TITLE

STAY OUT OF TROUBLE: EMAIL AND EDISCOVERY

AUTHOR(S)
Blair, Barclay
PUB. DATE
January 2010
SOURCE
Infonomics;Jan/Feb2010, Vol. 24 Issue 1, p20
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents questions and answers related to electronic mail (email), including the best way to implement records memory in email, the risk of housing email in an offsite solution, and how can a company permit an employee to identify if the email is not required.
ACCESSION #
48123246

 

Related Articles

  • CB Tek Chat. Pacheco, Dennis Costa // Caribbean Business;4/19/2007, Vol. 35 Issue 15, p40 

    The article provides an answer to a question on what is virtual memory and how to change its settings.

  • FAQs.  // Training Journal;Nov2008, p6 

    The article presents questions and answers related to electronic mails (emails) including how to stop digest emails, how to update emails, and how to search archives.

  • Electronic Document Destruction Policy. McGuire, Jeffrey T. // Pennsylvania CPA Journal;Fall2012, Vol. 83 Issue 3, p1 

    The article discusses the significance of maintaining an electronic document destruction policy, especially on a litigation. It suggests to follow a policy consistently to serve as a protection for the firm as well as to make sure that the implemented policy covers e-mails. The issues of...

  • A Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Worms. Kobayashi, Shinji; Goudge, Masamichi; Makie, Toshio; Hanada, Eisuke; Harada, Mine; Nose, Yoshiaki // Journal of Medical Systems;Jun2002, Vol. 26 Issue 3, p221 

    The malicious code “W32/Sircam” is spread via e-mail and potentially through the file space shared by local area networks. Such Trojan-horse-type computer worms easily penetrate Internet firewalls and propagate via the “backdoor” to other computers. Once a malicious code,...

  • IT Q&A. Fisher, Brian // Pulse;1/30/2008, Vol. 68 Issue 3, p49 

    The article provides an answer to a question on how can patients access their records.

  • Compliance Q&A.  // Credit Union Magazine;Jan2007, Vol. 73 Issue 1, p46 

    The article presents questions and answers related to sending undelivered electronic statement alert to a member of a credit union (CU) in the U.S. One questions if it is alright to send an undelivered message to a CU member's different electronic mail address once undelivered to his current...

  • Tricks & Traps - Ask the Experts. Smith, Randy Franklin; Mosher, Sue // Windows IT Pro;Nov2006, Vol. 12 Issue 11, p61 

    The article presents questions and answers related to the Internet. One person asks how to prevent users from trusting certification authorities they encounter while browsing the Web. Another questions how to add contacts from incoming electronic mail messages to Microsoft Office Outlook 2003,...

  • OUTSOURCING DOCUMENT MANAGEMENT. Churchill, Chris // Infonomics;Mar/Apr2010, Vol. 24 Issue 2, p46 

    The article focuses on the recruitment of outsourcing companies to manage active and inactive business documents and records. It outlines the services offered by an outsourcing partner which include intelligent scanning or conversion, hosted repository, and active physical and virtual file rooms...

  • ASK THE EXPERT. Madlener, Scott // B to B;9/24/2007, Vol. 92 Issue 12, p32 

    The article provides an answer to a question of what are the benefits and drawbacks of using video in e-mails.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics