Feeds

The legal risks of uncontrolled IM use

Nest of vipers

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

White paper Everyone loves instant messaging, the chat-cum-presence tool of choice of the masses. And that love extends to the workplace...IM should overtake email as the preferred method of business communication by the second half of 2010, an IDC survey found last year.

But IM can create enormous headaches for their employers. We have selected this whitepaper from the Reg Library to tell you just how big that headache is.

The legal risks of uncontrolled IM use

This is in spite of the fact that many organizations - President Obama's White House among them - ban the staff use of IM for security and compliance reasons.

Blanket bans such as this may engender a false sense of security, according to this white paper prepared by a London law firm for Messagelabs (reg req'd).

“A younger workforce is adept at using IM and such usage is likely to continue to grow. IM tools are sophisticated and may enter networks, notwithstanding the fact that firewalls are in place, or obvious ports locked down,” the authors write.

A devious lot, the young.

Companies that do embrace IM are often much slower to assess its on their corporate risk profile, and therefore have no agreed policy on its use.

But monitoring staff use of IM is essential, for legal reasons:

A key consideration is that an employer can be liable for the acts of its employees, even if the acts have been expressly forbidden. From this we can conclude that an employer will not necessarily escape liability arising from IM use, even if a) the use of IM is forbidden, or b) the IM software used was not provided by the employer. This is why employers need to take the risks arising from IM seriously, even if they have a policy of forbidding its use, or simply no policy at all.

UK employers can be sued for the actions of their staff under the concept of vicarious liability for harassment; breach of confidentiality; infringement of IP rights; data protection; freedom of information; and defamation. Also they must keep records of IM conversations to comply with sundry regulatory requirements.

So where does Messagelabs fit in with all this? The Symantec subsidiary provides a dedicated hosted IM security service which allows customers to actively monitor and control IM use and in "many cases, provide a defence to actions brought on as a result of use of public IM systems".

The sales spiel is softly spoken and the content is instructive. Recommended.

The legal risks of uncontrolled IM use

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.