NOT PROTECTIVELY MARKED FORCE PROCEDURES. Email Retention, Archiving and Destruction Procedure v1.2. Records Manager



Similar documents
NOT PROTECTIVELY MARKED. Cheshire Constabulary. Force Policy. Managing Staff Efficiency

Discovery Technology Group

Exit Questionnaire and Exit Interview Procedure

State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention

University of Louisiana System

Data Security Policy

Life Cycle of Records

ITEM NO: 4. Date: 23 March Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers:

Information Management Policy

DATA RETENTION, STORAGE & DISPOSAL POLICY

Scope and Explanation

Management: A Guide For Harvard Administrators

Table of Contents. Chapter No. 1. Introduction Objective Use Compliance Definitions Roles and Responsibilities 2

Records and Information Management. General Manager Corporate Services

Council Policy. Records & Information Management

WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public

CORK INSTITUTE OF TECHNOLOGY

OFFICIAL. NCC Records Management and Disposal Policy

NOT PROTECTIVELY MARKED FORCE PROCEDURES. Seizure and Disposal of Alcohol and Tobacco from Young Persons. Procedure Review Date: January 2008

West Midlands Police and Crime Commissioner Records Management Policy 1 Contents

Records Management - Department of Health

FDU - Records Retention policy Final.docx

CITY OF ANDERSON ELECTRONIC RECORD RETENTION POLICY

Records Management Policy & Guidance

WaterfordTechnologies.com Frequently Asked Questions

This policy is not designed to use systems backup for the following purposes:

Chester Beatty Library Records Management Policy

User Guide to Retention and Disposal Schedules Council of Europe Records Management Project

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Records Management Policy

RECORDS AND INFORMATION MANAGEMENT AND RETENTION

CODE OF PRACTICE ON THE MANAGEMENT OF POLICE INFORMATION

Backup Policy (ITP004) Information Technology Services Department

Information Management Policy for The Treasury Department

Services Policy

Basic Records Management Practices for Saskatchewan Government*

Disposal Schedule for Functional records of the Electricity Supply Industry Expert Panel

Privacy and Cloud Computing for Australian Government Agencies

FSA-297, Certification for Stored Litigation Hold Documents Approved by: Deputy Administrator, Management

BIG LOTTERY FUND Document archive and retention policy

Data Protection Policy

DOCUMENT RETENTION AND ARCHIVAL POLICY:

University of Liverpool

RECORDS MANAGEMENT POLICY

IFRS FOUNDATION DOCUMENT RETENTION AND DESTRUCTION POLICY

Merthyr Tydfil County Borough Council. Data Protection Policy

UNIVERSITY OF LONDON RECORDS MANAGEMENT MANUAL: BEST PRACTICE PROCEDURE No. 4 ELECTRONIC RECORDS MANAGEMENT

Territory Records (Records Disposal Schedule Disaster Recovery (Human Services) Records) Approval 2005 (No 1)

Welcome to InFixi Exchange Mailbox Recovery Software. Help Guide. Exchange Mailbox recovery software

Rackspace Archiving Compliance Overview

How To Preserve Records In Mississippi

FRONTIER REGIONAL/UNION#38 SCHOOL DISTRICTS. Records Retention Policy for Electronic Correspondence

The Online Archive offers compared to the conventional PST files many advantages, e. g.:

M i m o s a A r c h i v e S o f t w a r e ~ S e a r c h i n g f o r m e s s a g e s. Outline. Introduction to Mimosa Archive

Lotus Notes Archive Guide

Best Practice Guidance on Information and Records Management

2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.

EFFECTIVE DATE: JULY 1, 2010

Records Management plan

DATA PROTECTION AND DATA STORAGE POLICY

PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Records Management Policy. Version 4.0. Page 1 of 11 Policy PHSO Records Management Policy v4.

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

Solving.PST Management Problems in Microsoft Exchange Environments

Scotland s Commissioner for Children and Young People Records Management Policy

Data Security and Extranet

Retention 7/11/2014 1

LORD CHANCELLOR S CODE OF PRACTICE ON THE MANAGEMENT OF RECORDS UNDER

Storage of Messages Using Microsoft Outlook

Document Management Policy

Exchange Server 2010 & C2C ArchiveOne A Feature Comparison for Archiving

A practical guide to IT security

Complying with the Records Management Code: Evaluation Workbook and Methodology. Module 8: Performance measurement

4) Suspension of Record Disposal In Event of Litigation or Claims

Preservation and Production of Electronic Records

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice

Records Management Policy.doc

SUTLEJ TEXTILES AND INDUSTRIES LIMITED DOCUMENT PRESERVATION AND RETENTION POLICY

The E-Discovery Process

FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY

Transcription:

FORCE PROCEDURES Email Retention, Archiving and Destruction Procedure v1.2 Procedure Reference Number: 2010.08 Procedure Author: Samantha Hampson, Records Manager Procedure Review Date: 1 st April 2011 At the time of ratifying this procedure, the author is satisfied that this document complied with relevant legislation and Force requirements. Sign and date (Author(s)) Version 1.2 Not Protectively Marked 1

Procedure Index ELECTRONIC NAVIGATION: - move the cursor over the page number in the index or blue underlined text until a hand appears. Click the left mouse button once and it will jump to the specified part of the document. 1. Responsibilities... 3 2. Guidance... 3 3. Procedure Aim... 4 4. Appeals... 5 5. Review... 5 Version 1.2 Not Protectively Marked 2

1. Responsibilities 1.1 Overall responsibility for this procedure lies with the Force Records Manager. 1.2 Overall responsibility for the content of emails lies with each individual. Refer to the Acceptable Use Policy within the Force Information Security Policy and the Email Usage Procedure for further clarification. 2. Guidance 2.1 This procedure runs from 1 st April 2010. 2.2 The retention periods outlined in this procedure will be reviewed regularly, at least every 12 months. This will allow for management information to be extracted from the technical product to enable the force to analyse the information staff are accessing and make more informed business decisions regarding retention periods. 2.3 If an email or an attachment within an email is no longer required by the user it should be deleted manually as normal. However, the user must be aware that this email and/or attachment will be held within a central archive server for a period of 12 months from date of receipt or creation. 2.4 The email header will remain in the mailbox for 12 months from date of receipt or creation, allowing access to the email from Lotus Notes. After the first 12 months the email and attachment will be deleted, unless manually moved to a longer-term archive folder (see 3.11). Emails retained for more than 12 months will only be viewable in a separate search tool. 2.5 This will ensure the force complies with the Data Protection Act 1998, the Freedom of Information Act 2000 and the Limitation Act 1980. 2.6 Any documents that are stored within the stationery and draft folders of a mailbox will not be removed to archive or destroyed. 2.7 The live email system will be backed up on a daily basis for disaster recovery purposes only and not accidental deletion, and will use a 30 day backup cycle. Accidentally deleted emails can be retrieved from the archive system up to 12 months from the date of receipt. 2.8 All emails sent or received by members of staff will immediately have a copy stored on the central management server to help ensure compliance with the above Acts. A complete audit trail will be available showing when an email is sent or received. This copy will be destroyed after a 12 month period. 2.9 An overview and instructions on the email archiving solution will be distributed to all members of staff for reference purposes. Version 1.2 Not Protectively Marked 3

2.10 Any email created or received on or after 1 st April 2010 will have a retention period of 12 months. 2.11 Emails created or received prior to the 1 st April 2010 will be held for a maximum period of 7 years in an archive storage facility. The amount of data held will diminish during that period, as emails from 2003 (and older) will be deleted during 2010 etc. All of this legacy email will be deleted by 1 st April 2017. 2.12 Upon request, selected users, Departments or Sections may be provided with a longer term retention folder, up to a maximum of 7 years e.g. Legal Services. A business case must be submitted to the IT Service Desk requesting this functionality. Each request will be dealt with on a case by case basis. 2.13 Emails created or received by Cheshire Constabulary on or after 1 st April 2010 will not be kept any longer than the specified 12 month retention period. 2.14 Any data that is needed to be kept for longer than the specified retention periods should be transferred into a relevant operational or non-operational system. 3. Procedure Aim 3.1 Email is any document stored in a personal or group mailbox on the Cheshire Constabulary Lotus Notes infrastructure, regardless of the equipment it is stored on i.e. server, desktop or laptop computer. The procedure also extends to any attachments and embedded information stored within the emails that are sent or received by the Force. 3.2 Email has become the main textual communications medium between Cheshire Constabulary, partner agencies, other authorities and members of the public. It is important that the force appropriately manages the information in its email system to assure records management functions and statutory compliance is adhered to. It is also important that email is recognised as a transient system and that it is not designed to operate as a document storage facility. Any attachments to be retained by the Constabulary should be stored on the appropriate Network drive or operational system. 3.3 This procedure excludes all other databases created using Lotus Notes software such as document libraries and databases. Owners of other email systems, for example covert webmail, must provide appropriate auditable controls and ensure appropriate disposal of information is carried out in line with legislation. 3.4 Attachments to emails require huge amounts of space and multiple copies make their management and use both difficult and expensive. Version 1.2 Not Protectively Marked 4

3.5 To avoid expensive storage costs and assist with professional information and records management, staff should not retain any emails or attachments without a valid purpose and this procedure outlines the automatic processes that will be put in place to manage this. 3.6 This email retention, archiving and destruction procedure has been created to ensure all staff are aware of how email based data is managed. 3.7 This procedure should be read in conjunction with: Email Usage Procedure Records Management Procedure Information Management Strategy Force Information Security Policy (FISP). 4. Appeals 4.1 Persons affected by this procedure have the right to make representations, challenges and/or appeals against the relevant decision(s) through civil litigation or internal management, grievance or police complaint procedures. 4.2 A person who claims that a public authority has acted (or proposes to act) in a way which is unlawful under the Human Rights Act 1998, may bring proceedings against the authority under the Act in the appropriate court or tribunal. Alternatively the person may rely on the Convention right or rights concerned in any legal proceedings, if they are a victim (or would be) of the alleged unlawful act. 5. Review 5.1 This procedure will be reviewed in April 2011 to consider: Any changes in retention periods Its effectiveness in the business area concerned Any changes to legislation Challenges to the procedure Any identified inefficiencies in relation to implementation Impact on diversity and equality Version Date Status Authorised 1.0 Jan 10 Draft for consultation S Hampson 1.2 14/04/10 Amended and Published S Hampson Version 1.2 Not Protectively Marked 5