Rupert Kendrick outlines key e-mail risks and some basic strategies for avoiding them
E-mail presents excellent opportunities for developing more efficient and profitable business procedures. It also poses a number of risks which can damage companies' reputations and, in extreme cases, may even result in business failure. There are four key essentials for an e-mail communication.
virus: One of the most serious threats to data is that of infiltration by a computer virus - and, most frequently, viruses are transmitted by e-mail. Infection takes place in various ways, for instance by running an infected programme or opening an infected file, most commonly an e-mail attachment.data: E-mail enables information to be transferred easily, and makes personal data easy to distribute, transfer, retain and store. Data can be lost, distorted or transferred accidentally These risks might result in exposure to both civil and criminal proceedings.confidentiality: A number of situations arise where confidentiality is put at risk through the use of e-mail. Employees present particular risks. E-mail may be sent to the incorrect recipient, or be accidentally and erroneously copied. Breach of confidentiality may expose an organisation to civil proceedings or professional disciplinary sanctions. advice: Increasingly, employees will be providing advice and information by e-mail. The speed and informality of e-mail can lead to the risk of advice being provided without adequate thought. This can expose an organisation to actions for negligence.contracts: The speed and informality of e-mail facilitates the inadvertent formation of contractual relations. If an employee has apparent authority to conclude a contract, the employer will be liable for the contractual obligations that arise, irrespective of whether the employee had actual authority. defamation: Defamation is an untrue statement which is published to a third party and damages the reputation of a person, persons or corporate entity. Defamation applies to e-mail in the same way as to any other communication. Liability can be incurred by publishers of an e-mail, so a company might attract liability for statements made by employees, acting in, or ostensibly within, the scope of their employment.pornography: It is an offence to send an offensive, indecent or obscene message by means of a public telecommunications system, which includes e-mail and any attachment. harassment: Harassment is conduct which the victim finds unacceptable, unreasonable or offensive and includes direct harassment by e-mail. The most obvious source of offending is likely to arise through the careless or irresponsible use of e-mail, which lends itself to the use of inappropriate and improper language and expression. monitoring: In certain circumstances, employers can monitor employees' use of e-mail. While they may have the right to monitor the use of e-mail in the workplace, there are limited grounds upon which they are entitled to do so. Taking action outside the exemptions contained in the legislation will expose the employer to the risk of criminal prosecution.IT solutions
Encryption can be used to secure confidential e-mail. This disguises the message sufficiently to hide the content. A numerical key is created that scrambles data in such a way that it can only be deciphered by someone with a corresponding key. Symmetric encryption involves sender and recipient using the same key, both to encrypt and to decrypt. Asymmetric encryption involves a connected set of numbers. One key (the first set of numbers) is made public. The other key (the second set of numbers) remains private. The public key can be distributed. The private key must remain private. Only a specific (related) private key will decrypt (or unlock) a message encrypted with a particular public key. Privacy is maintained, as only the recipient can open the message with the private key. Integrity is also preserved. The message cannot have been tampered with because only the recipient can open it. The name given to the framework supporting the creation and administration of public key encryption is called Public Key Infrastructure (PKI).Digital signatures bind an individual's identity to an electronic record. As only one person creates a digital signature it provides confirmation of identity; and it can be easily stored and generatedThe Electronic Communications Act 2000 and Electronic Signatures Regulations 2001, which implement the Electronic Signatures Directive(1999/93/EC) in the UK, aim to ensure that electronic signatures are accorded legal admissibility on certain grounds and to establish benchmarks for signature creation devices and certificates used to support such signatures. Legal solutions
data protection act: The Data Protection Act 1998 came into force on 1 March 2000. The Information Commissioner administers data protection compliance (www.dataprotection.gov.uk). Data includes data (which may be included in an e-mail) relating to an individual who may be identifiable from that data, or from that data and any other data that might be in the possession of, or likely to come into the possession of the data controller.In broad terms, the Act states that personal data shall be:
They govern an employer's right to monitor employee behaviour. In broad terms, the regulations permit the monitoring of (e-mail) communications to:
is designed to promote best practice in the handling of personal data. Responses to the consultation paper are now being considered with a view to publication of a final Code this year.The draft suggests that monitoring must be lawful and proportionate to the employer's risk, with minimum intrusion, and supported by a published policy. As yet, there is no definitive solution. The following steps are suggested:
A sensible organisation will put in place an e-mail policy which clearly sets out its approach on the use of e-mail. This should contain guidance on business and personal use, e-mail security and the legal implications.A final word of warning - the practice has recently developed of attaching notices to e-mails referring to the condition(s) under which the e-mail has been sent. E-mail notices do not warrant their legal validity. This is ultimately a matter of interpretation by the courts, and there may well be instances in which they are found not to be binding. Most notices of this type are subject to the test of reasonableness.Rupert Kendrick is a solicitor and author of Managing Cyber-Risks (Law Society Publishing, June 2002), E-mail: RupertKendrick@aol.com POLICY CHECKLIST
Your company's e-mail policy should contain guidance on the following.Business use
Personal use
Security
Legal implications
INCREASE IN E-MAIL BULLYING
One-sixth of all staff are bullied by e-mail, according to recent research. Surprisingly, it is senior workers who are suffering the most; 28% of directors reported e-mail bullying compared to 15% of secretaries. Only 4% of workers admitted to being e-mail bullies themselves.
The survey, published by internet job site reed. co.uk and polling 3,400 staff, also found regional variations. In the South West, one in five (21%) had been bullied by e-mail, compared to one in eight (12%) in East Anglia. Of those surveyed, 45% considered that e-mail bullying has increased over the past three years. ( www.reed.co.uk/surveys.asp )
Topics
- Asset Risks
- Best Practice
- Companies
- Company Risk
- Controls
- Corporate Social Responsibility
- Data Protection
- Data Theft
- Employees
- ERM
- Extortion
- Feature
- Financial Servcies
- Fraud
- Fraud
- General
- Governance
- Guidelines
- Guidelines
- Intellectual Property
- IT
- IT Breakdown
- Liabilities
- Malicious Attacks
- People
- People Risks
- Public
- Risk Assessment
- Risk Identification
- Risk Type
- Supply Chain Risks
- Technological Risk