Reportedly concerned about unauthorized disclosures, FDA officials installed monitoring software on some scientists’ laptops. The scientists say the action is in retaliation for blowing the whistle.
A new software monitoring tool that can track and enforce acceptable-use policies and protect intellectual property and trade secrets hasn’t passed the acid test of some employees at the Food and Drug Administration, according to the online site AOL Government.
FDA officials reportedly installed SpectorSoft’s Spector 360 monitoring software on the laptop computers of an undisclosed number of FDA scientists and doctors, reportedly because the agency was concerned about unauthorized disclosures.
But in a lawsuit filed last week, the scientists contend that FDA secretly monitored their personal e-mail after they had warned Congress that the agency was approving medical devices they believed posed unacceptable risks to patients.
Spector 360 is designed for business, education and government users with networked Mac and Windows computers. The software captures every activity, including snapshot videos of a user's computer screen. The activity data is automatically stored centrally for further auditing, according to the company website.
“Spector 360, which is designed for centralized employee monitoring, offers a high level view of the ongoing Internet and desktop activities of your employees as they use company computers both Mac and Windows,” the web site says. “The software features automated deployment, remote management tools and will record a wide range of activity including Email, Chat/IM, Web Surfing, Online Searches, Keystrokes and Programs used.”
Among the activities that Spector 360 allows administrators to discern are:
- How are users communicating with customers and each other?
- Are employees or contractors visiting inappropriate or dangerous websites?
- Who is accessing, transferring, and printing sensitive IP?
- Who is ignoring Acceptable Use Policies by posting information to Facebook on organization time?
- Who is leaking confidential information or valuable trade secrets ... accidentally or for personal gain?
- Which users are transferring data to removable media like USB drives, CDs, or DVDs?