Although data privacy and identity theft have a higher profile in the minds of consumers, data retention issues can have a far greater financial impact on businesses. Every company, whether public or private, large or small, must have a policy and enforcement system to deal with the messages and files generated by the organization every day.

This white paper discusses the various reasons to archive email and other electronic content. However, it goes beyond that to provide some concrete reasons and justification for deploying and maintaining an archiving system, most of which are based on the cost savings that archiving can provide - both direct cost savings and reduced costs arising from lowered risk.

Social networks, blogs, and Twitter might be getting all the press these days, but email remains the most important communications channel for business. Email even surpasses the telephone in frequency of use, according to a 2009 study by Osterman Research.

Organizations today are finding themselves under increasing pressure, both legal and regulatory, to properly retain or delete documents. While policies and procedures for paper records may seem adequate, many companies find it difficult to translate those policies and requirements to electronically stored information (ESI) such as e-mail messages and electronic document files.


Today, almost anything across an enterprise's systems can be made digitally aware and interconnected. And given the business challenges of a smaller, flatter and more complex world, rethinking what information we store and how our information infrastructures work is a must.

The implementation of an information strategy is critical to your organization's business success and key to sustaining your competitive advantage. IBM's Information Agenda has been specifically designed to help. Philip Howard of Bloor Research has helpful insights on getting started.

Once an organization has become litigation ready by creating an ESI survey data map,implementing a records retention and deletion process, and establishing a litigation hold process, additional steps can be taken to further prepare for legal actions.

How concerned are companies about the content of email leaving their organizations? And how do companies manage the legal and financial risks associated with outbound email? To find out, Proofpoint and Osterman Research conducted an online survey of technology decision makers at 220 large US companies during June 2009.

This demo explores the Information on Demand strategy and discusses the 5 entry points to IOD - manage data over its lifetime, optimize content based operational and compliance processes, establish govern and deliver trusted information, optimize business performance, and the Information Agenda.

Litigation always, has been, and will continue to be, a reality of doing business. What is changing, however, is discovery and its focus on electronically stored information (often abbreviated ESI).

- An Osterman Research white paper, sponsored by MX Logic

Security costs are large & growing, with technical countermeasures dominated by on-premise licensed solutions. Companies wrestling with providing stronger security and meeting compliance requirements are seeking more efficient ways to provide security.

tmAddressing Compliance Requirements for Privacy, Data Retention, and e-Discovery
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries.

As email has become more critical in the business world, many companies are weighing the question of how long it should be retained, what should be done with it, and when it should be deleted. The answer depends on many issues, particularly when one considers the varying regulations and business situations that might demand emails to be archived for long periods of time.

Log in

Please Login to download this file

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Go to top