Feeds

US firms use own staff to snoop on co-workers

(Office)spy versus spy

Application security programs and practises

The UK may have more CCTV cameras than anywhere else in the world but US workers are kept under even closer tabs over internet use at work, according to a new survey.

Two in five (41 per cent) of large US firms pay staff to either read or analyse the contents of outbound emails. One in four (26 per cent) of the 300 US firms surveyed by email security outfit Proofpoint said they had sacked someone for violating email policies over the last 12 months.

Email was by no means the only source of data leakage or risk to corporate reputation. Many US corporations disciplined their staff over misuse of web 2.0 communications media such as blogs, message boards and media sharing sites.

Eleven per cent of US firms quizzed said they had disciplined workers for improper use of either blogs or message boards. A similar 13 per cent of companies had cause to read the riot act to workers over misuse of social networking sites. Improper use of media sharing sites led to disciplinary action at 14 per cent of the firms quizzed.

One in four (27 per cent) of the firms polled had investigated the exposure of confidential, sensitive or private information from lost or stolen mobile devices in the past 12 months. The exposure of sensitive financial information (such as unannounced financial results) on blogs or message board postings resulted in disciplinary actions at 14 per cent of publicly traded firms surveyed by Proofpoint.

Proofpoint's survey, Outbound Email and Data Loss Prevention in Today’s Enterprise, can be downloaded here (registration required). ®

Application security programs and practises

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.