SlideShare a Scribd company logo
Email retention regulations in India, how to ensure business
compliance and cut costs with cloud email archiving
SAKET AGRAWAL
Account Manager - Enterprise Solutions
Mithi Software Technologies.
FEB 27 2019
3:00PM - 3:30PM IST
In this webinar we shall highlight the
various regulations in India that require
long term retention of email data
In addition,
we shall address the
benefits of setting
a sound retention
policy in order to
protect email data
POLL
Does your organisation need to comply with any email
retention regulations?
Yes
No
Unsure
So what is email retention?
Email retention involves
Email retention involves
the storing of historical email
in a logical manner
Email retention involves
the storing of historical email
in a logical manner
for a specified period of time,
with on-demand retrieval
& recovery.
An email Retention Policy
defines aspects such as
employee email storage,
usage, retrieval of
ex-employee email data
& deletion of the same.
Let's have a look at some
Indian Regulations
requiring such retention
#1 SEBI
Securities and Exchange Board of India
SEBI regulations mandate the systematic categorization, review,
and retention of all important business documents for 5 years in
company systems, and thereafter archiving it for another 3 years.
These regulations are applicable to banks, nbfcs, trading
companies, and financial organizations in India.
#2 IT ACT 2000/8
This act with a further amendment in 2008 states that the use of
electronic records including email as evidence is permitted
under the Indian Evidence Act, 1872, the Civil Procedure Code
and the Criminal Procedure Code.
This is a generic law applicable to all organisations with an IT
infrastructure.
#3 IRDAI
Insurance regulatory and Development authority of India
As per the guideline of information and cyber security for
insurers, electronic maintenance of core business records
shall be hosted within India, with the data retention and
destruction schedules to be defined by the organization.
The company should audit this practice, wherever applicable.
#4 GDPR
General Data Protection Regulation
Established on May 25, 2018, this regulation requires that the data
should be processed and controlled only with the consent of the data
subjects. It also requires that the data should be deleted securely once
its life has maxed out.
Emails often contain personal data – and that means organizations must
manage backup and archived copies of the emails very meticulously.
#5 (Draft) DATA PROTECTION BILL, 2018
This bill mandates that any entity processing personal
data shall ensure the storage, on a server or data centre
located in India.
The Central Government shall notify categories of
personal data as critical personal data.
#6 HIPAA | HITECH
Health Insurance Portability and Accountability Act
This act sets out guidelines for protecting patients’ personal health
information as it is used, stored & shared. With the rise of email as a primary
communication medium in the healthcare industry, HIPAA requirements for
email stipulate that protected information must be encrypted.
The retention period of medical records depends on the medical laws in a
particular U.S state. Business Associates must comply with those guidelines
as well.
#7 MHRA UK
Medicines and Healthcare products Regulatory Agency
Under this law, organisations are required to maintain the
collection of essential documents that facilitates the conduct
and management of the clinical trial.
The regulation does not differentiate between paper and
electronic records. This law regulates medicines, medical
devices and blood components for transfusion in the UK
So a common thread with all these laws is a
mandate to maintain electronic records of
communication, critical transactions and
operations for an extended period of time.
The same to be discoverable and
recoverable on demand.
POLL
Which of these regulations apply to your company?
SEBI
IT ACT 2000/8
IRDAI
GDPR
HIPAA/HITECH
Besides compliances
here are some Other
Benefits Of Setting
An Email Retention
Policy
INTELLECTUAL PROPERTY RIGHTS PROTECTION
Email retention can protect valuable
insights into finances, business plans and
product details from being stolen, in case
of email server hacks.
A tamper proof cloud archiving solution
can help achieve just that!
PROTECTION AGAINST CYBER THREATS
In case a cyber attack wipes out your PC,
a retention policy can help safely recover
your mail as it systematically maintains all
the emails on a cloud archiving system as
a backup.
LITIGATION AND EDISCOVERY SUPPORT
In case of a lawsuit, email retention
can help lawyers quickly retrieve old
mails in an organised manner using
eDiscovery.
INTERNAL DISPUTE SETTLEMENTS
Disputes are opportunities
In case of disputes like stakeholder
mapping, project management and
delivery…
…archived emails can help in
reviewing the commitments and
conversations to discover the truth
and improve efficiencies
ORGANIZATIONAL COMPETENCE
Organizational Competence is built over
discussions, information & plans spanning long
periods of time requiring huge efforts.
Much of this is captured in the daily exchange
of email.
Email retention ensures that the entire
knowledge repository is secure and easily
accessible.
We can therefore see that apart from
archiving emails to remain compliant
with regulations, a retention policy can
also benefit an organisation through
numerous other ways.
ABOUT VAULTASTIC
Rapid Adoption of the cloud based services
• Vaultastic storage grows at 3GB/sec.
• Mithi cloud transacts 2 million +mails daily
• Currently managing over 25TB of archived email.
( All these emails are indexed, online & search ready. )
• Receive index & store about 400,000 mails a day
Vaultastic Customer
Partners
Awards & Recognitions
Certifications, Compliances & Credentials
UNLIMITED Q & A
Alright, Lets talk until you run out
of questions...SHOOT !
for attending this webinar
Drop in your queries at
sales@vaultastic.com
For more info contact
www.vaultastic.com

More Related Content

What's hot

Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructure
David Sweigert
 
KVKK Genel sunum - Kişisel Veriler
KVKK Genel sunum - Kişisel VerilerKVKK Genel sunum - Kişisel Veriler
KVKK Genel sunum - Kişisel Veriler
Ömer Özer
 
Privacidade By Design
Privacidade By DesignPrivacidade By Design
Privacidade By Design
Douglas Siviotti
 
Records Retention And Destruction Policies
Records Retention And Destruction PoliciesRecords Retention And Destruction Policies
Records Retention And Destruction Policies
Richard Austin
 
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeBuilding an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
TrustArc
 
Pārdomas par daudzdzīvokļu dzīvojamo ēku ekspluatācijas uzraudzību
Pārdomas par daudzdzīvokļu dzīvojamo ēku ekspluatācijas uzraudzībuPārdomas par daudzdzīvokļu dzīvojamo ēku ekspluatācijas uzraudzību
Pārdomas par daudzdzīvokļu dzīvojamo ēku ekspluatācijas uzraudzību
Ekonomikas ministrija/ Dzīvo siltāk
 
ISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of Privacy
ControlCase
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
Samrat Das
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
Craig Willetts ISO Expert
 
Kā nodibināt biedrību?
Kā nodibināt biedrību?Kā nodibināt biedrību?
Kā nodibināt biedrību?
Ekonomikas ministrija/ Dzīvo siltāk
 
LGPD Privacy by Design 30nov2022.pdf
LGPD Privacy by Design 30nov2022.pdfLGPD Privacy by Design 30nov2022.pdf
LGPD Privacy by Design 30nov2022.pdf
Fernando Nery
 
CIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdfCIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdf
LBagger1
 
The Data Unicorns
The Data UnicornsThe Data Unicorns
The Data Unicorns
Einat Shimoni
 
RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
Network Intelligence India
 
Daudzdzīvokļu dzīvojamo ēku īpašnieku tiesības un pienākumi siltumapgādes sis...
Daudzdzīvokļu dzīvojamo ēku īpašnieku tiesības un pienākumi siltumapgādes sis...Daudzdzīvokļu dzīvojamo ēku īpašnieku tiesības un pienākumi siltumapgādes sis...
Daudzdzīvokļu dzīvojamo ēku īpašnieku tiesības un pienākumi siltumapgādes sis...
Ekonomikas ministrija/ Dzīvo siltāk
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
Ashita Mehra
 
Zero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdfZero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdf
openfind
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
Kal BO
 
ISO 27001:2013 project master plan
ISO 27001:2013 project master planISO 27001:2013 project master plan
ISO 27001:2013 project master plan
club27001
 

What's hot (20)

Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructure
 
KVKK Genel sunum - Kişisel Veriler
KVKK Genel sunum - Kişisel VerilerKVKK Genel sunum - Kişisel Veriler
KVKK Genel sunum - Kişisel Veriler
 
Privacidade By Design
Privacidade By DesignPrivacidade By Design
Privacidade By Design
 
Records Retention And Destruction Policies
Records Retention And Destruction PoliciesRecords Retention And Destruction Policies
Records Retention And Destruction Policies
 
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeBuilding an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
 
Pārdomas par daudzdzīvokļu dzīvojamo ēku ekspluatācijas uzraudzību
Pārdomas par daudzdzīvokļu dzīvojamo ēku ekspluatācijas uzraudzībuPārdomas par daudzdzīvokļu dzīvojamo ēku ekspluatācijas uzraudzību
Pārdomas par daudzdzīvokļu dzīvojamo ēku ekspluatācijas uzraudzību
 
ISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of Privacy
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
 
Kā nodibināt biedrību?
Kā nodibināt biedrību?Kā nodibināt biedrību?
Kā nodibināt biedrību?
 
LGPD Privacy by Design 30nov2022.pdf
LGPD Privacy by Design 30nov2022.pdfLGPD Privacy by Design 30nov2022.pdf
LGPD Privacy by Design 30nov2022.pdf
 
CIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdfCIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdf
 
The Data Unicorns
The Data UnicornsThe Data Unicorns
The Data Unicorns
 
RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
 
Daudzdzīvokļu dzīvojamo ēku īpašnieku tiesības un pienākumi siltumapgādes sis...
Daudzdzīvokļu dzīvojamo ēku īpašnieku tiesības un pienākumi siltumapgādes sis...Daudzdzīvokļu dzīvojamo ēku īpašnieku tiesības un pienākumi siltumapgādes sis...
Daudzdzīvokļu dzīvojamo ēku īpašnieku tiesības un pienākumi siltumapgādes sis...
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
 
Zero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdfZero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdf
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
ISO 27001:2013 project master plan
ISO 27001:2013 project master planISO 27001:2013 project master plan
ISO 27001:2013 project master plan
 

Similar to Comply with Email retention regulations in India and cut costs using cloud email archiving

Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...
Vaultastic
 
Why Organizations Need to Archive Email
Why Organizations Need to Archive EmailWhy Organizations Need to Archive Email
Why Organizations Need to Archive Email
GFI Software
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
Bill Lisse
 
Mailstore advisory GDPR
Mailstore advisory GDPRMailstore advisory GDPR
Mailstore advisory GDPR
Balázs Antók
 
Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrmcinderella1961
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
CIOWomenMagazine
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
arnoldmeredith47041
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Osterman Research, Inc.
 
WhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA ComplianceWhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA Compliance
Succor Consulting Group, Inc.
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Delphix
 
ITS 833 – INFORMATION GOVERNANCEChapter 9IG AND RECORDS AN.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9IG AND RECORDS AN.docxITS 833 – INFORMATION GOVERNANCEChapter 9IG AND RECORDS AN.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9IG AND RECORDS AN.docx
vrickens
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
Cathy Gilmartin
 
GDPR Compliance
GDPR ComplianceGDPR Compliance
GDPR Compliance
Miguel Mello
 
Accounting Information Systems Australasian 1st Edition Romney Solutions Manual
Accounting Information Systems Australasian 1st Edition Romney Solutions ManualAccounting Information Systems Australasian 1st Edition Romney Solutions Manual
Accounting Information Systems Australasian 1st Edition Romney Solutions Manual
xexunidop
 
Consensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docxConsensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docx
bobbywlane695641
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkits
IT-Toolkits.org
 
What does GDPR laws mean for Australian businesses
What does GDPR laws mean for Australian businessesWhat does GDPR laws mean for Australian businesses
What does GDPR laws mean for Australian businesses
iFactory Digital
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Qualsys Ltd
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Management
bdirking
 
Documents, documents and more documents - is it time to spring clean? - Ahmor...
Documents, documents and more documents - is it time to spring clean? - Ahmor...Documents, documents and more documents - is it time to spring clean? - Ahmor...
Documents, documents and more documents - is it time to spring clean? - Ahmor...Werksmans Attorneys
 

Similar to Comply with Email retention regulations in India and cut costs using cloud email archiving (20)

Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...
 
Why Organizations Need to Archive Email
Why Organizations Need to Archive EmailWhy Organizations Need to Archive Email
Why Organizations Need to Archive Email
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
Mailstore advisory GDPR
Mailstore advisory GDPRMailstore advisory GDPR
Mailstore advisory GDPR
 
Records retention shrm
Records retention shrmRecords retention shrm
Records retention shrm
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
 
WhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA ComplianceWhitePaper- Archiving Supports HIPAA Compliance
WhitePaper- Archiving Supports HIPAA Compliance
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
 
ITS 833 – INFORMATION GOVERNANCEChapter 9IG AND RECORDS AN.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9IG AND RECORDS AN.docxITS 833 – INFORMATION GOVERNANCEChapter 9IG AND RECORDS AN.docx
ITS 833 – INFORMATION GOVERNANCEChapter 9IG AND RECORDS AN.docx
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
 
GDPR Compliance
GDPR ComplianceGDPR Compliance
GDPR Compliance
 
Accounting Information Systems Australasian 1st Edition Romney Solutions Manual
Accounting Information Systems Australasian 1st Edition Romney Solutions ManualAccounting Information Systems Australasian 1st Edition Romney Solutions Manual
Accounting Information Systems Australasian 1st Edition Romney Solutions Manual
 
Consensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docxConsensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docx
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkits
 
What does GDPR laws mean for Australian businesses
What does GDPR laws mean for Australian businessesWhat does GDPR laws mean for Australian businesses
What does GDPR laws mean for Australian businesses
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Management
 
Documents, documents and more documents - is it time to spring clean? - Ahmor...
Documents, documents and more documents - is it time to spring clean? - Ahmor...Documents, documents and more documents - is it time to spring clean? - Ahmor...
Documents, documents and more documents - is it time to spring clean? - Ahmor...
 

More from Vaultastic

Webinar mccia sm_bs_ how cloud backup can help you reduce risks and gain...
Webinar   mccia   sm_bs_ how cloud backup can help you reduce  risks and gain...Webinar   mccia   sm_bs_ how cloud backup can help you reduce  risks and gain...
Webinar mccia sm_bs_ how cloud backup can help you reduce risks and gain...
Vaultastic
 
3 simple strategies to preserve and manage unstructured data of former emplo...
3 simple strategies to preserve and manage unstructured  data of former emplo...3 simple strategies to preserve and manage unstructured  data of former emplo...
3 simple strategies to preserve and manage unstructured data of former emplo...
Vaultastic
 
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Vaultastic
 
5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one
Vaultastic
 
Webinar: Keep legacy email data safe and search ready with zero hardware
Webinar: Keep legacy email data safe and search ready with zero hardwareWebinar: Keep legacy email data safe and search ready with zero hardware
Webinar: Keep legacy email data safe and search ready with zero hardware
Vaultastic
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management
Vaultastic
 
Webinar: Worried about privacy of your data on public cloud - Bring your own key
Webinar: Worried about privacy of your data on public cloud - Bring your own keyWebinar: Worried about privacy of your data on public cloud - Bring your own key
Webinar: Worried about privacy of your data on public cloud - Bring your own key
Vaultastic
 
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Vaultastic
 
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
Vaultastic
 
Mastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data ManagementMastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data Management
Vaultastic
 
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
Vaultastic
 
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
Vaultastic
 
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
Vaultastic
 
AWS - Why cloud is the best platform for securely managing large data
AWS - Why cloud is the best platform for securely managing large dataAWS - Why cloud is the best platform for securely managing large data
AWS - Why cloud is the best platform for securely managing large data
Vaultastic
 
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
Vaultastic
 
Case Study: T and T Motor's Success Story With Vaultastic
Case Study: T and T Motor's Success Story With VaultasticCase Study: T and T Motor's Success Story With Vaultastic
Case Study: T and T Motor's Success Story With Vaultastic
Vaultastic
 
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
Vaultastic
 
Case Study: Cashpor Micro Credit's Success Story with Vaultastic
Case Study: Cashpor Micro Credit's Success Story with Vaultastic Case Study: Cashpor Micro Credit's Success Story with Vaultastic
Case Study: Cashpor Micro Credit's Success Story with Vaultastic
Vaultastic
 
Featured Webinar: How Cashpor increased their mail service performance by ado...
Featured Webinar: How Cashpor increased their mail service performance by ado...Featured Webinar: How Cashpor increased their mail service performance by ado...
Featured Webinar: How Cashpor increased their mail service performance by ado...
Vaultastic
 
Cashpor Micro Credit - Increasing mail service performance with cloud email a...
Cashpor Micro Credit - Increasing mail service performance with cloud email a...Cashpor Micro Credit - Increasing mail service performance with cloud email a...
Cashpor Micro Credit - Increasing mail service performance with cloud email a...
Vaultastic
 

More from Vaultastic (20)

Webinar mccia sm_bs_ how cloud backup can help you reduce risks and gain...
Webinar   mccia   sm_bs_ how cloud backup can help you reduce  risks and gain...Webinar   mccia   sm_bs_ how cloud backup can help you reduce  risks and gain...
Webinar mccia sm_bs_ how cloud backup can help you reduce risks and gain...
 
3 simple strategies to preserve and manage unstructured data of former emplo...
3 simple strategies to preserve and manage unstructured  data of former emplo...3 simple strategies to preserve and manage unstructured  data of former emplo...
3 simple strategies to preserve and manage unstructured data of former emplo...
 
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
 
5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one
 
Webinar: Keep legacy email data safe and search ready with zero hardware
Webinar: Keep legacy email data safe and search ready with zero hardwareWebinar: Keep legacy email data safe and search ready with zero hardware
Webinar: Keep legacy email data safe and search ready with zero hardware
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management
 
Webinar: Worried about privacy of your data on public cloud - Bring your own key
Webinar: Worried about privacy of your data on public cloud - Bring your own keyWebinar: Worried about privacy of your data on public cloud - Bring your own key
Webinar: Worried about privacy of your data on public cloud - Bring your own key
 
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
 
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
 
Mastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data ManagementMastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data Management
 
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
 
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
 
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
 
AWS - Why cloud is the best platform for securely managing large data
AWS - Why cloud is the best platform for securely managing large dataAWS - Why cloud is the best platform for securely managing large data
AWS - Why cloud is the best platform for securely managing large data
 
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
 
Case Study: T and T Motor's Success Story With Vaultastic
Case Study: T and T Motor's Success Story With VaultasticCase Study: T and T Motor's Success Story With Vaultastic
Case Study: T and T Motor's Success Story With Vaultastic
 
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
 
Case Study: Cashpor Micro Credit's Success Story with Vaultastic
Case Study: Cashpor Micro Credit's Success Story with Vaultastic Case Study: Cashpor Micro Credit's Success Story with Vaultastic
Case Study: Cashpor Micro Credit's Success Story with Vaultastic
 
Featured Webinar: How Cashpor increased their mail service performance by ado...
Featured Webinar: How Cashpor increased their mail service performance by ado...Featured Webinar: How Cashpor increased their mail service performance by ado...
Featured Webinar: How Cashpor increased their mail service performance by ado...
 
Cashpor Micro Credit - Increasing mail service performance with cloud email a...
Cashpor Micro Credit - Increasing mail service performance with cloud email a...Cashpor Micro Credit - Increasing mail service performance with cloud email a...
Cashpor Micro Credit - Increasing mail service performance with cloud email a...
 

Recently uploaded

Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 

Recently uploaded (20)

Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 

Comply with Email retention regulations in India and cut costs using cloud email archiving

  • 1. Email retention regulations in India, how to ensure business compliance and cut costs with cloud email archiving SAKET AGRAWAL Account Manager - Enterprise Solutions Mithi Software Technologies. FEB 27 2019 3:00PM - 3:30PM IST
  • 2. In this webinar we shall highlight the various regulations in India that require long term retention of email data
  • 3. In addition, we shall address the benefits of setting a sound retention policy in order to protect email data
  • 4. POLL Does your organisation need to comply with any email retention regulations? Yes No Unsure
  • 5. So what is email retention?
  • 7. Email retention involves the storing of historical email in a logical manner
  • 8. Email retention involves the storing of historical email in a logical manner for a specified period of time, with on-demand retrieval & recovery.
  • 9. An email Retention Policy defines aspects such as employee email storage, usage, retrieval of ex-employee email data & deletion of the same.
  • 10. Let's have a look at some Indian Regulations requiring such retention
  • 11. #1 SEBI Securities and Exchange Board of India SEBI regulations mandate the systematic categorization, review, and retention of all important business documents for 5 years in company systems, and thereafter archiving it for another 3 years. These regulations are applicable to banks, nbfcs, trading companies, and financial organizations in India.
  • 12. #2 IT ACT 2000/8 This act with a further amendment in 2008 states that the use of electronic records including email as evidence is permitted under the Indian Evidence Act, 1872, the Civil Procedure Code and the Criminal Procedure Code. This is a generic law applicable to all organisations with an IT infrastructure.
  • 13. #3 IRDAI Insurance regulatory and Development authority of India As per the guideline of information and cyber security for insurers, electronic maintenance of core business records shall be hosted within India, with the data retention and destruction schedules to be defined by the organization. The company should audit this practice, wherever applicable.
  • 14. #4 GDPR General Data Protection Regulation Established on May 25, 2018, this regulation requires that the data should be processed and controlled only with the consent of the data subjects. It also requires that the data should be deleted securely once its life has maxed out. Emails often contain personal data – and that means organizations must manage backup and archived copies of the emails very meticulously.
  • 15. #5 (Draft) DATA PROTECTION BILL, 2018 This bill mandates that any entity processing personal data shall ensure the storage, on a server or data centre located in India. The Central Government shall notify categories of personal data as critical personal data.
  • 16. #6 HIPAA | HITECH Health Insurance Portability and Accountability Act This act sets out guidelines for protecting patients’ personal health information as it is used, stored & shared. With the rise of email as a primary communication medium in the healthcare industry, HIPAA requirements for email stipulate that protected information must be encrypted. The retention period of medical records depends on the medical laws in a particular U.S state. Business Associates must comply with those guidelines as well.
  • 17. #7 MHRA UK Medicines and Healthcare products Regulatory Agency Under this law, organisations are required to maintain the collection of essential documents that facilitates the conduct and management of the clinical trial. The regulation does not differentiate between paper and electronic records. This law regulates medicines, medical devices and blood components for transfusion in the UK
  • 18. So a common thread with all these laws is a mandate to maintain electronic records of communication, critical transactions and operations for an extended period of time. The same to be discoverable and recoverable on demand.
  • 19. POLL Which of these regulations apply to your company? SEBI IT ACT 2000/8 IRDAI GDPR HIPAA/HITECH
  • 20. Besides compliances here are some Other Benefits Of Setting An Email Retention Policy
  • 21. INTELLECTUAL PROPERTY RIGHTS PROTECTION Email retention can protect valuable insights into finances, business plans and product details from being stolen, in case of email server hacks. A tamper proof cloud archiving solution can help achieve just that!
  • 22. PROTECTION AGAINST CYBER THREATS In case a cyber attack wipes out your PC, a retention policy can help safely recover your mail as it systematically maintains all the emails on a cloud archiving system as a backup.
  • 23. LITIGATION AND EDISCOVERY SUPPORT In case of a lawsuit, email retention can help lawyers quickly retrieve old mails in an organised manner using eDiscovery.
  • 24. INTERNAL DISPUTE SETTLEMENTS Disputes are opportunities In case of disputes like stakeholder mapping, project management and delivery… …archived emails can help in reviewing the commitments and conversations to discover the truth and improve efficiencies
  • 25. ORGANIZATIONAL COMPETENCE Organizational Competence is built over discussions, information & plans spanning long periods of time requiring huge efforts. Much of this is captured in the daily exchange of email. Email retention ensures that the entire knowledge repository is secure and easily accessible.
  • 26. We can therefore see that apart from archiving emails to remain compliant with regulations, a retention policy can also benefit an organisation through numerous other ways.
  • 27. ABOUT VAULTASTIC Rapid Adoption of the cloud based services • Vaultastic storage grows at 3GB/sec. • Mithi cloud transacts 2 million +mails daily • Currently managing over 25TB of archived email. ( All these emails are indexed, online & search ready. ) • Receive index & store about 400,000 mails a day
  • 32. UNLIMITED Q & A Alright, Lets talk until you run out of questions...SHOOT !
  • 33. for attending this webinar Drop in your queries at sales@vaultastic.com For more info contact www.vaultastic.com