A non-legal, technical and organisational guide for IT service providers and MSPs: how to structure multi-client deployments of Wolfeye Remote Screen, position live screen monitoring as a managed service and stay aware of legal boundaries in your country and use cases.
Illustrative Wolfeye dashboard in an MSP scenario: several company-controlled client PCs side by side. Image for technical illustration only; any real use of monitoring must comply with applicable laws and regulations.
For many IT service providers and managed service providers (MSPs), Wolfeye Remote Screen is interesting for a very specific reason:
“Can we offer live screen monitoring of company-controlled PCs as a managed service for our clients – and how would that work technically?”
From a technical and organisational perspective, the answer is: yes, you can build recurring services around live screen and screenshot visibility on selected client PCs. Typical examples are training PCs, support workstations, call centre agents or other clearly company-controlled devices.
At the same time, screen and employee monitoring is always a legally sensitive topic. Whether you or your clients may use software like Wolfeye at all, for which purposes (for example, training supervision, quality assurance or security) and under which conditions (for example, prior information of employees, explicit consent, internal agreements) depends on the legal framework in the respective country and on the specific use case.
This article therefore focuses strictly on technical possibilities and organisational patterns for IT providers and MSPs. It does not make any statement about what is legally permitted in any country and it is not legal advice.
Before you or your clients deploy Wolfeye or any other monitoring software, you should always obtain individual legal advice in the relevant jurisdiction. Legal experts can help clarify in particular:
From a business and organisational point of view, live screen monitoring with Wolfeye can be a building block in a broader managed service offering for your clients. Typical scenarios include:
In many cases, managed service providers design monitoring as an add-on service on top of existing contracts – for example, as a “screen visibility package” billed per monitored company PC or per client site.
Which of these scenarios are legally permissible and under which conditions depends on national law and must be clarified with legal counsel by you and your clients.
From a purely technical perspective, a multi-client setup for IT providers and MSPs with Wolfeye often follows patterns such as:
A technically typical rollout from the IT provider perspective might look like this (again, assuming legal questions have been clarified beforehand):
Important: how exactly you may access client environments yourself and what you are allowed to see is not just a technical question but one of contracts and law. Always clarify access rights and responsibilities contractually and with legal advice.
Example: a Wolfeye dashboard with multiple company-controlled PCs arranged in groups. The image is for technical illustration only. Any real use of monitoring must comply with the laws and regulations that apply in the client’s country, industry and specific use case.
From a business perspective, many IT providers and MSPs think in terms of service packages. Technically, Wolfeye can fit into such packages in several ways, for example:
In all of these models, live screen monitoring is only one component among others (for example, endpoint management, backups, security). It is important that your contracts clearly describe:
This article cannot provide legal wording or contract templates. It simply shows how Wolfeye can be used technically in such service models once legal questions have been clarified.
From a technical and organisational standpoint, IT providers often integrate Wolfeye into recurring client scenarios. A few examples:
You deploy Wolfeye on selected support PCs of a client. Supervisors can see live screens during peak times and understand how tickets are processed in practice. You are responsible for the technical operation; the client is responsible for legal and HR matters.
The client runs regular onboarding sessions on training PCs. With Wolfeye, trainers can see in real time how new staff follow the steps in CRM, ERP or ticket systems. Whether and how they must inform participants and document this is a legal question that the client must clarify with legal counsel.
A client runs several small branches and has staff working from home. You deploy Wolfeye on a selection of company laptops and office PCs so that management can view a cross-section of daily activity. Technically, this is straightforward – but the legal admissibility depends entirely on the laws and internal rules that apply to the client.
In all of these cases, Wolfeye is a technical tool. It does not decide what is allowed. Your role as an IT provider is to offer a technically clean implementation once legal and organisational questions have been settled on the client side.
Because monitoring is sensitive, many IT providers decide together with their clients to implement privacy by design principles at the technical level. For example:
Technically, Wolfeye provides enough flexibility to implement such limitations. How exactly they should be set up in each client organisation should always be defined together with legal, HR and data protection experts on the client side.
Because IT providers and MSPs often work across multiple clients and jurisdictions, the legal dimension is particularly important. For that reason, this article ends with a clear disclaimer:
This article describes technical possibilities and typical organisational patterns of using Wolfeye Remote Screen in IT service provider and MSP scenarios. It is not legal advice and does not state what is permitted in any specific country or situation.
In many jurisdictions, aspects such as the following may be relevant for the legal admissibility of monitoring (examples only):
Before you include live screen monitoring in any managed service offering, you and your clients should always obtain individual legal advice in the relevant jurisdiction. Only qualified legal experts can tell you:
Always treat Wolfeye as a technical component that you may only deploy within the limits of applicable law and your clients’ internal rules – never as a substitute for legal or HR decisions.
The following video shows a technical walkthrough of how Wolfeye Remote Screen can be used from the perspective of IT service providers and MSPs, for example to manage multiple client environments and monitor selected company-controlled PCs.
The video is a technical demo for professionals and does not replace legal advice. It does not guarantee that any specific use is lawful in your country or in your clients’ situations.
Video: technical demo of Wolfeye Remote Screen for IT service providers and MSPs. The video illustrates technical possibilities only. It does not make any statement about what is legally allowed in any specific country, industry or client use case.
For IT service providers and MSPs, Wolfeye Remote Screen can be a technical building block for managed services around live screen visibility on selected company PCs.
From a purely technical and organisational perspective, it can help you:
Wolfeye is monitoring software. Any use must comply with the laws and regulations that apply in the relevant country, industry and specific use case (for example, training supervision, quality assurance or security purposes). In many jurisdictions, the admissibility of monitoring depends on factors such as prior information of employees, explicit consent or further formal requirements. This article and the embedded video are for general technical and organisational information only and do not constitute legal advice or a guarantee of legal admissibility.
Before using any monitoring software such as Wolfeye, always obtain independent legal advice in the relevant country about whether and how you and your clients may monitor company-controlled PCs (for example in training supervision, quality assurance or security contexts) and under which conditions employees or users must be informed or give consent.