Roland Perry on 27 October 2004 at 16:49 said:-
> Yes, but it seems that some organisations wish to limit their
> liability
> by purging old emails, and keeping only "recent" ones. Times
> of as short
> as a month have been mentioned. You would need to co-ordinate the
> purging between the centralised copy and the user's copy.
>
> >If all emails are sent/received through your company email
> >servers, all
> >emails are copied, even emails sent from a Notebook?
> To your employees perhaps. What about outsiders?
Like all technology, legal and ethical aspects will depend upon the
implementing organisation/person(s) and the effectiveness of the controls.
The technological answer I previously mentioned was configurable to meet
various needs (Some questionable). Difficulties would inevitably arise where
differing sets of values were used across a group to deal with the same
technology; Confidentiality/'Organisational Privacy?' would probably then be
used to manage those differing values.
Chris Spray on 27 October 2004 at 16:24 said:-
> When you implement a system to do this, rather than taking
> "secret" copies
> or snooping you are very open about it. It might even discourage the
> sending of "incriminating" material in the first place (you
> use the 'phone
> that isn't connected to the call recording system instead!!).
That would depend on the telephone calls not being recorded and there being
no general recording of the environment within the room in which the
telephone is located. Having worked in such an environment (Police Control
Room) for many years prior to DP these things are not always that simple,
and some hilarious issues do arise. You become aware of how little respect
can be given to people and their values in the workplace for various
reasons; Raises interesting legal/ethical/moral questions when you think
about that.
I would argue most types of workplace surviellance mechanisms indicate an
admission of a failure/reduction of management at the interpersonal level,
which becomes coupled with an increase in value manipulation, both of which
have some dependence on the group/person(s) and controls as mentioned above.
Sad that some of the most important skills and values, those at the
interpersonal level, seem to be among the early casualties in such
scenarios.
I am not downloading e-mail very regularly at the moment, so do not know if
the e-mail is arriving in the correct sequence or going through some form of
delaying process. For some reason, also sending the e-mail directly to the
correspondent has in the past been effective in resolving that difficulty.
Ongoing bugs in the technology I suppose.
Ian W
> -----Original Message-----
> From: This list is for those interested in Data Protection
> issues [mailto:[log in to unmask]] On Behalf Of
> Roland Perry
> Sent: 27 October 2004 16:49
> To: [log in to unmask]
> Subject: Re: Searching for e-mails
>
>
> In message <[log in to unmask]>, at
> 16:23:34 on Wed, 27 Oct 2004, Chris Spray <[log in to unmask]> writes
> >I don't think there are necessarily the problems you
> envisage? The main
> >reason for using such systems is to provide a forensically
> sound/legally
> >admissible audit trail, so you don't want to mirror users
> email accounts?
>
> You are mirroring (capturing) all the emails to/from the users.
>
> >The ability to search the entire organisations emails in
> relation to SARS
> >is a useful by-product.
>
> Yes, but it seems that some organisations wish to limit their
> liability
> by purging old emails, and keeping only "recent" ones. Times
> of as short
> as a month have been mentioned. You would need to co-ordinate the
> purging between the centralised copy and the user's copy.
>
> >If all emails are sent/received through your company email
> servers, all
> >emails are copied, even emails sent from a Notebook?
>
> It can be achieved, but it's one more technicality to master.
>
> >When you implement a system to do this, rather than taking
> "secret" copies
> >or snooping you are very open about it.
>
> To your employees perhaps. What about outsiders?
> --
> Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|