Feeds

Self-destructing email – what Bill wants for Xmas

But it's not quite as simple as that, fortunately

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

The self-destructing email is almost upon us, according to a piece in the morning's New York Times. The breakthrough (if breakthrough it is) comes a little late for Microsoft, but Fort Redmond should look on the bright side - all of those awful trial exhibits add up to an amazing sales pitch to companies who don't want the same thing to happen to them.

But that of course is one of the problems as well. What do you think would be the reaction if Microsoft today started wiping its emails from its systems? Or if Microsoft developed a product that made it easier for itself and its major corporate customers to do so? The Feds wouldn't be happy, and the general conclusion would likely be that industry was giving itself carte blanche to do whatever it wanted, because there'd never be any evidence.

That's not of course how the companies developing email control systems would put it, but it's certainly how a lot of corporations are likely to see it, if the software flies in the first place.

The way the developers put it, what they're actually trying to do is to give customers the ability to control their information, stop it leaking, and stop email that only amounts to casual conversations escaping and being used against them. In its trial defence Microsoft argued that the brutal language used in its internal emails fell into this category, and couldn't be interpreted -- as the DoJ did interpret it -- as being official company policy.

Which up to a point is fair enough. In casual conversation quite a few people in business are prone to promise to do unspeakable things to rival companies, and some of this now gets transferred into email. So how come email gets recorded but the casual conversations don't?

Well, there you have the problem as far as Microsoft is concerned, anyway. Quite a bit of the trial evidence consisted of long documents of strategic significance, with accompanying emails (some of them including the rough stuff) commenting on them. How do you tell the difference between casual conversation and strategic documentation when it's all mixed up together? You don't, and if it's left to the corporations to decide where the line lies, they're going to draw it extremely tightly.

And anyway, self-destructing email looks extremely difficult to do. You have to be able to control the ability to copy the email, to print it out, to take a picture of it on screen -- it does rather look like you have to have all of the PCs in your organisation heavily locked down in order to even stand a chance of total control. Set against that challenge, developing software that makes email messages destroy themselves after a set period of time sounds pretty easy, but unless you can plug all the holes, what's the point?

Probably the best companies can hope for is to increase their ability to reduce information leakage, rather than eliminate it, in which case the documents that are being subpoenaed in current legal actions are still likely to exist, either somewhere with the organisation or with a business partner.

If companies went much further than this and actively destroyed documentation, then you could turn the casual conversation analogy on its head. They would effectively be shredding sensitive information that had been carried by email. And what happens to companies who shred information they think might get them into trouble? ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
UK.gov pushes for SWIFT ACTION against nuisance calls, threatens £500k fines
DCMS seeks lowering of legal threshold to fight rogue firms
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
Hungary's internet tax cannot be allowed to set a precedent, says EC
More protests planned against giga-tariff for Tuesday evening
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
ISPs handbagged: BLOCK knock-off sites, rules beak
Historic trademark victory, but sunset clause applies to future blocks
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.