if the program can search useful data from the local machine, then the user's system may be hacked. If the system was hacked, then the user's activities are monitored. If he used the computer to do internet banking, he may have to pay for his careless.