SlideShare una empresa de Scribd logo
1 de 36
ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM Managing Your Email Better
Developing an email policy Identifying and classifying messages as records Managing the inbox better – by managing less email Better collaboration WITHOUT email Seminar agenda
Developing an Email Policy
Email policy elements Policy statements The policy development framework Session agenda
Email policy elements
Every organization’s email policy will be different Public vs. private sector Regulatory requirements, both horizontal and vertical There are some common areas that should be addressed Lots of references andexamples available Email policy elements
Purpose Scope  Responsibilities Definitions Policy statements References Policy elements
This policy has three purposes: Establish definitions relevant to the email management program Describe usage policies relating to email Describe security and technology policies relating to email Scope: This policy is applicable to the entire enterprise.  Purpose and scope
Responsibilities for policy development and maintenance Responsibilities for policy administration Responsibilities for compliance with policy Responsibilities
Uncommon terms Common terms used in an uncommon fashion Acronyms and abbreviations Definitions
Many different elements available Detailed in the next section Policy statements
List any references used to develop the policy Internal strategic documents Records program governance instruments Statutes and regulations Publications  Examples and templates References
Detailed instructions for complying with policies Often separate document(s) Each of the policy statements will have one or more procedures May be specific to process, business unit, jurisdiction, and/or application Procedures
Email policy statements
Most common element of email policies today Typically addresses things NOT to do: Obscene language or sexual content Jokes, chain letters, business solicitation Racial, ethnic, religious, or other slurs May address signature blocks Standardization, URLs, pictures Acceptable usage
Guidance on writing emails Wording and punctuation Spell check and grammar check Effective subject lines Guidance on email etiquette Guidance on addressees Effective usage
Whether personal usage is allowed Any limitations to personal usage Separation of personal and business usage within individual messages Personal email account access Personal usage
Whether email is considered to be owned by the organization Responsibility for stewardship of messages, both sent and received Privacy and monitoring Third-party access Ownership and stewardship
Email is a medium, not a record type or series Email messages can be records Other information objects that might need to be treated as records Read receipts Bounced messages Retention and disposition
Email can be subject to discovery Assigns responsibility for communicating  legal holds Describes whether or not email disclaimers will be used and how May outline privilege issues Legal issues
Outlines whether encryption is allowed What approaches to use Whether digital signatures are allowed What approaches to use Encryption and digital signatures
Most often found as part of general policies for remote workers Requirements for mobile devices Requirements for web-based access Synchronization and login requirements Mobile and remote email
Addresses whether email will be archived Addresses whether personal archives will be allowed  May address backups – but backups are not archives May also address public or managed folders Archival
Attachment limitations Whether they can be sent at all Size limitations Content type limitations Attachments vs. links Content filtering Encryption and DRM Security
Policy development framework
Approach to developing and implementing a policy Ensures that policy development is consistent with organizational goals Ensures that policy meets legal and regulatory requirements The policy framework
Policy development requires time and energy from users and stakeholders So does policy implementation Ongoing compliance will require  auditing and communication None of this happens without management support 1. Get management support
Policy should address the entire enterprise Stakeholders should include: Business unit managers End users Legal, RM, IT External customers and partners 2. Identify stakeholders
What changes are being introduced?  Processes, technologies What are the desired outcomes? What behavioral changes should result? 3. Identify the goals of the policy
Legal research Organizational research Public research Standards and guidelines Benchmarking Consult with similarorganizations Analyze the results 4. Conduct the research
Collaborative and iterative process There are a number of resources available to provide an email policy framework These are starting points and need to be customized for your requirements 5. Draft the policy
Review by legal, HR, users Ensures it is valid Ensures it will work within existing organizational culture Change management  6. Review the policy
Policy is reviewed by business managers, senior management Complete revisions as necessary Approve the policy 7. Approve the policy
Communication Training Auditing 8. Implement the policy
Monitor for compliance with policy Solicit feedback about policy Provide refresher training as required Consider whether to retain  previous versions of the policy Plan for periodic review and maintenance 9. Once the policy is live
Questions?

Más contenido relacionado

La actualidad más candente

Lesson 2
Lesson 2Lesson 2
Lesson 2MrsNunn
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...Kelly Hart & Hallman LLP
 
Vapor Stream Value
Vapor Stream ValueVapor Stream Value
Vapor Stream Valuejcol75
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawRamon Ray
 
Practical Solutions To Internet Marketing Legal Compliance, pt 2
Practical Solutions To Internet Marketing Legal Compliance, pt 2Practical Solutions To Internet Marketing Legal Compliance, pt 2
Practical Solutions To Internet Marketing Legal Compliance, pt 2Affiliate Summit
 
E-Mail Privacy at Johnson and Dresser (A Case Study)
E-Mail Privacy at Johnson and Dresser (A Case Study)E-Mail Privacy at Johnson and Dresser (A Case Study)
E-Mail Privacy at Johnson and Dresser (A Case Study)Muhammad Junaid Ali
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacyG&A Partners
 

La actualidad más candente (11)

Lesson 2
Lesson 2Lesson 2
Lesson 2
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
 
Vapor Stream Value
Vapor Stream ValueVapor Stream Value
Vapor Stream Value
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
Practical Solutions To Internet Marketing Legal Compliance, pt 2
Practical Solutions To Internet Marketing Legal Compliance, pt 2Practical Solutions To Internet Marketing Legal Compliance, pt 2
Practical Solutions To Internet Marketing Legal Compliance, pt 2
 
Group policy
Group policy Group policy
Group policy
 
E-Mail Privacy at Johnson and Dresser (A Case Study)
E-Mail Privacy at Johnson and Dresser (A Case Study)E-Mail Privacy at Johnson and Dresser (A Case Study)
E-Mail Privacy at Johnson and Dresser (A Case Study)
 
spam
spamspam
spam
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
Email Liability
Email LiabilityEmail Liability
Email Liability
 

Similar a 20110512-1 ARMA Boston Email Policy

20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social Media20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social MediaJesse Wilkins
 
Mwlug Compliance And E Discovery Policies
Mwlug   Compliance And E Discovery PoliciesMwlug   Compliance And E Discovery Policies
Mwlug Compliance And E Discovery PoliciesLotusDR
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkitsIT-Toolkits.org
 
PolicyPLUS Webinar - Effective Policy Writing and Management
PolicyPLUS Webinar - Effective Policy Writing and ManagementPolicyPLUS Webinar - Effective Policy Writing and Management
PolicyPLUS Webinar - Effective Policy Writing and ManagementQFHC
 
A software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxA software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxdaniahendric
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
What are policies procedures guidelines standards
What are policies procedures guidelines standardsWhat are policies procedures guidelines standards
What are policies procedures guidelines standardsManish Chaurasia
 
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustVivastream
 
Consensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docxConsensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docxmargaretr5
 
Email policies tools to govern usage, access and etiquette it-toolkits
Email policies  tools to govern usage, access and etiquette   it-toolkitsEmail policies  tools to govern usage, access and etiquette   it-toolkits
Email policies tools to govern usage, access and etiquette it-toolkitsIT-Toolkits.org
 
Harrisburg UniversityISEM 547 IT PolicyOb.docx
Harrisburg UniversityISEM 547  IT PolicyOb.docxHarrisburg UniversityISEM 547  IT PolicyOb.docx
Harrisburg UniversityISEM 547 IT PolicyOb.docxshericehewat
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Establishing Wiki & Blog Governance
Establishing Wiki & Blog GovernanceEstablishing Wiki & Blog Governance
Establishing Wiki & Blog GovernanceJason Stearns
 
Policy Framework
Policy FrameworkPolicy Framework
Policy FrameworkLai En Xin
 
Writing Effective Policies & Procedures
Writing Effective  Policies & ProceduresWriting Effective  Policies & Procedures
Writing Effective Policies & Proceduresnoha1309
 

Similar a 20110512-1 ARMA Boston Email Policy (20)

Ch14 Policies and Legislation
Ch14 Policies and LegislationCh14 Policies and Legislation
Ch14 Policies and Legislation
 
20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social Media20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social Media
 
What is Email Management?
What is Email Management?What is Email Management?
What is Email Management?
 
Mwlug Compliance And E Discovery Policies
Mwlug   Compliance And E Discovery PoliciesMwlug   Compliance And E Discovery Policies
Mwlug Compliance And E Discovery Policies
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkits
 
PolicyPLUS Webinar - Effective Policy Writing and Management
PolicyPLUS Webinar - Effective Policy Writing and ManagementPolicyPLUS Webinar - Effective Policy Writing and Management
PolicyPLUS Webinar - Effective Policy Writing and Management
 
A software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxA software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docx
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Security policies
Security policiesSecurity policies
Security policies
 
What are policies procedures guidelines standards
What are policies procedures guidelines standardsWhat are policies procedures guidelines standards
What are policies procedures guidelines standards
 
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and TrustEmail Marketing Workshop Part 5: Deliverability, Compliance and Trust
Email Marketing Workshop Part 5: Deliverability, Compliance and Trust
 
Consensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docxConsensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docx
 
Email policies tools to govern usage, access and etiquette it-toolkits
Email policies  tools to govern usage, access and etiquette   it-toolkitsEmail policies  tools to govern usage, access and etiquette   it-toolkits
Email policies tools to govern usage, access and etiquette it-toolkits
 
Harrisburg UniversityISEM 547 IT PolicyOb.docx
Harrisburg UniversityISEM 547  IT PolicyOb.docxHarrisburg UniversityISEM 547  IT PolicyOb.docx
Harrisburg UniversityISEM 547 IT PolicyOb.docx
 
How to Write Good Policies
How to Write Good PoliciesHow to Write Good Policies
How to Write Good Policies
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Establishing Wiki & Blog Governance
Establishing Wiki & Blog GovernanceEstablishing Wiki & Blog Governance
Establishing Wiki & Blog Governance
 
Policy Framework
Policy FrameworkPolicy Framework
Policy Framework
 
Writing Effective Policies & Procedures
Writing Effective  Policies & ProceduresWriting Effective  Policies & Procedures
Writing Effective Policies & Procedures
 

Más de Jesse Wilkins

20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...Jesse Wilkins
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...Jesse Wilkins
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptxJesse Wilkins
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....Jesse Wilkins
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptxJesse Wilkins
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
 
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...Jesse Wilkins
 
20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptx20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptxJesse Wilkins
 

Más de Jesse Wilkins (20)

20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
 
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
 
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
 
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
 
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
 
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
 
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
 
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
 
20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx20230719 ARMA Canada Professional Development.pptx
20230719 ARMA Canada Professional Development.pptx
 
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
 
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx20230816 6 Most Common Mistakes in Records Modernization.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
 
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
 
20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx20230117 ARMA MHD Building Your RM Playbook.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
 
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
 
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
 
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
 
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
 
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
 
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...
 
20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptx20230419-1 ARMA Nebraska Harnessing Your Information.pptx
20230419-1 ARMA Nebraska Harnessing Your Information.pptx
 

20110512-1 ARMA Boston Email Policy

  • 1. ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM Managing Your Email Better
  • 2. Developing an email policy Identifying and classifying messages as records Managing the inbox better – by managing less email Better collaboration WITHOUT email Seminar agenda
  • 4. Email policy elements Policy statements The policy development framework Session agenda
  • 6. Every organization’s email policy will be different Public vs. private sector Regulatory requirements, both horizontal and vertical There are some common areas that should be addressed Lots of references andexamples available Email policy elements
  • 7. Purpose Scope Responsibilities Definitions Policy statements References Policy elements
  • 8. This policy has three purposes: Establish definitions relevant to the email management program Describe usage policies relating to email Describe security and technology policies relating to email Scope: This policy is applicable to the entire enterprise. Purpose and scope
  • 9. Responsibilities for policy development and maintenance Responsibilities for policy administration Responsibilities for compliance with policy Responsibilities
  • 10. Uncommon terms Common terms used in an uncommon fashion Acronyms and abbreviations Definitions
  • 11. Many different elements available Detailed in the next section Policy statements
  • 12. List any references used to develop the policy Internal strategic documents Records program governance instruments Statutes and regulations Publications Examples and templates References
  • 13. Detailed instructions for complying with policies Often separate document(s) Each of the policy statements will have one or more procedures May be specific to process, business unit, jurisdiction, and/or application Procedures
  • 15. Most common element of email policies today Typically addresses things NOT to do: Obscene language or sexual content Jokes, chain letters, business solicitation Racial, ethnic, religious, or other slurs May address signature blocks Standardization, URLs, pictures Acceptable usage
  • 16. Guidance on writing emails Wording and punctuation Spell check and grammar check Effective subject lines Guidance on email etiquette Guidance on addressees Effective usage
  • 17. Whether personal usage is allowed Any limitations to personal usage Separation of personal and business usage within individual messages Personal email account access Personal usage
  • 18. Whether email is considered to be owned by the organization Responsibility for stewardship of messages, both sent and received Privacy and monitoring Third-party access Ownership and stewardship
  • 19. Email is a medium, not a record type or series Email messages can be records Other information objects that might need to be treated as records Read receipts Bounced messages Retention and disposition
  • 20. Email can be subject to discovery Assigns responsibility for communicating legal holds Describes whether or not email disclaimers will be used and how May outline privilege issues Legal issues
  • 21. Outlines whether encryption is allowed What approaches to use Whether digital signatures are allowed What approaches to use Encryption and digital signatures
  • 22. Most often found as part of general policies for remote workers Requirements for mobile devices Requirements for web-based access Synchronization and login requirements Mobile and remote email
  • 23. Addresses whether email will be archived Addresses whether personal archives will be allowed May address backups – but backups are not archives May also address public or managed folders Archival
  • 24. Attachment limitations Whether they can be sent at all Size limitations Content type limitations Attachments vs. links Content filtering Encryption and DRM Security
  • 26. Approach to developing and implementing a policy Ensures that policy development is consistent with organizational goals Ensures that policy meets legal and regulatory requirements The policy framework
  • 27. Policy development requires time and energy from users and stakeholders So does policy implementation Ongoing compliance will require auditing and communication None of this happens without management support 1. Get management support
  • 28. Policy should address the entire enterprise Stakeholders should include: Business unit managers End users Legal, RM, IT External customers and partners 2. Identify stakeholders
  • 29. What changes are being introduced? Processes, technologies What are the desired outcomes? What behavioral changes should result? 3. Identify the goals of the policy
  • 30. Legal research Organizational research Public research Standards and guidelines Benchmarking Consult with similarorganizations Analyze the results 4. Conduct the research
  • 31. Collaborative and iterative process There are a number of resources available to provide an email policy framework These are starting points and need to be customized for your requirements 5. Draft the policy
  • 32. Review by legal, HR, users Ensures it is valid Ensures it will work within existing organizational culture Change management 6. Review the policy
  • 33. Policy is reviewed by business managers, senior management Complete revisions as necessary Approve the policy 7. Approve the policy
  • 34. Communication Training Auditing 8. Implement the policy
  • 35. Monitor for compliance with policy Solicit feedback about policy Provide refresher training as required Consider whether to retain previous versions of the policy Plan for periodic review and maintenance 9. Once the policy is live

Notas del editor

  1. At this point I’d be pleased to entertain your questions.