1. Daily Email Manager: | 1. It is a business requirement to integrate the application service with traditional email methods of working. | 2. It is understood the traditional email is not fit for the purpose of communicating private, confidential or sensitive business information. This is because every email is copied by agencies in all parts of the world, is processed and sold for the benefit of third parties. | 3. Business information MUST be encrypted at all times to prevent the threat of theft or a data breach with significant fines. This can be achieved with this business email service where what would normally be an attachment becomes a link to the encrypted information. |
2. How does it work: | 1. The application service is used in the normaly way to create documents, reports and analysis lists. | 2. When any document is on show, the "Email" button can be pressed to cause that document to be linked to an email to an approved person. | 3. A list of approved people is shown and a name selected. | 4. A link is shown that may be included in a traditional email or the "send" button can be pressed to cause an email with the link to be sent to the person. | 5. Every email has an expiry date that is set by the author. After an email is sent, it can be revoked by changing its expiry date. | 6. Track and trace is deployed so when the recipiant views the document, the date and time are recorded so the author knows that the procedure is complete and correct. |
3. Internals: | 1. Every email is managed as a task with a URL link and a list of parameters known as: | (1). Where as the site or project name. | (2). When as the diary date. | (3). What as the task key. | (4). How as action such as report. | 2. The authors name, date and time sent is recorded as evidence. (20-21-22) | 3. The recipiant name is recorded as evidence with the expiry date. (26-27) The task kind, type and status is recorded. (23-24-25) | 4. When and how many times the recipiant viewed the document is recorded as evidence (17-18-19-14), together with hardware, software and network (31-32-33) data. | 5. All business data remains stored in encrypted vaults at all time so no data breach is possible. | 6. Privacy-by-design is built in using pseudonymised tokens so the task only contains meaningless and worthless numeric data. |
Document Control. | 1. Document Title: Daily Email Manager. | 2. Description: Daily Email Manager, policies and guidelines. | 3. Keywords: Daily Email Manager, policies and guidelines. | 4. Privacy: Shared with approved people for the benefit of humanity. | 5. Edition: 1.1. | 6. Issued: 2 Jan 2018. |
|
|