Generally security programs like this that do keylogging are context aware and don’t include passwords, plus if it’s a managed device they probably wouldn’t need keylogging to obtain passwords if that was the objective. Significant amount of endpoint protection software will allow for RAM capture, which would have your passwords as well.
Furthering this, if you’re accessing managed applications (say OneDrive or Sharepoint) it’s common to prevent access to a device that doesn’t have all of the monitoring software installed.
I don’t believe anything is actually copied until you request it to be pasted. The clipboards in Linux mark where the data is, and don’t actually initiate a copy until there’s a destination.
https://wiki.archlinux.org/title/clipboard