Table of Content
BIM
Daily Email Manager
Print this Page
Close this Page

1. Daily Email Manager:
1. It is a business requirement to integrate the application service with traditional email methods of working.
2. It is understood the traditional email is not fit for the purpose of communicating private, confidential or sensitive business information.   This is because every email is copied by agencies in all parts of the world, is processed and sold for the benefit of third parties.
3. Business information MUST be encrypted at all times to prevent the threat of theft or a data breach with significant fines.   This can be achieved with this business email service where what would normally be an attachment becomes a link to the encrypted information.

2. How does it work:
1. The application service is used in the normaly way to create documents, reports and analysis lists.
2. When any document is on show, the "Email" button can be pressed to cause that document to be linked to an email to an approved person.
3. A list of approved people is shown and a name selected.
4. A link is shown that may be included in a traditional email or the "send" button can be pressed to cause an email with the link to be sent to the person.
5. Every email has an expiry date that is set by the author. After an email is sent, it can be revoked by changing its expiry date.
6. Track and trace is deployed so when the recipiant views the document, the date and time are recorded so the author knows that the procedure is complete and correct.

3. Internals:
1. Every email is managed as a task with a URL link and a list of parameters known as:
  (1). Where as the site or project name.
  (2). When as the diary date.
  (3). What as the task key.
  (4). How as action such as report.
2. The authors name, date and time sent is recorded as evidence. (20-21-22)
3. The recipiant name is recorded as evidence with the expiry date. (26-27)   The task kind, type and status is recorded. (23-24-25)
4. When and how many times the recipiant viewed the document is recorded as evidence (17-18-19-14), together with hardware, software and network (31-32-33) data.
5. All business data remains stored in encrypted vaults at all time so no data breach is possible.
6. Privacy-by-design is built in using pseudonymised tokens so the task only contains meaningless and worthless numeric data.

4. One-Time Links:
1. The link on the email is a URL that provides access to a private business document - some people will try to hack this link.
2. The link has a fixed prefix identifier and unique suffix that does not contain any information - it cannot be decrypted.
  The suffix is simply a large random number that acts as a pointer to the email task key. date and time.  
  The life of a link is limited by its expiry date that is typically 6 days.  
3. If any link is hacked, its CRC check will identify the hack and will reply "Sorry this message has expired".
4. Criminals and threat hunters will switch on a hacking program to try every possible URL value at a rate of many thousands per hour.
  To stall such attacks, an unknown IP address is throttled to one transaction per second - this may be futher reduced as an attack continues.  

Document Control.
1. Document Title: Daily Email Manager.
2. Description: Daily Email Manager, policies and guidelines.
3. Keywords: Daily Email Manager, policies and guidelines.
4. Privacy: Shared with approved people for the benefit of humanity.
5. Edition: 1.1.
6. Issued: 2 Jan 2018.