Showing posts with label privacy. Show all posts
Showing posts with label privacy. Show all posts

Monday, November 27

E-mailing History

The most convenient and abused communication method, e-mail, turned 35 years old today. The very first text message was forgettable, QWERTYUIOP or something similar, IT programmer Ray Tomlinson told The Sun reporter Josh Burt.

But it didn't take long before people became more inventive, writing e-mails they would never pen on paper. Burt includes five of the most famous cases in his commentary: Cringe! Worst e-mails ever.

• In 2000, Claire Swires sent a saucy note to her boyfriend while working at the London law firm Norton Rose. Her boyfriend forwarded it to a few of his closest friends, which turned Swires into a global talking point.

• Lucy Gao, who worked for Citigroup, demanded via e-mail that her 39 guests adhere to numerous ridiculous demands, including what time she would accept gifts and cards for her birthday.

• Joseph Dobbie spilled his heart out to a pretty girl over e-mail, blissfully unaware that his warm words to Kate Winsall would be forwarded to the entire world.

• Richard Phillips left his job as a senior associate with the world's biggest law firm, Baker & McKenzie, after he demanded a secretary, Jenny Amner, pay £4 to dry clean his ketchup stained pants. Amner replied to his e-mail, which she cc'ed to all 250 members of their staff: "I must apologize for not getting back to you straight away but due to my mother's sudden illness, death and funeral I have more pressing issues than your £4."

• Trevor Luxton, a clerk at Credit Lyonnais, made a big mistake when he thought he'd boast about his cheating ways over e-mail, calling himself the worst boyfriend in the world. Presumably his friends agreed, forwarding his e-mail until the entire world knew too.

Burt left off a similar story, where an executive stationed overseas boasted about using his expense account to rob the company blind. His e-mail's final destination was The Wall Street Journal, which underpins the point I always share with public relations students — never write an electronic message that you wouldn't be proud to see published in The Wall Street Journal. One day, it just might be, even if you wrote it years ago.

Monday, November 20

Sacrificing Privacy For Exposure

Like it or not, there are different rules for public figures than private individuals in regard to privacy. The more public your position or actions in society, the less privacy you retain because the public has a legitimate and substantial interest in public figures and public conduct.

That's why NBC affiliate WSLS-TV fired meteorologist Jamey Singleton on Thursday after a frontal nude shot of him getting out of the shower was posted on someone else's MySpace site; and why he will likely not be able to pursue charges against the poster despite the fact he was fired. It's also why MySpace pulled the pictures, because it has positioned itself as a distribution channel, not a publisher (protecting it from what people post, but pulling such content only if it is determined the subject did not consent).

According to the station, Singleton was fired because the photo broke the morals code in his contract. The moral code in the contract is indicative of his position as a public figure. Singleton told the Roanoke Times that he cannot blame them if the photo was the straw that broke the camel's back (he was retained earlier this year after admitting he was a recovering heroin addict).

It's an interesting commentary on how definitions are being changed today as becoming a public figure is easier than ever. Blogging, for instance, comes with the risk of sacrificing privacy rights. The greater your readership, the greater your potential to become a public figure with fewer privacy rights. It's something to think about while you share your commentary because, sometimes, there are unforeseen consequences to moving into the public eye.

Tuesday, October 17

Questioning Ethics

If you want to shake up people's definition of ethics, go no further than the Internet.

Some of the same folks who easily chastise Rep. Mark Foley e-mails and private messages, laughed as they discovered Augusten Burroughs frequently amused himself by placing fake personal ads, and smirked when Jude Law's character pretends to be Julia Roberts and sucks in Clive Owen (Closer), are now defending married men and women seeking extramarital affairs on Craig's List personal ads.

The controversial practice, which has been around for some time, has been brought to center stage after after Michael Crook, a 28-year-old Liverpool, N.Y., man posed as 19-year-old Melissa and coaxed personal information from Kevin Murphy, who answered a personal advertisement on Craig's List. Crook then shared the information about the extramatarial affair with Murphy's wife, bosses, co-workers, several of his company's corporate accounts, and on his Website, which is dedicated to exposing Internet infidelity.

According to Abigail Goldman's story in the Las Vegas Sun, ethics experts say the stunt is immoral. Legal experts say it encroaches upon the gray territory of online liberties. Internet rights experts say it raises questions about privacy in cyberspace.

Does it? While two wrongs might not make a right, the question of the First Amendment still hangs over the entire argument. We cannot censor people from sharing any portion of a conversation, online or otherwise, if they choose to publish it. Can we?

Sure, some might argue that Crook and similar publishers are defrauding these men, but aren't they themselves attempting to defraud single women as available, only offering up their marital status when it suits them (to say nothing of what they are doing to their spouses)? Are people so naive to believe that personal ad exchanges are honest, despite years and years of articles that point out they are generally rife with fraud as those who post and respond frequently shave 10 years, 20 pounds, change jobs, and even their own names along the way? Where is the outrage in this seemingly accepted practice?

Ergo, there is only one answer here. If we are talking about ethics, they are all wrong. But if we are talking about stupidity, then those seeking online affairs retain all the honors. Maybe not today nor even tomorrow, but someone somewhere has stored all that personal informational shared over the Internet, innocently or not, possibly with the receiving party totally unaware (given that traces of pictures and e-mails remain on hard drives long after they are 'erased' and Google archives Website pages so they can be viewed long after you've taken them down).

As I've posted before, there is no such thing as a private conversation. So unless you would be proud to see what you say or do on the cover of the Wall Street Journal (Crook, I might point out, is proud of what he is doing), don't say or do it. It's about that simple. This holds to be especially true on the Internet because the information you put out there is much more permanent than anyone ever imagined, and the risk of it resurfacing is far greater than you ever considered.

Friday, September 29

E-mailing Is Never Private

The first e-mail rule I tell every client or public relations professional is: don't send it unless you would be proud to see it on CNN.

Unfortunately for Rep. Mark Foley, he was never a client or a student. CNN reports he resigned today after a former congressional page questioned e-mails Foley had sent to him.

Foley apparently sent the e-mails in August 2005, when the male page was 16 years old.

"Today I have delivered a letter to the speaker of the House informing him of my decision to resign from the U.S. House of Representatives, effective today. I thank the people of Florida's 16th Congressional District for giving me the opportunity to serve them for the last twelve years; it has been an honor," said Foley. "I am deeply sorry and I apologize for letting down my family and the people of Florida I have had the privilege to represent."

In the e-mails, which were obtained by Washington-based Citizens for Responsibility and Ethics in Washington (CREW), Foley discussed a second page, saying "I just emailed [him]... hes such a nice guy... acts much older than his age... hes in great shape... i am just finished riding my bike on a 25 mile journey now heading to the gym... whats school like for you this year?"

Foley then asked the page for a picture.

The young man, who forwarded the e-mails to another congressional staffer, called the e-mails "sick, sick, sick."

"Maybe it is just me being paranoid, but seriously. This freaks me out," the page wrote in the e-mails obtained by CREW.

A spokesman for Foley told CNN the congressman acknowledged he had an e-mail exchange with the former page but flatly denied that it was anything inappropriate.

Of course, if there was nothing inappropriate, one has to wonder how he let his family and the people of Florida down.

I'm not going to add any speculation on the implications, but limit this to the aforementioned lesson. There is no such thing as private communication anymore, especially in e-mail or on voice mail (as State Sen. Dina Titus recently learned in Nevada).

Wednesday, September 27

Increasing PDA Security


GFI, a international developer of network security, content security, and messaging software, recently launched a new white paper about the new and increasing threat of "Pod Slurping."

The paper explores the threat posed by portable storage devices and considers security measures that should be implemented in addition to perimeter solutions such as firewalls and anti-virus software. Easy connectivity and high speed data transfer means that by simply plugging a device into a USB or FireWire port, a data thief can get away with more information than ever before. This increasing leakage, ciphering and disclosure of corporate data have been coined the term "pod slurping."

There is no denying that these devices are increasingly popular -- by 2009 it is expected that shipments of iPods and other MP3 players will surge to nearly 124 million units.

"Data slurping is a very simple and automated process. It doesn't require any special technical expertise to steal a company's data using a portable storage device," said Simon Azzopardi, MD EMEA, GFI. "A company needs to protect its network by introducing technological barriers that enable control over data transfers throughout the network."

To download a copy of the White Paper, visit Pod Slurping White Paper.

Friday, September 1

Stripping Away Private Conversations

In early 2005, the Las Vegas chapter of the International Association of Business Communicators (IABC), recognizing that blogs represented the next evolution of communication, asked me to speak on transforming blogs into business strategy. Copywrite, Ink. had already conducted several years of research in the area and actively tracked blogs' exponential growth rate.

While the presentation included the characteristics, demographics, and growing influence of blogs, we also offered up the impact that blogs could have on communication. We cautioned our audience, and still do today, that blogs (and similar outlets such a YouTube) mark a diminished ability to control a message while increasing the need for accountability, transparency, and rapid response.

And above all, we warned, there is no such thing as a private conversation.

Under all circumstances, the golden rule for public relations practitioners, public figures, and corporate executives is if you would not want your statement to be quoted in the Wall Street Journal or on CNN, then DO NOT SAY IT AT ALL. And now it seems to me, as news reporters have evolved from covering public figures to becoming public figures, there is a growing need in the media industry to learn the very public relations skills they once criticized.

Kyra Phillips certainly could have benefited. When her wireless microphone picked up her muffled conversation about her husband, brother, and sister-in-law in the bathroom — "I've got to be protective of him. He's married, three kids and his wife is just a control freak" — she learned the hard way that members of the media are no longer exempt from public scrutiny.

CNN later apologized to the White House, but, citing corporate policy, said it wouldn't comment on whether anyone would be disciplined. It seems to me it is unlikely anyone will be disciplined. No one is sure whether it was a technical or human malfunction. Other than appearing on Letterman, however, Phillips has not personally offered any comment on the conversation.

This is precisely where bloggers demonstrate public influence. As much as CNN would prefer the story die a quiet death, Phillips remains the top searched name on the Internet. Why?

Silence after a mini communication crisis is like adding lighter fluid to a fire.

We saw the same thing in Las Vegas a few months ago. Congressman Jim Gibbons, Republican candidate for governor, bragged to a Las Vegas Review-Journal reporter about using his state legislative position to be rehired at Delta Air Lines years ago. After his opponents and political bloggers labeled his story a case study in extortion and ethics, his campaign quietly prayed the mistake would simply go away. After several weeks, the tiny flame began to rage into a 4-alarm fire on the Internet. The campaign had no choice but to put it out by calling the Gibbons' account nothing more than a misstatement.

The cost was phenomenal. While the story eventually shifted, the campaign was forced to spend nearly $1 million to retain Gibbons' lead in the primary. Certainly, the 'extortion' story wasn't the only reason, but it certainly lent traction to his opposition. Gibbons is not the only one out there. There seems to be a surge of misstatements — from accidental insensitive slurs to poorly planned racial jokes — and almost every one of them has been largely mishandled. Enough so that political pundits are more inclined to discuss whether misstatements are covered fairly instead of asking why it was said in the first place.

The bottom line is that the advent of new alternative media, blogs and webcasts, means there is no longer any such thing as a private conversation. The person you are talking to today could very easily be blogging about what you said tomorrow. And, if what you said happens to be blogged about enough, it will very likely make CNN and the Wall Street Journal. Fail to respond, even for a second, and if the major media outlets do not ratchet it up, several million bloggers probably will.

Thursday, July 28

Keeping Communication In Check

I recenty read a story written by Amy Crane that reminded me most Americans don't realize that their right to privacy does not extend into the workplace.

In fact, she pointed out that according to the 2005 Electronic Monitoring and Surveillance Survey, conducted by the American Management Association and the ePolicy Institute, monitoring employees electronically is a growing part of the way American companies do business. The institute's survey, released in May 2005, noted that 76 percent of employers monitor workers' Web connections, while 50 percent store and monitor employees' computer files.

That's not all. Many companies go beyond keyboard keystroke monitoring, reviewing and storing employee e-mails and instant messages, monitoring time spent on the phone (or taping conversations). Video surveillance, drug testing,
and satellite technology that monitors use of company cars, cell phones and pagers are all becoming part of the mix.

While the invasion continues to move into other areas, company computer use is still the primary concern. According to the survey, 26 percent of employers have fired workers for workplace offenses related to the Internet and 25 percent of employers have fired employees for misuse of e-mail. While many employers monitor employees' Web surfing, a slightly smaller number - 65 percent of those surveyed - actually use software to block workers' access to inappropriate Web sites.

It's not all about productivity, employees who spend too much time online surfing, attending to personal business, or e-mailing friends. It's also about workers disclosing trade secrets or proprietary information over the Internet. And in some cases, employers have cause to worry.

When I recently conducted a blog workshop, I reminded a room full of communication managers that private conversations in the workplace with co-workers, vendors, or customers are a thing of the past. With the popularity of blogs, for example, anyone can be a journalist of sorts and share any experiences or comments with an audience as large as they're willing to capture.

I also added that it seems to me the real challenge is not really about employers and employees. It's about people. While some might scoff at the idea that they are being monitored at work, they feel perfectly justified in making private conversations public, recording personal chat logs and e-mails, positioning video monitors around and about their homes, and purchasing publications that reveal every dirty detail of someone's life if they happen to come into the public eye. In short, the enemy eroding our right to privacy is not a conspiracy constructed by faceless corporations and companies. On the contrary, companies are nothing more than a collection of people, which means the conspirators against privacy are us.

Good, bad, or indifferent, there are are simple solutions to avoiding serious problems. As an employee, be more sensitive to your company's privacy policies, avoid activities that violate them, and always be careful about with whom you share company information online and over the phone. For employers, even though the law does not require it, it's common sense to let employees know when, where, and how they might be monitored (about 80-89 percent of employers do). Otherwise, your company could inadvertently denigrate morale and trust in the workplace.

Of course, you don't have to have a company to be an employer. At home, you might consider extending the same courtesy to your babysitter, lawn care professional, and home improvement specialist. They're people too.
 

Blog Archive

by Richard R Becker Copyright and Trademark, Copywrite, Ink. © 2021; Theme designed by Bie Blogger Template