3However, you should be aware that nothing can prevent a criminal from utilizing screen capture utilities to steal confidential information. When handling confidential information, measures should be taken to make it impossible (or a violation of policy) for the members of an organization to install or use such utilities.