Totally Automatic, Rules-Driven Email Management & Archiving

by Frank 15. December 2015 06:00

 

More than thirty years after the advent of email as a convenient and fast means of business to business communication most organizations still don’t have an effective way to analyze, monitor, select, capture and classify emails. If your organization does, then you are the exception.

This means most businesses don’t come even close to meeting the requirements of any compliance legislation that applies to their business. Nor do they even come close to managing real corporate risk.

It also means that most businesses don’t effectively guard against sexism, racism, obscenity, theft and bullying in their email system.

Is this a case of ‘heads in the sand’ or is the problem seen as just too hard? Maybe, senior management doesn’t really see unmanaged and unmonitored emails as a problem. Well, at least until the first court case.

In my experience, many organizations think they have a solution but in reality, they don’t; at least not a one hundred-percent solution. In the case of email management, ‘good enough’ is certainly not good enough. It only takes one bad email to slip through the cracks to bring the whole house down.

In many examples, organizations rely on end users to monitor, manage and police email. The problem with this model is that end users are human and typically exhibit all the strengths and weaknesses of humans. In this case, we are more concerned with the failings. As humans we are not always on top of our game; we have good days and we have bad days. We get distracted, we are prejudiced, we are sometimes lazy, we are sometimes careless and for a small number, we are sometimes outright dishonest.

Human beings will never produce a one-hundred-percent consistent result; that is not in our nature. Maybe when AI gets to the stage that we can all be ‘upgraded’ to cyborgs this will change, but I seriously doubt it. As long as there is any trace of humanity we will still be lovingly unreliable and inconsistent entities.

You don’t have a one hundred-percent reliable system if you don’t control and standardize all the inputs. Instead, you have a form of ‘managed chaos’ and inconsistent and unreliable results. You will also probably have a false sense of security, “Sure, we are managing all emails (well, kind of).”

I have been a proponent of the fully-automatic, server-centric paradigm for email management for many years and still promote it as the only one hundred-percent reliable way to effectively and consistently manage all incoming and outgoing emails. It is also the only way to manage risk effectively.

To be one hundred-percent sure you must have a one hundred-percent consistent paradigm. That is, a common set of rules that all emails are judged against plus a common set of processes to apply after an email has been ‘judged’.

Following are some example of what our fully-automatic, rules-driven email management system should be doing 24/7:

  • Is the email of a personal nature and harmless? If so, it can be ignored, there is no reason to capture and classify it.
  • Is the email all about business? If so, it needs to be captured and correctly classified within our corporate store.
  • Does the email contain expletives or sexual references? If so, it needs to be captured, quarantined by our security system and referred to a responsible officer for further examination and possible action.
  • Does the email contain references to corporate IP or classified material? If so, it needs to be captured, quarantined by our security system and referred to a responsible officer for further examination and possible action.
  • Is the email about business and does it require some action or response? If so, it needs to be captured, correctly classified within our corporate store and appropriate workflow initiated.
  • Is the email from a senior executive, about business and does it require some action or response with appropriate access controls applied? If so, it needs to be captured, correctly classified within our corporate store with appropriate security and access rights assigned and appropriate workflow initiated.

We produced our first fully-automatic, rules-driven email managements system in 1994. By today’s standards the technology was primitive but it worked and we used it within our business to demonstrate to our customers and partners how it could function in the real world. We called that product GEM for ‘GMB’s Email Management’ system. 

GEM has been redesigned and rewritten multiple times since so as to utilize the latest technology and tools. We still call it GEM even though our company is now called Knowledgeone Corporation, not GMB; the name works for us and our customers and we see no need to change it. It is after all, a ‘gem’ of a product.

We have used each and every version of GEM since 1994 within our company (we are the primary Beta test site) to automatically analyze all incoming and outgoing emails and to store and classify captured emails in our corporate store based on the RecFind 6 relational database. I can’t imagine running my business without GEM and I don’t understand how other organizations can exist without GEM, but they do albeit, taking huge risks.

The latest version of GEM, 2.7.1, is a major upgrade and involves a significant change in the way we connect to email servers of any type (e.g., Exchange, Office 365, GroupWise, Notes, etc.). We have standardized and simplified the interface to the email server using IMAP and converted our Agents to Windows Services to make the installation and management of GEM as easy as possible for your IT staff.

We have also improved the Rules engine to make it as easy as possible to define all the rules you need to manage your emails.

Because we have 21 years’ experience installing, configuring and using GEM in a real-world production example we also have the world’s most experienced GEM consultants to assist our customers.

How GEM integrates with any other EDRMS

GEM is designed to use the RecFind 6 relational database as its image & data repository. However, we provide several options for integrating to any other EDRMS such that the other EDRMS can search for and access emails (and the associated Metadata) captured by GEM. The four main methods, in order of ease-of-use are:

  1. Capturing encapsulated XML records produced by GEM;
  2. Using the RecFind 6 Mini API;
  3. Using the RecFind 6 SharePoint Integration Module (for customers using SharePoint as their EDRMS); and
  4. Using the RecFind 6 SDK

Please contact Support at Knowledgeone Corp for more information on the above methods.

Month List