Feeds

The legal risks of uncontrolled IM use

Nest of vipers

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

White paper Everyone loves instant messaging, the chat-cum-presence tool of choice of the masses. And that love extends to the workplace...IM should overtake email as the preferred method of business communication by the second half of 2010, an IDC survey found last year.

But IM can create enormous headaches for their employers. We have selected this whitepaper from the Reg Library to tell you just how big that headache is.

The legal risks of uncontrolled IM use

This is in spite of the fact that many organizations - President Obama's White House among them - ban the staff use of IM for security and compliance reasons.

Blanket bans such as this may engender a false sense of security, according to this white paper prepared by a London law firm for Messagelabs (reg req'd).

“A younger workforce is adept at using IM and such usage is likely to continue to grow. IM tools are sophisticated and may enter networks, notwithstanding the fact that firewalls are in place, or obvious ports locked down,” the authors write.

A devious lot, the young.

Companies that do embrace IM are often much slower to assess its on their corporate risk profile, and therefore have no agreed policy on its use.

But monitoring staff use of IM is essential, for legal reasons:

A key consideration is that an employer can be liable for the acts of its employees, even if the acts have been expressly forbidden. From this we can conclude that an employer will not necessarily escape liability arising from IM use, even if a) the use of IM is forbidden, or b) the IM software used was not provided by the employer. This is why employers need to take the risks arising from IM seriously, even if they have a policy of forbidding its use, or simply no policy at all.

UK employers can be sued for the actions of their staff under the concept of vicarious liability for harassment; breach of confidentiality; infringement of IP rights; data protection; freedom of information; and defamation. Also they must keep records of IM conversations to comply with sundry regulatory requirements.

So where does Messagelabs fit in with all this? The Symantec subsidiary provides a dedicated hosted IM security service which allows customers to actively monitor and control IM use and in "many cases, provide a defence to actions brought on as a result of use of public IM systems".

The sales spiel is softly spoken and the content is instructive. Recommended.

The legal risks of uncontrolled IM use

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.