CN108985722A - E-mail management strategy based on full lifecycle theory - Google Patents
E-mail management strategy based on full lifecycle theory Download PDFInfo
- Publication number
- CN108985722A CN108985722A CN201810783025.1A CN201810783025A CN108985722A CN 108985722 A CN108985722 A CN 108985722A CN 201810783025 A CN201810783025 A CN 201810783025A CN 108985722 A CN108985722 A CN 108985722A
- Authority
- CN
- China
- Prior art keywords
- management
- information
- stage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Data Mining & Analysis (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of e-mail management strategy based on full lifecycle theory, including the management of Email Information establishing stage, Email Information protection stage management, the management of Email Information dial-tone stage, the management of Email Information migration phase, the management of Email Information archiving phase and Email Information processing stage management.The present invention is provided with the management strategy more standardized with each life cycle phase of Email of promotional value, create the mail management tracing subsystem and user management analysis system of Life cycle, it is combined with existing email system, the sensitive information of each links such as the generation of real-time tracking mail, delivery, reception, storage, and manager is passed to for information about to suspicious mail, reinforce anti-rubbish mail strategy.
Description
Technical field
The present invention relates to mail management fields, and in particular to a kind of e-mail management plan based on full lifecycle theory
Slightly.
Background technique
Email is as management file, so that including that information in these Emails can help to improve work and imitate
Rate is easily retrieved and is browsed to the user for possessing certain permission, and can be used as archives in due course and use becomes evidence
Or documents and materials.
From the point of view of practice principle, colleges and universities' e-mail system is mostly used come the draft document that circulates, distribution memorandum, distributes finger
Enable, support colleges and universities' running, transmission colleges and universities' file etc..Colleges and universities' Email has distinguishing feature, informal special with dynamic
Sign can make Email generate risk during Information Lifecycle Management, and especially Current statutory system is to Email
Relevant regulations are not perfect, it is also possible to generate legal issue.Colleges and universities' Email is usually the tool sent in colleges and universities' routine work
There is the information of important value, this also determines colleges and universities' Email information value with higher, and it is only to possessing permission
User service.Colleges and universities' Email also has the characteristics that fugitiveness and unstability, this is also the feature institute of digital information itself
It determines.
Summary of the invention
To solve the above problems, the present invention provides a kind of e-mail management strategy based on full lifecycle theory.
To achieve the above object, the technical scheme adopted by the invention is as follows:
E-mail management strategy based on full lifecycle theory, including with the next stage:
(1) Email Information establishing stage management
After mail receives, need to Email be classified and be identified, determine whether it is created or received, determine this
Email message is what type of file;It if this mail is considered as non-recorded material, should be deleted immediately, wrap
It includes: personal mail, spam and uncalled mail;If email message be it is relevant with business, should judge
Which class message is the message received be, and applies for the storage life of appropriate time;
(2) Email Information protects stage management
The Email Information protection stage includes reserve liability, backup and system safety, the management of 3 aspects of confidentiality;
First aspect: reserve liability
It needs to retain once email message is determined, it is thus necessary to determine that how to be responsible for saving it, be sender or connect
Debit;
Second aspect: backup and system safety
System answers schedule backup to prevent system mistake, unintentional deletion or distort;Unit is needed to formulate and be closed simultaneously
It in processing, ensures the regulation of safety of electronic mail grade access system, file is tracked by maintenance checkpoint index, in record system
Any variation of email message;
The third aspect: the confidentiality of Email
Email exchange should follow one it is assumed that an envelope mail can be read by many people, without only specified
Recipient, sensitive either confidential information need to be using cryptographic protocol appropriate come the safety of certified mail;
(3) Email Information dial-tone stage management
Email for public access must can access during their entire preservation, and should support one
Plant timely and effectively retrieval mode;Document name, filing, index and the searching system that a standard need to be developed, assist to maintain one
A unit is within the retention period of mail to the accessibility of mail;
(4) management of Email Information migration phase
According to the storage time length or value of Email, grade of service level is established within the storage system, deployment is just
Beginning computer management tools, by e-mail messages Autonomic Migration Framework into corresponding grade of service level;
(5) Email Information archiving phase management
E-mail system administrator should policies and system ensure email record by preservation appropriate, guarantor
Shield;Mail record with long-term value should be stored in one have appropriate safety measure come protect record do not changed or
Damage, and regular backtracking can be provided;
(6) management of Email Information processing stage
Expire when retaining, non-permanent reservation record needs to be deleted, and need to formulate complete email message and destroy policy, really
Email message is protected to be completely removed.
Further, in the e-mail system day-to-day operation stage, increase management tracing subsystem, real-time tracking mail produces
The sensitive information of each links such as raw, delivery, reception, storage, and manager is passed to for information about to suspicious mail.
Further, using active dynamic group management agreement, for setting up the mail of having time stamp and safety label
User group, label need every member's confirmation in group that can mass-send, and hereafter group mail will be no longer by anti-rubbish in the group
Rubbish mailing system intercepts.
The present invention is provided with the management strategy more standardized with each life cycle phase of Email of promotional value, wound
The mail management tracing subsystem and user management analysis system for building Life cycle, combine with existing email system,
The sensitive information of each links such as the generation of real-time tracking mail, delivery, reception, storage, and the transmitting for information about to suspicious mail
To manager, reinforce anti-rubbish mail strategy.By using full life cycle management method, except to school teacher, student at school, from
School personnel etc. carry out Classification Management, form different access permission, are authenticated outside the voucher that a key logs in for campus network, need to be directed to
User information, e-mail messages of accumulation etc. carry out the data mining analysis of Life cycle for many years, are other administrative departments of school
Effective administration base is provided.
Specific embodiment
In order to which objects and advantages of the present invention are more clearly understood, the present invention is carried out with reference to embodiments further
It is described in detail.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to limit this hair
It is bright.
A kind of e-mail management strategy based on full lifecycle theory of the embodiment of the present invention, including with the next stage:
(1) Email Information establishing stage management
After mail receives, need to Email be classified and be identified, determine whether it is created or received, determine this
Email message is what type of file;It if this mail is considered as non-recorded material, should be deleted immediately, lead
It include: personal mail, spam and uncalled mail;If email message be it is relevant with business, should
Judge which class message is the message received be, and applies for the storage life of appropriate time;
(2) Email Information protects stage management
The Email Information protection stage includes reserve liability, backup and system safety, the management of 3 aspects of confidentiality;
First aspect: reserve liability
It needs to retain once email message is determined, it is thus necessary to determine that how to be responsible for saving it, be sender or connect
Debit;
Second aspect: backup and system safety
System answers schedule backup to prevent system mistake, unintentional deletion or distort;The purpose of schedule backup program
Being can be with emergent restoring, but it cannot function as the method that Email long-term record saves, it is ensured that email record
As the admissible evidence of unit of activity, management, audit and legal liabilities are provided;Unit is needed to formulate about processing, is ensured simultaneously
Safety of electronic mail grade accesses the regulation of system, tracks file by maintenance checkpoint index, email message in record system
Any variation;
The third aspect: the confidentiality of Email
Email message transmission will pass through several computers and network, it is possible to which in midway, any one node is captured looks into
It reads.Email exchange should follow one it is assumed that an envelope mail can be read by many people, without only specified reception
Side, sensitive either confidential information need to be using cryptographic protocol appropriate come the safety of certified mail;
(3) Email Information dial-tone stage management
Since Email is public records, it is required as other public records of unit by the same open record
Constraint.Email for public access must can access during their entire preservation, and should support one
Plant timely and effectively retrieval mode;Document name, filing, index and the searching system that a standard need to be developed, assist to maintain one
A unit is within the retention period of mail to the accessibility of mail;
(4) management of Email Information migration phase
All Emails simultaneously do not have same value, they need not retain the identical time.In Email
Information, Establish reason and its administrative, finance, law or historical value determine that it is any message.Some electronics postals
Part only has secondary management record.There are great administration, law, research or with other values when Email be used to transmit
Record, need to retain for a long time.According to the storage time length or value of Email, the grade of service is established within the storage system
Level disposes initial information management tool, by e-mail messages Autonomic Migration Framework into corresponding grade of service level;
(5) Email Information archiving phase management
E-mail system administrator should policies and system ensure email record by preservation appropriate, guarantor
Shield;Mail record with long-term value should be stored in one have appropriate safety measure come protect record do not changed or
Damage, and regular backtracking can be provided;
(6) management of Email Information processing stage
Expire when retaining, non-permanent reservation record needs to be deleted, and need to formulate complete email message and destroy policy, really
Email message is protected to be completely removed.
In the present embodiment, in the e-mail system day-to-day operation stage, increase management tracing subsystem, real-time tracking mail
The sensitive information of each links such as generation, delivery, reception, storage, and manager is passed to for information about to suspicious mail.
In the present embodiment, using active dynamic group management agreement, for setting up the postal of having time stamp and safety label
Part user group, label need every member's confirmation in group that can mass-send, and hereafter group mail will be no longer anti-in the group
Garbage mail system intercepts.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the principle of the present invention, it can also make several improvements and retouch, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (3)
1. the e-mail management strategy based on full lifecycle theory, which is characterized in that including with the next stage:
(1) Email Information establishing stage management
After mail receives, need to Email be classified and be identified, determine whether it is created or received, determine this postal
Part message is what type of file;If this mail is considered as non-recorded material, should be deleted immediately comprising:
Personal mail, spam and uncalled mail;If email message be it is relevant with business, should judge to receive
To message be any class message, and apply for the storage life of appropriate time;
(2) Email Information protects stage management
The Email Information protection stage includes reserve liability, backup and system safety, the management of 3 aspects of confidentiality;
First aspect: reserve liability
It needs to retain once email message is determined, it is thus necessary to determine that how to be responsible for saving it, be sender or recipient;
Second aspect: backup and system safety
System answers schedule backup to prevent system mistake, unintentional deletion or distort;Unit needs to formulate about place simultaneously
Reason, the regulation for ensureing safety of electronic mail grade access system, track file, mail in record system by maintenance checkpoint index
Any variation of message;
The third aspect: the confidentiality of Email
Email exchange should follow one it is assumed that an envelope mail can be read by many people, without only specified reception
Side, sensitive either confidential information need to be using cryptographic protocol appropriate come the safety of certified mail;
(3) Email Information dial-tone stage management
Email for public access must can access during their entire preservation, and should support it is a kind of and
When effective retrieval mode;Document name, filing, index and the searching system that a standard need to be developed, assist to maintain a list
Position is within the retention period of mail to the accessibility of mail;
(4) management of Email Information migration phase
According to the storage time length or value of Email, grade of service level is established within the storage system, disposes initial letter
Management tool is ceased, by e-mail messages Autonomic Migration Framework into corresponding grade of service level;
(5) Email Information archiving phase management
E-mail system administrator should policies and system ensure email record by preservation appropriate, protection;
Mail record with long-term value, which should be stored in one, has appropriate safety measure to protect record not changed or damaged
It is bad, and regular backtracking can be provided;
(6) management of Email Information processing stage
Expire when retaining, non-permanent reservation record needs to be deleted, and need to formulate complete email message and destroy policy, it is ensured that postal
Part message is completely removed.
2. the e-mail management strategy based on full lifecycle theory as described in claim 1, which is characterized in that in electronics
Mailing system day-to-day operation stage, increase management tracing subsystem, real-time tracking mail generate, deliver, receive, store link
Sensitive information, and manager is passed to for information about to suspicious mail.
3. the e-mail management strategy based on full lifecycle theory as described in claim 1, which is characterized in that using master
Dynamic dynamic group management agreement, for setting up the mail user group of having time stamp and safety label, label needs in group every
Member's confirmation can be mass-sended, and hereafter group mail will be intercepted no longer by anti-garbage mail system in the group.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810783025.1A CN108985722A (en) | 2018-07-17 | 2018-07-17 | E-mail management strategy based on full lifecycle theory |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810783025.1A CN108985722A (en) | 2018-07-17 | 2018-07-17 | E-mail management strategy based on full lifecycle theory |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108985722A true CN108985722A (en) | 2018-12-11 |
Family
ID=64549362
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810783025.1A Pending CN108985722A (en) | 2018-07-17 | 2018-07-17 | E-mail management strategy based on full lifecycle theory |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108985722A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109802884A (en) * | 2018-12-29 | 2019-05-24 | 论客科技(广州)有限公司 | A kind of moving method and device of campus mail |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104778420A (en) * | 2015-04-24 | 2015-07-15 | 广东电网有限责任公司信息中心 | Method for establishing safety management view of full life cycle of unstructured data |
CN106656761A (en) * | 2016-12-28 | 2017-05-10 | 珠海市魅族科技有限公司 | Email management method and device |
CN107093054A (en) * | 2010-08-24 | 2017-08-25 | 瓦欧尼斯系统有限公司 | Enterprise E-mail and file supervisory systems and method |
CN107409086A (en) * | 2015-03-09 | 2017-11-28 | 微软技术许可有限责任公司 | Mass Data Management is carried out in communication applications by multiple mailboxes |
-
2018
- 2018-07-17 CN CN201810783025.1A patent/CN108985722A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107093054A (en) * | 2010-08-24 | 2017-08-25 | 瓦欧尼斯系统有限公司 | Enterprise E-mail and file supervisory systems and method |
CN107409086A (en) * | 2015-03-09 | 2017-11-28 | 微软技术许可有限责任公司 | Mass Data Management is carried out in communication applications by multiple mailboxes |
CN104778420A (en) * | 2015-04-24 | 2015-07-15 | 广东电网有限责任公司信息中心 | Method for establishing safety management view of full life cycle of unstructured data |
CN106656761A (en) * | 2016-12-28 | 2017-05-10 | 珠海市魅族科技有限公司 | Email management method and device |
Non-Patent Citations (1)
Title |
---|
李文生等: "基于信息生命周期管理的政务电子邮件管理策略", 《情报科学》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109802884A (en) * | 2018-12-29 | 2019-05-24 | 论客科技(广州)有限公司 | A kind of moving method and device of campus mail |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104734943B (en) | A kind of processing method and system of Email | |
US8037029B2 (en) | Automated records management with hold notification and automatic receipts | |
US20060031357A1 (en) | Method of and system for management of electronic mail | |
CN107093054B (en) | Enterprise e-mail and file monitoring system and method | |
US20120278862A1 (en) | Methods and systems for auto-marking, watermarking, auditing, reporting, tracing and policy enforcement via e-mail and networking systems | |
CN103902917B (en) | Full-view monitoring method for access range and motion trails of cross-domain files | |
Ngulube | " Ghosts in our machines": preserving public digital information for the sustenance of electronic government in sub-Saharan Africa | |
CN104239812A (en) | Local area network data safety protection method and system | |
Kalusopa | Extent of the integration of information communication and technology (ICT) systems in the management of records in labour organisations in Botswana | |
CN108985722A (en) | E-mail management strategy based on full lifecycle theory | |
Moulton et al. | Electronic communications risk management: a checklist for business managers | |
Ncaagae-Mbe | Managing Records in the Covid-19 Era at the Botswana Communications Regulatory Authority. | |
CN116383861B (en) | Computer security processing system based on user data protection | |
Daudov et al. | Principles of protection, storage and movement of documents during electronic document flow within and outside the organization | |
CN204314881U (en) | A kind of LAN data security protection system | |
Guidelines for State of Ohio Executive Agencies | ||
Zaliene | Development and implementation of records management policies and procedures in Cocoa Bean | |
Gródek-Szostak et al. | CORPORATE CYBERSECURITY–AN INTRODUCTION1 | |
King | Data classification: A means to an end | |
Secretariat | Policy on Records Management for the Arctic Council Secretariat | |
Howard | Invasion of Privacy Liability in the Electronic Workplace: A Lawyer's Perspective | |
Box40238 | ELECTRONIC MAIL | |
HIGHLY | EDPACS | |
Safsten | Five keys to protecting your organization's E-mail | |
Murphy | Preventing Mistakes in E-mail Records Management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181211 |
|
RJ01 | Rejection of invention patent application after publication |