White House use of outside e-mail raises red flags
Businesses often face similar risks by employees, experts say
Computerworld - For official government business, staff members in the Bush White House use government-issued e-mail accounts where all communications are then stored, archived and preserved for eventual inclusion in the National Archives.
But for several years, some high-ranking Bush staff members have also apparently been using outside e-mail accounts for nongovernmental, political communications. Those accounts, through the Republican National Committee (RNC) and the 2004 Bush-Cheney re-election campaign, allowed the officials to keep up with both their official and political responsibilities while not violating the Hatch Act. That law forbids many government officials from engaging in political activities from their workplaces.
While the focus of those particular incidents is on the White House, the issue is one that should be getting close scrutiny from businesses across the nation, experts said.
The concern is that if company communications are being conducted outside official corporate e-mail systems, there's no way to control their security, preservation or use, something that can leave companies vulnerable to a wide variety of legal problems and regulatory compliance issues.
In the White House case this week, the House Committee on Oversight and Government Reform sent letters Monday to the chairmen of the RNC and the former Bush-Cheney 2004 campaign committee, asking them to explain more about the use of the outside e-mail accounts. In the letters, Oversight Committee Chairman Henry Waxman (D-Calif.) said his group wants to know what's been done to preserve the contents of the outside e-mail accounts used by government officials for possible review and to assure that "no e-mails involving official White House business have been destroyed or altered.
"Congressional investigations have revealed that White House officials have used nongovernmental e-mail accounts, including those maintained by the RNC, to conduct official White House business," the letters said. "The Committee has questions about who has access to these e-mail records and how the RNC protects them from destruction or tampering. The Committee also directs you to preserve all such records because of their potential relevance to congressional investigations. Such e-mails written in the conduct of White House business would appear to be govemmental records subject to preservation and eventual public disclosure."
The Oversight Committee first learned of the outside e-mail accounts during investigations of White House contacts with convicted lobbyist Jack Abramoff, which found "that many of the e-mail exchanges between Jack Abramoff and White House officials were conducted via nongovernmental e-mail accounts. In at least one [incoming message to Abramoff], the e-mails indicate that these nonofficial accounts were being used because 'to put this stuff in writing in their [White House] e-mail system ... might actually limit what they can do to help us.'"
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts