SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Email Archiving vs.
                           Destructive Retention
                                         Policies
                          An ArcMail Technology Research Paper




© ArcMail Technology, Inc. 401 Edwards Street, Suite 1100   Shreveport, Louisiana 71101
                                                                     www.arcmail.com
Email Archiving vs. Destructive Retention Policies



Email Archiving vs. Destructive Retention Policies
One of the greatest dilemmas businesses face when it comes to email is balancing security and
storage concerns. Email continues to be the preferred method of communications today, and as
a result businesses are often overwhelmed with the amount and size of emails. Emails have been
deemed by the courts to be business records so they must be preserved. In addition to the legal
rulings, there are also a number of industry guidelines that require organizations to retain all of
their communications, which provides cost, security and storage challenges, particularly for small
businesses.

The dilemma leaves organizations with several questions regarding email archiving and retention
policies, including:

       When is it more appropriate to archive emails for long periods of time?

       Is it ever more appropriate to implement a destructive retention policy that deletes emails
       that exceed a specific amount of days, whether, 60, 90 or more?

Retention
If you ask most people, they will probably say they have some sort of personal retention routine, or
at least their email program has an archiving function. In fact, these retention routines or functions
may be the only email retention solution that people know of. A recent study by Osterman Research
found that 53 percent of companies lack a policy to govern email retention and destruction. The
same study found that 67 percent of the companies even allow individual end-users to determine
how long messages are retained.i

While retaining some email is important, does an organization need to save every email for
extended periods of time? Is it preferable to reduce the amount of “old” data stored on mail servers,
and delete sensitive data that could be leaked or stolen? This practice is defined as destructive
retention, a policy whereby email is retained for a limited time and then permanently deleted from
the network.

Advocates of destructive retention cite three primary arguments to support the practice:

Change fron the traditional retention policies
Change can be difficult for organizations, particularly if it requires employees to change the way
they are accustomed to doing something. The pace of modern business quickly makes yesterday’s
email irrelevant and not worth the cost, effort and additional load on the network required to retain
it. Tradition also has relied on email programs, such as Microsoft Outlook, to manage just how
long email is retain in each individual user’s PST file. Each month, a pop-up window asks users if
they want to automatically archive their email. By simply clicking “Yes, employees can feel that
                                                                          ”
they have done their part in backing up their relevant email, while deleting older messages that
needlessly take up space on their hard drive or network server. A case can also be made that, by
automatically updating their PST file, users are reducing the organization’s potential legal and
regulatory exposure.

Storage / Data Overload
Organizations of all sizes are being overwhelmed with data. A 2006 Gartner study found that 55
percent of IT managers identified the growing requirement for storage capacity as their number one
storage challenge. Those surveyed estimated that “their capacity needs would grow by an average
25 percent in one year and by 41 percent in two years. ii The Enterprise Strategy Group estimates
                                                      ”
that the average retention period for database records is roughly 6-10 years.iii

One of the leading culprits of this data overload is email. According to the Radicati Group, “the
Email Archiving vs. Destructive Retention Policies



average corporate e-mail user received 126 messages a day in 2006, up 55 percent from 2003. By
2009, workers are expecting to spend 41 percent of their time managing e-mails. iv The Radicati
                                                                              ”
Group also found that the average corporate email account receives 18 MB of mail and attachments
each business day. That figure is projected to grow to 28 MB a day by 2011.v

With organizations already faced with growing data demands, an obvious solution is to delete email
regularly to help reduce this management and storage strain.

Eliminate the potential threat of data loss/leakage
Among companies surveyed by McAfee, the average cost of a data-leak incident was estimated
at $1.82 million. A popular argument for a destructive retention policy is that, by periodically
destroying emails, organizations are reducing this threat. Before deleting email messages, many
organizations will download attachments onto secure servers to retain potentially important
documents, a practice they see as akin to keeping the groceries and discarding the bag.

Archiving
Email archiving is becoming increasingly important as e-mail communications now play a
central role in everyday business operations. Communications previously conducted via phone,
fax and snail mail now take place in email, from routine conversations to contract negotiations
and document exchanges. Consequently, email content is more business-critical than ever and
increasingly relevant to an organization’s competitive, legal and regulatory concerns. For public
companies, finance organizations and legal firms, email archives are being deployed in litigation,
used to demonstrate regulatory compliance, as well as to facilitate disaster recovery and business
continuity.

While the cost of email archiving continues to decline, many organizations resist changing their
email retention policies. They may not want to invest resources into preserving information they
regard as obsolete, sensitive or which could potentially come back to hurt them. Or they may
simply want to reduce information clutter. However, an increasing number of these organizations
are coming around to the concept of email archiving, due to the three arguments outlined below.

Compliance
More and more organizations, regardless of size or industry, are facing government or industry
compliance requirements that reflect the expanding role of email in organization communications
and business transactions. Many of these requirements specifically address an organization’s
responsibility to retain and produce electronic records.

Technology industry analyst group International Data Company reported, “The introduction
of legislation such as the Sarbanes-Oxley Act of 2002 and the Health Insurance Portability and
Accountability Act [HIPAA] has significantly increased the importance of managing, securing and
storing all information within the enterprise. More specifically, because of regulations such as SEC
Rule 17a-4 that are very prescriptive for the retention for email, and the numerous and very costly
public lawsuits in which an email has been the deciding factor, email has emerged as one of the
most important content types that need to be retained. vi”

Sarbanes-Oxley, HIPAA, and Gramm-Leach-Bliley Act are among several government and
industry regulations that have made securing and archiving email correspondence a fundamental
requirement. Ignorance of the law or claims of inadequate storage resource are no longer viable
excuses for non-compliance With an archiving policy in place supported by reliable archiving
technology organizations can be confident of practicing due diligence by enabling internal and
external auditors to easily review all virtual paper trails that may come under question.

Productivity
A recent study by IDC found that a company with 1,000 information workers can expect to lose
Email Archiving vs. Destructive Retention Policies



more than $5 million in annual salary costs due to of the time employees spend on unproductive
(email?) searches.vii

Email archiving solutions can dramatically lower this cost by making employees more productive.
When organizations have self-imposed email quotas in order to control mailbox sizes, users
are often forced to manually delete emails to be able to continue sending and receiving emails.
Automated archiving solutions eliminate the need for users to manage their own email box and
email archiving. If their organizations are already capturing their employees’ inbound and outbound
email messages, then employees won’t have to create personal archives or spend time trying find
and restore email messages and attachments.

Discovery
Data is being created and stored in multiple databases across the enterprise. Employees are
now using multiple storage devices to facilitate the transport and exchange of information, from
USB flash drives, to multi-gigabyte portable hard drives and Web-based hosting services. This
is in addition to their personal computers and their companies’ network servers. The multitude
of storage locations makes it difficult to readily find information, which can suddenly become
imperative in the event of a discovery order arising from litigation. The number of places to search
only adds to the time, labor and cost associated with searching through records and locating files.

Having an archiving solution that captures all inbound and outbound email in a single location
helps to reduce the time and expense. An archiving system that can comply with all of the e-
discovery requirements by preserving information for a long period of time is ultimately a practical
and cost-effective business tool. A solution that automatically captures and indexes data from
multiple sources supports an organization’s strategic objectives to be prepared in the event that
information needs to be located, reviewed and restored quickly.

With litigation on the rise, archiving emails presents a formidable solution for helping to reduce
discovery costs and enhance the organization’s ability to respond to inquiries in a timely and
comprehensive manner.

Conclusion
While destructive retention policies may still have a place in certain organizations, a comprehensive
archiving policy and process is a much sounder approach for most companies today. Faced
with the threat of litigation, industry and government compliance regulations and the challenge
of maintaining employee productivity, organizations simply cannot afford to leave their email
retention policies in the hands of individual employee routines or default software functions.

Advanced archiving policies provide a clear case against destructive retention policies by relieving
users of the responsibility to manage email volumes, providing a single, centralized solution for
capturing and storing all email data, along with enhanced security to prevent data loss or leaks.
Archiving ensures that the invaluable asset that is corporate knowledge-base is retained and stored
in an accessible format, while protecting the integrity of the database by preventing users from
altering or deleting files.

Destructive email retention policies are no longer a viable strategy for today’s businesses.
Companies that have paid strict fines as a result of their poor email retention policies have learned
the hard way that email content is now regarded as essential business data. An automated
archiving system ensures compliance with government and industry regulations and the new
Federal Rules of Civil Procedure, while reducing storage costs, enhancing network performance and
employee productivity.
Email Archiving vs. Destructive Retention Policies



ArcMail Defender
Defender by ArcMail Technology is a high-performance, comprehensive email archiving and
management solution that includes the right combination of features and functionality that makes it
the right archiving solution for small and medium-sized enterprises. ArcMail helps to remove email
management from individual users, and its enhanced security eliminates any concerns of rogue
access and data theft or leakage.

The independent device provides up to 12TB of onboard storage, and automatically archives and
indexes all email and attachments in a secure, centralized location. Everyone from end-users to the
IT department can access Defender’s user-friendly, Web-based interface to quickly and easily search
and restore emails. Defender does not require additional software or hardware, and is easy to
install, configure and use.

About ArcMail Technology
Founded in 2005, ArcMail Technology is a cutting-edge provider of simple, secure, and cost-
effective email archiving and management solutions for small and medium-sized businesses. The
company’s ArcMail appliance is easy to buy, easy to install, and easy to use, and improves the
end-user experience, reduces the load on IT resources, and safely and securely retains the business
information contained in emails. ArcMail provides broad coverage for the SMB market and is
capable of meeting the archiving and management requirements for an organization with as few
as five users up to more than 4,000 users. The company is developing a global channel program to
help deliver its products to organizations worldwide. ArcMail is headquartered in Shreveport, La.,
and has development groups in Washington and Arizona.
For more information, visit www.arcmail.com


___________________________


i
     Leaf, Nate, “Survey: Most Businesses Lack Clear Email Retention Policy, December 17, 2007, http://
                                                                           ”
     www.yourtv20.com/news/technology/12563691.html
ii
     Mullins, Robert, “Storage budgets may not keep up with demand in 2007” InfoWorld, October 19, 2006,
                                                                          ,
     http://www.infoworld.com/article/06/10/19/HNstorbudg_1.html?STORAGE%20ARRAY%20SYSTEMS
iii
      Prince, Brian, “Database Archiving Market Evolves with Exploding Data Needs, December 13, 2007,
                                                                                 ”
      http://www.eweek.com/article2/0,1895,2232738,00.asp
iv
      Buckman, Rebecca, “The E-mail Overload, December 17, 2007,
                                              ”
      http://www.courier-journal.com/apps/pbcs.dll/article?AID=/20071217/BUSINESS/712170371
v
     ibid
vi
      http://accounting.smartpros.com/x46588.xml
vii
      http://www.networkworld.com/news/2007/012307-wasted-searches.html

Contenu connexe

Tendances

Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...Jone Smith
 
White paper-diligent-cybersecurity
White paper-diligent-cybersecurityWhite paper-diligent-cybersecurity
White paper-diligent-cybersecurityjames morris
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsDruva
 
Cloud Computing for Legal Administrators
Cloud Computing for Legal AdministratorsCloud Computing for Legal Administrators
Cloud Computing for Legal AdministratorsPatrick R. Wiley
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Managementbdirking
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsBMDS3416
 
Paralegal Rainmakers Digest Volume 4 Issue 1
Paralegal Rainmakers Digest Volume 4 Issue 1Paralegal Rainmakers Digest Volume 4 Issue 1
Paralegal Rainmakers Digest Volume 4 Issue 1Paralegal Rainmakers
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & EdiscoveryLouise Spiteri
 
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A ProductBrian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A Productbdirking
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...ARMA International
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
Share point encryption
Share point encryptionShare point encryption
Share point encryptioncsmith2009
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYcscpconf
 
Nathan Winters TechDays UK Exchange 2010 IPC
Nathan Winters TechDays UK Exchange 2010 IPCNathan Winters TechDays UK Exchange 2010 IPC
Nathan Winters TechDays UK Exchange 2010 IPCNathan Winters
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital AgeSherpa Software
 

Tendances (19)

Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
 
White paper-diligent-cybersecurity
White paper-diligent-cybersecurityWhite paper-diligent-cybersecurity
White paper-diligent-cybersecurity
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Cloud Computing for Legal Administrators
Cloud Computing for Legal AdministratorsCloud Computing for Legal Administrators
Cloud Computing for Legal Administrators
 
295256_Security_Problem_Whitepaper.Web
295256_Security_Problem_Whitepaper.Web295256_Security_Problem_Whitepaper.Web
295256_Security_Problem_Whitepaper.Web
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Management
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic Documents
 
Paralegal Rainmakers Digest Volume 4 Issue 1
Paralegal Rainmakers Digest Volume 4 Issue 1Paralegal Rainmakers Digest Volume 4 Issue 1
Paralegal Rainmakers Digest Volume 4 Issue 1
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A ProductBrian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Share point encryption
Share point encryptionShare point encryption
Share point encryption
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
 
Nathan Winters TechDays UK Exchange 2010 IPC
Nathan Winters TechDays UK Exchange 2010 IPCNathan Winters TechDays UK Exchange 2010 IPC
Nathan Winters TechDays UK Exchange 2010 IPC
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 

Similaire à Email archiving vs. destructive retention policies

The Growing Email Archiving Dilemma
The Growing Email Archiving DilemmaThe Growing Email Archiving Dilemma
The Growing Email Archiving Dilemmagkfletch
 
Control the Cost of too Much Content
Control the Cost of too Much ContentControl the Cost of too Much Content
Control the Cost of too Much ContentZanda Mark
 
Controlling Content Cost in and Enterprise Content Management System
Controlling Content Cost in and Enterprise Content Management SystemControlling Content Cost in and Enterprise Content Management System
Controlling Content Cost in and Enterprise Content Management SystemSimona Galdikaite, B.B.A, MBA
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Vaultastic
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessOsterman Research, Inc.
 
10 steps-email-retention-wp-us 198118
10 steps-email-retention-wp-us 19811810 steps-email-retention-wp-us 198118
10 steps-email-retention-wp-us 198118Antony
 
5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right oneVaultastic
 
How to managed e discovery services
How to managed e discovery servicesHow to managed e discovery services
How to managed e discovery serviceselijaht
 
Avoid expensive electronic dumping grounds by auto-tagging content
Avoid expensive electronic dumping grounds by auto-tagging contentAvoid expensive electronic dumping grounds by auto-tagging content
Avoid expensive electronic dumping grounds by auto-tagging contentZanda Mark
 
Avoid Expensive Electronic Dumping Grounds by Auto-tagging Content
Avoid Expensive Electronic Dumping Grounds by Auto-tagging ContentAvoid Expensive Electronic Dumping Grounds by Auto-tagging Content
Avoid Expensive Electronic Dumping Grounds by Auto-tagging ContentSimona Galdikaite, B.B.A, MBA
 
Datenwiederherstllung für Microsoft Exchange
Datenwiederherstllung für Microsoft ExchangeDatenwiederherstllung für Microsoft Exchange
Datenwiederherstllung für Microsoft ExchangeKroll Ontrack GmbH
 
Osterman_research_MessagingPlatforms
Osterman_research_MessagingPlatformsOsterman_research_MessagingPlatforms
Osterman_research_MessagingPlatformsShawn Ebbs
 
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...Vaultastic
 
Avoiding Vendor Lock-in When Transitioning Email to the Cloud
Avoiding  Vendor  Lock-in  When  Transitioning  Email to  the Cloud Avoiding  Vendor  Lock-in  When  Transitioning  Email to  the Cloud
Avoiding Vendor Lock-in When Transitioning Email to the Cloud Abhishek Sood
 
Webinar: How an enterprise can Benefit from Email Archiving
Webinar: How an enterprise can Benefit from Email ArchivingWebinar: How an enterprise can Benefit from Email Archiving
Webinar: How an enterprise can Benefit from Email ArchivingVaultastic
 

Similaire à Email archiving vs. destructive retention policies (20)

The Growing Email Archiving Dilemma
The Growing Email Archiving DilemmaThe Growing Email Archiving Dilemma
The Growing Email Archiving Dilemma
 
WhitePaper-ReducingLoad
WhitePaper-ReducingLoadWhitePaper-ReducingLoad
WhitePaper-ReducingLoad
 
Control the Cost of too Much Content
Control the Cost of too Much ContentControl the Cost of too Much Content
Control the Cost of too Much Content
 
Controlling Content Cost in and Enterprise Content Management System
Controlling Content Cost in and Enterprise Content Management SystemControlling Content Cost in and Enterprise Content Management System
Controlling Content Cost in and Enterprise Content Management System
 
Best Practices for File Sharing
Best Practices for File SharingBest Practices for File Sharing
Best Practices for File Sharing
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
 
10 steps-email-retention-wp-us 198118
10 steps-email-retention-wp-us 19811810 steps-email-retention-wp-us 198118
10 steps-email-retention-wp-us 198118
 
5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one
 
How to managed e discovery services
How to managed e discovery servicesHow to managed e discovery services
How to managed e discovery services
 
Avoid expensive electronic dumping grounds by auto-tagging content
Avoid expensive electronic dumping grounds by auto-tagging contentAvoid expensive electronic dumping grounds by auto-tagging content
Avoid expensive electronic dumping grounds by auto-tagging content
 
Avoid Expensive Electronic Dumping Grounds by Auto-tagging Content
Avoid Expensive Electronic Dumping Grounds by Auto-tagging ContentAvoid Expensive Electronic Dumping Grounds by Auto-tagging Content
Avoid Expensive Electronic Dumping Grounds by Auto-tagging Content
 
Osterman report
Osterman reportOsterman report
Osterman report
 
Osterman report
Osterman reportOsterman report
Osterman report
 
Datenwiederherstllung für Microsoft Exchange
Datenwiederherstllung für Microsoft ExchangeDatenwiederherstllung für Microsoft Exchange
Datenwiederherstllung für Microsoft Exchange
 
Osterman_research_MessagingPlatforms
Osterman_research_MessagingPlatformsOsterman_research_MessagingPlatforms
Osterman_research_MessagingPlatforms
 
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
 
IDOL eDiscovery
IDOL eDiscoveryIDOL eDiscovery
IDOL eDiscovery
 
Avoiding Vendor Lock-in When Transitioning Email to the Cloud
Avoiding  Vendor  Lock-in  When  Transitioning  Email to  the Cloud Avoiding  Vendor  Lock-in  When  Transitioning  Email to  the Cloud
Avoiding Vendor Lock-in When Transitioning Email to the Cloud
 
Webinar: How an enterprise can Benefit from Email Archiving
Webinar: How an enterprise can Benefit from Email ArchivingWebinar: How an enterprise can Benefit from Email Archiving
Webinar: How an enterprise can Benefit from Email Archiving
 

Dernier

Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 

Dernier (20)

Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 

Email archiving vs. destructive retention policies

  • 1. Email Archiving vs. Destructive Retention Policies An ArcMail Technology Research Paper © ArcMail Technology, Inc. 401 Edwards Street, Suite 1100 Shreveport, Louisiana 71101 www.arcmail.com
  • 2. Email Archiving vs. Destructive Retention Policies Email Archiving vs. Destructive Retention Policies One of the greatest dilemmas businesses face when it comes to email is balancing security and storage concerns. Email continues to be the preferred method of communications today, and as a result businesses are often overwhelmed with the amount and size of emails. Emails have been deemed by the courts to be business records so they must be preserved. In addition to the legal rulings, there are also a number of industry guidelines that require organizations to retain all of their communications, which provides cost, security and storage challenges, particularly for small businesses. The dilemma leaves organizations with several questions regarding email archiving and retention policies, including: When is it more appropriate to archive emails for long periods of time? Is it ever more appropriate to implement a destructive retention policy that deletes emails that exceed a specific amount of days, whether, 60, 90 or more? Retention If you ask most people, they will probably say they have some sort of personal retention routine, or at least their email program has an archiving function. In fact, these retention routines or functions may be the only email retention solution that people know of. A recent study by Osterman Research found that 53 percent of companies lack a policy to govern email retention and destruction. The same study found that 67 percent of the companies even allow individual end-users to determine how long messages are retained.i While retaining some email is important, does an organization need to save every email for extended periods of time? Is it preferable to reduce the amount of “old” data stored on mail servers, and delete sensitive data that could be leaked or stolen? This practice is defined as destructive retention, a policy whereby email is retained for a limited time and then permanently deleted from the network. Advocates of destructive retention cite three primary arguments to support the practice: Change fron the traditional retention policies Change can be difficult for organizations, particularly if it requires employees to change the way they are accustomed to doing something. The pace of modern business quickly makes yesterday’s email irrelevant and not worth the cost, effort and additional load on the network required to retain it. Tradition also has relied on email programs, such as Microsoft Outlook, to manage just how long email is retain in each individual user’s PST file. Each month, a pop-up window asks users if they want to automatically archive their email. By simply clicking “Yes, employees can feel that ” they have done their part in backing up their relevant email, while deleting older messages that needlessly take up space on their hard drive or network server. A case can also be made that, by automatically updating their PST file, users are reducing the organization’s potential legal and regulatory exposure. Storage / Data Overload Organizations of all sizes are being overwhelmed with data. A 2006 Gartner study found that 55 percent of IT managers identified the growing requirement for storage capacity as their number one storage challenge. Those surveyed estimated that “their capacity needs would grow by an average 25 percent in one year and by 41 percent in two years. ii The Enterprise Strategy Group estimates ” that the average retention period for database records is roughly 6-10 years.iii One of the leading culprits of this data overload is email. According to the Radicati Group, “the
  • 3. Email Archiving vs. Destructive Retention Policies average corporate e-mail user received 126 messages a day in 2006, up 55 percent from 2003. By 2009, workers are expecting to spend 41 percent of their time managing e-mails. iv The Radicati ” Group also found that the average corporate email account receives 18 MB of mail and attachments each business day. That figure is projected to grow to 28 MB a day by 2011.v With organizations already faced with growing data demands, an obvious solution is to delete email regularly to help reduce this management and storage strain. Eliminate the potential threat of data loss/leakage Among companies surveyed by McAfee, the average cost of a data-leak incident was estimated at $1.82 million. A popular argument for a destructive retention policy is that, by periodically destroying emails, organizations are reducing this threat. Before deleting email messages, many organizations will download attachments onto secure servers to retain potentially important documents, a practice they see as akin to keeping the groceries and discarding the bag. Archiving Email archiving is becoming increasingly important as e-mail communications now play a central role in everyday business operations. Communications previously conducted via phone, fax and snail mail now take place in email, from routine conversations to contract negotiations and document exchanges. Consequently, email content is more business-critical than ever and increasingly relevant to an organization’s competitive, legal and regulatory concerns. For public companies, finance organizations and legal firms, email archives are being deployed in litigation, used to demonstrate regulatory compliance, as well as to facilitate disaster recovery and business continuity. While the cost of email archiving continues to decline, many organizations resist changing their email retention policies. They may not want to invest resources into preserving information they regard as obsolete, sensitive or which could potentially come back to hurt them. Or they may simply want to reduce information clutter. However, an increasing number of these organizations are coming around to the concept of email archiving, due to the three arguments outlined below. Compliance More and more organizations, regardless of size or industry, are facing government or industry compliance requirements that reflect the expanding role of email in organization communications and business transactions. Many of these requirements specifically address an organization’s responsibility to retain and produce electronic records. Technology industry analyst group International Data Company reported, “The introduction of legislation such as the Sarbanes-Oxley Act of 2002 and the Health Insurance Portability and Accountability Act [HIPAA] has significantly increased the importance of managing, securing and storing all information within the enterprise. More specifically, because of regulations such as SEC Rule 17a-4 that are very prescriptive for the retention for email, and the numerous and very costly public lawsuits in which an email has been the deciding factor, email has emerged as one of the most important content types that need to be retained. vi” Sarbanes-Oxley, HIPAA, and Gramm-Leach-Bliley Act are among several government and industry regulations that have made securing and archiving email correspondence a fundamental requirement. Ignorance of the law or claims of inadequate storage resource are no longer viable excuses for non-compliance With an archiving policy in place supported by reliable archiving technology organizations can be confident of practicing due diligence by enabling internal and external auditors to easily review all virtual paper trails that may come under question. Productivity A recent study by IDC found that a company with 1,000 information workers can expect to lose
  • 4. Email Archiving vs. Destructive Retention Policies more than $5 million in annual salary costs due to of the time employees spend on unproductive (email?) searches.vii Email archiving solutions can dramatically lower this cost by making employees more productive. When organizations have self-imposed email quotas in order to control mailbox sizes, users are often forced to manually delete emails to be able to continue sending and receiving emails. Automated archiving solutions eliminate the need for users to manage their own email box and email archiving. If their organizations are already capturing their employees’ inbound and outbound email messages, then employees won’t have to create personal archives or spend time trying find and restore email messages and attachments. Discovery Data is being created and stored in multiple databases across the enterprise. Employees are now using multiple storage devices to facilitate the transport and exchange of information, from USB flash drives, to multi-gigabyte portable hard drives and Web-based hosting services. This is in addition to their personal computers and their companies’ network servers. The multitude of storage locations makes it difficult to readily find information, which can suddenly become imperative in the event of a discovery order arising from litigation. The number of places to search only adds to the time, labor and cost associated with searching through records and locating files. Having an archiving solution that captures all inbound and outbound email in a single location helps to reduce the time and expense. An archiving system that can comply with all of the e- discovery requirements by preserving information for a long period of time is ultimately a practical and cost-effective business tool. A solution that automatically captures and indexes data from multiple sources supports an organization’s strategic objectives to be prepared in the event that information needs to be located, reviewed and restored quickly. With litigation on the rise, archiving emails presents a formidable solution for helping to reduce discovery costs and enhance the organization’s ability to respond to inquiries in a timely and comprehensive manner. Conclusion While destructive retention policies may still have a place in certain organizations, a comprehensive archiving policy and process is a much sounder approach for most companies today. Faced with the threat of litigation, industry and government compliance regulations and the challenge of maintaining employee productivity, organizations simply cannot afford to leave their email retention policies in the hands of individual employee routines or default software functions. Advanced archiving policies provide a clear case against destructive retention policies by relieving users of the responsibility to manage email volumes, providing a single, centralized solution for capturing and storing all email data, along with enhanced security to prevent data loss or leaks. Archiving ensures that the invaluable asset that is corporate knowledge-base is retained and stored in an accessible format, while protecting the integrity of the database by preventing users from altering or deleting files. Destructive email retention policies are no longer a viable strategy for today’s businesses. Companies that have paid strict fines as a result of their poor email retention policies have learned the hard way that email content is now regarded as essential business data. An automated archiving system ensures compliance with government and industry regulations and the new Federal Rules of Civil Procedure, while reducing storage costs, enhancing network performance and employee productivity.
  • 5. Email Archiving vs. Destructive Retention Policies ArcMail Defender Defender by ArcMail Technology is a high-performance, comprehensive email archiving and management solution that includes the right combination of features and functionality that makes it the right archiving solution for small and medium-sized enterprises. ArcMail helps to remove email management from individual users, and its enhanced security eliminates any concerns of rogue access and data theft or leakage. The independent device provides up to 12TB of onboard storage, and automatically archives and indexes all email and attachments in a secure, centralized location. Everyone from end-users to the IT department can access Defender’s user-friendly, Web-based interface to quickly and easily search and restore emails. Defender does not require additional software or hardware, and is easy to install, configure and use. About ArcMail Technology Founded in 2005, ArcMail Technology is a cutting-edge provider of simple, secure, and cost- effective email archiving and management solutions for small and medium-sized businesses. The company’s ArcMail appliance is easy to buy, easy to install, and easy to use, and improves the end-user experience, reduces the load on IT resources, and safely and securely retains the business information contained in emails. ArcMail provides broad coverage for the SMB market and is capable of meeting the archiving and management requirements for an organization with as few as five users up to more than 4,000 users. The company is developing a global channel program to help deliver its products to organizations worldwide. ArcMail is headquartered in Shreveport, La., and has development groups in Washington and Arizona. For more information, visit www.arcmail.com ___________________________ i Leaf, Nate, “Survey: Most Businesses Lack Clear Email Retention Policy, December 17, 2007, http:// ” www.yourtv20.com/news/technology/12563691.html ii Mullins, Robert, “Storage budgets may not keep up with demand in 2007” InfoWorld, October 19, 2006, , http://www.infoworld.com/article/06/10/19/HNstorbudg_1.html?STORAGE%20ARRAY%20SYSTEMS iii Prince, Brian, “Database Archiving Market Evolves with Exploding Data Needs, December 13, 2007, ” http://www.eweek.com/article2/0,1895,2232738,00.asp iv Buckman, Rebecca, “The E-mail Overload, December 17, 2007, ” http://www.courier-journal.com/apps/pbcs.dll/article?AID=/20071217/BUSINESS/712170371 v ibid vi http://accounting.smartpros.com/x46588.xml vii http://www.networkworld.com/news/2007/012307-wasted-searches.html