Corruption Crime & Compliance

Electronics Communications Risks in the Era of Ephemeral Messaging


Listen Later

Ephemeral messaging applications like Snapchat, WhatsApp, and Telegram have presented a complex challenge for compliance professionals and legal counsel. On one hand, these technologies can reduce data storage and preservation costs, minimize breach exposure, and allow prioritization of communications data. On the other hand, they can create blind spots by deleting communications records and seriously obstruct internal investigations. How can companies balance the benefits of ephemeral messaging against the risks of compliance program undermining? In this week's episode of Corruption, Crime and Compliance, Michael Volkov discusses recent DOJ guidance regarding ephemeral messaging risks and outlines practical steps organizations can take to strike the right balance. 


You’ll hear him discuss:

  • Ephemeral messaging can reduce data storage and preservation costs, which can be significant for companies facing litigation or investigations. It also reduces potential breach exposure by deleting data.
  • However, ephemeral messaging can obstruct internal investigations and create corporate blind spots by deleting communications records before they can be reviewed. This undermines compliance programs.
  • DOJ's guidance outlines several steps companies can take to allow ephemeral messaging while mitigating risks:
  • Understand how the apps delete data and what types of data are stored;
  • Tailor policies on use to your specific risk profile and business needs;
  • Clearly communicate policies to employees and ensure regular enforcement;
  • Examine how policies impact the ability to conduct investigations and respond to subpoenas;
  • Evaluate the overall reasonableness of the risk mitigation strategy.
  • Practical steps to make ephemeral messaging safer include:
  • Restricting use to specific authorized purposes like scheduling;
  • Requiring employees to maintain deletion settings;
  • Conducting periodic audits of devices;
  • Requiring preservation and company access to work communications,
  • Coordinating ephemeral messaging policies with broader data preservation policies.
  • If a company provides devices to employees, it has more control and ability to restrict apps and access data, but even then, steps need to be taken to mitigate risks.
  • BYOD policies are more complex since consent and privacy restrictions may limit what companies can do. However, a BYOD policy still needs to address comprehensively:
  •   Preserving data
  •   Allowing corporate audits and access
  •   Segregating work data where possible
  •   Outlining consequences for violations
  •   Respecting local privacy laws
  •   Getting employee consent
  • With the right policy framework, BYOD can potentially allow ephemeral messaging while protecting data availability.


KEY QUOTES

“Companies have a vested interest in preserving their internal communications for a variety of reasons, to hold internal actors accountable, or even outside actors sometimes, and to protect the organization from potential private and government claims or investigations that may have serious direct or collateral consequences.” - Michael Volkov


“If the government issues a grand jury subpoena as part of a criminal investigation and the company fails to preserve data generated by use of an ephemeral messaging system, a company could be held liable for failing to preserve data relevant to the criminal investigation. Such consequences can be significant...” - Michael Volkov


“While a company may have limited access to employees' personal devices when it supplies devices to its employees, the company should regularly secure certifications by its employees that has not used its personal device for work-related purposes, with emergency exceptions, of course. Similarly, companies have to develop testing protocols for its BYOD policy and secure employee consent to examine the personal device limited solely to business data.” - Michael Volkov


Resources

Michael Volkov on LinkedIn | Twitter

The Volkov Law Group

...more
View all episodesView all episodes
Download on the App Store

Corruption Crime & ComplianceBy Michael Volkov

  • 4.9
  • 4.9
  • 4.9
  • 4.9
  • 4.9

4.9

42 ratings


More shows like Corruption Crime & Compliance

View all
The Moth by The Moth

The Moth

27,115 Listeners

Amicus With Dahlia Lithwick | Law, justice, and the courts by Slate Podcasts

Amicus With Dahlia Lithwick | Law, justice, and the courts

3,547 Listeners

WSJ What’s News by The Wall Street Journal

WSJ What’s News

4,386 Listeners

FCPA Compliance Report by Thomas Fox

FCPA Compliance Report

20 Listeners

The Daily by The New York Times

The Daily

113,095 Listeners

Up First from NPR by NPR

Up First from NPR

56,827 Listeners

RopesTalk by Ropes & Gray LLP

RopesTalk

16 Listeners

The Atlantic Interview by The Atlantic

The Atlantic Interview

27 Listeners

Innovation in Compliance with Tom Fox by Thomas Fox

Innovation in Compliance with Tom Fox

17 Listeners

Great Women in Compliance by Lisa Fine and Hemma Lomax

Great Women in Compliance

56 Listeners

The Intelligence from The Economist by The Economist

The Intelligence from The Economist

2,547 Listeners

Compliance into the Weeds by Tom Fox

Compliance into the Weeds

12 Listeners

Strict Scrutiny by Strict Scrutiny

Strict Scrutiny

5,868 Listeners

The Ezra Klein Show by New York Times Opinion

The Ezra Klein Show

16,492 Listeners

Main Justice by MS NOW, Andrew Weissmann, Mary McCord

Main Justice

7,066 Listeners