How to Use Instant Messaging Most Effectively

Barbara Weltman Instant messaging (IM) is the new e-mail. About 40% of companies already authorize IM use for business and more are sure to follow suit as this technology overtakes e-mail in popularity. Instant messaging allows information to be exchanged at real-time speed rather than passing through online mailboxes. This technology can be a plus or a minus to your business, so use it wisely.

When to use IM
Teenagers already know all about instant messaging; 20% of them use it as their primary means of communication – ahead of telephones, cell phones and e-mail. They use it to pass on gossip, make dates and gripe. So how does this form of communication fit within your business?

Recognize that it is like a hybrid of phone and e-mail – you communicate instantly but have a written record of the conversation. Typically, because of the need to type in responses, the exchange is usually short sentences in a “chat” format. It can include attachments – text, images and files – just like e-mail.

Situations in which to encourage IM use:

  • Customer response. If your customers are IM-capable (and increasingly many are), you can offer real-time response to customer queries.

  • Accessibility to workers offsite. If employees or contractors typically work away from your company base, you can improve communications through IM.

  • Cost savings on long distance. If you pay for long-distance phone service, you can reduce your monthly bill by using IM for communications with out-or-town employees, vendors and others.

  • Avoiding phone tag. You may be able to end the annoyance of trying in vain to connect with someone by telephone.

  • Multi-tasking. It is easier to maintain contact with someone while continuing to work at another task when using IM, rather than phoning or e-mailing.

    When to limit IM use
    Instant messaging may be a common technology, but it shouldn’t be used in every situation. Consider limiting IM use where you have potential problems relating to:

  • Sensitive materials.There are serious security concerns about IM. The reason: While e-mail filters through servers protected by firewalls and other security devices, most IM passes through servers controlled by Yahoo!, AOL and Microsoft and is vulnerable to hackers and eavesdroppers; it is also subject to virus infection and IM spam (called “spim”).

  • Content archiving. There are circumstances in which your company should retain records of its communications. If special steps are not taken, instant messages are lost, which can result in liability.

  • Intellectual property (IP) protection. A company’s customer lists, for example, are valuable IP. But the nature of IM can result in casual use of IP that can undermine confidentiality.

  • Productivity. An occasional IM to a family member for personal reasons may be no big deal. But if employees are permitted to use IM at will throughout the day, it can take considerable time and attention away from work.

    IM policies
    How much time do you want employees to spend IMing family and friends? Do communications violate sexual harassment policies? Do you want employees running unauthorized software? It’s up to you to set the rules. Less than half of all companies have an e-mail policy, let alone one for IM. But you can establish one that serves your purpose:

    Restrictions on using IM. To minimize wasted time, consider limiting IM use to co-workers or other business associates. This means banning or severely restricting IM with family and friends (something you may not want to do since such communication may be faster than phoning and may be necessary in some situations).

    Also clarify IM content limitations. For example, advise employees not to discuss IP matters or use IM to send sexually or radically offense jokes.

    Security.If you want to make IM part of your company’s technology, something that may be inevitable, use business IM software. Many employees are downloading consumer IM software without the company’s knowledge – consumer software generally lacks security protections. If you want to restrict unauthorized software use, say so.

    Some businesses may need to archive IMs as they would e-mails and should use special business software for this purpose.

    Explain your policy. Once you have a policy in place, tell your employees about it. Caution: A simple e-mail about the policy isn’t sufficient; an in-person discussion or having them sign as acknowledgment that they’ve read the policy is a better approach.

    Enforce your policy. Make it clear that the rules are to be followed and that there will be consequences for violations.

    Obtain free online guidance (a $249 value) in setting your policy from The Electronic Communications Compliance Council (TE3C). Register at www.te3c.org/policybuilder.html to download the free information (the offer expires September 30, 2005).

    Copyright © 2005 by BWideas.com, Inc. All right reserved.

    Print page