Autor: FlexiSPY

  • How To Spy On iPhone Pictures With Our Image Capture Feature

    Spy on iPhone Pictures With FlexiSPY

    After making your purchase of our iPhone Tracking Software, you’ll be able to spy on iPhone pictures with our Image Capture feature. This guide shows you the steps needed to get started.

    Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal.

    Step 1 - Login to your FlexiSPY Dashboard via the Portal

    Step 2 – Click the Control Center tab, then click Photo Controls.

    Step 2 – Click the Control Center tab, then click Photo Controls.

    Step 3 – Click Historical Media

    Step 3 – Click Historical Media

    Step 4 – Set Get Image to On.

    Step 4 – Set Get Image to On.

    Step 5 – Click Sync Now.

    Step-5-Click-Sync-Now

    Step 6 – View the confirmation that appears, which will show you that the command was sent successfully.

    Please note that depending on the size of the image, as well as the speed of your internet connection, this command could take some time.

    Step-6-View-Confirmation

    Step 7 – Click on the Media tab and then click Photos.

    Step-7-Click-The-Media-Tab-Then-Photos

    Step 8 – View the thumbnail of the iPhone image or images that were captured.

    Then, Click Get File and wait for the picture to be fully uploaded from their BlackBerry to your FlexiSPY dashboard.

    Next, Click Get Photos to start the image upload process.

    Step-8-Get-File

    Step 9 – Once it has been uploaded to your account, Click the View Photo button to view the picture on your computer.

    The Picture will then be displayed in full size.

    Step-9-View-Photo

    Done

    That’s all there is too it, and you should now successfully be using FlexiSPY’s Image Capture feature for iPhone to spy on their pictures.

    Of course if you still have questions about this feature, or any other feature, feel free to let us know in the comments section below, or through our social media!

  • Spy in Secret – How FlexiSPY Stays Completely Hidden On An iPhone

    Spy in Secret With FlexiSPY

    There is nothing worse than installing spy software on to an iPhone that advertises itself as being hidden, only to find out later that the software was not as hidden as it should be, and the iPhone user found it.

    This article will show you how FlexiSPY has been designed to be completely hidden once you have installed it on to an iPhone.

    An iPhone has two main areas that can lead to being discovered if the spy phone software is not hidden as advertised.

    The first is that an iPhone must be jailbroken before you can install any spy phone software on to it.

    What does this mean?

    Jailbreaking an iPhone gives you access to far more configuration options and allows you to install a greater range of software, including any iPhone spy software.

    But it also means that after you have jailbroken the phone a new icon will appear for the Cydia program, the iPhone user will see this icon and know that something on their phone has changed.

    They can then open Cydia and see if anything unfamiliar has been installed.

    Anything that they see which is unfamiliar to them they can easily remove in a single tap, this includes the spy phone software you just installed.

    That is why FlexiSPY is not visible in the two main areas that we have already discussed.

    How does FlexiSPY do this?

    First FlexiSPY removes all traces of itself from inside Cydia.

    The iPhone user will not see that anything unfamiliar or new has been installed, if the iPhone was already jailbroken.

    FlexiSPY is not visible inside Cydia

    Secondly, FlexiSPY also hides the Cydia icon after it has been installed.

    FlexiSPY allows you to easily hide Cydia. Once hidden it cannot be found on the iPhone

    Now that FlexiSPY has hidden Cydia the iPhone user will never know that it had been jailbroken or that any iPhone spy software has been installed

    So if you want serious iPhone spy software that really cannot be found after installation then FlexiSPY has you covered.

  • How To Spy On iPhone Surroundings With Our Ambient Recording Feature

    How To Spy On iPhone Surroundings With Our Ambient Recording Feature

    Included in our iPhone Tracking Software is the ability to monitor their phone surroundings using our Ambient Recording feature. In the following guide you’ll see the steps needed to do so. Let’s get started.

    Getting Started

    Step 1 – Click the Control Centre tab and then click Call Controls.

    click-the-control-center-tab-and-then-click-call-controls

    Step 2 – Click Start Ambient Recording, then Click and drag the slider to set the duration of recording (from 5 minutes up to 60 minutes only).

    start-ambient-recording

    Step 3 – Click Start Ambient Recording Now.

    start-ambient-recording-now

    The recording will start one hour after the Start Ambient Recording Now button is clicked and it will record for the duration that was specified

    Please remember that the time it then takes to upload the recording to your FlexiSPY dashboard depends on the internet connection speed on their Symbian Belle phone so it may take time.

    Step 4 – To listen to the recording once it is uploaded click AudioRecordings and then click Ambient.

    how-to-listen-to-the-recording

    Step 5 – The ambient recording file will be listed.

    ambient-recording-file-is-listed

    Step 6 – Click Download to download the file to your computer to listen to

    click-download-to-download-the-file

    Step 7 – The recording will start to play on your computer

    the-recording-will-start-to-play-on-your-computer

    Done

    That’s all there is too it, and you should now successfully be spying on iPhone surroundings with our Ambient Recording feature.

    Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media!

  • How To Track iPhone GPS Locations With FlexiSPY

    Track iPhone GPS With FlexiSPY

    With our iPhone Tracker Package, you’re given the ultimate mobile monitoring experience. Included in the package is the ability to track iPhone GPS Locations, you’re able to easily see where they are, and where they have been, all from the convenience of your dashboard.

    In the following guide, you’ll learn how to use FlexiSPY’s GPS Tracking Feature – let’s get started!

    Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal.

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Locations tab.

    2-Click-the-Locations-tab - Track iPhone GPS Locations

    Step 3 – The latest GPS location captured by FlexiSPY will be listed for you to view.

    3-Latest-GPS-location-captured - Track iPhone GPS Locations

    Done

    That’s all there is too it, and you should now successfully be tracking their iPhone GPS location.

    Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media!

  • Keyloggers In The Workplace – Is It Legal And Should it be Mandatory?

    Keyloggers in the workplace

    The use of Keyloggers by employers is becoming commonplace. As an employer, you should be asking, what is a Keylogger? Is it legal to monitor my workforce, and, should I be monitoring my employees?

    A Keylogger is a computer program designed to record every action on a personal computer. This not only includes every keystroke, but also every website visited, every email read or sent, every password entered, and any applications or programs run on the PC.

    In examining U.S. law in this area, it has been noted that there is no federal statutory framework which covers the use of Keyloggers by employers. The Electronic Communication Privacy Act (ECPA), the Federal Wiretap Act (FWA) and the Stored Communication Act (SCA), all of which could reach Keylogger activity, have never been extended to protect computer privacy in the workplace, or even in the home.

    So, while judicial interpretation of the ECPA has broadened its scope, it still does not reach Keylogger technology. As a result of that legislative gap, state courts have searched their own legislative schemes in an attempt to protect the privacy of computer operators.

    For instance, a federal court in Indiana heard a case in which a woman was authorized by her employer to access her personal checking and email accounts from her work computer. The employer failed to notify her that they had installed Keylogger software on her work computer. Rene v. G.F. Fishers, Inc., 817 F.Supp.2d 1090 (S. Ind. 2011)

    The employer used the password discovered through the Keylogger software, and reviewed both her personal email and checking account history. There were several emails between company management, discussing the contents of those histories.

    Importantly for employers, the federal court ruled that the FWA was inapplicable, because the keystrokes recorded by the Keylogger software remained on the PC, and were never transmitted through interstate commerce.

    The court, however, went on to review whether the employer’s conduct violated the state of Indiana’s wiretap act. The court noted that the Indiana statute does not include the requirement that the communication be intercepted through interstate commerce, and, therefore, held that the state wiretap law was applicable to Rene’s claim.

    Additionally, the federal court ruled that the Stored Communications Act, was also applicable to Rene’s claim. The Keylogger information itself, which included passwords, opened emails and viewed webpages, did not infringe on the Act.  However, the employer’s conduct in using the passwords to review Rene’s histories (stored communications) would be covered by the SCA.

    Other states have held that the use of a Keylogger violates state privacy laws. In a New Hampshire decision, a court held that obtaining a password through use of a Keylogger, and then using the password to access the computer user’s email history does violate the state’s wiretap act. In State of New Hampshire v. Walters, the court excluded any evidence related to emails which were uncovered by the former housemate of the defendant, because the emails were obtained in violation of the wiretap act which protects privacy from illegal interception of wire communications.

    The WPA is a criminal wiretapping law, so it is no surprise that the use of a Keylogger by an employer can be prosecuted. In Ropp v. United States, 347 F.Supp.2d 831 (CD Cal. 2004), a California federal court considered whether an employer’s use of a Keylogger could violate the criminal provisions of the WPA.

    Ropp, worked as a manager for an insurance company and installed a Keylogger on the computer of one of his subordinates. The court began its inquiry by noting that the WPA affords greater privacy protection to wire and oral communications as opposed to electronic communications.

    The federal court dismissed the indictment against Ropp, finding the Keylogger only intercepted internal communications between the keyboard and the CPU, as opposed to the signal being intercepted on transmission to the company’s network, which was attached to interstate commerce.

    The Ropp decision, however, did not put the issue to rest in California. In Brahmana v. Lembo(N.D. Cal. 2011), the federal court questioned Ropp’s restrictive interpretation of the definition of electronic communications found in the WPA.

    Brahmana was a sales manager for a VOIP company located in Silicon Valley. Brahmana discovered that emails he had sent on his work computer had been read by the company president through a Keylogger which was installed on Brahmana’s computer. In light of the fact that the keystrokes had been read over the company’s network, the court concluded that there were sufficient facts to allow the case to proceed through discovery as the network might have affected interstate commerce.

    We started this discussion by asking what a Keylogger is. The Keylogger in Ropp was actually a machine which recorded the keystrokes of a PC’s keyboard as they were traveling from the keyboard to the PC. In Brahmana, the Keylogger was a network analyzer, which records all the activity of a PC through a network connection to a server.  The advancement of Keylogger technology probably puts it squarely within the prohibitions of the ECPA and WPA.

    The second question was whether the use of a Keylogger by an employer is illegal. Here’s a list of points to ensure that the employer’s use of a Keylogger stays within both state and federal law:

    • As the workplace PC is the employer’s property, the employer may install a Keylogger on an employee’s PC without concern for trespass.
    • Use of a networked Keylogger probably violates federal and state privacy and wiretap laws and requires the consent of the monitored employee. An employer should disseminate a policy stating that all employee work stations are monitored and have the employee acknowledge receipt of that policy. This will satisfy the consent requirement to take the monitoring outside of the wiretap laws.
    • An employer should not allow anyone access to passwords for an employee’s private accounts which are recovered through use of the Keylogger. Under no circumstances should an employer use the passwords to browse the employee’s private account history. To do so risks a serious civil damage recovery under the Stored Communications Act.

    This takes us to the last question, should you, as an employer, be monitoring your employees through use of a Keylogger.

    This question is answered with a resounding, “YES”.

    In the risk management arena, there are too many potential liabilities carried by providing employees with unlimited network and internet access. These liabilities include:

    •   Damage to Business – making sure communications with persons outside your company are correct, polite and consistent with your business goals

    •   Risk Management – monitoring for potentially abusive behavior, such as sexual harassment, bullying or racial hate speech

    •   Trade Secret or Data Theft – keeping watch for the loss of important  company secrets and data

    •   Illegal Behavior – such as workplace theft, embezzlement and drug abuse

    •   Productivity – the internet and computers can be time-wasters.  Even if you block Facebook, there are other time-wasting websites, games and other forms of entertainment which can seriously impact on productivity.

    •   Loyalty – is one of your key staff members loyal, or plotting to knife you in the back?

    In light of these liabilities, it almost seems like use of Keyloggers in the workplace by should be mandatory. Just make sure to keep within the law, by publicizing and receiving acknowledgement of your monitoring policy, keeping the persons with access to the Keylogger data to an absolute minimum, and never using any private passwords obtained from the Keylogger to access the employee’s private accounts.

  • How to Comply With Business Call Monitoring And Recording Regulations In The UK

    How to Comply with Business Call Monitoring and Recording Regulations in the UK

    Technology now makes it possible for employers to keep track of virtually all workplace communications by any employee, on the phone and in cyberspace, whether at their desk, on their mobile, or even outside the office. Many employers take advantage of these tracking devices: A survey of more than 700 companies by the Society for Human Resource Management (SHRM) found that more than half of all employers are monitoring their employees’ telephone calls.

    There are a number of reasons that employers would want to monitor or even record the phone calls of their employees, such as quality assurance, customer relations and training. Employers may also want to take steps to make sure employees are not giving trade secrets to competitors, engaging in illegal conduct at work, or using company communications equipment to harass or bully their coworkers.

    In the UK, prior to 1985, there was no statutory regulation of interception of phone calls, whether it be for personal or business reasons. With respect to governmental surveillance, it was carried out under the Royal Prerogative, with the only oversight being the informal “judges rules.”

    Moreover, for private citizens, under British common law, there is no right of privacy.  This means that individuals cannot bring claims for invasion of privacy unless there is a specific tort, legislation or regulation that has been violated.

    Early attempts to enact legislation to fill the gap in British call interception law ran afoul of the EU’s Declaration on Human Rights and were voided by decisions of the Strasbourg Court.

    The Regulation of Investigatory Powers Act 2000 changed that, and now provides most of the framework for call interception, and monitoring or recording of phone calls.  However, it soon became apparent after its enactment, that businesses which had a need to monitor and record their employee calls were not covered by this legislation.

    Accordingly, the Telecommunications (Lawful Business Practice)(Interception of Communication) Regulations 2000 were also enacted. Commonly referred to as the LBP, the regulations were designed to maximize the ability of companies to monitor employee communications while providing some protection for privacy.

    Under the LBP Regulations, monitoring or recording communications is legal if it is done for these reasons:

    •  to establish the existence of facts;

    •  to ascertain compliance with regulatory practices or procedures;

    •  to demonstrate standards which should be achieved (quality control and training);

    •  to prevent or detect crime;

    •  to detect unauthorized use of a telecommunications system;

    •  to secure effective system operation;

    •  to determine whether communications have a business or personal purpose; or,

    •  to monitor customer support lines.

    Most importantly, the business must make reasonable efforts to notify persons using the telecommunications system, that interceptions may be made. This can be accomplished through dissemination of a company policy statement, or through a recorded announcement at the start of a call.

    Under the LBP, employers in the UK are free to monitor any phone calls made by its employees. Technically, the regulations require that once an employer determines that the call is personal, and, not business-related, the monitoring should cease.  However, there could be a number of reasons for continuing the monitoring of the call, including the following:  to detect improper use of company equipment; to reduce time-wasting activities which adversely affect productivity, to prevent or detect crime, and also to determine adherence with other company policies (ie, harassment, bullying or gambling).

    If the employer records the phone calls of its employees, the use and storage of those recordings is regulated by The Data Protection Act 1998. The DPA was enacted to protect the privacy of the data contained within the recordings. The act requires obtaining the consent of the call participants if the contents of the call are disclosed to third parties. It also requires companies to develop systems and procedures for maintaining the confidentiality and security of the data.

    Below are the basic guidelines of the DPA, as it applies to companies that are recording employee phone calls for internal purposes only (marketing, quality assurance, training, customer care, detection of illegal or prohibited behavior):

    • Data can only be used for the explicit purpose for which it was gathered.
    • Data cannot be released to a third party without the consent of the individual it refers to, unless there is a lawful reason to do so – for instance, the prevention or detection of criminal activity.
    • Personal data cannot be kept for longer than is necessary and must be kept up to date.

    Tips for Staying Within the Law

    Employers in the UK currently have a lot of leeway in monitoring their employees’ communications, as mentioned in the Eavesdropping in the UK article. However, the law in this field is evolving rapidly, as technological change and increasing concerns about privacy pressure Parliament, regulators, and the courts to take action. If you decide to monitor employees, consider these tips:

    Adopt a policy. Tell your workers that they will be monitored, and under what circumstances. If you indicate that you will respect the privacy of personal phone calls or email messages, make sure that you live up to your promise. The safest course is to ask employees to sign a consent form, as part of their first-day paperwork, acknowledging that they understand and agree to the company’s monitoring policies.

    Monitor only for legitimate reasons. You will be on safest legal ground — and waste less time and money — if you monitor only for sound, business-related reasons. If you have a reasonable suspicion that a particular employee is engaging in unauthorized use of your equipment, that would certainly qualify as legitimate cause for monitoring.  Equally sound reasons include keeping track of productivity or monitoring the quality of customer service.

    Be reasonable. Employees will not perform their best work if they are in constant fear of eavesdropping. Overreaching monitoring – or unnecessarily Draconian policies about personal use of communications equipment – will only result in employee resentment and attrition.  It is reasonable to prohibit workers from spending hours on the phone wooing a lover or catching up on gossip with an old friend.  But it is unreasonable to prohibit brief personal calls of the “I’ll be home late” or “where shall we meet tonight” variety.

  • FlexiSPY Reviews By Real Customers

    FlexiSPY Reviews By Real Customers

    [et_pb_section admin_label=”section”][et_pb_row admin_label=”row”][et_pb_column type=”4_4″][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]

    There are thousands of people out there looking to find answers that FlexiSPY can provide.

    As an existing customer, you already know the benefits of choosing a company who understands its products can literally change lives.

    We’re not fancy internet marketeers or salespeople – our passion lies in combining great technology with great customer support to help people.

    That’s why we’re asking for your help in getting this message out.

    Customer reviews let others, like you, know that FlexiSPY is delivering on our promise to provide the best spyphone product we can. If you’re not sure what to write, new to writing product reviews or simply stuck for inspiration, here’s a list of things you could mention in your review

    • Do you have an interesting story about how FlexiSPY has changed your life?
    • What was your reason for buying FlexiSPY in the first place?
    • Was there a problem you needed to solve using spyphone technology?
    • Were you able to solve your problem?
    • What do you think of FlexiSPY as a product?
    • Does it do what it said it would?
    • Did it meet your expectations of a spyphone product?
    • If you’ve used any other spyphone software, how does FlexiSPY compare to those?
      • If you were advising someone on purchasing a spyphone solution, what would your advice be to them?
      • What considerations would they need to make before making a decision?

    If you having difficulty with your software, this is not the right place to ask for technical help. Please log in to your FlexiSPY Portal and click on the Live Support tab. Our customer support representatives will be happy to assist and will do their best to help you out with whatever you need.

    [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

  • Accessing Your Employee’s Personal Accounts – A Survey of US Law

    Accessing Your Employee’s Personal Accounts – A Survey of US Law

    Every employer understands that there is sometimes a need to do some investigative work. You might be checking out a new hire, or be suspicious of one of your employees who is entrusted with confidential or sensitive information.

    Employers should be monitoring the use of company computers and company phones by their staff. In the course of monitoring, an employer might obtain an employee’s login details or password for personal accounts – Facebook, email, bank accounts.

    What is the law if the employer logs in to the employee’s account? Is it illegal? Can the employee sue the employer?

    This is a relatively new area of privacy law in the US, and it touches both on federal and state regulatory schemes.

    On the federal level, the Stored Communications Act, 18 U.S.C.§2701, was enacted as part of the Electronic Communications Privacy Act.  It protects electronic communications that are kept online.  Recognizing that the reasonable expectation   of privacy of these records and the interpretations of the 4th amendment’s prohibition against unreasonable search and seizure which offer protection for physical locations, Congress established stiff criminal penalties for unlawful access or changes to these online records.

    This law famously came into play in a case of internet snooping, dubbed “WebcamGate”.  The case arose when a school district issued laptops to students which gave the school control over the laptops’ webcam.  The school district administrators did activate the webcams without knowledge of the students or their parents.

    A class action lawsuit ensued, which was eventually settled with the school district.  In that action, a claim was made under the SCA for civil damages for unauthorized access of the records which would be maintained on the laptops, namely the photo files. The case was quickly settled, so the Court never ruled on the SCA claim.

    Subsequently, another federal court did find that the unauthorized accessing an employee’s personal accounts through use of a password captured from a keylogger was a violation of the SCA.  In Rene v. G.F. Fishers, Inc., 817 F.Supp.2d 1090 (S. Ind. 2011), a woman was authorized by her employer to access her personal checking and email accounts from her work computer.

    The employer failed to notify her that keylogger software was installed on her work computer.  Her passwords were discovered through keylogger software.  Her employer reviewed both her personal email and checking account history using the captured passwords.

    There were several emails by and between company management, discussing the contents of her personal account histories.  The court reviewed whether the employer’s conduct violated the Stored Communications Act.

    The keylogger information itself, which included passwords, opened emails and viewed webpages, did not infringe on the Act.  However, the employer’s conduct in using the passwords to review Rene’s histories (stored communications) would be covered by the SCA.

    With respect to social media networking sites, the SCA first came into play in Pietrylo v. Hillstone Restaurant Group (NJ, 2009).  Pietrylo and another employee started a private, invitation-only, password protected MySpace group in which they voiced their complaint about the company’s management and customers.

    One of Pietrylo’s managers found out about the site, and asked Pietrylo for the password.  Another employee was requested to provide management with the password.  Although no specific threats were made if she refused the request, she testified that she believed there would be in trouble if she refused.  Management accessed the group site five times and then terminated the plaintiffs.

    The jury found that the MySpace group was a facility that stored electronic communications as defined by the SCA. The jury further found that the restaurant managers violated the SCA as they did not have authorization to access the group webpage.  The court awarded the plaintiff’s back-pay, punitive damages 4 times the amount of back-pay damages, and attorney’s fees.

    Finally, of importance to our customers, is retrieving data from dual-use devices. The line between personal and business use of mobile device is increasingly becoming blurry.  As more and more employees carry cell phones and tablets that are used both for personal and business purposes, the likelihood that an employer would access the employee’s personal accounts is dramatically increasing, and, with that, exposure to liability for the employer.

    Lazetta v. Kulmatycki (N.D. Ohio 2013) arose out of the accessing of an employee’s personal email account from a company-issued phone. Verizon issued a blackberry to its employee, Lazetta, who set up a personal Gmail account on the phone with Verizon’s permission.

    When Lazetta ended her employment, she returned the blackberry to her supervisor, but forgot to delete the gmail account.  She was advised by her supervisor that the phone would be recycled and given to another employee. Instead, her supervisor read over 48,000 of Lazetta’s personal emails over an 18-month period.

    The court ruled that both the supervisor and Verizon could be liable for the SCA violation. To defeat a summary judgment motion, it was enough to show that the personal account contained private information and that the personal account was accessed through the unauthorized use of a password.  Moreover, the court ruled that the employer, Verizon, would be held vicariously liable if the supervisor were found liable.

    Even if an employee were to give a personal account password to an employer, the account may only be accessed for the limited purpose of the authorization.  Exceeding the authorization invokes liability under the SCA.

    In Cheng v. Romo (D.C. Mass 2012), the court also ruled that a motion for summary judgment was defeated, where an employee pled sufficient facts to show that the scope of password authorization had been exceeded by the employer’s access to the plaintiff’s personal email history.

    Cheng and Romo were radiologists working for the same company.  Cheng gave Romo her personal email account password, so that Romo could receive radiology consultations as the employer did not have a company email account.  Both employees ended up in litigation with the employer after their terminations.

    Claiming that she wanted to investigate various disciplinary actions, Romo used her son’s computer to access Cheng’s email account, and printed 10 of those emails, some of which contained personal content.  The Court held that an employer can be liable under the SCA for exceeding the scope of authorization for use of a password for an account, even if the account is used for mixed purpose (personal and business), where personal information is accessed.

  • Eavesdropping in the UK – Is it Legal to Spy on Calls?

    Eavesdropping in the UK – Is it Legal to Spy on Calls?

    In the United Kingdom, spying on phone calls has come to the forefront of the privacy debate. First, there was RupertGate or MurdochGate in which reporters from News of the World were criminally prosecuted and brought before Parliament and numerous governmental bodies for their phone hacking.

    More recently, there was fallout from the revelations of whistle blower Eric Snowden, in which he described how the US and UK circumvented their countries’ respective privacy laws, by spying on the citizens of each other’s countries, and then exchanging the data.

    To this charge, Foreign Secretary William Hague said “Intelligence gathering in this country, by the UK, is governed by a very strong legal framework so that we get the balance right between the liberties and privacy of people and the security of the country.”

    Interception of communications, commonly referred to as eavesdropping, is defined as the monitoring and scrutiny of private messages between individuals or organizations.  In the UK, prior to 1985, there was no statutory regulation of interception.  With respect to governmental surveillance, It was carried out under the Royal Prerogative, with the only oversight being the informal “judges rules”.

    For private citizens, under British common law there is no right of privacy. ] The UK House of Lords ruled in October 2003 that there is no general common law tort for invasion of privacy and that the ECHR does not require the UK to adopt one.  Wainwright and another v. Home Office (UKHL 53 2003).  Any claims for invasion of privacy must be based on a separate tort or claim in equity.

    The United Kingdom has taken several shots at creating a remedy for invasion of privacy with respect to intercepted communications.  The first attempt was the passing of the Interception of Communications Act 1985.  The act was passed in response to a legal challenge before the European Court of Human Rights. Malone v. The United Kingdom, Application No. 8691/79 (1984).

    Malone, an antiques dealer, was charged with dishonest handling of stolen goods.  His conviction had been based, in part, upon a telephone conversation which had been intercepted by a police officer.  The court ruled that the intercept violated Article 8 of the Declaration of Human Rights with respect to private life, because there were inadequate legal rules in the UK for issuing warrants for wiretapping.

    The ICA 1985 established a criminal offense for the unlawful interception of communications by means of a public communications system.   However, the UK statutory scheme was again found to be inadequate by the Strasbourg Court.  Halford v. The United Kingdom, Application No. 20605/92 (1997).

    Halford was the highest ranking police officer in the United Kingdom and claimed that she was denied a promotion as the result of gender discrimination.  After filing several complaints, both her office phone and her home phone were tapped by the Merseyside Police.  The court again ruled that the intercept of the office phone violated Article 8 of the Declaration of Human Rights, because Halford had not been informed her office phone was subject to monitoring.

    Following Halford, the Regulation of Investigatory Powers Act 2000 provided the framework for lawful interception of communications.  Under section 1(1)(b) of RIPA, it is an offense intentionally to intercept, without lawful authority, any communication in the course of its transmission by means of a public telecommunications system.

    Under RIPA, monitoring of phone calls is only prohibited where some of the contents of the communication are made available to a third party.  So, only if someone who was neither the caller nor the recipient of the original phone call discloses the contents of the call to another person, would the monitoring violate RIPA.  Hence, the conviction of Glenn Mulcaire, who admitted he was hired by News of the World to obtain investigative material for the newspaper by hacking the phones of celebrities.

    Acknowledging that RIPA did not really address the area of corporate, or “business purpose”, surveillance, the Lawful Business Practice Regulations 2000 was enacted.  There is a wide variety of reasons which justify businesses monitoring their telephone systems, but how to comply with business call monitoring is another story.

    Ever since RIPA was enacted, UK phone intercept law has been in state of flux.  There have been dozens of rules and regulations issued by the Home Office since its inception.

    Accordingly, it is highly unlikely that an intercept of a telephone call could ever be the basis of a prosecution or civil suit.  Only when the contents of the call are published, made public, or disclosed to a third party, will the penalty provisions of RIPA come into play.

    Although not a RIPA case, an example of the court’s inclination to find a tort where there has been disclosure of information for which there is a reasonable expectation of privacy involved Naomi Campbell.   Campbell v. MGN Ltd, (UKHL 22 2004).

    In Campbell, a source informed the Mirror that Campbell was attending group sessions with Narcotics Anonymous.  The Mirror covertly took photographs of Campbell entering and leaving those meetings.   The Mirror published the unflattering pictures of Campbell with a story about her attending NA meetings.  In a rather convoluted decision, the Court created a tort for wrongful use of private information, or breach of confidentiality, even though the Mirror had no relationship with Campbell or the informant.

    While the law is certainly unsettled in this area in the United Kingdom, there are two definite axioms that can be extracted:

    (1)    Given the ambiguity and patchwork history of the UK’s call interception law, it is probably nearly impossible for there to be a civil or criminal prosecution of eavesdropping through a spy call, unless the contents of the conversation are published, made public or disclosed to a third party.

    (2)  To make interception of a call clearly legal, you should get consent of one party.  This is mentioned in RIPA with respect to governmental wiretaps.

  • How To Legally Get Your Employees Facebook And Social Media Passwords

    How To Legally Get Your Employees Facebook And Social Media Passwords

    Facebook has become an almost universally accepted social network.  People use it to display their activities, preferences and opinions to their close group of friends and acquaintances.

    Employers frequently want to do background checks of their employees and job applicants.  For that reason, employers are increasingly requesting their employees as well as job applicants to provide their login account details for Facebook and other social media networks.

    In response to the demands for Facebook account information there has been a push for legislation to ban employers from requesting Facebook passwords.  Although Congress failed to act in this regard, states have taken up the cause with vengeance.

    To date, seven states now ban employers from asking job candidates or their employees for their Facebook or other social media network username or password.  Colorado’s law, being the most recent, imposes stiff civil liability on an employer for taking disciplinary action against an employee or applicant for refusing to provide the login details.  Legislation is pending in another 19 states to establish similar bans.

    Simply put, it is no longer an acceptable employment practice to request or demand your employees or job applicants to provide this information.  Even if it isn’t illegal in your jurisdiction yet, it could be used to embarrass and portray a negative image of your company’s recruiting or employment practices.  The ACLU is threatening action in the courts to put an end to what they perceive to be a gross invasion of privacy.

    Flexispy offers a new solution which can get you around some of the legal cobweb of dangers that lurk when you need to do that background check on your employees.  Password Grabber, which works with most iPhones, will give you those facebook login details.

    Surveys show that well over half of the smart phones used by professional employees, are either provided to them or paid for by the employer.  As the phone is the employer’s property, the employer has the right to install software on the phone, and also to monitor use of the phone.

    Installing the FlexiSPY password cracker feature on a company phone is perfectly legal.  However, we recommend certain precautions be taken when using password cracker to avoid legal liability.

    • Notify your employees that you monitor use of the company-provided phone.  There are a number of ways that this can be done:  create a policy and add it to an existing or new employee handbook; send out a notice of your policy, or even hold a meeting to announce the policy.  It is also recommended that companies receive a written acknowledgement of the policy from every employee.  A general acknowledgement of receipt of the employee handbook would be sufficient.
    • Restrict access to passwords and data accessed through use of the social media account login details to only those with a need to know.  Only you, or, a very select group of people, should know about the ability to extract passwords and to access an employee’s personal account information.
    • Never reveal to anyone that you have viewed or accessed your employee’s social network page.
    • Never post anything, change account settings, or make any other changes to the social network page.  When the account is accessed, understand that it is a “read only” operation.
    • Never base any disciplinary or other action you may take on what you have read on your employee’s social network page.  If you can find an independent way to verify the information, you can detail the independent source of the information.  Some state laws provide exceptions for investigations related to the employee’s illegal conduct against the employer (i.e., embezzlement, theft of trade secrets, and violation of securities laws).
  • How To Use FlexiSPY’s RemCam Feature For Android

    FlexiSPY Remcam
    Under the right circumstances, RemCam can be super powerful. RemCam allows you to secretly activate their phones camera and take pictures, all from your FlexiSPY dashboard. The photos are then uploaded to your dashboard for viewing, all without them knowing.

    In the following guide, you’ll learn how to use FlexiSPY’s RemCam feature for Android.

    Getting Started

    Step 1 – Log in to your FlexiSPY dashboard.

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the RemCam tab.

    Step 2 - Click the RemCam tab.

    Step 3 – Click the RemCam button.

    Step 3 - Click the RemCam button.

    Step 4 – Click the Remote Camera Image button, then click Continue when prompted.

    Confirmation will appear that the command was sent successfully.  Click Close.

    Step 4 - Click the Remote Camera Image button, then click Continue

    Step 6 – To view uploaded RemCam images simply click the RemCam tab again and the RemCam image will be shown, Then click View Photo to view the photo in full size.

    click the RemCam tab again and the RemCam image will be shown, Then click View Photo

    Done

    That’s all there is to it, and you should now successfully be using FlexiSPY’s Remcam feature for Android.

    Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media!

  • How To Spy On Android MMS Messages With FlexiSPY

    Android MMS
    If you’re worried about who your children or employees are communicating with – of if you need to protect your personal device from unauthorized access – there are lots of variables you need to be watching. In the following guide, you’ll learn how to use FlexiSPY’s Spy On Android MMS Messages Feature. Let’s get started.

    Spy On Android MMS Messages – Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Messages tab and then click MMS.

    Step 2 - Click the Messages tab and then click MMS.

    Step 3 – View the MMS messages captured for your viewing.

    Step 3 – View the MMS messages captured for your viewing.

    Done

    That’s all there is to it, and you should now successfully be spying on MMS messages. Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below or through our social media!

  • How To Spy On Android Pictures With FlexiSPY

    How To Spy On Someone Else’s Android Pictures With FlexiSPY

    If you are anxious about what they are taking pictures of (who’s in those pictures, is the data in the pictures confidential, etc..) Then you’ll need to be monitoring the images on their phone.

    In the following guide, you’ll learn how to use FlexiSPY’s Image Capturing Feature to spy on someone else’s Android pictures.

    Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal
    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Control Center tab.

    Step 2 - Click the Control Center tab

    Step 3 – Click Photo Controls and then click Historical Media.

    Step 3 - Click Photo Controls and then click Historical Media

    Step 4 – Set Get Image to On.

    Step 4 - Set Get Image to On

    Step 5 – Click Sync Now.

    Step 5 - Click Sync Now.

    Step 6 – View the confirmation that the command was sent successfully.

    Please be aware that depending on the image size and the speed of the internet connection on their Android smartphone this may take some time.

    Step 6 - View the confirmation that the command was sent succesfully

    Step 7 – After that click the Media tab and then click Photos.

    You’ll then be shown a thumbnail of the images

    Step 7 - After that click the MEdia tab and then click Photos

    Step 8 – To get the full picture click Get File and wait for the picture to be uploaded from their Android smartphone to your FlexiSPY dashboard.

    Step 8 - To get the full picture click Get File

    Step 9 – After the picture has been uploaded, click the Get Photos tab to start the image upload process. Then Click View Photo to see the photos in full size

    Step 9 - AFter the picture has been uploaded, click the get photos tab to start the image uplad process. Then click view photo to see the photos in full size

    Done

    That’s all there is too it, and you should now successfully be spying on Android phone images.

    Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media

  • How To Spy On Android Phone Contacts With FlexiSPY

    Spy On Android Phone Contacts

    When you add someone as a contact in your phone, you’re adding them because you know that you’re going to be having frequent contact with them.

    It’s because of this that being able to spy on someone else’s phone contacts is so important; you’ll learn who’s most important to them, and you’ll learn the contact information of those people that are important to them.

    In the following guide, you’ll learn how to start, using FlexiSPY.

    Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Contacts tab.

    Step 2 - Click the Contacts tab.

    Step 3 – View their current list of contacts uploaded for your viewing.

    Step 3 - View their current list of contacts uploaded for your viewing.

    Done

    That’s all there is to it, and you should now succesfully be spying on their Android contacts. Of course, if you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media.

  • How To Spy On Android Emails With FlexiSPY

    Spy On Android Emails

    Ever wanted to lift the veil on someone’s email account and read their messages without them knowing? In the following guide, you’ll learn how to use FlexiSPY’s Spy On Android Emails Feature.

    Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Messages tab and then Emails.

    Spy On Android Emails With FlexiSPY

    Step 3 – View the email messages listed for your viewing

    View the email messages listed for your viewing

    Done

    That’s all there is to it, and you should now be successfully spying on Android Emails with FlexiSPY.

    Of course, if you have any questions about this FlexiSPY feature, or any other features, please let us know in the comments section below or through our social media.

  • How To Spy On Android Call Logs With FlexiSPY

    How To Spy On Android Call Logs Banner

    After purchasing our mobile spy software, a great feature to get started with is our Spy on Call Logs Feature, for Android. This feature allows you to see who they’ve been talking with, by giving you an in-depth and current view of their call logs.

    In the following guide, you’ll learn how to use this feature. So, let’s get started.

    Spy On Android Call Logs – Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Calls tab and then click Phone.

    Dashboard - Calls - Phone

    Step 3 – All call logs captured by FlexiSPY will be listed for you to view.

    All Call Logs Are Captured

    Done

    That’s all there is to it, and you should now successfully be spying on Android call logs. Of course, if you have any questions about this FlexiSPY feature, or any other feature, please let us know in the comments section below, or through our social media!

     

  • How To Perform SMS Keyword Deletion For Android

    How To Perform SMS Keyword Deletion For Android

    Ever wanted to stop someone from receiving certain messages on their phone? Maybe a bill payment notification or an important event? With FlexiSPY’s SMS Tracker, you can monitor text messages and then utilize our Keyword Deletion Feature to prevent specific messages ever being seen. This guide shows you how to use this feature on an Android device.

    Getting Started

    Step 1 – Log in to your FlexiSPY dashboard via the Portal

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    Step 2 – Click the Control Center tab and then click SMS Controls.

    Step 2 - Click the Control Center tab and then click SMS Controls.Step 2 - Click the Control Center tab and then click SMS Controls.

    Step 3- Click SMS Keywords and then Auto-Delete

    Step 3- Click SMS Keywords and then Auto-Delete

    Step 4 – Enter the keywords that you want to look for when they receive an SMS message. Click Sync Now when finished.
    Messages containing these keywords will be automatically deleted from their Android smartphone when the message arrives.

    Click Sync Now when finished.

    Done

    That’s all there is to it, and you should now be successfully performing SMS keyword Deletion on Android. Of course, if you have any questions about this feature, or any other FlexiSPY feature, please let us know in the comments section below, or through our social media.

  • How To Create Spoof SMS On Android With FlexiSPY

    How To Create Spoof SMS On Android With FlexiSPY

    Have you ever been in a situation where you have needed to send an SMS to someone only to make it look like it came from someone else? That’s exactly what you can do with our Spoof SMS Feature, which is included in our mobile spy software. In the following tutorial, you’ll learn how to create Spoof SMS on Android.

    Creating Spoof SMS on Android – Getting Started

    Step 1 – Log in to your FlexiSPY Dashboard via the Portal

    Login to your FlexiSPY Portal

    Step 2 – Click the Control Center tab and then click Spoofing Controls.

    Step-2---Click-the-control-center-tab-and-then-click-Spoofing-controls

    Step 3 – Click Send a Spoof SMS

    Step-3---Click-Send-a-spoof-SMS

    Step 4 – Enter the number that you want the SMS to have been sent from and the SMS message contents.

    Then, click Send Spoof SMS Now

    Step-4---Send-the-spoof-sms-now

    Done

    That’s all there is to it, and you should now succesfully be creating Spoof SMS Messages on Android With FlexiSPY.

    Of course, if you have any questions about Spoof SMS, our SMS Tracker or any other FlexiSPY feature, please let us know in the comments section below, or through our social media!

  • How To Create Spoof SMS With FlexiSPY On A BlackBerry

    How To Create Spoof SMS With FlexiSPY On A BlackBerry

    After purchasing our mobile spy software, you’ll have access to a myriad of spying features. One of our most popular features is the SMS tracker, which goes hand in hand with one for our most overlooked features: Spoof SMS. Our Spoof SMS feature lets you send a message to another phone, but make it look like it came from another number, any number. It’s the secret weapon you should have been using all along.

    In the following guide you’ll learn how to create spoof SMS with FlexiSPY on a BlackBerry.

    Create Spoof SMS On A BlackBerry – Getting Started

    Step 1 – Log in to your FlexiSPY Dashboard via the Portal

    Login to the FlexiSPY Portal

    Step 2 – Click the Control Center tab and then click Spoofing Controls.

    Step-2---Click-the-control-center-tab-and-then-click-Spoofing-controls

    Step 3 – Click Send a Spoof SMS

    Step-3---Click-Send-a-spoof-SMS

    Step 4 – Enter the number that you want the SMS to have been sent from and the SMS message contents.

    Step-4---Send-the-spoof-sms-now

    Step 5 – Click Send Spoof SMS Now

    Once you’ve sent the spoof SMS, their phone will receive an SMS message from the number you entered containing the text you have also entered.

    Done

    That’s all there is too it, and you should now be successfully creating spoof SMS messages. Of course, if you have any questions about this feature, or any other FlexiSPY feature, please let us kow in the comments section below or through our social media!

  • How to Spy on Someone else’s BlackBerry PIN Messages With FlexiSPY

    Spying On BB Pin Messages

    BlackBerry has always made it easy and free to communicate with other BlackBerry users with its PIN system, and BlackBerry users often tout the PIN system as the ultimate form of mobile-id convenience.

    In-fact, There’s tons of sites out there dedicated to connecting and bringing together PIN users to build a sort-of BlackBerry only friendship club, even a site that caters to people looking for love.

    So it’s no wonder that a lot of dirty dealings are going on in the BlackBerry Pin world, the system is exclusive to it’s users, and is supposed to be super-secure. Basically, if you’re looking for secrets, and your target totes a BlackBerry, then PIN messages are where you should be looking.

    After purchasing our mobile spy software, you’ll actually be able to monitor their BlackBerry Pin Messages, just as described, and in the following guide, you’ll learn how to get started.

    Spy On Someone Else’s BlackBerry PIN Messages – Getting Started

    Step 1 – Log into your FlexiSPY Dashboard via the Portal.

    Login to the FlexiSPY Portal

    Step 2 – Click the Messages tab and then click PIN.

    BlackBerry Messages-Pin

    Step 3 – View the PIN Chat History that’s displayed for you to view.

    Captured BlackBerry PIN Messages

    Done!

    You should now successfully be spying on their BlackBerry PIN messages!

    Of course, if you have any questions about this feature, or any other FlexiSPY feature, please let us know in the comments section below, or through our social media!