About Us | Contact Us
View Cart

Supreme Court Decision Regarding “Expectation of Privacy” with text messaging

By Dan Hadaway | Saturday, June 19, 2010 - Leave a Comment

If we are issuing devices that allow text messaging to our employees, we’d be wise to update our Acceptable Use Policy to include “zero privacy expectations” for text messaging.

There are many articles on the subject, here’s the one I thought was best!

I would like to point out that this is a great example of how we need to be VERY conscious of “new assets” during our day-to-day lives.  Any time we see a process, device, application, or even a new “function” of existing assets, we should be documenting that using our risk assessment tools, and brainstorming answers to the questions:

  • “What threats does this new asset pose?”
  • “What vulnerabilities are there in this new asset?”
  • “How is this asset similar to other existing assets (in terms of threats and vulnerabilities)?”

Keep in mind that had we done this for text messaging, I think we might have thought “it’s very similar to e-mail, let’s look at the threats and vulnerabilities related to e-mail.”

In other words, our next iteration of our Acceptable Use Policy will look at text messaging not only in terms of privacy and confidentiality, but also in terms of integrity, availability, reputation, legal risk, and compliance.

Just take that last one.  If a loan officer broadcasts the new low interest rate to all contacts on his smart phone, are we violating disclosure requirements of Reg Z and other regulations?

Think about it!


Let us know if you have additional information, thoughts, links,
or disagreements.   Simply comment on this article.

We will keep your comment private unless you give us permission to post it on the blog.


This has been a Dan’s New Leaf posting . . . . a weekly post about whatever happens to be on Dan’s mind at the time, related of course to IT Governance in banking.


Latest News
    Artificial intelligence carries risk, but so does organic ignorance … Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . At a recent conference, I noticed two camps emerging in the debate over artificial intelligence. Some people embrace AI as a tool, while others support Elon […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX We are pleased to announce the appointment of Nathan Taylor as our new Network Administrator at infotex.  “We are very excited to have Nathan join our team as a Network Administrator and look forward to his contributions to maintaining and improving our infrastructure!” […]
    about artificial intelligence . . . And who will protect us from it . . .  Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Just watched some press on the the Senate hearings over regulating AI. The normal senator faces, Sam Altman of OpenAI, […]
    The Evolution of an Inside Term Used in our Vendor Risk Report Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Those who audit infotex know that our vendor risk report refers to a couple of our providers as “ransomware companies.” This reference started evolving […]
    Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    New tools could allow unskilled attackers to launch increasingly sophisticated attacks… An article review. Imagine a world where you receive a call from your boss asking you to assist them with something… only it’s not your boss, but an AI being used by an attacker.  This isn’t science fiction, it’s an actual attack that has […]
    Unavailability Strikes Where it doesn’t matter anyway Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . So, I’m writing today’s article from a resort in the middle of Wisconsin.  I want to make sure I’m staying on top of my New Leaf, which is to […]
    . . . and the importance of segregated response. The latest edition of Executive Vice President, Michael Hartke’s article series! In 2007 when I first joined infotex, coming from small to medium sized business general IT support into the world of cybersecurity, the one thing that was very hard for me to internally rectify was […]
    How concerts can help us understand APTs . . . Especially if you use your imagination! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . My daughter reminded me of a concert Stacey and I attended way back in 2013, in Chicago.  It was one […]
    Mutiny! The Malicious Insider Threat Webinar Registration A Webinar-Video It is often awkward to bring up the one attack vector most of us have not addressed. The malicious insider threat. Even if we can flaunt all statistics and claim that the likelihood of an insider attack is low in our bank, the impact is still […]