. . . "It can be used to eavesdrop on conversations, internet access, calendar appointments, text messages, pictures, videos, e-mails and other activity." . . . . .