Feeds

'Poke your camera phone's eye out' – analyst

Businesses face new liabilities

  • alert
  • submit to reddit

Website security in corporate America

The Meta Group has warned companies to have a corporate policy that limits cameraphones being used on premises.

Analyst Jack Gold told us that cameraphones posed liability issues for corporations. How, we wondered?

"Next year's designs could be snapped and sent to a competitor," said Gold.

"Do you want people running around taking pictures of someone picking their nose?" he asked. (A thousand times, yes, Mr Gold - we thought to ourselves, although the value to us really depends on who's doing the picking.) But camera phones allowed company staff to be caught in other compromising positions too, he argues, most vigorously.

So we had to ask, which staff would be most at risk from being caught in a compromising position? The CEO?

Gold agreed.

"And probably the CFO after that?" we mused.

"You get the point," Gold said, steering us back to the thrust of his advice. He wants corporates to have a procurement policy that limits the purchasing of phones to non-camera models, even though this might limit employees to low functionality, low end models.

But this is increasingly hard to do, as cameras are becoming increasingly ubiquitous on cellphones. What should purchasing departments do?

"Poke it's eye out," said Gold.

Poke it's eye out?

"Yes. Make it blind."

Faced with such Old Testament urgings, we moved swiftly on.

We've heard a lot of marketing spiel from software vendors - in fact, if The Guardian newspaper is to believed, IT staff are talking about nothing else - about how companies should encourage a culture of weblogging in their organisations.

But what about cameraphone owners who blog? Surely, we asked, allowing them onto the corporate premises would be like strapping a bomb to the organization, and giving the detonator to a monkey?

"Sure," agreed Gold.

"Blogging and IM are just an extension of what corporations fear from employees using email - if they get sued, look what they've left behind." It's true, as we've noted before, that companies who have successfully stayed out of trouble have very strict policies about what's written.

Alas, we fear, Jack may be going a little over the top. Taking a surreptitious photo on a visit is difficult, and sure to attract the attention of a minder. The determined spy may as well get wired up with a dedicated surveillance device. Jack agreed. A discreet camera, such as a Canon Elph would do a much better job. But employers have to grant employees some trust degree of trust, otherwise we may as well remove all Xerox machines from the premises, too.

And cameraphones could equally prove to be boon to the whistleblower.

So remember, if you do have a picture of your CFO in a compromising position, you know where to send it first. ®

Internet Security Threat Report 2014

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
ISPs' post-net-neutrality world is built on 'bribes' says Tim Berners-Lee
Father of the worldwide web is extremely peeved over pay-per-packet-type plans
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Google+ GOING, GOING ... ? Newbie Gmailers no longer forced into mandatory ID slurp
Mountain View distances itself from lame 'network thingy'
Vodafone to buy 140 Phones 4u stores from stricken retailer
887 jobs 'preserved' in the process, says administrator PwC
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.