One of this year’s biggest news stories has been the phone hacking scandal. One of the first celebrities to settle with the now-defunct News of the World was Sienna Miller, and I’ve always believed the newspaper was keen to settle because she demanded to see all emails relating to herself.
However, it was only a matter of time before others affected by the scandal demanded to see such emails too. And as result, it recently emerged that HCL Technologies – a firm that managed some of the News of the World’s IT systems – was asked to delete emails nine times between April 2010 and July 2011.
Although I totally condemn the phone hacking saga, there are lessons to be learnt about how we use email. Indeed, the use of emails as evidence highlights three issues:
You may also have heard that there has been talk of changing the UK laws relating to the retention and archiving of emails. In future, businesses could be compelled to keep all their emails and make them available on demand. That brings its own set of problems.
Ultimately, these things all confirm that you really need to think before you hit send. If you’re in any doubt about the content of your email, talk first and email afterwards.
As well as thinking carefully about when and how you send emails, there are other things you can do to protect your business:
There’s a tool to help you create an acceptable usage policy, plus a template for an email charter over on my own website.
(I’m not, of course, condoning any kind of hacking, whether into someone’s email, voicemail or anything else. I just think this scandal has highlighted some interesting issues about how businesses use and manage their email.)
To learn more about using email more effectively either go to one of Dr Monica Seeley’s new ninety minute Brilliant Email Master Classes or get a copy of her book, ‘Brilliant Email: How to improve productivity and save time’.
Comments
Have a look at my article on phone hacking (it's actually voicemail hacking that was the problem with the news of the world scandal).
http://www.secureassure.co.uk/articles/mobile-phone-hacking
Add a comment