How to Establish a Privacy Policy

 

How to Establish a Privacy Policy

Eye on Circuit BoardImagine that your business has a make-or-break presentation scheduled today with a prospective client. But after arriving at work this morning, you discovered that key files needed for the meeting are corrupt. The culprit: a virus-infected email message that one of your employees forwarded from the Web last night to everyone in the company.

It may sound like every business’ worst nightmare. But as the use of communications tools such as email and instant messaging (IM) proliferates, it’s a scenario that all businesses must wake up to sooner rather than later. If you’re serious about protecting your business’ intellectual property and other sensitive information, then you need a comprehensive privacy policy that addresses employee use of email and IM. This article will show you how to implement some privacy policy “best practices.”

Assess your risks Few people would doubt that email has revolutionized communications in today’s business world. According to the American Management Association’s 2003 “Email Rules, Policies and Practices” survey, 86 percent of respondents said that email has made them more efficient, while 51 percent said they are much more efficient. Gartner, meanwhile, forecasts that 70 percent of all corporations will use IM this year, and that by 2005 IM will represent 50 percent of all business-to-client communications.

But employee use of such tools can open businesses to some costly liabilities, including workplace lawsuits, sexual harassment claims, trademark and patent infringement suits, internal security breaches, hacker attacks, and lost productivity. As a result, companies are increasingly adopting strict privacy policies — often including monitoring — to govern their employees’ email and IM activity. Consider these additional findings from the American Management Association’s survey:

Three-fourths of all organizations have written policies concerning email, but fewer than half train their employees on them.

More than half of U.S. companies engage in some form of email monitoring of employees and enforce email policies with discipline or other methods.

22 percent of companies have terminated an employee for email infractions.

The average survey respondent spends a quarter of the workday on email.

Be explicit So how do you balance an employee’s privacy and the need to maintain security? With lots of care, experts agree. After all, no company wants to find itself in the position of playing “Big Brother.” And not all businesses will deem it necessary to monitor their employees’ email and IM use. But if sensitive business information regularly passes through your mail systems, it’s imperative that you have a clear, unambiguous privacy policy in place and the means to back it up.

 

 

Carl Mazzanti is Co-Founder and President of eMazzanti Technologies, Microsoft’s four time Partner of the Year and one of the premier IT consulting services for businesses throughout the New York metropolitan area and internationally. Carl and his company manage over 400 active accounts ranging from professional services firms to high-end global retailers.

eMazzanti is all about delivering powerful, efficient outsourced IT services, such as computer network management and troubleshooting, managed print, PCI DSS compliance, green computing, mobile workforce technology, information security, cloud computing, and business continuity and disaster recovery.  

Carl Mazzanti is also a frequent business conference speaker and technology talk show guest and contributor at Microsoft-focused events, including frequent prominent roles at the Microsoft Inspire (Worldwide Partner Conference / WPC).

Carl, a serial Entrepreneur, gives back to the community through Entrepreneur teaching engagements at Georgetown University, the company’s ocean wildlife conservation effort, the Blue Project, and Tree Mazzanti.

SHARE:

Facebook
Twitter
LinkedIn

Video Resources

Are You It Resources Effective In The New Normal

VIDEO/WEBINAR

Are Your IT Resources Effective in the New Normal?

Align2020 A Virtual Conference

VIDEO/VIRTUAL CONFERENCE

Align 2020
Cyber Security, Compliance & Collaboration

Best Practices For Working In A Modern, Mobile, And Secure Environment

VIDEO/WEBINAR

Best Practices for Working in a Modern, Mobile, and Secure Environment

NEWSLETTER