SlideShare a Scribd company logo
Email Classification -
Why Should It Matter to You?
A Best Practice White Paper
Written by Grant Lindsay,
Product Manager, Sherpa Software




 456 Washington Avenue, Suite 2 
 Bridgeville, PA 15017 
 www.SherpaSoftware.com  
 information@sherpasoftware.com  
Email Classification – Why Should It Matter
to You?


INTRODUCTION
What is email classification you ask? And should it be on your radar? For this discussion, let's define email
classification as the process of tagging email messages with labels to assist in managing those messages as they
either move through or rest in the email environment. For example, a message might be classified as “privileged,”
“confidential,” “secret,” “private,” or “business relevant.” A message with a “business relevant” classification may be
retained for three years, whereas a message classified as “personal” may be purged after thirty days. A message
marked “secret” may be restricted from leaving the organization’s email environment unless it is encrypted.

The reasons for classifying email vary, but may include: grouping like messages together for electronic discovery
[e-discovery], applying security and access control to messages of a certain type, and managing the life-span of
messages, based on their relevancy to the business or to regulations.

                                                                          1
Email classification like this can aid the e-discovery process because searches can be targeted to only the
messages classified “business relevant” or “privileged” and leave out other messages not pertinent to the search,
which can greatly reduce the search run-time. In other cases, message classifications may be hierarchical or
relevant to only some people in the organization.

Classifying or tagging emails can be done through several methods. The process of applying these tags (i.e.,
classifying) may be either:


                 ▪       Manual: The message custodian, a human, applies the classification when the message is either
                         created or received
                 ▪       Automatic: A computer applies the classification, based on rules or contextual analysis
                 ▪       Hybrid: Combining both manual and automatic methods.



IS THERE A NEED FOR CLASSIFICATION?
At a high level, the purposes for classifying unstructured data, like email, could include:


                 ▪       Organizing data into groups: For business reuse and e-discovery retrieval
                 ▪       Tracking and managing data: For access control and retention windows




                                                            
1
    For more information about the e-discovery process, check out the E-discovery Reference Model (http://www.edrm.net)




                                                                                                                          P a g e  | 2 
Email Classification – Why Should It Matter
to You?

The decision whether to classify email data lies with each individual organization, but it is a question you should be
asking. Other questions pertinent to email classification include:


         ▪    Will having classified messages speed up e-discovery requests?
         ▪    Is your organization under industry or government regulations that require us to implement email
              classification?
         ▪    Will email classification help us in other ways, like reducing storage costs or getting the big picture
              about feedback on our products or services?

Email is just one component of an organization's unstructured data that might need to be managed with a
classification policy. However, it is an important component. Email often comprises the majority of an organization's
communications, both internal and external. As such, it also constitutes a large part of its unstructured data.



WHERE AND WHY SHOULD EMAIL CLASSIFICATION BE APPLIED?
Classifying email is complicated by the fact that not all email messages are relevant from a business perspective,
and would not necessarily need to be kept. Some experts estimate as much as 60% of email messages held are
not related to business. These are the “where do you want to go for lunch?” and “there is cake in the break room”
types of messages. Should those messages be kept? If so, would they be under the same retention rules as other,
more relevant messages, like a product quote or support question? This is where a strategic email classification
policy could come in handy because these non-business-related emails can be broadly classified and dealt with by
an email archiving system or other email management technology en masse.

If classifying email makes sense in your organization, there are some details to work out. For example, different
schemes are available to classify email such as:


         ▪    Security or sensitivity (e.g., privileged, secret, etc.)
         ▪    Retention period (e.g., “keep until...”, “delete after...”)
         ▪    Locations at various levels (e.g., EMEA, US, Chicago, etc.)
         ▪    Product lines (e.g., “gizmo,” “widget,” “gizmo 2.0”)

By classifying messages in a way that makes sense for your organization, you can more easily group this data
together for e-discovery, retention, protection, etc.

For example, a product company that makes "gizmos" may want to classify any inbound messages that have
"gizmo" in the body with a header called X-Product and a value of "gizmo". Later, all such messages can be
discovered easily in a search (e.g., find all messages where X-Product = "gizmo"). Additionally, the tagged




                                                                                                            P a g e  | 3 
Email Classification – Why Should It Matter
to You?

messages may be collected together into a journal to comply with industry or government regulations or to help
Product Management see feedback from customers and prospects on the gizmo product, regardless of the source
or the recipient.

In a similar way, the confidentiality of a new product, "gadget," can be protected using classification by having the
mail router reject any message for external recipients where the header X-Product has the value "gadget".
However, before any procedure or technology can be applied to the job of classifying email, a policy must be
created. Relevant elements of the email classification policy would include:
         ▪    Definitions, procedures, regulations
         ▪    Roles, responsibilities
         ▪    Actions, monitoring, accountability


HOW SHOULD EMAIL CLASSIFICATION BE APPLIED?
Generally, there are two ways to classify email: automatically by a computer or manually by a human. Additionally,
using a hybrid combination of these two methods might be considered.

Automatically—Machine Assisted

With this kind of classification, a computer process scans message headers and bodies to make a determination as
to what classifications may apply to it and update the headers accordingly. It makes these decisions in various
ways, but in essence it follows a set of rules.

        Advantages
         ▪    Limited human involvement: Once configured, the machine does all the heavy lifting. Potentially, all
              inbound, outbound, and internal messages can be processed automatically.
         ▪    Consistent decisions: Assuming the rules don’t change, the computer will be faithful in applying the
              same classifications to like messages without deviation. However, some systems employ a kind of
              learning or adapting logic that, in some way or another, bases current decisions on past results.
              While some inconsistency may be evident early on, the intent is to make these systems more
              accurate at classifying messages over time.

        Disadvantages
         ▪    Computers can’t reason: They only do what they are told. This leads to various degrees of accuracy
              when classifying messages based purely on content or addresses, even when sophisticated and
              expensive learning systems are employed.




                                                                                                            P a g e  | 4 
Email Classification – Why Should It Matter
to You?

Manually—User Applied

This involves the sender applying a suitable classification to a message during composition before it is sent.
Sometimes, the email client software may be able to assist the author in selecting a classification or it may prevent
a message from being sent if the classification is missing. Received messages (e.g., from external sources) may
also need to be classified after the fact by the recipient.

        Advantages
         ▪    People can reason: Presumably the message author can make the best determination as to the
              nature of the message and, therefore, what classifications it needs. Or, if the message arrived
              unclassified from an external source, the recipient may be able to make that determination.

        Disadvantages
         ▪    Increased workload: Besides additional and on-going training, there is additional work on the email
              author’s part to consider and apply classifications.
         ▪    Inconsistencies: Are users being thoughtful and careful each and every time they classify an email?
              Are the policies clear enough that everyone will arrive at the same determination about a given
              message's classifications? Inconsistencies can muddy the waters when trying to manage the
              messages later as a group of a given type.


MOVING FORWARD
There are several options for moving forward with an email classification system. Once you have identified the
organizational needs for classifying email, there are several steps Sherpa Software experts recommend before
moving forward with implementing.

Get Buy-in

        Business needs should drive any classification effort. If the initiative begins with the Leadership team or a
        department like Legal or Governance, Risk Management and Compliance (GRC,) then adoption has a
        higher level of likelihood. Additionally, these other departments may have important insight into crafting an
        email classification policy or strategy. For instance, if the goal of an email classification strategy is to secure
        confidential emails from leaving the organization, the Governance, Risk Management and Compliance
        team can direct the email administrator to look out for the right keywords or patterns (e.g. patent or credit
        card numbers).




                                                                                                               P a g e  | 5 
Email Classification – Why Should It Matter
to You?

Draft an Email Classification Strategy

        Before you begin shopping for the right kind of technology to support an email classification strategy, it is
        vital to write the strategy down and determine what and how you are going to classify emails in your
        environment. This will help greatly when researching technologies.

Research Supporting Technology

        Identify opportunities present in your existing tools. You may have all the pieces already in place. If not,
        understand gaps that will need to be filled by new technologies so that you can compare products based on
        just the features you will need. One such tool is Sherpa Software’s Compliance Attender for Lotus Notes
        which contains an email classification module. Compliance Attender can classify email messages based on
        a wide array of criteria including message content, metadata, message size, etc. Compliance Attender is a
        module-based email compliance system for Lotus Notes environments; available modules include
        journaling, filtering and ToneCheck (automated tone/sentiment analysis).

As you can see, the answer to the question, should email classification matter depends. But for many
organizations, that answer is an empathetic yes. For others, it may not be as clean cut, but the questions raised
here will help you determine if classification is a good fit for your organization. Regardless of how you answer, you
need to be asking the questions.




ABOUT THE AUTHOR- GRANT LINDSAY
                        As the Product Manager for Compliance Attender for Notes, Grant is responsible for product
                        research and development, pre‐sales technical support (e.g., Demos), post‐sales technical
                        support and competitive research.

                        Grant joined Sherpa Software in 2007 with 15 years of experience in Information
                        Technology. Of those, more than 14 were spent building applications with Lotus Notes and
                        Domino. He worked with a wide range of company sizes and across several industries
                        including insurance, consulting, venture capital, manufacturing, software and more.

                       Grant is an IBM Certified Advanced Application Developer and an expert in email
management and compliance, LotusScript, Notes Formula Language, application design, and security. He is also
skilled in C/C++ and Java Application Programming Interfaces (APIs) for Notes and Domino. Grant is accomplished
in web delivered technologies: HTML, CSS, and JavaScript.




                                                                                                            P a g e  | 6 
Email Classification – Why Should It Matter
to You?

He graduated in 1995 from the Career Development Institute with a Programmer Analyst Diploma. Grant spends
his time with his wife, Lydia, of 16 years and his two retired greyhound racers, Rio and Wavorly.




                                                                                                  P a g e  | 7 

More Related Content

What's hot

Collaborative Filtering
Collaborative FilteringCollaborative Filtering
Collaborative Filtering
Tayfun Sen
 
Social recommender system
Social recommender systemSocial recommender system
Social recommender system
Kapil Kumar
 
Recommender systems using collaborative filtering
Recommender systems using collaborative filteringRecommender systems using collaborative filtering
Recommender systems using collaborative filtering
D Yogendra Rao
 
Hybrid recommender systems
Hybrid recommender systemsHybrid recommender systems
Hybrid recommender systemsrenataghisloti
 
CSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 AugCSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 Augcstalks
 
Collaborative Filtering 1: User-based CF
Collaborative Filtering 1: User-based CFCollaborative Filtering 1: User-based CF
Collaborative Filtering 1: User-based CF
Yusuke Yamamoto
 
Filtering content bbased crs
Filtering content bbased crsFiltering content bbased crs
Filtering content bbased crs
Aravindharamanan S
 
Stock prediction using social network
Stock prediction using social networkStock prediction using social network
Stock prediction using social network
Chanon Hongsirikulkit
 
Survey of Recommendation Systems
Survey of Recommendation SystemsSurvey of Recommendation Systems
Survey of Recommendation Systemsyoualab
 
Item Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation AlgorithmsItem Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation Algorithmsnextlib
 
Collaborative filtering
Collaborative filteringCollaborative filtering
Collaborative filtering
Neha Kulkarni
 
Collaborative filtering
Collaborative filteringCollaborative filtering
Collaborative filtering
Tien-Yang (Aiden) Wu
 
Collaborative Filtering Recommendation Algorithm based on Hadoop
Collaborative Filtering Recommendation Algorithm based on HadoopCollaborative Filtering Recommendation Algorithm based on Hadoop
Collaborative Filtering Recommendation Algorithm based on Hadoop
Tien-Yang (Aiden) Wu
 
Final deck
Final deckFinal deck
Final deck
Swapna Lekkala
 
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
IRJET Journal
 
Recommendation and Information Retrieval: Two Sides of the Same Coin?
Recommendation and Information Retrieval: Two Sides of the Same Coin?Recommendation and Information Retrieval: Two Sides of the Same Coin?
Recommendation and Information Retrieval: Two Sides of the Same Coin?
Arjen de Vries
 
Recommendation engines
Recommendation enginesRecommendation engines
Recommendation enginesGeorgian Micsa
 
Tag based recommender system
Tag based recommender systemTag based recommender system
Tag based recommender system
Karen Li
 
Summary of a Recommender Systems Survey paper
Summary of a Recommender Systems Survey paperSummary of a Recommender Systems Survey paper
Summary of a Recommender Systems Survey paper
Changsung Moon
 
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTEA FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
ijnlc
 

What's hot (20)

Collaborative Filtering
Collaborative FilteringCollaborative Filtering
Collaborative Filtering
 
Social recommender system
Social recommender systemSocial recommender system
Social recommender system
 
Recommender systems using collaborative filtering
Recommender systems using collaborative filteringRecommender systems using collaborative filtering
Recommender systems using collaborative filtering
 
Hybrid recommender systems
Hybrid recommender systemsHybrid recommender systems
Hybrid recommender systems
 
CSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 AugCSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 Aug
 
Collaborative Filtering 1: User-based CF
Collaborative Filtering 1: User-based CFCollaborative Filtering 1: User-based CF
Collaborative Filtering 1: User-based CF
 
Filtering content bbased crs
Filtering content bbased crsFiltering content bbased crs
Filtering content bbased crs
 
Stock prediction using social network
Stock prediction using social networkStock prediction using social network
Stock prediction using social network
 
Survey of Recommendation Systems
Survey of Recommendation SystemsSurvey of Recommendation Systems
Survey of Recommendation Systems
 
Item Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation AlgorithmsItem Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation Algorithms
 
Collaborative filtering
Collaborative filteringCollaborative filtering
Collaborative filtering
 
Collaborative filtering
Collaborative filteringCollaborative filtering
Collaborative filtering
 
Collaborative Filtering Recommendation Algorithm based on Hadoop
Collaborative Filtering Recommendation Algorithm based on HadoopCollaborative Filtering Recommendation Algorithm based on Hadoop
Collaborative Filtering Recommendation Algorithm based on Hadoop
 
Final deck
Final deckFinal deck
Final deck
 
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
 
Recommendation and Information Retrieval: Two Sides of the Same Coin?
Recommendation and Information Retrieval: Two Sides of the Same Coin?Recommendation and Information Retrieval: Two Sides of the Same Coin?
Recommendation and Information Retrieval: Two Sides of the Same Coin?
 
Recommendation engines
Recommendation enginesRecommendation engines
Recommendation engines
 
Tag based recommender system
Tag based recommender systemTag based recommender system
Tag based recommender system
 
Summary of a Recommender Systems Survey paper
Summary of a Recommender Systems Survey paperSummary of a Recommender Systems Survey paper
Summary of a Recommender Systems Survey paper
 
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTEA FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
 

Similar to Email Classification - Why Should it Matter to You?

Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
Craig Jahnke
 
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
ArethaSimons
 
guide infrastructure 04 in English
guide infrastructure 04 in Englishguide infrastructure 04 in English
guide infrastructure 04 in English
Mubariz Mahmood
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
Secure Islands - Data Security Policy
 
Office 365 Archiving Comparison to Dropsuite
Office 365 Archiving Comparison to DropsuiteOffice 365 Archiving Comparison to Dropsuite
Office 365 Archiving Comparison to Dropsuite
Dropsuite
 
Nt1330 Unit 7
Nt1330 Unit 7Nt1330 Unit 7
Nt1330 Unit 7
Erin Moore
 
SC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsSC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance Solutions
FredBrandonAuthorMCP
 
Pathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-ToPathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-To
Marketo
 
5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one
Vaultastic
 
Exploring the World of Professional Certification
Exploring the World of Professional CertificationExploring the World of Professional Certification
Exploring the World of Professional CertificationCareer Communications Group
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management
Vaultastic
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
Don Daubert
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
Sherpa Software
 
Deep Dive Into Email Archiving Products
Deep Dive Into Email Archiving ProductsDeep Dive Into Email Archiving Products
Deep Dive Into Email Archiving ProductsStephen Foskett
 
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Ioannis Mandourarakis
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
BizTalk360
 
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...TEAM Informatics
 
AMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information managementAMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information management
Christopher Wynder
 
Email Marketing techniques
Email Marketing techniquesEmail Marketing techniques
Email Marketing techniques
Jeroen Vos
 
Email marketing
Email marketingEmail marketing
Email marketing
Prognya Ghosh
 

Similar to Email Classification - Why Should it Matter to You? (20)

Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
 
guide infrastructure 04 in English
guide infrastructure 04 in Englishguide infrastructure 04 in English
guide infrastructure 04 in English
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Office 365 Archiving Comparison to Dropsuite
Office 365 Archiving Comparison to DropsuiteOffice 365 Archiving Comparison to Dropsuite
Office 365 Archiving Comparison to Dropsuite
 
Nt1330 Unit 7
Nt1330 Unit 7Nt1330 Unit 7
Nt1330 Unit 7
 
SC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsSC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance Solutions
 
Pathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-ToPathway to Email Marketing: Best Practices and How-To
Pathway to Email Marketing: Best Practices and How-To
 
5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one
 
Exploring the World of Professional Certification
Exploring the World of Professional CertificationExploring the World of Professional Certification
Exploring the World of Professional Certification
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 
Deep Dive Into Email Archiving Products
Deep Dive Into Email Archiving ProductsDeep Dive Into Email Archiving Products
Deep Dive Into Email Archiving Products
 
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
Dealing with ROT - Email Management using Oracle WebCenter Content Records Ma...
 
AMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information managementAMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information management
 
Email Marketing techniques
Email Marketing techniquesEmail Marketing techniques
Email Marketing techniques
 
Email marketing
Email marketingEmail marketing
Email marketing
 

More from Sherpa Software

Policy-Driven Information Governance
Policy-Driven Information GovernancePolicy-Driven Information Governance
Policy-Driven Information Governance
Sherpa Software
 
Putting the "ME" in social media
Putting the "ME" in social media Putting the "ME" in social media
Putting the "ME" in social media
Sherpa Software
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product build
Sherpa Software
 
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Sherpa Software
 
Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive Consolidation
Sherpa Software
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt you
Sherpa Software
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital AgeSherpa Software
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for Notes
Sherpa Software
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Sherpa Software
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Software
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your Organization
Sherpa Software
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
Sherpa Software
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the Numbers
Sherpa Software
 

More from Sherpa Software (13)

Policy-Driven Information Governance
Policy-Driven Information GovernancePolicy-Driven Information Governance
Policy-Driven Information Governance
 
Putting the "ME" in social media
Putting the "ME" in social media Putting the "ME" in social media
Putting the "ME" in social media
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product build
 
Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!
 
Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive Consolidation
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt you
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for Notes
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui Imaging
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your Organization
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the Numbers
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Email Classification - Why Should it Matter to You?

  • 1. Email Classification - Why Should It Matter to You? A Best Practice White Paper Written by Grant Lindsay, Product Manager, Sherpa Software 456 Washington Avenue, Suite 2  Bridgeville, PA 15017  www.SherpaSoftware.com   information@sherpasoftware.com  
  • 2. Email Classification – Why Should It Matter to You? INTRODUCTION What is email classification you ask? And should it be on your radar? For this discussion, let's define email classification as the process of tagging email messages with labels to assist in managing those messages as they either move through or rest in the email environment. For example, a message might be classified as “privileged,” “confidential,” “secret,” “private,” or “business relevant.” A message with a “business relevant” classification may be retained for three years, whereas a message classified as “personal” may be purged after thirty days. A message marked “secret” may be restricted from leaving the organization’s email environment unless it is encrypted. The reasons for classifying email vary, but may include: grouping like messages together for electronic discovery [e-discovery], applying security and access control to messages of a certain type, and managing the life-span of messages, based on their relevancy to the business or to regulations. 1 Email classification like this can aid the e-discovery process because searches can be targeted to only the messages classified “business relevant” or “privileged” and leave out other messages not pertinent to the search, which can greatly reduce the search run-time. In other cases, message classifications may be hierarchical or relevant to only some people in the organization. Classifying or tagging emails can be done through several methods. The process of applying these tags (i.e., classifying) may be either: ▪ Manual: The message custodian, a human, applies the classification when the message is either created or received ▪ Automatic: A computer applies the classification, based on rules or contextual analysis ▪ Hybrid: Combining both manual and automatic methods. IS THERE A NEED FOR CLASSIFICATION? At a high level, the purposes for classifying unstructured data, like email, could include: ▪ Organizing data into groups: For business reuse and e-discovery retrieval ▪ Tracking and managing data: For access control and retention windows                                                              1 For more information about the e-discovery process, check out the E-discovery Reference Model (http://www.edrm.net) P a g e  | 2 
  • 3. Email Classification – Why Should It Matter to You? The decision whether to classify email data lies with each individual organization, but it is a question you should be asking. Other questions pertinent to email classification include: ▪ Will having classified messages speed up e-discovery requests? ▪ Is your organization under industry or government regulations that require us to implement email classification? ▪ Will email classification help us in other ways, like reducing storage costs or getting the big picture about feedback on our products or services? Email is just one component of an organization's unstructured data that might need to be managed with a classification policy. However, it is an important component. Email often comprises the majority of an organization's communications, both internal and external. As such, it also constitutes a large part of its unstructured data. WHERE AND WHY SHOULD EMAIL CLASSIFICATION BE APPLIED? Classifying email is complicated by the fact that not all email messages are relevant from a business perspective, and would not necessarily need to be kept. Some experts estimate as much as 60% of email messages held are not related to business. These are the “where do you want to go for lunch?” and “there is cake in the break room” types of messages. Should those messages be kept? If so, would they be under the same retention rules as other, more relevant messages, like a product quote or support question? This is where a strategic email classification policy could come in handy because these non-business-related emails can be broadly classified and dealt with by an email archiving system or other email management technology en masse. If classifying email makes sense in your organization, there are some details to work out. For example, different schemes are available to classify email such as: ▪ Security or sensitivity (e.g., privileged, secret, etc.) ▪ Retention period (e.g., “keep until...”, “delete after...”) ▪ Locations at various levels (e.g., EMEA, US, Chicago, etc.) ▪ Product lines (e.g., “gizmo,” “widget,” “gizmo 2.0”) By classifying messages in a way that makes sense for your organization, you can more easily group this data together for e-discovery, retention, protection, etc. For example, a product company that makes "gizmos" may want to classify any inbound messages that have "gizmo" in the body with a header called X-Product and a value of "gizmo". Later, all such messages can be discovered easily in a search (e.g., find all messages where X-Product = "gizmo"). Additionally, the tagged P a g e  | 3 
  • 4. Email Classification – Why Should It Matter to You? messages may be collected together into a journal to comply with industry or government regulations or to help Product Management see feedback from customers and prospects on the gizmo product, regardless of the source or the recipient. In a similar way, the confidentiality of a new product, "gadget," can be protected using classification by having the mail router reject any message for external recipients where the header X-Product has the value "gadget". However, before any procedure or technology can be applied to the job of classifying email, a policy must be created. Relevant elements of the email classification policy would include: ▪ Definitions, procedures, regulations ▪ Roles, responsibilities ▪ Actions, monitoring, accountability HOW SHOULD EMAIL CLASSIFICATION BE APPLIED? Generally, there are two ways to classify email: automatically by a computer or manually by a human. Additionally, using a hybrid combination of these two methods might be considered. Automatically—Machine Assisted With this kind of classification, a computer process scans message headers and bodies to make a determination as to what classifications may apply to it and update the headers accordingly. It makes these decisions in various ways, but in essence it follows a set of rules. Advantages ▪ Limited human involvement: Once configured, the machine does all the heavy lifting. Potentially, all inbound, outbound, and internal messages can be processed automatically. ▪ Consistent decisions: Assuming the rules don’t change, the computer will be faithful in applying the same classifications to like messages without deviation. However, some systems employ a kind of learning or adapting logic that, in some way or another, bases current decisions on past results. While some inconsistency may be evident early on, the intent is to make these systems more accurate at classifying messages over time. Disadvantages ▪ Computers can’t reason: They only do what they are told. This leads to various degrees of accuracy when classifying messages based purely on content or addresses, even when sophisticated and expensive learning systems are employed. P a g e  | 4 
  • 5. Email Classification – Why Should It Matter to You? Manually—User Applied This involves the sender applying a suitable classification to a message during composition before it is sent. Sometimes, the email client software may be able to assist the author in selecting a classification or it may prevent a message from being sent if the classification is missing. Received messages (e.g., from external sources) may also need to be classified after the fact by the recipient. Advantages ▪ People can reason: Presumably the message author can make the best determination as to the nature of the message and, therefore, what classifications it needs. Or, if the message arrived unclassified from an external source, the recipient may be able to make that determination. Disadvantages ▪ Increased workload: Besides additional and on-going training, there is additional work on the email author’s part to consider and apply classifications. ▪ Inconsistencies: Are users being thoughtful and careful each and every time they classify an email? Are the policies clear enough that everyone will arrive at the same determination about a given message's classifications? Inconsistencies can muddy the waters when trying to manage the messages later as a group of a given type. MOVING FORWARD There are several options for moving forward with an email classification system. Once you have identified the organizational needs for classifying email, there are several steps Sherpa Software experts recommend before moving forward with implementing. Get Buy-in Business needs should drive any classification effort. If the initiative begins with the Leadership team or a department like Legal or Governance, Risk Management and Compliance (GRC,) then adoption has a higher level of likelihood. Additionally, these other departments may have important insight into crafting an email classification policy or strategy. For instance, if the goal of an email classification strategy is to secure confidential emails from leaving the organization, the Governance, Risk Management and Compliance team can direct the email administrator to look out for the right keywords or patterns (e.g. patent or credit card numbers). P a g e  | 5 
  • 6. Email Classification – Why Should It Matter to You? Draft an Email Classification Strategy Before you begin shopping for the right kind of technology to support an email classification strategy, it is vital to write the strategy down and determine what and how you are going to classify emails in your environment. This will help greatly when researching technologies. Research Supporting Technology Identify opportunities present in your existing tools. You may have all the pieces already in place. If not, understand gaps that will need to be filled by new technologies so that you can compare products based on just the features you will need. One such tool is Sherpa Software’s Compliance Attender for Lotus Notes which contains an email classification module. Compliance Attender can classify email messages based on a wide array of criteria including message content, metadata, message size, etc. Compliance Attender is a module-based email compliance system for Lotus Notes environments; available modules include journaling, filtering and ToneCheck (automated tone/sentiment analysis). As you can see, the answer to the question, should email classification matter depends. But for many organizations, that answer is an empathetic yes. For others, it may not be as clean cut, but the questions raised here will help you determine if classification is a good fit for your organization. Regardless of how you answer, you need to be asking the questions. ABOUT THE AUTHOR- GRANT LINDSAY As the Product Manager for Compliance Attender for Notes, Grant is responsible for product research and development, pre‐sales technical support (e.g., Demos), post‐sales technical support and competitive research. Grant joined Sherpa Software in 2007 with 15 years of experience in Information Technology. Of those, more than 14 were spent building applications with Lotus Notes and Domino. He worked with a wide range of company sizes and across several industries including insurance, consulting, venture capital, manufacturing, software and more. Grant is an IBM Certified Advanced Application Developer and an expert in email management and compliance, LotusScript, Notes Formula Language, application design, and security. He is also skilled in C/C++ and Java Application Programming Interfaces (APIs) for Notes and Domino. Grant is accomplished in web delivered technologies: HTML, CSS, and JavaScript. P a g e  | 6 
  • 7. Email Classification – Why Should It Matter to You? He graduated in 1995 from the Career Development Institute with a Programmer Analyst Diploma. Grant spends his time with his wife, Lydia, of 16 years and his two retired greyhound racers, Rio and Wavorly. P a g e  | 7