Corruption, Crime & Compliance: Electronics Communications Risks in The Era of Ephemeral Messaging

Thomas Fox - Compliance Evangelist
Contact
Ephemeral messaging applications like Snapchat, WhatsApp, and Telegram have presented a complex challenge for compliance professionals and legal counsel. On one hand, these technologies can reduce data storage and preservation costs, minimize breach exposure, and allow the prioritization of communications data. On the other hand, they can create blind spots by deleting communications records and seriously obstructing internal investigations. How can companies balance the benefits of ephemeral messaging against the risks of compliance See more +
Ephemeral messaging applications like Snapchat, WhatsApp, and Telegram have presented a complex challenge for compliance professionals and legal counsel. On one hand, these technologies can reduce data storage and preservation costs, minimize breach exposure, and allow the prioritization of communications data. On the other hand, they can create blind spots by deleting communications records and seriously obstructing internal investigations. How can companies balance the benefits of ephemeral messaging against the risks of compliance program undermining? In this week’s episode of Corruption, Crime, and Compliance, Michael Volkov discusses recent DOJ guidance regarding ephemeral messaging risks and outlines practical steps organizations can take to strike the right balance.

You’ll hear him discuss:

• Ephemeral messaging can reduce data storage and preservation costs, which can be significant for companies facing litigation or investigations. It also reduces potential breach exposure by deleting data.

• However, ephemeral messaging can obstruct internal investigations and create corporate blind spots by deleting communications records before they can be reviewed. This undermines compliance programs.

• DOJ’s guidance outlines several steps companies can take to allow ephemeral messaging while mitigating risks:

1. Understand how the apps delete data and what types of data are stored;

2. Tailor policies on use to your specific risk profile and business needs;

3. Clearly communicate policies to employees and ensure regular enforcement;

4. Examine how policies impact the ability to conduct investigations and respond to subpoenas;

5. Evaluate the overall reasonableness of the risk mitigation strategy.

• Practical steps to make ephemeral messaging safer include:

1. Restricting use to specific authorized purposes like scheduling;

2. Requiring employees to maintain deletion settings;

3. Conducting periodic audits of devices;

4. Requiring preservation and company access to work communications,

5. Coordinating ephemeral messaging policies with broader data preservation policies.

• If a company provides devices to employees, it has more control and ability to restrict apps and access data, but even then, steps need to be taken to mitigate risks.

• BYOD policies are more complex since consent and privacy restrictions may limit what companies can do. However, a BYOD policy still needs to address comprehensively:

1. Preserving data

2. Allowing corporate audits and access

3. Segregating work data where possible

4. Outlining consequences for violations

5. Respecting local privacy laws

6. Getting employee consent

• With the right policy framework, BYOD can potentially allow ephemeral messaging while protecting data availability.

KEY QUOTES:

“Companies have a vested interest in preserving their internal communications for a variety of reasons, to hold internal actors accountable, or even outside actors sometimes, and to protect the organization from potential private and government claims or investigations that may have serious direct or collateral consequences.” – Michael Volkov

“If the government issues a grand jury subpoena as part of a criminal investigation and the company fails to preserve data generated by use of an ephemeral messaging system, a company could be held liable for failing to preserve data relevant to the criminal investigation. Such consequences can be significant…” – Michael Volkov

“While a company may have limited access to employees’ personal devices when it supplies devices to its employees, the company should regularly secure certifications by its employees that has not used its personal device for work-related purposes, with emergency exceptions, of course. Similarly, companies have to develop testing protocols for its BYOD policy and secure employee consent to examine the personal device limited solely to business data.” – Michael Volkov See less -

Embed
Copy

Other MultiMedia by Thomas Fox - Compliance Evangelist

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Thomas Fox - Compliance Evangelist | Attorney Advertising

Written by:

Thomas Fox - Compliance Evangelist
Contact
more
less

Thomas Fox - Compliance Evangelist on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide