Security StrategiesNetwork World's Security Strategies Newsletter, 07/17/07Managing private e-mail at workBy M. E. KabayRecently I was getting ready to invite colleagues to the annual Gay Pride parade in Burlington using my employer's e-mail. My wife and I have been marching in such parades for 20 years, and I had planned to use my personal e-mail account for the invitation and not to include my professional signature block in the message. However, I have a longstanding objection to the use of corporate e-mail for personal purposes, so I resolved the problem by writing to specific colleagues to ask for their personal e-mail addresses and invited them to join the parade in entirely personal messages. What’s wrong with using corporate e-mail for jokes, invitations, and the like? One issue is the waste of bandwidth. Some people find the quality of the jokes, hoaxes and cheering sessions low enough to be irritating. Another problem arises with politically sensitive messages such as my announcement - some members of a group may find particular events or viewpoints offensive. Why should everyone in the group be subjected to a barrage of unsolicited e-mail just because they work somewhere? The question also raises some valuable and instructive points about appropriate-use policies for e-mail. First, we don’t have a formal written policy on appropriate use of our official e-mail. In the coming months, I propose to work with my colleagues to frame clear written policies that any of our staff members can easily consult for guidance about suitable and unsuitable content for personal messages.
Such policies will reduce possible disappointments and resentments resulting from decisions based on unwritten expectations. In addition, any hint of discrimination based on particular political or religious biases will have to be scrutinized to ensure that we are not subject to legal repercussions. In more general terms, I believe that clear written guidance for effective use of e-mail is essential for any organization to ensure privacy, maintain security, respect requirements for archiving of data and avoid legal liability of many kinds, including restrictions imposed under the Family Educational Right to Privacy Act (FERPA). An easy tool that we can develop is a voluntary mailing list of non-work e-mail addresses for non-work e-mail. A Yahoo group, for example, offers many benefits over an informal list in the CC: or TO: field. In my next column, I’ll explore this option in more detail.
|
| Contact the author: M. E. Kabay, Ph.D., CISSP-ISSMP, is Associate Professor of Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site. ARCHIVEArchive of the Security Strategies Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment