Print this Page
47. EMS
07. Business Message Service
Close this Page

1. Business Message Service:
1. The world has evolved with the provision of a Business Message Service for the benefit of the customer.
2. Any approved person may add a support message and that message will be directed to the appropriate person using encryption so it cannot be stolen and using replication so it cannot be lost.   The age when messages may or may not arrive have ended - a support message has safely arrived as it is authored - instantly.
3. Business Message Service has a "public" and a "private" capability where public means messages are leaked to others and private means messages are encrypted to keep the content private.   All traditonal email (and phone) messages are "public" to be legally copied, proessed and sold by agencies in all parts of the world.   Business messages containing private, confidential and sensitive business information must be elevated to "private" where they are encrypted so they cannot be stolen and replicated so they cannot be lost.

2. Support Service:
1. The customer is granted access to a support message service that is continually monitored by the first level support team 24*7.   First level support will redirect and escalate the support message as may be applicable.
2. The customer is assigned a full time account manager as the single point of contact where that account manager roles is managed by the first level support team.   People are permitted to have leave but the assigned account manager is a service that is provided 24*7 with no leave, no sickness, no holidays and 24 hours a day working.
3. To send a support message:
  (1) From the main dashboard, click the "Support" button - a list of support messages are shown.
  (2) From the support list, click the "New" button - the add new support form is shown.
  (3) Enter a subject, select the name of the author and enter a message - click the "Broker" button to return to the dashboard.
4. To add evidence, please use the attachment button to attach a PNG, JPG, HTML or PDF file of up to 20 MB in size.
5. First Level Support team will notify the account manager who will reply to the support request as soon as is practical.

3. Supplier Service:
1. Where a business message is to be sent to a customer, the supplier list is used to identify the customer and the customers RFQ email address.   In this contect, the supplier is the customer.
2. The First Level Support procedure is:
  (1) From the main dashboard, click the "Supplier" button - a list of suppliers are shown.
  (2) From the supplier list, click the applicable supplier row - the supplier form is shown.
  (3) From the supplier menu, click the "tasks" button - a list of tasks by supplier are shown.
  (4) From the task menu, click the "new" button - the Add New Task by Supplier form shown.
  (5) Enter the subject in the work done field, enter the message in the message field, click the "Email" button on the top menu bar.
3. A permanent record of the business message is stored in date order.   Track and trace may be enabled so who and when a message is viewed is recorded for each business message.

4. Evolution:
1. Email (and phone) is no longer fit-for-purpose where that purpose is to communicate private, confidential and sensitive business information.
2. Every phone call and every email is copied by many agencies in all parts of the world.   That data is processed and sold to other parties.
3. What is legal in one country may be unacceptable in another country and what is acceptable in one decade may not be acceptable in a future decade.   The privacy battle has been lost by many people and those people are not paying the price of what they said and did twenty years ago.
4. Government initiatives like "Making Tax digital" demonstrate the evolution towards business-to-business communications using encrypted messages.   Business Message Service is part of that evolution to messages are encrypted so they cannot be stolen and replicated so they cannot be lost.
5. A very large number of public email addresses are used as a honeytrap to criminals to divulge their malware payloads in a safe and secure email environment that leaks fake business information.   It becomes practical to track and trace criminal behaviour when specific fake information is communicated by email.   The prime purpose of email (and phone) remains to track criminal behaviour - not to communicate private, confidential and sensitive business information.

5. Attachments:
1. Each support message may include a customer attachment and a reply attachment as evidence of the work done.
2. Attachments are uploaded and cannot be deleted or corrupted in any way.   Attachments are stored in libraries that are not accessable from the internet.
3. Supplier tasks may have an attachment as evidence to the message.
4. Supplier tasks can also have a guide wiki name that acts as an attachment for the benefit of the customer.   Guide wiki pages are selected from a massive knowledgebase of public web pages that provide a guide, tutorial and education purposes.   The customer email will show the guide wiki page as a link that may be used as a link or cut and pasted or retyped to view the applicable page.

6. Contact Us:
1. From the home page, a contact us message service is provided that is monitored 24*7 by the first level support team.
2. Criminals in all parts of the world have access to the public contact us message service and so it must be assumed that messages are phishing attacks unless a message contains unique information that would not be known to a criminal.
3. Where a contact us message is likely to be real, then it is transcribed to the applicable support service and processed using the normal support procedures.
4. It can be expected that a contact us message will be responded to within the hour.
5. First Level Support team are funded with a single mission:
  Our objective is to help enough other people to achieve their objectives.
The objective of financial freedom will come from unreserved cooperation with enough other people.

7. Email Services:
1. The business deployes a large number of email addresses with the majority being used as a honeypot to detect criminal behaviour.
2. It must be assumed that most email message are phishing attacks by criminals because an approved person wwould used their private support service.
3. Where an email is sent to a string of email addresses, then the email shall be deleted by an email server as not a valid business message.
4. Where an email is sent to a CC or BCC email address, then the email shall be deleted by tan email server as not relevant to the business.
5. Where an email is sent from an approved email address to an approved email address, then the message is copied to become a support message that may be processed using normal business procedures.
6. Email shall not be used for business-to-business communications, but email may be used for person-to-person comunications where private business information is not involved.

8. Liability:
1. Company Directors have a duty of care and are personally liable when the email service provided to employees is used for criminal purposes.
2. Where an email sent by an employee is said by the recepiant to be offensive, then the Company Directors are personally liable for assisting in the crime.
3. The company email service should only be used to communicate busines-to-business information and should be free of any personal opinion that may offend.
4. The recepiant will judge if the email content is offensive if it contains any gender, race, religion, age, health, culture, sex, colour, children, political, marrage or other opinion.
5. Only approved business messages are permitted to be sent by email and no personal opinions may be appended.
6. The company has a legal obligation to retain a copy of every email message as evidence.   A company without a copy of all emails has no evidence for their defence.
7. It is said that traditonal email is not able to comply with:
  (GDPR) General Data Protection Regulations.
  (PECR) Privacy of Electronic Communication Regulations.

9. Fake News:
1. Email is used to deliberatly spread carefully engineered fake news that is plausable and easy to track and trace.
2. Emails are sent out to known email addresses containing plausable messages and then the time it takes criminals to copy that news, process it and sell it to others is monitored.
3. Sensitive business information can be in the hands of competitors in a few hours - evidence is demonstrated every week that the cycle of data leaks is growing faster.
4. When it can be demonstrated that plausable fake news is being sold, then it becomes self-evident that real business information is being sold.
5. Application support services that are encrypted have become the only credible way to communicate prive, confidential and sensitive business information.
6. Companies that continue to leak their customers business data may find those customers choosing to do business with other companies that do not leak their data.

10. Benefits:
1. Business Message Service is not just another email service, it is a very different service with a business-to-business purpose.
2. Track and trace is a key benefit where who and when a message is viewed can be recorded.   Each year, about 15% of business email addresses change and so it is critical to be able to detect when an email address is no longer being used.
3. Messages can be changed after they have been sent and before the recipient has viewed the message.   This is a simple way to make improvements so the recipient gets the right message.
4. Messages have an expiry date (and time) and can be deleted by the author at any time.   If a message becomes obsolete, it can be expired and the recipient will never see the message.
5. The company has a formal copy of every email and can mount a defense against a claim that a message content was offensive.   If the recipient has altered the email content in any way, this will beome self-evident and a counter-claim can be mounted.
6. Every electronic message sent to a person must have prior written consent and must give the person the right to unsubscribe and withdraw their concent.

11. Standard Messages:
1. The average company has up to 20 procedures that involve a standard message being communicated to an external business associate.
2. Productivity is greatly improved by eliminating hand crafted messages and providing a select from a list of standard approved messages.
3. People can still spend half their working day chatting to others using traditonal person-to-person email, but business-to-business messages are treated in a more professional way.
4. Standard messages may contain placeholders where data from a database may be inserted when the standard message is created.
5. The effect is that Company Directors can be certain that they will not be fined for silly opinions written by employees and messages will provide customers with confidence that business is beging done in a professional way.

12. Subscription Management:
1. Every electronic message to a person must have evidence of the prior concent of that person to receive such a message.   Concent does not apply to invoices and normal business messages, but does apply to all other electronic communications - including phone.
2. Concent means the person has subscribed to receive a specific type of electronic comunication.   At any time, the person must be granted the right to unsubscribe and withdraw their concent to receive electronic communications.
3. Each and every message to a person must include an "unsubscribe" link - it would be illegal to make the unsubscription procedure any more complex.   It should not noted that traditional email services are not able to comply with this legal obligation.
4. Not only must subscriptions be managed, subscription information must be shared with the person so they can see when they concented and when they withdrew their concent.   The legal obligation on Company Directors is continually growing and those that choose to stick with 20 year old email technology deserve to be fined to remind them of their legal obligations.   Why should a few companies gain a competitive cost advantage by using old technology that does not comply with their legal obligations.

Document Control:
1. Document Title: Business Message Service.
3. Keywords: Business Message Service.
4. Description: Business Message Service.
5. Privacy: Public education service as a benefit to humanity.
6. Issued: 11 Jun 2018.
7. Edition: 1.3.