In message <[log in to unmask]>, at
16:23:34 on Wed, 27 Oct 2004, Chris Spray <[log in to unmask]> writes
>I don't think there are necessarily the problems you envisage? The main
>reason for using such systems is to provide a forensically sound/legally
>admissible audit trail, so you don't want to mirror users email accounts?
You are mirroring (capturing) all the emails to/from the users.
>The ability to search the entire organisations emails in relation to SARS
>is a useful by-product.
Yes, but it seems that some organisations wish to limit their liability
by purging old emails, and keeping only "recent" ones. Times of as short
as a month have been mentioned. You would need to co-ordinate the
purging between the centralised copy and the user's copy.
>If all emails are sent/received through your company email servers, all
>emails are copied, even emails sent from a Notebook?
It can be achieved, but it's one more technicality to master.
>When you implement a system to do this, rather than taking "secret" copies
>or snooping you are very open about it.
To your employees perhaps. What about outsiders?
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|