Go High-Tech to Uncover Employees Unauthorized Instant Messaging Use


Go High-Tech to Uncover Employees’ Unauthorized Instant Messaging Use

To help you get a grip on unauthorized instant messaging use, you may want to take advantage of technology. A number of vendors including Akonix, FaceTime, and IMlogic provide tools that enable employers to test their networks for the presence of consumergrade IM clients. These products reveal what names employees are using and whether or not they are using IM to transfer files, and if so, what files. [1]

This is a potentially serious issue. Employees who are instant messaging files out of your system may be stealing valuable intellectual property. Or they may be planning to go into business for themselves, using your customer database as a prospecting tool.

Don’t stop with a onetime check of your system. Have your IT department conduct regular IM screenings. Your findings will help you develop a comprehensive strategic plan for effective IM management.

See Appendix G for a list of IM vendors.

[1]Dan Orzech, ‘‘Under IT’s Radar, Instant Messaging Invades Corporate Desktops,’’ InstantMessagingPlanet (July 14, 2003), www.instantmessagingplanet.com/enterprise/article.php/1120822348711 .




Instant Messaging Rules. A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
ISBN: 0814472532
EAN: 2147483647
Year: 2003
Pages: 241
Authors: Nancy Flynn

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net