Feeds

The legal risks of uncontrolled IM use

Nest of vipers

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

White paper Everyone loves instant messaging, the chat-cum-presence tool of choice of the masses. And that love extends to the workplace...IM should overtake email as the preferred method of business communication by the second half of 2010, an IDC survey found last year.

But IM can create enormous headaches for their employers. We have selected this whitepaper from the Reg Library to tell you just how big that headache is.

The legal risks of uncontrolled IM use

This is in spite of the fact that many organizations - President Obama's White House among them - ban the staff use of IM for security and compliance reasons.

Blanket bans such as this may engender a false sense of security, according to this white paper prepared by a London law firm for Messagelabs (reg req'd).

“A younger workforce is adept at using IM and such usage is likely to continue to grow. IM tools are sophisticated and may enter networks, notwithstanding the fact that firewalls are in place, or obvious ports locked down,” the authors write.

A devious lot, the young.

Companies that do embrace IM are often much slower to assess its on their corporate risk profile, and therefore have no agreed policy on its use.

But monitoring staff use of IM is essential, for legal reasons:

A key consideration is that an employer can be liable for the acts of its employees, even if the acts have been expressly forbidden. From this we can conclude that an employer will not necessarily escape liability arising from IM use, even if a) the use of IM is forbidden, or b) the IM software used was not provided by the employer. This is why employers need to take the risks arising from IM seriously, even if they have a policy of forbidding its use, or simply no policy at all.

UK employers can be sued for the actions of their staff under the concept of vicarious liability for harassment; breach of confidentiality; infringement of IP rights; data protection; freedom of information; and defamation. Also they must keep records of IM conversations to comply with sundry regulatory requirements.

So where does Messagelabs fit in with all this? The Symantec subsidiary provides a dedicated hosted IM security service which allows customers to actively monitor and control IM use and in "many cases, provide a defence to actions brought on as a result of use of public IM systems".

The sales spiel is softly spoken and the content is instructive. Recommended.

The legal risks of uncontrolled IM use

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.