Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Instant messaging rules : a business guide to managing policies, security, and legal issues for safe IM communication
Flynn N., American Management Assoc, Inc., New York, NY, 2004. 224 pp. Type: Book (9780814472538)
Date Reviewed: Jun 16 2005

One of the favorite personal applications of the Internet--instant messaging (IM)--is rapidly gaining popularity in the business world. Total users of IM have exceeded 100 million worldwide, and IM will be used more frequently than email in 2005. Like all other Internet tools, the paramount concerns about this widespread use of IM by millions of corporate employees in their workplaces (estimated to be 70 percent of employees of US companies by this year) are its security, and legal implications and impacts.

The hybrid nature of IM, somewhere between a casual telephone call and a formal email message, may have caused confusion among business organizations, and many organizations still have not established a clear policy for the use of IM in their offices. Literally, IM is a special form of email with instant delivery: a form of written correspondence that creates a written business record, just as email does (although, technically, IM is usually under more centralized control by gateway servers). Consequently, the use of IM in the workplace, whether it is officially adopted by the business or not, can raise a variety of issues and concerns, such as data confidentiality and security, data retention, policy compliance, employee productivity, training, and so on.

This book addresses the challenges that IM brings to the workplace, and provides workable solutions for establishing and enforcing rules and policies that will let corporations maximize the business potential of IM technology. The IM rules summarized in the book as best practices for workplace IM use will help employers keep their organizations out of harm’s way, while giving employees access to a cutting-edge, productivity-enhancing tool.

The book is rather concise and brief. The text is organized into 19 chapters, arranged into seven parts, including a general overview of IM, IM and the law, establishing IM policy, content guidelines for IM, IM retention and deletion strategy, employee education, and regulatory realities. Nine appendices offer some reference materials, such as IM and email policy dos and don’ts, a code of conduct, sample IM and email policies, a sample sexual harassment and discrimination policy, and a glossary. In addition, there are many “real-life e-disaster stories” and sample survey questions, as well as the “Recap and IM Action Plan” at the end of each chapter.

Dedicated only to the legal and policy issues of IM, this book could be a good guide and reference for readers who are either interested in, or currently working on, creating, managing, and maintaining policies and security practices for safe IM communication in the business world.

Reviewer:  Cui-Qing Yang Review #: CR131397 (0605-0474)
Bookmark and Share
 
Regulation (K.4.1 ... )
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Computer Conferencing, Teleconferencing, And Videoconferencing (H.4.3 ... )
 
 
Privacy (K.4.1 ... )
 
 
Web-Based Interaction (H.5.3 ... )
 
 
Communications Applications (H.4.3 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Regulation": Date
Is big brother hanging by his bootstraps?
Greenberg L., Goodman S. Communications of the ACM 39(7): 11-16, 1996. Type: Article
Jul 1 1997
The Gordian knot
Neuman W., McKnight L., Solomon R., MIT Press, Cambridge, MA, 1997. Type: Book (9780262140614)
Feb 1 1998
Captive audience: the telecom industry and monopoly power in the new gilded age
Crawford S., Yale University Press, New Haven, CT, 2014.  368, Type: Book (978-0-300205-70-1)
Jul 17 2014

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy