Print this Page
1.1 Portfolio
56 Unified Communications
Close this Page

1.1.56 Unified Communications:
Insecure email has been replaced with Unified Communications (UC) as a secure business messaging service.   Business messages can be entered over encrypted (HTTPS) communications and stored in encrypted databases.   Messages are subject to normal data and functional data controls to define who can view any message.
Business messages cannot be deleted, cannot be changed, cannot be corrupted, cannot be lost and the audit trail shows when they are sent and read.   Business messages are never stored in a private mailbox on a computer that may be stolen.

Definition:
Unified Communications is "communications integrated to optimize business procedures".   UC is not for private messages to be pushed to private inboxes.   UC is a Business Process Integration (BPI) and collaboration tool with considerable benefits over outdated email.

Business Document:
Each type of UC email is managed as a HTML business document with online editor.   Email is only sent as a UC business document header with a link to the real UC message that is never communicated as plain text email.

Life Cycle:
UC messages have a life cycle of when the are applicable to the recipient.   When a cut off time has expired, the UC message is no longer applicable and cannot be viewed via the email link.
UC message life cycle only applies to email links, UC messages are always available to authorized users and cannot be deleted.

Message Type:
Executive Escalation where an excalation rule has been triggered because a task has not been completed as cheduled.
Executive Message as the regular scorecard of key performance indicators, achievements and forecasts as needed.
Authorized Person Sign In as an authorized person sign in details.
Authorized Person Pass Phrase as an authorized person pass phrase details.
Personal Message to one named person.
Group Message to a group of people.
Shared Message to all authorized people.
Instant Message or chat with a named person.
Speech or chat with a named person.
Presence request to any person with relevent skill or knowledge.
SMS or text to a named person or number.
Video or TV are to follow.

Business Requirement:
This Financial Management Application project has a business requirement to communication confidential information between remote development teams using secure methods.   Email is not fit-for-purpose because it is not secure, it has no audit trail and critical information may be accidently deleted or stolen.
Unified Communications (UC) is a professional kind of email that is secure, enables messages to be shared between all project members.

Security Statement:
A company can continue to use out-of-date emails that say to its business associates that it does not care about security or it can enbrace secure methods that say to ites business associated that your data is safe in our hands.   In the event of a data breach, the Information Commissionair will take into consideration the corportate security policy and methods before awarding a fine.   Where a company has done everything expected of it to be secure and to demonstrate to everybody that it has implemented secure procedures, then the Information Commissionair may only issue a warning or small fine.   Where a company has no published security policy, then the Information Commissionair may choose to set an example with a massive fine and order to recruit and train an adequate security team.

Content:
UC messages have a subject and may include:
1. Normal message of up to 500 characters.
2. Extended message of up to one million characters characters (NoSQL).
3. Attachment file as uploaded image or document of up to one million characters.
4. Follow up task scheduled for a named person or group.

Evolution:
UC messages have a size limit as:
1. Version 1 as up to 500 characters.
2. Version 2 as up to one million characters characters (NoSQL).
3. Version 3 with field editing to include bold, underline, etc...

Chat:
Both parties update the message area with:
Persons name inserted in the message when each party begins to enter anything.

NoSQL:
The world has seen a major upgrade with NoSQL implementation as:
4GL,UCA,99,99,FILE,FORM,Message,please enter,-
Files are saved using c21 date so messages can only be edited on the day they were created - change history is not saved.
Subfolder is YYMM and file is primary key - Ajax to write, Show to read.
Scan-replace to change symbols to HTML inline codes and eliminate scripts of any kind.
Option: to save the first 64 characters of a message in SQL for list preview.
Ajax: new edit code as FILE to write data as file in folder using month and pkey.

Background:
Every email is being recorded by many other organisations.   These email recordings may be hacked, stolen or lost.   Where these email recordings have been legally collected, they may be used in court against the parties who were communicating confidential business information.   Where these email recordings were illegally collected, they may be sold to other parties such as competitors and may become public information.
Industry experts are now saying that plain text email is no longer fit-for-purpose to communication confidential business information.   Many corporations are turning to encryption as a means to securely communicate confidential business information.   Corporations who continue to use plain text email may be saying to business associates that they do not care about security and do not care about the confidentiality of the business information being communicated.

Data Structure:
UC is a type of workflow or task management application with a similar data structure.   A UC message may be a big note, uploaded attachment, or scheduled follow up task to be shown in the users diary.
A UC message may be shared with all authorized application users, a named person or a name group of people.

Function Structure:
UC has a function structure like an improvement or support request as: search; list; add; clone; change; sheet; history and guide.   An extra layer of secururity is added with the use of an application code in c14 that partitions UC data according to data access controls.
Navigation to the UC dashboard is from any dashboard according to approved user role.