Feeds

The legal risks of uncontrolled IM use

Nest of vipers

  • alert
  • submit to reddit

Internet Security Threat Report 2014

White paper Everyone loves instant messaging, the chat-cum-presence tool of choice of the masses. And that love extends to the workplace...IM should overtake email as the preferred method of business communication by the second half of 2010, an IDC survey found last year.

But IM can create enormous headaches for their employers. We have selected this whitepaper from the Reg Library to tell you just how big that headache is.

The legal risks of uncontrolled IM use

This is in spite of the fact that many organizations - President Obama's White House among them - ban the staff use of IM for security and compliance reasons.

Blanket bans such as this may engender a false sense of security, according to this white paper prepared by a London law firm for Messagelabs (reg req'd).

“A younger workforce is adept at using IM and such usage is likely to continue to grow. IM tools are sophisticated and may enter networks, notwithstanding the fact that firewalls are in place, or obvious ports locked down,” the authors write.

A devious lot, the young.

Companies that do embrace IM are often much slower to assess its on their corporate risk profile, and therefore have no agreed policy on its use.

But monitoring staff use of IM is essential, for legal reasons:

A key consideration is that an employer can be liable for the acts of its employees, even if the acts have been expressly forbidden. From this we can conclude that an employer will not necessarily escape liability arising from IM use, even if a) the use of IM is forbidden, or b) the IM software used was not provided by the employer. This is why employers need to take the risks arising from IM seriously, even if they have a policy of forbidding its use, or simply no policy at all.

UK employers can be sued for the actions of their staff under the concept of vicarious liability for harassment; breach of confidentiality; infringement of IP rights; data protection; freedom of information; and defamation. Also they must keep records of IM conversations to comply with sundry regulatory requirements.

So where does Messagelabs fit in with all this? The Symantec subsidiary provides a dedicated hosted IM security service which allows customers to actively monitor and control IM use and in "many cases, provide a defence to actions brought on as a result of use of public IM systems".

The sales spiel is softly spoken and the content is instructive. Recommended.

The legal risks of uncontrolled IM use

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.