Migrated from eDJGroupInc.com. Author: Greg Buckles. Published: 2010-05-25 08:51:20
Email became the defacto corporate communication stream without real policy or structure. The introduction of Blackberry phones enabled continuous, stream of consciousness connectivity. Employees assumed that they could use it for personal discussions as long as they deleted the jokes and other off-color emails. But we all know that user deletion is a myth at best without the kind of comprehensive enterprise software that has only recently hit the market. Many corporate IT admins and record managers assume that users are complying with ‘policy’ until we run the eDiscovery fire drill and find all the hoarders and impromptu, abandoned departmental shares.Any Biglaw associate or contract attorney knows about all the crazy email found during a major review, but most fall under the “don’t ask, don’t tell” rule unless the communications are blatantly criminal. Now that live review software is reaching corporate counsel inside the firewall, more are running their own investigations and many are horrified at what they find. While training on new enterprise systems, I have had counsel say, “Go back to that email. Can you forward that to me?” No one wants to acknowledge the problem until it stares you in the face in front of your peers.The good news is that the employees can and will change their habits when they see a couple bad apples get the axe for particularly blatant or obscene violations. The corporate grapevine works fast, especially when backed up with a new training program and awareness campaign. You want to foster a workplace environment that encourages collaboration and good communication within a clear usage policy framework. A ‘big brother’ atmosphere can poison your workforce and pressure employees into underground communication streams. Outside of regulated companies, I recommend ‘trust but verify’ practices that make it clear that the company does not indiscriminately review without cause. This only works when supported by automated search, filter or categorization systems that will flag suspect communications. Everyone understands why HR would want to review email containing obscene words, images or directly to competitor’s domains.While taming your own ‘wild west’ of historical email, you should be prepared to escalate problem emails with an official remediation plan that includes chain of custody, action thresholds and policy feedback mechanisms. When you find a problem, you want to be able to demonstrate that you resolved the individual violator fairly and then made reasonable effort to ensure that the issue would not reoccur. If you find a particularly ugly attachment, you will need to run an enterprise search to find out who else has copies and get them out of your system. Then you will want some kind of corporate policy blast to remind everyone else of the acceptable usage policy.So before you embark on your first big in-house review of raw email, think about these scenarios:• Obscenity and sexual contento Child pornography – CALL THE POLICE IMMEDIATELY (do not compromise evidence)o Workplace affairso Photo sharing networks – yes, they are that blatant• White Collar Crimeo Price fixingo Deceptive trade practiceso Bribeso Industrial Espionage – stealing trade secrets, IP theft• Business Ethicso Lyingo Kickbacks, bid rigging and purchasing violationso Time/billing issues – yes, they do brag about falsified overtime• HR conducto Harassment – sexual, racial, age, etco Political/Religious Activism in the workplaceo Information access – salary, passwords, hacking the bosses emailo Outside jobs, including actively marketing within the companyo Gamblingo Inappropriate humorThese should give you some things to think about as you get access and control over your communication flood. Just face the fact that any sufficiently large collection will contain unprofessional content. Focused relevance criteria will reduce your exposure during review, but you should still be sampling the excluded email. It is better to have an escalation workflow set up and deal proactively with these kinds of things. We are Litsupport and we do read your email. We just wish that you would stop sending things like that. Please.