October 13, 2016 By Rick M Robinson 2 min read

Read the fine print. It’s an old piece of advice, going back long before the first webpage ever hit the ether. But the web and app eras have made this old advice far more immediate and pervasive. Company security policies should consider the unread agreement challenge to protect customers, employees and the company itself.

Understanding Company Security Policies

Website and applications prompt us to agree to terms of service seemingly every day. Still, few of us actually read what we are agreeing to before we click on the box.

By clicking without reading, we risk exposing ourselves to security hazards and legal ramifications. Users might agree to downloading cookies or other intrusive software onto their devices, for example, or sign over their original words or media to another firm’s intellectual property.

Checking the Box

In the days before the internet, reading the fine print was important advice for relatively rare occasions. Few people encountered detailed legal contracts on a daily basis. Today, these agreements are a fact of everyday life.

Simply reading a webpage or using an application might require agreeing to terms of service. This seems to fly in the face of the internet’s promise of convenience and speed. We want to use the application now, not spend hours rifling through confusing legalese.

For companies and the those tasked with devising company security policies, the challenge of reading the fine print goes in both directions. Not only should security executives be reading the fine print themselves in an effort to protect the business, but they also need to encourage their customers to read their fine print.

Jettison the Jargon

Legal language has a bad reputation because it is technical jargon. Like all jargon, it seems mysterious to laypeople, filled with long words and ordinary words used in odd ways. To a lawyer, however, it is clear and exact. It is also legally necessary.

For this reason, efforts to write terms of service in everyday language are usually doomed to fail. Instead of making agreements clearer, common language can be vague or even misleading. Unfortunately, simple language generally does not fit the requirements of legal or regulatory compliance.

The language of online terms and conditions can still be improved, however. Legal and marketing departments can work together to craft agreements that are easier to understand while still meeting legal standards of precision. As NPR reported, Apple took the unusual step of presenting the iTunes terms of service in the form of a graphic novel to encourage users to actually read and understand what they were agreeing to.

The Fine Print

To be sure, these challenges will not go away. For example, Apple might need to consider its rights to the iTunes agreement as a literary property, which presents a whole new challenge for a contractual legal agreement. But every improvement to terms of service and related documents will save users and vendors alike a lot of frustration, aggravation and potential legal fees.

More from Risk Management

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today