Email archiving

Last updated

Email archiving is the act of preserving and making searchable all email to/from an individual. Email archiving solutions capture email content either directly from the email application itself or during transport. The messages are typically then stored on magnetic disk storage and indexed to simplify future searches. In addition to simply accumulating email messages, these applications index and provide quick, searchable access to archived messages independent of the users of the system using a couple of different technical methods of implementation. The reasons a company may opt to implement an email archiving solution include protection of mission critical data, to meet retention and supervision requirements of applicable regulations, and for e-discovery purposes. It is predicted that the email archiving market will grow from nearly $2.1 billion in 2009 to over $5.1 billion in 2013. [1]

Contents

Definition

Email archiving is an automated process for preserving and protecting all inbound and outbound email messages (as well as attachments and metadata) so they can be accessed at a later date should the need arise. The benefits of email archiving include the recovery of lost or accidentally deleted emails, accelerated audit response, preservation of the intellectual property contained in business email and its attachments and "eDiscovery" in the case of litigation or internal investigations (what happened when, who said what).

Overview

Email Archiving is the process of capturing, preserving, and making easily searchable all email traffic to and from a given individual, organization, or service. Email archiving solutions capture email content either directly from the email server itself (journaling) or during message transit. The email archive can then be stored on magnetic tape, disk arrays, or now more often than not, in the cloud. Regardless of the location of the email archive, it gets indexed in order to speed future searches, and most archive vendors provide a search UI to simplify query construction.

In addition to email, attachments and associated metadata, some email archiving applications can also archive additional aspects of a mailbox including public folders, .pst files, calendars, contacts, notes, instant messages and context.

Objectives

There are many motivations for enterprises or end-users to invest in an Email Archiving solution, including:

Regulatory compliance

As enterprises of all sizes grow more reliant on email, the business value of that content is also growing. To protect this increasingly valuable information (intellectual property), numerous standards and regulations have been enacted to require records protection and retention as well as timely response to legal (discovery) and information (FOIA) requests. [2] Modern email archiving solutions allow companies to meet regulatory requirements or corporate policies by securing and preserving data and providing flexible data management policies to enable authorized users to enact 'legal holds', set retention and purge policies, or conduct searches across multiple mailboxes to complete various inquiries.

Some of the primary compliance requirements driving the need for secure email archiving are (alphabetically):

Canada

Germany

Switzerland

United Kingdom

United States

Note, that many of the compliance regulations require the preservation of "electronic business communications" which consist of not only email, but may include instant messaging, file attachments, Bloomberg Messaging, Reuters Messaging, PIN-to-PIN and SMS text messages, VoIP and other electronic messaging communications used in business.

For legal discovery, email archiving solutions will lower the overall risk of spoliation and greatly speed up electronic discovery. This is because messages are indexed, audit trails are provided, messages are deduplicated, and legal hold/preservation can be applied. [6] For litigation support, email can be retrieved quickly and a history of the email exists to prove its authenticity for chain of custody. For compliance support, email records are stored in the archive according to administrator defined retention policies. When retention periods expire, email is automatically deleted by the archiving application. In order to be compliant, an organization can intentionally destroy email messages, so long as (1) the destruction is done pursuant to a stated company policy and (2) the destruction stops immediately if an incident occurs which could give rise to a lawsuit. [7]

If an organization has multiple separate applications, for example for e-discovery, records information management, and email archiving, each application may have a separate database and it becomes difficult to de-duplicate messages and ensure that a single retention policy is being applied. From a legal point of view, this is important because once retention periods have expired the message should be purged from the archive. [8] Messages that are not purged are still discoverable, should litigation arise at a later date. As such, without a unified archive it is difficult to ensure one single retention policy. This problem is magnified for large organizations that manage tens of millions of emails per day.

Without email archiving, email likely exists on some combination of backup tapes and on end users’ local workstations. If a specific email needs to be found for an internal investigation or in response to litigation, it can take weeks to find and costs a great deal. With today’s legal discovery rules (see FRCP: https://web.archive.org/web/20141021110256/http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/EDiscovery_w_Notes.pdf) and compliance legislations, it has become necessary for IT departments to centrally manage and archive their organization’s email, so email can be searched and found in minutes; not days or weeks.

Email backup and disaster recovery

Email is the lifeblood of many modern businesses, and enterprises today depend more on reliable email service. Virtually all enterprises implement a messaging infrastructure to connect workers and enable business processes. In the e-commerce arena, employees may require access to email to close sales and manage accounts. These employees, plus many others, may choose to keep their emails indefinitely, but some organizations may mandate that emails more than 90 days old be deleted. Setting these kinds of retention policies deserves careful consideration as a single email could help a company win a lawsuit or avoid litigation altogether. Email archiving can also be used for business continuity at the individual employee level. When one employee quits, his/her replacement can be given access to the departed employee's archived messages in order to preserve correspondence records, and enable accelerated on-boarding.

As part of a comprehensive disaster recovery plan, an email archive can be instrumental in an organization's effort to "get back to business". An offsite, online archive means that secondary facilities can spin up messaging servers and quickly get access to the last mails sent/received as well as all historical messaging data. Offsite archives can take the form of disk farms (SANs) in distant DR facilities or email archives stored in public/private cloud environments. Although email archiving products do capture and copy all messages, they are not mirrored copies of the messaging server itself, and therefore cannot help recreate user accounts/groups in the event of a disaster.

Messaging system & storage optimization

Every email message takes up space on an email system's hard drive or some other permanent storage device (e.g. Network Attached Storage, Storage Area Network, etc.). As the number of these messages increase, simple operations such as retrieving, searching, indexing, backup, etc. utilize more information system resources. At some point older data must be removed from the production email system so that they can maintain a level of performance for their primary use, exchange of email messages. Email archiving solutions improve email server performance and storage efficiency by removing email and attachments from the messaging server based on administrator defined policies. Archived email and attachments remain accessible to end users via the existing email client applications.

See also

Related Research Articles

<span class="mw-page-title-main">Email</span> Mail sent using electronic means

Electronic mail is a method of transmitting and receiving messages using electronic devices. It was conceived in the late–20th century as the digital version of, or counterpart to, mail. Email is a ubiquitous and very widely used communication medium; in current use, an email address is often treated as a basic and necessary part of many processes in business, commerce, government, education, entertainment, and other spheres of daily life in most countries.

<span class="mw-page-title-main">Microsoft Outlook</span> Email and calendaring software

Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites. Though primarily being popular as an email client for businesses, Outlook also includes functions such as calendaring, task managing, contact managing, note-taking, journal logging, web browsing, and RSS news aggregation.

<span class="mw-page-title-main">Gmail</span> Email service provided by Google

Gmail is an email service provided by Google. As of 2019, it had 1.5 billion active users worldwide, making it the largest email service in the world. It also provides a webmail interface, accessible through a web browser, and is also accessible through the official mobile application. Google also supports the use of third-party email clients via the POP and IMAP protocols.

Records management, also known as records and information management, is an organizational function devoted to the management of information in an organization throughout its life cycle, from the time of creation or receipt to its eventual disposition. This includes identifying, classifying, storing, securing, retrieving, tracking and destroying or permanently preserving records. The ISO 15489-1: 2001 standard defines records management as "[the] field of management responsible for the efficient and systematic control of the creation, receipt, maintenance, use and disposition of records, including the processes for capturing and maintaining evidence of and information about business activities and transactions in the form of records".

Enterprise content management (ECM) extends the concept of content management by adding a timeline for each content item and, possibly, enforcing processes for its creation, approval, and distribution. Systems using ECM generally provide a secure repository for managed items, analog or digital. They also include one methods for importing content to bring manage new items, and several presentation methods to make items available for use. Although ECM content may be protected by digital rights management (DRM), it is not required. ECM is distinguished from general content management by its cognizance of the processes and procedures of the enterprise for which it is created.

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters—therefore having legal protection from all forms of eavesdropping—is disputed because of the very nature of email.

Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998.

Information lifecycle management (ILM) refers to strategies for administering storage systems on computing devices.

BlackBerry Enterprise Server designates the middleware software package that is part of the BlackBerry wireless platform supplied by BlackBerry Limited. The software plus service connects to messaging and collaboration software on enterprise networks to redirect emails and synchronize contacts and calendaring information between servers, desktop workstations, as well as mobile devices. Some third-party connectors exist, including Scalix, Zarafa, Zimbra, and the Google Apps BES Connector, although these are not supported by BlackBerry Limited. As of June 2018, BlackBerry Enterprise Server has been renamed to BlackBerry Unified Endpoint Manager (UEM).

Electronic discovery refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format. Electronic discovery is subject to rules of civil procedure and agreed-upon processes, often involving review for privilege and relevance before data are turned over to the requesting party.

Google Workspace is a collection of cloud computing, productivity and collaboration tools, software and products developed and marketed by Google. It consists of Gmail, Contacts, Calendar, Meet and Chat for communication; Currents for employee engagement; Drive for storage; and the Google Docs Editors suite for content creation. An Admin Panel is provided for managing users and services. Depending on edition Google Workspace may also include the digital interactive whiteboard Jamboard and an option to purchase add-ons such as the telephony service Voice. The education edition adds a learning platform Google Classroom and today has the name Workspace for Education.

Email encryption is encryption of email messages to protect the content from being read by entities other than the intended recipients. Email encryption may also include authentication.

Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers, and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of mobile devices. Though closely related to Enterprise Mobility Management and Unified Endpoint Management, MDM differs slightly from both: unlike MDM, EMM includes mobile information management, BYOD, mobile application management and mobile content management, whereas UEM provides device management for endpoints like desktops, printers, IoT devices, and wearables as well.

Information technology risk, IT risk, IT-related risk, or cyber risk is any risk relating to information technology. While information has long been appreciated as a valuable and important asset, the rise of the knowledge economy and the Digital Revolution has led to organizations becoming increasingly dependent on information, information processing and especially IT. Various events or incidents that compromise IT in some way can therefore cause adverse impacts on the organization's business processes or mission, ranging from inconsequential to catastrophic in scale.

<span class="mw-page-title-main">Proofpoint, Inc.</span> American cybersecurity company

Proofpoint, Inc. is an American enterprise cybersecurity company based in Sunnyvale, California that provides software as a service and products for email security, identity threat defense, data loss prevention, electronic discovery, and email archiving.

Electronic message journaling is the process of retaining information relating to electronic messages. In this context, electronic messages are defined as any type of electronic communication data structure. Historically this was an electronic mail, but it may also include instant messages, audio messages, text messages, facsimile messages, or other user collaboration protocol data structures. Beginning about 2005 electronic messages began to include social media that included user-generated content such as blogs, discussion forums, posts, chats, tweets, podcasting, pins, digital images, video and audio files. Several implementation variations exist, altering when, what, and how information is retained.

<span class="mw-page-title-main">Stored Communications Act</span>

The Stored Communications Act is a law that addresses voluntary and compelled disclosure of "stored wire and electronic communications and transactional records" held by third-party Internet service providers (ISPs). It was enacted as Title II of the Electronic Communications Privacy Act of 1986 (ECPA).

Information governance, or IG, is the overall strategy for information at an organization. Information governance balances the risk that information presents with the value that information provides. Information governance helps with legal compliance, operational transparency, and reducing expenditures associated with legal discovery. An organization can establish a consistent and logical framework for employees to handle data through their information governance policies and procedures. These policies guide proper behavior regarding how organizations and their employees handle information whether it is physically or electronically created (ESI).

HP Information Management Software is a software from the HP Software Division, used to organize, protect, retrieve, acquire, manage, and maintain information. The HP Software Division also offers information analytics software. The amount of data that companies have to deal with has grown tremendously over the past decade, making the management of this information more difficult. The University of California at Berkeley claims the amount of information produced globally increases by 30 percent annually. An April 2010 Information Management article cited a survey in which nearly 90 percent of businesses blame poor performance on data growth. The survey concluded that for many businesses their applications and databases are growing by 50 percent or more annually, making it difficult to manage the rapid expansion of information.

References

  1. "The Radicati Group, Inc. Releases "E-Mail Archiving Market, 2009-2013" Study". Trading Markets. October 7, 2009. Archived from the original on May 22, 2010. Retrieved August 20, 2022.
  2. "System Maintenance". IProduction.
  3. "MFDA Rules". mfda.ca.
  4. "Temp mail". Eztempmail.
  5. Principles of data access and of digital documents (GDPdU) Archived 2011-07-18 at the Wayback Machine
  6. The Sedona Canada Principles: Addressing Electronic Discovery, 2008
  7. Kest, Kristopher; Drew Sorrell; Lowndes, Drosdick, Doster, Kantor & Reed, P.A. (April 12, 2013). "Are You Allowed to Intentionally Destroy Emails? Re: Privacy in the Workplace". The National Law Review. Retrieved 17 April 2013.{{cite news}}: CS1 maint: multiple names: authors list (link)
  8. Maitland, Jo (October 17, 2008). "Best Practices: Email Archiving" (PDF). Forrester. Archived from the original (PDF) on January 10, 2022. Retrieved August 20, 2022.

Further reading