Messaging Pipeline | Blog
Free Newsletter GlossaryContact UsAbout Us
One To One Collaboration Servers & Security Business
March 08, 2006
More E-mail Management Tips

You can't have message management without messaging policies and you can't have policies until managers can decide and agree on what they should be. recently published a list of some of the key decisions in implementing messaging a document archiving projects.

The first thing on the list should be rather obvious, but determining who has responsibility for archiving can set the tone for the whole project. Raise your hand IT department because it can't be left up to users. Users will apply their own logic to the problem or just assume that someone else is doing it behind the scenes. And who else can build a policy-driven automated archiving system that makes you users' assumption valid?

The next tip from Ferris: make sure your mobile users are kept in the archiving loop. Not only do you need to make sure the documents housed on mobile devices get properly archived, those road warriors also need access to their archived messages. Ferris recommends they access their repositories in an offline state. That means you need to make it easy to sync with the archive when they connect to the network.

The next decision will cut across many functional boundaries and bring the legal and compliance folks to the table in a big way: deciding what types of documents need to be archived. This decision can cause so much internal debate that organizations end up throwing in the towel and instituting an archive-everything policy. There's not much to offer in the way of advice here because every organization has its unique requirements and obligations. Archiving everything might remove the debate but leave a mess on the back end when documents need to be discovered and produced. There are no standards to rely on here so if you opt for an archiving system with its own policy engine, do plenty of testing before you deploy to make sure it is archiving what you tell it to archive. For now, err on the side of caution.

. . . Full Story: "More E-mail Management Tips"

Posted by Mitch Irsfeld at 02:13 PM | Permalink


March 2006
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  

Monthly Archives

Messaging Pipeline

Get the latest Messaging news, product info, and trends every week.

  Get The Messaging Pipeline Blog RSS Feed

Editorial and vendor perspectives


Editor's Picks
The Six Flavors Of Windows Vista
Microsoft plans to release a full six-pack of Vista versions, one for every taste. Which Vista will be right for you?

Hope is Not Enough When It Comes To Compliance

Three Ways To Authenticate E-Mail And Stop Spam

Wikis In The Workplace

Review: Google Desktop 3

Digital Warehouse buys, sells, & rents used Cisco networking hardware such as routers & switches, as well as Juniper, Extreme & Foundry at 50-80% off list price. One year warrantee and fast delivery.

Stop spam on your terms with CanIt-PRO, the most flexible and customizable anti-spam solution available for the mail server. Offers per-user or per-group controls and is available as software or hardware appliance.

Use your Intranet to manage Software Licenses, plan for Windows XP/2000 upgrades, do Security Audits and more. Click to try and ask for our white paper - PC Management for the Internet Age.

Analysts at the Tolly Group put a leading Branch Office IT services solution to the test, measuring performance, security and data reliability. Download the results, detailed in this free report, now.

Whether you need temporary or permanent access to remote PCs, LogMeIn has your solution: LogMeIn IT Reach for automatic maintenance of remote and mobile systems, and LogMeIn Rescue for instant, web-based remote access without pre-installing software.

Sponsored Links:      
 |   |   |   |   |   | 
 |   |   |   | 
 |   |   |   |   | 
Messaging Pipeline  |   |   |   | 
 |   |   |   |   | 
© 2006 | MESSAGING PIPELINE All rights reserved. | |