Feeds

Microsoft launches self-destructing email (false)

Urban myth gets disavowed

  • alert
  • submit to reddit

Protecting against web application threats using SSL

An urban myth has grown up around today’s launch of Microsoft Office 2003 which suggests that the product features technology that allows embarrassing emails to “self destruct” after a specified time period.

If you believe early reports, the inclusion of an Information Rights Management technology within Microsoft Office 2003 means that embarrassing documents will vanish into the ether after a determined period.

We’re told the package includes safeguards such as a "self destruct" mechanism, putting a time limit on the lifespan of documents, as well as the ability to limit which recipients can open, edit, copy or even print a document.

So no more embarrassing revelations spreading across company email systems like wildfire (Claire Swires) or legally dubious memos (Merrill Lynch technology analyst Henry Blodget describing stock he promoted in email as “junk”) to worry about?

Unfortunately not.

Microsoft’s Information Rights Management technology does include controls that enable the author of information to control its use. However users looking for Mission Impossible-style auto-destruct technology are likely to be disappointed.

"There is no technology or functionality within Office 2003 to make emails or documents disappear," a Microsoft spokeswoman told The Register.

"After a time limit an email doesn’t vanish – it expires. Someone with administrative rights can still retrieve it from a server," she added.

Jamie Cowper, consultant at Mirapoint, a messaging firm, adds: “Although some of the features may make it more difficult for sensitive information to be 'forwarded' into the wrong hands, the fact remains that it will still be stored centrally due to archiving laws, making companies liable if the content is incriminating. People have an uncanny knack of overcoming technical limitations if the information is valuable enough." ®

Related Stories

Microsoft devs Windows Rights Management Services
Writing history with Microsoft's Office lock-in
The Beast, MS Office 2003, and the Big Nada
Claire Swires MK II: Man suspended over sex boast email
Yummy Claire gets in touch with The Reg

The next step in data security

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.