A
data processing application
logging, recording, and reporting process and infrastructure. Compliance with regulatory directives such as HIPAA, internal organizational and corporate, personal
information privacy, and other security policies can thus be enforced without the need to recode legacy
application software. In one preferred embodiment, a core agent process provides “listener” functionality that captures
user input events, such as keyboard and mouse interactions, between a user and a legacy application of interest. The agent obtains instructions for how to deal with such events, accessing information that describes the application's behavior as already captured by an application profiler tool. Keyboard and mouse
data entry sequences, screen controls and fields of interest are tagged during application profiling process. This data is stored in
application profile developed for each mode of a legacy application. The technique can be implemented in various
Information Technology (IT) environments including mainframe / terminal applications and / or
client /
server applications. Thus,
full coverage of “fat”
client, “thin”
client, and legacy “mainframe” applications can be provided with a common approach across an enterprise.