Captures keystrokes and data copied to the clipboard.
Intercepts login and password data to facilitate the tracking of accounts maintained on potentially harmful web resources. Identifies users who have entered passwords on their keyboards to access encrypted documents.