A data processing application logging, recording, and reporting process
and infrastructure. Compliance with regulatory directives such as HIPAA,
internal organizational and corporate, personal information privacy, and
other security policies can thus be enforced without the need to recode
legacy application software. In one preferred embodiment, a core agent
process provides "listener" functionality that captures user input
events, such as keyboard and mouse interactions, between a user and a
legacy application of interest. The agent obtains instructions for how to
deal with such events, accessing information that describes the
application's behavior as already captured by an application profiler
tool. Keyboard and mouse data entry sequences, screen controls and fields
of interest are tagged during application profiling process. This data is
stored in application profile developed for each mode of a legacy
application. The technique can be implemented in various Information
Technology (IT) environments including mainframe/terminal applications
and/or client/server applications. Thus, full coverage of "fat" client,
"thin" client, and legacy "mainframe" applications can be provided with a
common approach across an enterprise.