Making Conference Calls

Using the telephone to provide simultaneous discussions between three or more persons. The threats posed by Conference Calls are similar to those posed by conventional person-to-person calls.

To view the related Policy click      

  • An overheard or (worse) tapped conversation can result in leaked information. Where the information is sensitive, is potentially very damaging.

  • Be cautious when discussing sensitive content over public communications lines.
  • Mobile 'phones are insecure; do not convey information that is sensitive because it can easily be monitored.
  • If information needs to be communicated by voice on a regular basis, and such information is highly confidential, you should consider the use of voice encryption for the lines involved.
  • Failing to authenticate the identity of other parties to the conversation can result in a breach to information confidentiality.

  • Establish a procedure for establishing beyond reasonable doubt the true identities of the parties involved in the conversation.
  • Follow up with a written note of key issues discussed and agreements reached. Use secure fax and / or letter if legal reliance is expected. An encrypted message could provide even greater security.
Previous PageTop of this pageNext Page

Information Security Policies from US$595


Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word


Next PageUpPrevious Page