| Businesses trying to control internal information turnover, to stop incorrect using of the company name, drain of trade/industrial know-how or intellectual property etc. After installation on the monitored computer it will invisibly copy all outgoing emails and accurately send them to your secret email address pre-configured by the program Control Panel, no matter which email client software a monitored user might use (either Microsoft Outlook Express, Eudora, Pegasus, The Bat! |