October 13, 2016 By Rick M Robinson 2 min read

Read the fine print. It’s an old piece of advice, going back long before the first webpage ever hit the ether. But the web and app eras have made this old advice far more immediate and pervasive. Company security policies should consider the unread agreement challenge to protect customers, employees and the company itself.

Understanding Company Security Policies

Website and applications prompt us to agree to terms of service seemingly every day. Still, few of us actually read what we are agreeing to before we click on the box.

By clicking without reading, we risk exposing ourselves to security hazards and legal ramifications. Users might agree to downloading cookies or other intrusive software onto their devices, for example, or sign over their original words or media to another firm’s intellectual property.

Checking the Box

In the days before the internet, reading the fine print was important advice for relatively rare occasions. Few people encountered detailed legal contracts on a daily basis. Today, these agreements are a fact of everyday life.

Simply reading a webpage or using an application might require agreeing to terms of service. This seems to fly in the face of the internet’s promise of convenience and speed. We want to use the application now, not spend hours rifling through confusing legalese.

For companies and the those tasked with devising company security policies, the challenge of reading the fine print goes in both directions. Not only should security executives be reading the fine print themselves in an effort to protect the business, but they also need to encourage their customers to read their fine print.

Jettison the Jargon

Legal language has a bad reputation because it is technical jargon. Like all jargon, it seems mysterious to laypeople, filled with long words and ordinary words used in odd ways. To a lawyer, however, it is clear and exact. It is also legally necessary.

For this reason, efforts to write terms of service in everyday language are usually doomed to fail. Instead of making agreements clearer, common language can be vague or even misleading. Unfortunately, simple language generally does not fit the requirements of legal or regulatory compliance.

The language of online terms and conditions can still be improved, however. Legal and marketing departments can work together to craft agreements that are easier to understand while still meeting legal standards of precision. As NPR reported, Apple took the unusual step of presenting the iTunes terms of service in the form of a graphic novel to encourage users to actually read and understand what they were agreeing to.

The Fine Print

To be sure, these challenges will not go away. For example, Apple might need to consider its rights to the iTunes agreement as a literary property, which presents a whole new challenge for a contractual legal agreement. But every improvement to terms of service and related documents will save users and vendors alike a lot of frustration, aggravation and potential legal fees.

More from Risk Management

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today