SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
Email Classification -
Why Should It Matter to You?
A Best Practice White Paper
Written by Grant Lindsay,
Product Manager, Sherpa Software




 456 Washington Avenue, Suite 2 
 Bridgeville, PA 15017 
 www.SherpaSoftware.com  
 information@sherpasoftware.com  
Email Classification – Why Should It Matter
to You?


INTRODUCTION
What is email classification you ask? And should it be on your radar? For this discussion, let's define email
classification as the process of tagging email messages with labels to assist in managing those messages as they
either move through or rest in the email environment. For example, a message might be classified as “privileged,”
“confidential,” “secret,” “private,” or “business relevant.” A message with a “business relevant” classification may be
retained for three years, whereas a message classified as “personal” may be purged after thirty days. A message
marked “secret” may be restricted from leaving the organization’s email environment unless it is encrypted.

The reasons for classifying email vary, but may include: grouping like messages together for electronic discovery
[e-discovery], applying security and access control to messages of a certain type, and managing the life-span of
messages, based on their relevancy to the business or to regulations.

                                                                          1
Email classification like this can aid the e-discovery process because searches can be targeted to only the
messages classified “business relevant” or “privileged” and leave out other messages not pertinent to the search,
which can greatly reduce the search run-time. In other cases, message classifications may be hierarchical or
relevant to only some people in the organization.

Classifying or tagging emails can be done through several methods. The process of applying these tags (i.e.,
classifying) may be either:


                 ▪       Manual: The message custodian, a human, applies the classification when the message is either
                         created or received
                 ▪       Automatic: A computer applies the classification, based on rules or contextual analysis
                 ▪       Hybrid: Combining both manual and automatic methods.



IS THERE A NEED FOR CLASSIFICATION?
At a high level, the purposes for classifying unstructured data, like email, could include:


                 ▪       Organizing data into groups: For business reuse and e-discovery retrieval
                 ▪       Tracking and managing data: For access control and retention windows




                                                            
1
    For more information about the e-discovery process, check out the E-discovery Reference Model (http://www.edrm.net)




                                                                                                                          P a g e  | 2 
Email Classification – Why Should It Matter
to You?

The decision whether to classify email data lies with each individual organization, but it is a question you should be
asking. Other questions pertinent to email classification include:


         ▪    Will having classified messages speed up e-discovery requests?
         ▪    Is your organization under industry or government regulations that require us to implement email
              classification?
         ▪    Will email classification help us in other ways, like reducing storage costs or getting the big picture
              about feedback on our products or services?

Email is just one component of an organization's unstructured data that might need to be managed with a
classification policy. However, it is an important component. Email often comprises the majority of an organization's
communications, both internal and external. As such, it also constitutes a large part of its unstructured data.



WHERE AND WHY SHOULD EMAIL CLASSIFICATION BE APPLIED?
Classifying email is complicated by the fact that not all email messages are relevant from a business perspective,
and would not necessarily need to be kept. Some experts estimate as much as 60% of email messages held are
not related to business. These are the “where do you want to go for lunch?” and “there is cake in the break room”
types of messages. Should those messages be kept? If so, would they be under the same retention rules as other,
more relevant messages, like a product quote or support question? This is where a strategic email classification
policy could come in handy because these non-business-related emails can be broadly classified and dealt with by
an email archiving system or other email management technology en masse.

If classifying email makes sense in your organization, there are some details to work out. For example, different
schemes are available to classify email such as:


         ▪    Security or sensitivity (e.g., privileged, secret, etc.)
         ▪    Retention period (e.g., “keep until...”, “delete after...”)
         ▪    Locations at various levels (e.g., EMEA, US, Chicago, etc.)
         ▪    Product lines (e.g., “gizmo,” “widget,” “gizmo 2.0”)

By classifying messages in a way that makes sense for your organization, you can more easily group this data
together for e-discovery, retention, protection, etc.

For example, a product company that makes "gizmos" may want to classify any inbound messages that have
"gizmo" in the body with a header called X-Product and a value of "gizmo". Later, all such messages can be
discovered easily in a search (e.g., find all messages where X-Product = "gizmo"). Additionally, the tagged




                                                                                                            P a g e  | 3 
Email Classification – Why Should It Matter
to You?

messages may be collected together into a journal to comply with industry or government regulations or to help
Product Management see feedback from customers and prospects on the gizmo product, regardless of the source
or the recipient.

In a similar way, the confidentiality of a new product, "gadget," can be protected using classification by having the
mail router reject any message for external recipients where the header X-Product has the value "gadget".
However, before any procedure or technology can be applied to the job of classifying email, a policy must be
created. Relevant elements of the email classification policy would include:
         ▪    Definitions, procedures, regulations
         ▪    Roles, responsibilities
         ▪    Actions, monitoring, accountability


HOW SHOULD EMAIL CLASSIFICATION BE APPLIED?
Generally, there are two ways to classify email: automatically by a computer or manually by a human. Additionally,
using a hybrid combination of these two methods might be considered.

Automatically—Machine Assisted

With this kind of classification, a computer process scans message headers and bodies to make a determination as
to what classifications may apply to it and update the headers accordingly. It makes these decisions in various
ways, but in essence it follows a set of rules.

        Advantages
         ▪    Limited human involvement: Once configured, the machine does all the heavy lifting. Potentially, all
              inbound, outbound, and internal messages can be processed automatically.
         ▪    Consistent decisions: Assuming the rules don’t change, the computer will be faithful in applying the
              same classifications to like messages without deviation. However, some systems employ a kind of
              learning or adapting logic that, in some way or another, bases current decisions on past results.
              While some inconsistency may be evident early on, the intent is to make these systems more
              accurate at classifying messages over time.

        Disadvantages
         ▪    Computers can’t reason: They only do what they are told. This leads to various degrees of accuracy
              when classifying messages based purely on content or addresses, even when sophisticated and
              expensive learning systems are employed.




                                                                                                            P a g e  | 4 
Email Classification – Why Should It Matter
to You?

Manually—User Applied

This involves the sender applying a suitable classification to a message during composition before it is sent.
Sometimes, the email client software may be able to assist the author in selecting a classification or it may prevent
a message from being sent if the classification is missing. Received messages (e.g., from external sources) may
also need to be classified after the fact by the recipient.

        Advantages
         ▪    People can reason: Presumably the message author can make the best determination as to the
              nature of the message and, therefore, what classifications it needs. Or, if the message arrived
              unclassified from an external source, the recipient may be able to make that determination.

        Disadvantages
         ▪    Increased workload: Besides additional and on-going training, there is additional work on the email
              author’s part to consider and apply classifications.
         ▪    Inconsistencies: Are users being thoughtful and careful each and every time they classify an email?
              Are the policies clear enough that everyone will arrive at the same determination about a given
              message's classifications? Inconsistencies can muddy the waters when trying to manage the
              messages later as a group of a given type.


MOVING FORWARD
There are several options for moving forward with an email classification system. Once you have identified the
organizational needs for classifying email, there are several steps Sherpa Software experts recommend before
moving forward with implementing.

Get Buy-in

        Business needs should drive any classification effort. If the initiative begins with the Leadership team or a
        department like Legal or Governance, Risk Management and Compliance (GRC,) then adoption has a
        higher level of likelihood. Additionally, these other departments may have important insight into crafting an
        email classification policy or strategy. For instance, if the goal of an email classification strategy is to secure
        confidential emails from leaving the organization, the Governance, Risk Management and Compliance
        team can direct the email administrator to look out for the right keywords or patterns (e.g. patent or credit
        card numbers).




                                                                                                               P a g e  | 5 
Email Classification – Why Should It Matter
to You?

Draft an Email Classification Strategy

        Before you begin shopping for the right kind of technology to support an email classification strategy, it is
        vital to write the strategy down and determine what and how you are going to classify emails in your
        environment. This will help greatly when researching technologies.

Research Supporting Technology

        Identify opportunities present in your existing tools. You may have all the pieces already in place. If not,
        understand gaps that will need to be filled by new technologies so that you can compare products based on
        just the features you will need. One such tool is Sherpa Software’s Compliance Attender for Lotus Notes
        which contains an email classification module. Compliance Attender can classify email messages based on
        a wide array of criteria including message content, metadata, message size, etc. Compliance Attender is a
        module-based email compliance system for Lotus Notes environments; available modules include
        journaling, filtering and ToneCheck (automated tone/sentiment analysis).

As you can see, the answer to the question, should email classification matter depends. But for many
organizations, that answer is an empathetic yes. For others, it may not be as clean cut, but the questions raised
here will help you determine if classification is a good fit for your organization. Regardless of how you answer, you
need to be asking the questions.




ABOUT THE AUTHOR- GRANT LINDSAY
                        As the Product Manager for Compliance Attender for Notes, Grant is responsible for product
                        research and development, pre‐sales technical support (e.g., Demos), post‐sales technical
                        support and competitive research.

                        Grant joined Sherpa Software in 2007 with 15 years of experience in Information
                        Technology. Of those, more than 14 were spent building applications with Lotus Notes and
                        Domino. He worked with a wide range of company sizes and across several industries
                        including insurance, consulting, venture capital, manufacturing, software and more.

                       Grant is an IBM Certified Advanced Application Developer and an expert in email
management and compliance, LotusScript, Notes Formula Language, application design, and security. He is also
skilled in C/C++ and Java Application Programming Interfaces (APIs) for Notes and Domino. Grant is accomplished
in web delivered technologies: HTML, CSS, and JavaScript.




                                                                                                            P a g e  | 6 
Email Classification – Why Should It Matter
to You?

He graduated in 1995 from the Career Development Institute with a Programmer Analyst Diploma. Grant spends
his time with his wife, Lydia, of 16 years and his two retired greyhound racers, Rio and Wavorly.




                                                                                                  P a g e  | 7 

Mais conteúdo relacionado

Mais procurados

Hybrid recommender systems
Hybrid recommender systemsHybrid recommender systems
Hybrid recommender systems
renataghisloti
 
CSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 AugCSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 Aug
cstalks
 
Survey of Recommendation Systems
Survey of Recommendation SystemsSurvey of Recommendation Systems
Survey of Recommendation Systems
youalab
 
Item Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation AlgorithmsItem Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation Algorithms
nextlib
 
Recommendation engines
Recommendation enginesRecommendation engines
Recommendation engines
Georgian Micsa
 

Mais procurados (20)

Collaborative Filtering
Collaborative FilteringCollaborative Filtering
Collaborative Filtering
 
Social recommender system
Social recommender systemSocial recommender system
Social recommender system
 
Recommender systems using collaborative filtering
Recommender systems using collaborative filteringRecommender systems using collaborative filtering
Recommender systems using collaborative filtering
 
Hybrid recommender systems
Hybrid recommender systemsHybrid recommender systems
Hybrid recommender systems
 
CSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 AugCSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 Aug
 
Collaborative Filtering 1: User-based CF
Collaborative Filtering 1: User-based CFCollaborative Filtering 1: User-based CF
Collaborative Filtering 1: User-based CF
 
Filtering content bbased crs
Filtering content bbased crsFiltering content bbased crs
Filtering content bbased crs
 
Stock prediction using social network
Stock prediction using social networkStock prediction using social network
Stock prediction using social network
 
Survey of Recommendation Systems
Survey of Recommendation SystemsSurvey of Recommendation Systems
Survey of Recommendation Systems
 
Item Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation AlgorithmsItem Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation Algorithms
 
Collaborative filtering
Collaborative filteringCollaborative filtering
Collaborative filtering
 
Collaborative filtering
Collaborative filteringCollaborative filtering
Collaborative filtering
 
Collaborative Filtering Recommendation Algorithm based on Hadoop
Collaborative Filtering Recommendation Algorithm based on HadoopCollaborative Filtering Recommendation Algorithm based on Hadoop
Collaborative Filtering Recommendation Algorithm based on Hadoop
 
Final deck
Final deckFinal deck
Final deck
 
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
 
Recommendation and Information Retrieval: Two Sides of the Same Coin?
Recommendation and Information Retrieval: Two Sides of the Same Coin?Recommendation and Information Retrieval: Two Sides of the Same Coin?
Recommendation and Information Retrieval: Two Sides of the Same Coin?
 
Recommendation engines
Recommendation enginesRecommendation engines
Recommendation engines
 
Tag based recommender system
Tag based recommender systemTag based recommender system
Tag based recommender system
 
Summary of a Recommender Systems Survey paper
Summary of a Recommender Systems Survey paperSummary of a Recommender Systems Survey paper
Summary of a Recommender Systems Survey paper
 
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTEA FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
 

Semelhante a Email Classification - Why Should it Matter to You?

Exploring the World of Professional Certification
Exploring the World of Professional CertificationExploring the World of Professional Certification
Exploring the World of Professional Certification
Career Communications Group
 
Deep Dive Into Email Archiving Products
Deep Dive Into Email Archiving ProductsDeep Dive Into Email Archiving Products
Deep Dive Into Email Archiving Products
Stephen Foskett
 
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
TEAM Informatics
 

Semelhante a Email Classification - Why Should it Matter to You? (20)

Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
 
guide infrastructure 04 in English
guide infrastructure 04 in Englishguide infrastructure 04 in English
guide infrastructure 04 in English
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Office 365 Archiving Comparison to Dropsuite
Office 365 Archiving Comparison to DropsuiteOffice 365 Archiving Comparison to Dropsuite
Office 365 Archiving Comparison to Dropsuite
 
Nt1330 Unit 7
Nt1330 Unit 7Nt1330 Unit 7
Nt1330 Unit 7
 
SC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsSC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance Solutions
 
Pathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-ToPathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-To
 
5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one
 
Exploring the World of Professional Certification
Exploring the World of Professional CertificationExploring the World of Professional Certification
Exploring the World of Professional Certification
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 
Deep Dive Into Email Archiving Products
Deep Dive Into Email Archiving ProductsDeep Dive Into Email Archiving Products
Deep Dive Into Email Archiving Products
 
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
 
AMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information managementAMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information management
 
Email Marketing techniques
Email Marketing techniquesEmail Marketing techniques
Email Marketing techniques
 
Email marketing
Email marketingEmail marketing
Email marketing
 

Mais de Sherpa Software

The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
Sherpa Software
 

Mais de Sherpa Software (13)

Policy-Driven Information Governance
Policy-Driven Information GovernancePolicy-Driven Information Governance
Policy-Driven Information Governance
 
Putting the "ME" in social media
Putting the "ME" in social media Putting the "ME" in social media
Putting the "ME" in social media
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product build
 
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!
 
Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive Consolidation
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt you
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for Notes
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui Imaging
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your Organization
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the Numbers
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Email Classification - Why Should it Matter to You?

  • 1. Email Classification - Why Should It Matter to You? A Best Practice White Paper Written by Grant Lindsay, Product Manager, Sherpa Software 456 Washington Avenue, Suite 2  Bridgeville, PA 15017  www.SherpaSoftware.com   information@sherpasoftware.com  
  • 2. Email Classification – Why Should It Matter to You? INTRODUCTION What is email classification you ask? And should it be on your radar? For this discussion, let's define email classification as the process of tagging email messages with labels to assist in managing those messages as they either move through or rest in the email environment. For example, a message might be classified as “privileged,” “confidential,” “secret,” “private,” or “business relevant.” A message with a “business relevant” classification may be retained for three years, whereas a message classified as “personal” may be purged after thirty days. A message marked “secret” may be restricted from leaving the organization’s email environment unless it is encrypted. The reasons for classifying email vary, but may include: grouping like messages together for electronic discovery [e-discovery], applying security and access control to messages of a certain type, and managing the life-span of messages, based on their relevancy to the business or to regulations. 1 Email classification like this can aid the e-discovery process because searches can be targeted to only the messages classified “business relevant” or “privileged” and leave out other messages not pertinent to the search, which can greatly reduce the search run-time. In other cases, message classifications may be hierarchical or relevant to only some people in the organization. Classifying or tagging emails can be done through several methods. The process of applying these tags (i.e., classifying) may be either: ▪ Manual: The message custodian, a human, applies the classification when the message is either created or received ▪ Automatic: A computer applies the classification, based on rules or contextual analysis ▪ Hybrid: Combining both manual and automatic methods. IS THERE A NEED FOR CLASSIFICATION? At a high level, the purposes for classifying unstructured data, like email, could include: ▪ Organizing data into groups: For business reuse and e-discovery retrieval ▪ Tracking and managing data: For access control and retention windows                                                              1 For more information about the e-discovery process, check out the E-discovery Reference Model (http://www.edrm.net) P a g e  | 2 
  • 3. Email Classification – Why Should It Matter to You? The decision whether to classify email data lies with each individual organization, but it is a question you should be asking. Other questions pertinent to email classification include: ▪ Will having classified messages speed up e-discovery requests? ▪ Is your organization under industry or government regulations that require us to implement email classification? ▪ Will email classification help us in other ways, like reducing storage costs or getting the big picture about feedback on our products or services? Email is just one component of an organization's unstructured data that might need to be managed with a classification policy. However, it is an important component. Email often comprises the majority of an organization's communications, both internal and external. As such, it also constitutes a large part of its unstructured data. WHERE AND WHY SHOULD EMAIL CLASSIFICATION BE APPLIED? Classifying email is complicated by the fact that not all email messages are relevant from a business perspective, and would not necessarily need to be kept. Some experts estimate as much as 60% of email messages held are not related to business. These are the “where do you want to go for lunch?” and “there is cake in the break room” types of messages. Should those messages be kept? If so, would they be under the same retention rules as other, more relevant messages, like a product quote or support question? This is where a strategic email classification policy could come in handy because these non-business-related emails can be broadly classified and dealt with by an email archiving system or other email management technology en masse. If classifying email makes sense in your organization, there are some details to work out. For example, different schemes are available to classify email such as: ▪ Security or sensitivity (e.g., privileged, secret, etc.) ▪ Retention period (e.g., “keep until...”, “delete after...”) ▪ Locations at various levels (e.g., EMEA, US, Chicago, etc.) ▪ Product lines (e.g., “gizmo,” “widget,” “gizmo 2.0”) By classifying messages in a way that makes sense for your organization, you can more easily group this data together for e-discovery, retention, protection, etc. For example, a product company that makes "gizmos" may want to classify any inbound messages that have "gizmo" in the body with a header called X-Product and a value of "gizmo". Later, all such messages can be discovered easily in a search (e.g., find all messages where X-Product = "gizmo"). Additionally, the tagged P a g e  | 3 
  • 4. Email Classification – Why Should It Matter to You? messages may be collected together into a journal to comply with industry or government regulations or to help Product Management see feedback from customers and prospects on the gizmo product, regardless of the source or the recipient. In a similar way, the confidentiality of a new product, "gadget," can be protected using classification by having the mail router reject any message for external recipients where the header X-Product has the value "gadget". However, before any procedure or technology can be applied to the job of classifying email, a policy must be created. Relevant elements of the email classification policy would include: ▪ Definitions, procedures, regulations ▪ Roles, responsibilities ▪ Actions, monitoring, accountability HOW SHOULD EMAIL CLASSIFICATION BE APPLIED? Generally, there are two ways to classify email: automatically by a computer or manually by a human. Additionally, using a hybrid combination of these two methods might be considered. Automatically—Machine Assisted With this kind of classification, a computer process scans message headers and bodies to make a determination as to what classifications may apply to it and update the headers accordingly. It makes these decisions in various ways, but in essence it follows a set of rules. Advantages ▪ Limited human involvement: Once configured, the machine does all the heavy lifting. Potentially, all inbound, outbound, and internal messages can be processed automatically. ▪ Consistent decisions: Assuming the rules don’t change, the computer will be faithful in applying the same classifications to like messages without deviation. However, some systems employ a kind of learning or adapting logic that, in some way or another, bases current decisions on past results. While some inconsistency may be evident early on, the intent is to make these systems more accurate at classifying messages over time. Disadvantages ▪ Computers can’t reason: They only do what they are told. This leads to various degrees of accuracy when classifying messages based purely on content or addresses, even when sophisticated and expensive learning systems are employed. P a g e  | 4 
  • 5. Email Classification – Why Should It Matter to You? Manually—User Applied This involves the sender applying a suitable classification to a message during composition before it is sent. Sometimes, the email client software may be able to assist the author in selecting a classification or it may prevent a message from being sent if the classification is missing. Received messages (e.g., from external sources) may also need to be classified after the fact by the recipient. Advantages ▪ People can reason: Presumably the message author can make the best determination as to the nature of the message and, therefore, what classifications it needs. Or, if the message arrived unclassified from an external source, the recipient may be able to make that determination. Disadvantages ▪ Increased workload: Besides additional and on-going training, there is additional work on the email author’s part to consider and apply classifications. ▪ Inconsistencies: Are users being thoughtful and careful each and every time they classify an email? Are the policies clear enough that everyone will arrive at the same determination about a given message's classifications? Inconsistencies can muddy the waters when trying to manage the messages later as a group of a given type. MOVING FORWARD There are several options for moving forward with an email classification system. Once you have identified the organizational needs for classifying email, there are several steps Sherpa Software experts recommend before moving forward with implementing. Get Buy-in Business needs should drive any classification effort. If the initiative begins with the Leadership team or a department like Legal or Governance, Risk Management and Compliance (GRC,) then adoption has a higher level of likelihood. Additionally, these other departments may have important insight into crafting an email classification policy or strategy. For instance, if the goal of an email classification strategy is to secure confidential emails from leaving the organization, the Governance, Risk Management and Compliance team can direct the email administrator to look out for the right keywords or patterns (e.g. patent or credit card numbers). P a g e  | 5 
  • 6. Email Classification – Why Should It Matter to You? Draft an Email Classification Strategy Before you begin shopping for the right kind of technology to support an email classification strategy, it is vital to write the strategy down and determine what and how you are going to classify emails in your environment. This will help greatly when researching technologies. Research Supporting Technology Identify opportunities present in your existing tools. You may have all the pieces already in place. If not, understand gaps that will need to be filled by new technologies so that you can compare products based on just the features you will need. One such tool is Sherpa Software’s Compliance Attender for Lotus Notes which contains an email classification module. Compliance Attender can classify email messages based on a wide array of criteria including message content, metadata, message size, etc. Compliance Attender is a module-based email compliance system for Lotus Notes environments; available modules include journaling, filtering and ToneCheck (automated tone/sentiment analysis). As you can see, the answer to the question, should email classification matter depends. But for many organizations, that answer is an empathetic yes. For others, it may not be as clean cut, but the questions raised here will help you determine if classification is a good fit for your organization. Regardless of how you answer, you need to be asking the questions. ABOUT THE AUTHOR- GRANT LINDSAY As the Product Manager for Compliance Attender for Notes, Grant is responsible for product research and development, pre‐sales technical support (e.g., Demos), post‐sales technical support and competitive research. Grant joined Sherpa Software in 2007 with 15 years of experience in Information Technology. Of those, more than 14 were spent building applications with Lotus Notes and Domino. He worked with a wide range of company sizes and across several industries including insurance, consulting, venture capital, manufacturing, software and more. Grant is an IBM Certified Advanced Application Developer and an expert in email management and compliance, LotusScript, Notes Formula Language, application design, and security. He is also skilled in C/C++ and Java Application Programming Interfaces (APIs) for Notes and Domino. Grant is accomplished in web delivered technologies: HTML, CSS, and JavaScript. P a g e  | 6 
  • 7. Email Classification – Why Should It Matter to You? He graduated in 1995 from the Career Development Institute with a Programmer Analyst Diploma. Grant spends his time with his wife, Lydia, of 16 years and his two retired greyhound racers, Rio and Wavorly. P a g e  | 7