KTD Communications

Contact Contents

             
   

Number 18: September 3, 2003

Please forward this newsletter to your colleagues and friends. If  someone sent this to you,  now so you don't miss an issue.

This week in Katydid:

Plug that IM Security Leak
Two recent articles from Business Journal discuss some of the new issues raised by instant messaging (IM) services. The first article stresses the technical issues facing IT administrators who allow IM services to run on their sites. The second article discusses the legal and security issues related to IM traffic.

The main concerns are security and confidentiality. IM is an open channel. Companies have less control over IM than they do over their telephone service. Companies may restrict features such as long distance calling and they have an audit trail of calls placed from any phone. However, there are no restrictions on IM. Any employee with internet access may install the software on their computer and begin communicating without an audit trail.

Any tool is open to abuse; and if you can't trust your employees with their personal communications, you might want to address those trust issues on a grander scale. However, there are genuine risks. Such an open channel makes a prime target for viruses. Employees sensitive to e-mail safety may not be as careful with IM. Conversely, it's also easy for information to escape your business. In the same way you'd transfer a picture of your pet dog to a friend, you can transmit the latest code rev of your software to your competition.

The seeming anonymity of IM also leads to abuse. Most company policies state that e-mail is property of the company, and while everybody expects a certain level of privacy, most court cases have favored the company that pays for the infrastructure. E-mail threads are often called into evidence in corporate lawsuits, infamously so in the Microsoft antitrust case. Prosecutors have begun to subpoena IM conversations as well. Recent cases of insider trading and sexual harassment have relied on this kind of evidence. For this reason, lawyers have recommended that public companies restrict IM access and record all IM threads.

Perhaps a little personal restraint makes sense for both employees and the corporations for which they work. If security is part of the value of your company, it might make sense to have careful control over communications. For most businesses, however, there are too many low-tech ways for information to get past your walls to be overly concerned about IM security. Trash cans, envelopes, and the ever-trusty, but often overlooked, face-to-face conversation are still the primary leaks.

Corporations need to include IM policies in their employee handbooks, and consider installing IM auditing software. Employees, for their part, can exercise the same vigilance with IM conversation as they do with spoken conversations. Even if Big Brother is not watching, imagine your mother is.

Top »

How to Expand Your List
A quick case study from ClickZ shows how The Sales Board, a training company, used an integrated marketing campaign to build their in-house list. I often recommend just such a strategy, so it's good to see confirmation from other sources.

One overlooked idea for an integration campaign is the business card. Because business cards are standardized, printing is often inexpensive and, of course, highly personalized. If a card can have an individual phone number or e-mail address, why can't it have a unique URL? Consider creating a landing page for your sales reps, or your service reps that caters to their respective audiences.

For example, if support is one of your major value points, you can include a special URL on the business cards of your training team. The landing page could include training material or other resources, as well as offers for solution upgrades.

For trade shows, it might be worthwhile and cost-effective to print business cards for your representatives to hand out that include unique offers for trade show participants. Because people hand out business cards face-to-face, they can be a critical control factor on reach. Additionally, you can track response through the unique URLs. While brochures often end up in the trash bins at the airport as people lighten up for the trip, business cards usually find themselves tucked in somewhere, a little information time bomb waiting to go off.

Top »

Thanks for Reading
This e-mail newsletter spreads mainly by word of mouth. Please forward it to your colleagues and friends. Also, you can read other back issues.

If you have suggestions of web sites to review, writing that buzzes, or a new way of looking at things, let me know. Send your suggestions to .

If you received this newsletter from a friend, please today. Our subscriber lists are confidential; we never sell or rent our lists to third parties. If you want to from this newsletter, please let us know.

Kind regards, 
Kevin Troy Darling

Top »

   

Subscribe Today
The Weekly Katydid is a refreshing blend of tips, current events, and other ideas to shift your perspective. now.

Evaluate Your Site
We'll compile a three-page report filled with action items you can put to use today — with or without us. Call (480) 215-6462 now or send Learn more »

Reach Out to Customers
Let us develop a custom e-newsletter solution for you.  For a consultation, today.

 
             

Quotation

Red Sandstone


P.O. Box 71606
Phoenix, AZ 85050
(480) 215-6462 phone
(623) 321-8128 fax