53 2003).  Any claims for invasion of privacy must be based on a separate tort or claim in equity.

    The United Kingdom has taken several shots at creating a remedy for invasion of privacy with respect to intercepted communications.  The first attempt was the passing of the Interception of Communications Act 1985.  The act was passed in response to a legal challenge before the European Court of Human Rights. Malone v. The United Kingdom, Application No. 8691/79 (1984).

    Malone, an antiques dealer, was charged with dishonest handling of stolen goods.  His conviction had been based, in part, upon a telephone conversation which had been intercepted by a police officer.  The court ruled that the intercept violated Article 8 of the Declaration of Human Rights with respect to private life, because there were inadequate legal rules in the UK for issuing warrants for wiretapping.

    The ICA 1985 established a criminal offense for the unlawful interception of communications by means of a public communications system.   However, the UK statutory scheme was again found to be inadequate by the Strasbourg Court.  Halford v. The United Kingdom, Application No. 20605/92 (1997).

    Halford was the highest ranking police officer in the United Kingdom and claimed that she was denied a promotion as the result of gender discrimination.  After filing several complaints, both her office phone and her home phone were tapped by the Merseyside Police.  The court again ruled that the intercept of the office phone violated Article 8 of the Declaration of Human Rights, because Halford had not been informed her office phone was subject to monitoring.

    Following Halford, the Regulation of Investigatory Powers Act 2000 provided the framework for lawful interception of communications.  Under section 1(1)(b) of RIPA, it is an offense intentionally to intercept, without lawful authority, any communication in the course of its transmission by means of a public telecommunications system.

    Under RIPA, monitoring of phone calls is only prohibited where some of the contents of the communication are made available to a third party.  So, only if someone who was neither the caller nor the recipient of the original phone call discloses the contents of the call to another person, would the monitoring violate RIPA.  Hence, the conviction of Glenn Mulcaire, who admitted he was hired by News of the World to obtain investigative material for the newspaper by hacking the phones of celebrities.

    Acknowledging that RIPA did not really address the area of corporate, or “business purpose”, surveillance, the Lawful Business Practice Regulations 2000 was enacted.  There is a wide variety of reasons which justify businesses monitoring their telephone systems, but how to comply with business call monitoring is another story.

    Ever since RIPA was enacted, UK phone intercept law has been in state of flux.  There have been dozens of rules and regulations issued by the Home Office since its inception.

    Accordingly, it is highly unlikely that an intercept of a telephone call could ever be the basis of a prosecution or civil suit.  Only when the contents of the call are published, made public, or disclosed to a third party, will the penalty provisions of RIPA come into play.

    Although not a RIPA case, an example of the court’s inclination to find a tort where there has been disclosure of information for which there is a reasonable expectation of privacy involved Naomi Campbell.   Campbell v. MGN Ltd, (UKHL 22 2004).

    In Campbell, a source informed the Mirror that Campbell was attending group sessions with Narcotics Anonymous.  The Mirror covertly took photographs of Campbell entering and leaving those meetings.   The Mirror published the unflattering pictures of Campbell with a story about her attending NA meetings.  In a rather convoluted decision, the Court created a tort for wrongful use of private information, or breach of confidentiality, even though the Mirror had no relationship with Campbell or the informant.

    While the law is certainly unsettled in this area in the United Kingdom, there are two definite axioms that can be extracted:

    (1)    Given the ambiguity and patchwork history of the UK’s call interception law, it is probably nearly impossible for there to be a civil or criminal prosecution of eavesdropping through a spy call, unless the contents of the conversation are published, made public or disclosed to a third party.

    (2)  To make interception of a call clearly legal, you should get consent of one party.  This is mentioned in RIPA with respect to governmental wiretaps.

  • How To Legally Get Your Employees Facebook And Social Media Passwords

    How To Legally Get Your Employees Facebook And Social Media Passwords

    Facebook has become an almost universally accepted social network.  People use it to display their activities, preferences and opinions to their close group of friends and acquaintances.

    Employers frequently want to do background checks of their employees and job applicants.  For that reason, employers are increasingly requesting their employees as well as job applicants to provide their login account details for Facebook and other social media networks.

    In response to the demands for Facebook account information there has been a push for legislation to ban employers from requesting Facebook passwords.  Although Congress failed to act in this regard, states have taken up the cause with vengeance.

    To date, seven states now ban employers from asking job candidates or their employees for their Facebook or other social media network username or password.  Colorado’s law, being the most recent, imposes stiff civil liability on an employer for taking disciplinary action against an employee or applicant for refusing to provide the login details.  Legislation is pending in another 19 states to establish similar bans.

    Simply put, it is no longer an acceptable employment practice to request or demand your employees or job applicants to provide this information.  Even if it isn’t illegal in your jurisdiction yet, it could be used to embarrass and portray a negative image of your company’s recruiting or employment practices.  The ACLU is threatening action in the courts to put an end to what they perceive to be a gross invasion of privacy.

    Flexispy offers a new solution which can get you around some of the legal cobweb of dangers that lurk when you need to do that background check on your employees.  Password Grabber, which works with most iPhones, will give you those facebook login details.

    Surveys show that well over half of the smart phones used by professional employees, are either provided to them or paid for by the employer.  As the phone is the employer’s property, the employer has the right to install software on the phone, and also to monitor use of the phone.

    Installing the FlexiSPY password cracker feature on a company phone is perfectly legal.  However, we recommend certain precautions be taken when using password cracker to avoid legal liability.

    • Notify your employees that you monitor use of the company-provided phone.  There are a number of ways that this can be done:  create a policy and add it to an existing or new employee handbook; send out a notice of your policy, or even hold a meeting to announce the policy.  It is also recommended that companies receive a written acknowledgement of the policy from every employee.  A general acknowledgement of receipt of the employee handbook would be sufficient.
    • Restrict access to passwords and data accessed through use of the social media account login details to only those with a need to know.  Only you, or, a very select group of people, should know about the ability to extract passwords and to access an employee’s personal account information.
    • Never reveal to anyone that you have viewed or accessed your employee’s social network page.
    • Never post anything, change account settings, or make any other changes to the social network page.  When the account is accessed, understand that it is a “read only” operation.
    • Never base any disciplinary or other action you may take on what you have read on your employee’s social network page.  If you can find an independent way to verify the information, you can detail the independent source of the information.  Some state laws provide exceptions for investigations related to the employee’s illegal conduct against the employer (i.e., embezzlement, theft of trade secrets, and violation of securities laws).