Smoking Guns
Companies deploy monitoring software to limit e-mail risks.
June 30, 2008 at 08:00 PM
18 minute read
In early February, while the government was breathing down Eli Lilly's neck over questionable marketing tactics used to peddle its schizophrenia drug Zyprexa, an Eli Lilly in-house attorney was working on a way to settle the matter.
The lawyer was writing an e-mail full of sensitive information pertaining to the settlement, which included a fine that would be the largest ever paid by a drug company for breaking federal laws regulating how drug makers can promote their medicines. She meant to address the message to Brad Berenson, a partner at Sidley Austin, and outside counsel on the case.
However, thanks to the autofill function on her e-mail, the message went to Alex Berenson, a reporter for the New York Times. Needless to say, the issues surrounding Zyprexa literally became front-page news the next day.
E-mail blunders such as Eli Lilly's can happen to any company. Whether it's an employee writing blatantly harassing e-mails to a co-worker or an engineer transmitting trade secrets outside of an organization, no company is safe from the risks that e-mail creates.
However, new technology may help combat these liabilities. A number of companies are producing software that automatically enforces acceptable use policies. These customizable systems execute a number of actions in the event that a policy is broken, going so far as to sequester the damaging message before it ever reaches the recipient.
“People treat e-mail like chatting, often thinking of it as private, short-lived and unofficial,” says David Cohen, co-chair of K&L Gates' e-discovery analysis and technology group. “What lawyers quickly learn is that it lasts forever, multiple copies of a message exist, and it's easily misinterpreted and misdirected.”
Publicized Policies
E-mail dangers come in many forms. The most notorious risk that e-mail poses, and possibly the most costly, is the “smoking gun.” This is the term used for e-mails that contain blatantly damaging information that can sink a case for a company defending itself in investigations and litigation.
Other e-mail dangers include misguided messages that can compromise privilege or trade secret information, the transmission of pornographic material and the accidental disclosure of private information such as Social Security numbers and health records. Any of these can result in litigation, regulatory investigations or financial loss to a company.
“The first step for any company is to have an acceptable use policy, which should state, among other things, that company resources are for business purposes and that employees have no privacy rights,” Cohen says.
The company should publicize the policy and ensure all employees sign a document stating they have read and understand it.
However, sometimes policies aren't enough to protect a company. That's where e-mail monitoring software comes into play.
Writing Rules
This technology comes in multiple flavors, but all permutations of the product serve the same purpose–to create a process whereby in-house counsel can track, monitor and sometimes prevent potentially damaging messages.
This process begins with the establishment of policies. Policies are customizable combinations of rule sets that in-house counsel can institute to help automatically enforce acceptable use policies. Policies can take the shape of banned keywords, whereby the software, using its built-in lexicon, can scan e-mail messages for trigger words such as sexual and racist vocabulary.
“With our software, you can have multiple lexicons for different business units, such as R&D and HR,” says Bill Tolson, director of legal and regulatory solutions marketing at Mimosa Systems Inc. “All those lexicons will be compared in real time as files flow through the system.”
Another type of policy can limit the number of recipients a sender can assign an e-mail. Companies can use this function to cut down on the number of mass e-mails employees transmit, but it also can help prevent violations of certain regulations, such as those that govern the financial industry.
“Let's say you are a registered broker-dealer and you just sent out a communication to more than 20 people outside the company,” says Chris Bradley, vice president of marketing and business development for MessageGate Inc., an e-mail monitoring software provider. “That could be constituted as marketing materials, so you might want to alert the user to insert a disclaimer saying the message doesn't represent the views of the company but of the individual.”
Finally, the software can limit communication between internal departments at a company. This type of policy is especially useful to prevent the transmission and theft of trade secrets and personally identifiable information.
“If you are an engineer, you tend to not be working with HR content,” says George Tziahanas, vice president of legal and information management solutions at Orchestria Corp. “If it turns out that you are an engineer working with HR content [and shouldn't be], we can trigger a control.”
Taking Action
These controls are called “actions,” and in-house counsel can set up the software to deploy actions of varying severity depending on the infraction.
For example, some software can automatically sequester an e-mail in a special queue, preventing it from leaving the organization. The company assigns someone to monitor the queue, often either in-house counsel or a member of the compliance or HR departments. This person can review the questionable e-mails and either allow them to continue on to their recipients or stop them and confront the sender on the violation of policy.
However not all software manufacturers include this capability.
“Our product is different in that we don't stop e-mails,” Tolson says. “We watch things, do alerts and put copies of questionable e-mails aside, but we never stop the flow of e-mail. If you are stopping the wrong things and cause a business to lose business, then there are some liability issues.”
This is why many companies opt to use the alert action, which not only prevents the interruption of business but educates employees in the process. When a user attempts to send a message that potentially violates a policy, a message appears citing the possible violation. At this point, the employee can opt to either send the message as is or alter the e-mail to comply.
“If you give people the ability to self-correct, that has a huge impact on two things,” Tziahanas says. “It is a deterrent in and of itself, but it also is a great way to educate employees.”
In early February, while the government was breathing down Eli Lilly's neck over questionable marketing tactics used to peddle its schizophrenia drug Zyprexa, an Eli Lilly in-house attorney was working on a way to settle the matter.
The lawyer was writing an e-mail full of sensitive information pertaining to the settlement, which included a fine that would be the largest ever paid by a drug company for breaking federal laws regulating how drug makers can promote their medicines. She meant to address the message to Brad Berenson, a partner at
However, thanks to the autofill function on her e-mail, the message went to Alex Berenson, a reporter for the
E-mail blunders such as Eli Lilly's can happen to any company. Whether it's an employee writing blatantly harassing e-mails to a co-worker or an engineer transmitting trade secrets outside of an organization, no company is safe from the risks that e-mail creates.
However, new technology may help combat these liabilities. A number of companies are producing software that automatically enforces acceptable use policies. These customizable systems execute a number of actions in the event that a policy is broken, going so far as to sequester the damaging message before it ever reaches the recipient.
“People treat e-mail like chatting, often thinking of it as private, short-lived and unofficial,” says David Cohen, co-chair of
Publicized Policies
E-mail dangers come in many forms. The most notorious risk that e-mail poses, and possibly the most costly, is the “smoking gun.” This is the term used for e-mails that contain blatantly damaging information that can sink a case for a company defending itself in investigations and litigation.
Other e-mail dangers include misguided messages that can compromise privilege or trade secret information, the transmission of pornographic material and the accidental disclosure of private information such as Social Security numbers and health records. Any of these can result in litigation, regulatory investigations or financial loss to a company.
“The first step for any company is to have an acceptable use policy, which should state, among other things, that company resources are for business purposes and that employees have no privacy rights,” Cohen says.
The company should publicize the policy and ensure all employees sign a document stating they have read and understand it.
However, sometimes policies aren't enough to protect a company. That's where e-mail monitoring software comes into play.
Writing Rules
This technology comes in multiple flavors, but all permutations of the product serve the same purpose–to create a process whereby in-house counsel can track, monitor and sometimes prevent potentially damaging messages.
This process begins with the establishment of policies. Policies are customizable combinations of rule sets that in-house counsel can institute to help automatically enforce acceptable use policies. Policies can take the shape of banned keywords, whereby the software, using its built-in lexicon, can scan e-mail messages for trigger words such as sexual and racist vocabulary.
“With our software, you can have multiple lexicons for different business units, such as R&D and HR,” says Bill Tolson, director of legal and regulatory solutions marketing at Mimosa Systems Inc. “All those lexicons will be compared in real time as files flow through the system.”
Another type of policy can limit the number of recipients a sender can assign an e-mail. Companies can use this function to cut down on the number of mass e-mails employees transmit, but it also can help prevent violations of certain regulations, such as those that govern the financial industry.
“Let's say you are a registered broker-dealer and you just sent out a communication to more than 20 people outside the company,” says Chris Bradley, vice president of marketing and business development for MessageGate Inc., an e-mail monitoring software provider. “That could be constituted as marketing materials, so you might want to alert the user to insert a disclaimer saying the message doesn't represent the views of the company but of the individual.”
Finally, the software can limit communication between internal departments at a company. This type of policy is especially useful to prevent the transmission and theft of trade secrets and personally identifiable information.
“If you are an engineer, you tend to not be working with HR content,” says George Tziahanas, vice president of legal and information management solutions at Orchestria Corp. “If it turns out that you are an engineer working with HR content [and shouldn't be], we can trigger a control.”
Taking Action
These controls are called “actions,” and in-house counsel can set up the software to deploy actions of varying severity depending on the infraction.
For example, some software can automatically sequester an e-mail in a special queue, preventing it from leaving the organization. The company assigns someone to monitor the queue, often either in-house counsel or a member of the compliance or HR departments. This person can review the questionable e-mails and either allow them to continue on to their recipients or stop them and confront the sender on the violation of policy.
However not all software manufacturers include this capability.
“Our product is different in that we don't stop e-mails,” Tolson says. “We watch things, do alerts and put copies of questionable e-mails aside, but we never stop the flow of e-mail. If you are stopping the wrong things and cause a business to lose business, then there are some liability issues.”
This is why many companies opt to use the alert action, which not only prevents the interruption of business but educates employees in the process. When a user attempts to send a message that potentially violates a policy, a message appears citing the possible violation. At this point, the employee can opt to either send the message as is or alter the e-mail to comply.
“If you give people the ability to self-correct, that has a huge impact on two things,” Tziahanas says. “It is a deterrent in and of itself, but it also is a great way to educate employees.”
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All2024 in Review: Judges Met Out Punishments for Ex-Apple, FDIC, Moody's Legal Leaders
Financial Watchdog Alleges Walmart Forced Army of Gig-Worker Drivers to Receive Pay Through High-Fee Accounts
GC Pleads Guilty to Embezzling $7.4 Million From 3 Banks
In Lawsuit, Ex-Google Employee Says Company’s Layoffs Targeted Parents and Others on Leave
6 minute readTrending Stories
- 1Considering the Implications of the 2024 Presidential Election for Jurors in White Collar Cases
- 22024 in Review: Judges Met Out Punishments for Ex-Apple, FDIC, Moody's Legal Leaders
- 3What We Heard From Litigation Leaders in 2024
- 4Akin and Simpson Create New Practice Groups With Integrated Teams
- 5Thursday Newspaper
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250