Destruct means destruct - right?
You take a picture on SnapChat and send to a friend or two. After a preset period the recipient/friend cannot view any more. Gone, deleted or self destructed is the claim.
WELL – not able to be accessed by the recipient is closer to the truth. How are all these kids going to cope in 20 years time when all the risqué pictures they sent to their mates get released in image libraries for the rest of the world to use.
What goes into cyberspace is encapsulated there, and could turn up anywhere at any time. Beware!
How does this relate to my secure business to business communications?
Well the simple truth of the matter is the you have perhaps slightly more privacy and control over your sensitive business correspondence (especially but not only email) but not a whole more. Julian Assange blew a hole in the myth that emails are a secure form of messaging.
As Haley noted email danger comes in many forms. It is easy to instantly share emails with many people, regardless of content or intended recipient. Email recipients may easily compromise email privacy when forwarding and deleted emails are often still accessible
Deleted content such as emails may be permanently “backed up” with other important information from the computer system and at home or on any hard drive, deleted emails may be retrieved and restored in various ways. For example, on AOL, deleted mail goes into a “recently deleted mail” folder where it can be easily located, restored and then viewed. There are software programs that easily recover deleted emails as well as other deleted items on a hard drive.
Emails, like the rest of the items on the Internet, are subject to unauthorised access from hackers. For example, intelligent software can easily access email content via an unprotected router. Information hosted by a cloud provider may allow them access to your data because they are storing your data (Check the fine print).
Also as Hayley notes in some countries “your private email may be intentionally intercepted by a government or law enforcement agencies without a search warrant or judicial approval.
Just check out some of this legislation to see how far privacy can be eroded
Its not always critical to havesecure, business to business email, but from time to time you need to be sure that confidential information will go directly to the right recipient. wher it can't be leaked and in the end DELETE actually means DELETE.
Of course there are those who believe that "if you have nothing to hide you have nothing to fear" I'm not one of them - share your views.