SHARE
Facebook X Pinterest WhatsApp

Shareholder Values

Written By
thumbnail
Larry Downes
Larry Downes
Nov 6, 2006

“Every company of consequence has people who do detective-type work in order to ferret out the sources of nefarious activities.”

So said ousted Hewlett-Packard Co. chairman, Patricia Dunn, in her testimony before a testy Congressional committee investigating the company’s boardroom spying scandal. I hope she’s wrong—as she seems to have been about most everything related to the company’s wide-ranging investigation of media leaks—but I suspect she’s probably right about this one. Companies increasingly recognize the value of information assets and, understandably, want to protect them from premature or unwanted disclosure.

But I doubt many companies go to the lengths H-P did to find out who on its board of directors was revealing what it considered confidential information. So far we have learned that H-P, in addition to the likely illegal acquisition of private phone records, secretly recorded instant messages, attached spyware to a fake e-mail message sent to a journalist from a supposedly disgruntled H-P employee, and sifted through garbage. Disclosure of the investigation into the leaks has done far more harm to the company than the leaks themselves.

Worse, there was no need for cloak-and-dagger. H-P could simply have sued the suspected leakers—board members and employees in this case—for breach of written and implied duties of confidentiality. Having done so, the company could then have used the courts to issue subpoenas for the phone records, and taken depositions under oath from everyone involved. In the end they could have gotten everything they wanted, legally.

Realistically, though, suing board members is distracting and destructive. H-P’s covert operations, on the other hand, were quick and efficient—ruthlessly efficient. The “investigation team” assembled by H-P’s legal department at Dunn’s request was a kind of posse, following time-tested techniques of vigilante justice. Posses collapse the process of investigation, trial and sentencing into one step. The appeal of H-P’s investigatory methods is as plain now as it was on the American frontier—and so is the danger.

There was another way for H-P to solve the problem, however. Management could have simply explained to the board how the leaks were damaging the company and its shareholders. Of course, this approach requires a board and an executive team who all have the best interests of the company at heart. It doesn’t plug leaks so much as it repairs relationships.

The moral of the story here is that when a company has its own in-house legal department, it’s important for senior management to resist the temptation to use it inappropriately. Much as a company’s books must be certified by public accountants, internal reviews should be supervised by outside legal counsel, and conducted in a way that won’t embarrass the company if they become public. Because they always do.

So maybe it’s time for a candid conversation about what the shareholders—the owners, that is—expect of your company’s officers and directors. You know, a conversation about shareholder values.

Larry Downes is a Fellow with the Stanford Law School Center for Internet and Society.

Recommended for you...

Best Business Travel Items: 11 Business Travel Essentials
Kaiti Norton
Aug 4, 2022
IBM on the Evolving Role of the CIO: Interview with Kathryn Guarini, CIO of IBM
Shelby Hiter
Jul 26, 2022
Can’t Hire a CIO or CISO? Go Virtual
Drew Robb
Jul 11, 2022
An In-Depth Guide to Enterprise Data Privacy
Jenna Phipps
Jun 25, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.