{"id":1708,"date":"2018-05-09T14:01:41","date_gmt":"2018-05-09T18:01:41","guid":{"rendered":"http:\/\/www.exchangedefender.com\/blog\/?p=1708"},"modified":"2018-05-09T14:10:17","modified_gmt":"2018-05-09T18:10:17","slug":"achieving-ediscovery-and-compliance-archiving-requirements-in-5-steps","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2018\/05\/achieving-ediscovery-and-compliance-archiving-requirements-in-5-steps\/","title":{"rendered":"Achieving eDiscovery and Compliance Archiving requirements in 5 steps"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1727 alignleft\" style=\"margin-right: 15px;\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/05\/compliance-keyboard-3d-render-illustration-with-word-on-blue-key-stock-photo_csp24740647-e1525877170697.jpg\" alt=\"\" width=\"264\" height=\"176\" \/>Signing up for the <a href=\"https:\/\/www.exchangedefender.com\/compliance-archive.php\">Compliance Archiving<\/a> service is the first step in reaching regulatory compliance when it comes to email retention and eDiscovery. The following five steps will put you on the right path of achieving and maintaining that compliance:<\/p>\n<h2><\/h2>\n<h2><\/h2>\n<p>&nbsp;<\/p>\n<h2><strong><span style=\"color: #3366ff;\">1.Understand what you need to keep and for how long.<\/span><\/strong><\/h2>\n<p>Your regulatory\/oversight body will provide details about how long you are required to hold on to your email. In our experience with Compliance Archiving, you also need to pay attention to the Statue of Limitations that your business may be liable for. Very often the discovery process for lawsuits includes legal hold requests and record requests that are longer than regulatory requirement.<\/p>\n<h2><span style=\"color: #3366ff;\">2. Get the right product and implement it correctly.<\/span><\/h2>\n<p>Your compliance has to be all encompassing \u2013 all email must be archived. With <a href=\"https:\/\/www.exchangedefender.com\/compliance-archive.php\">ExchangeDefender Compliance Archiving<\/a> all of your inbound, outbound, and interoffice email is collected, archived and protected in the cloud. You can search for any document at any time and be certain that it has not been tampered with and that no emails have been deleted \u2013 something that sets our eDiscovery\/archiving apart from backup solutions.<\/p>\n<h2><span style=\"color: #3366ff;\">3. Keep an eye on it to make sure it works<\/span><\/h2>\n<p>Just setting up a compliance archiving solution is not sufficient enough. there is no protection for technical negligence in regulations. You are expected to keep your mail server and everything connected to it secure. Penalties for data loss, compromised credentials, and data leakage are severe and are not a valid excuse for not having compliance.<\/p>\n<h2><span style=\"color: #3366ff;\">4. Create Compliance Officer reports frequently.<\/span><\/h2>\n<p>Compliance Officer within your organization must create reports on a monthly basis to assure no confidential information is allowed to leave the organization. Some industries have an even more specific and severe restriction on the type of communication that can take place over email and what sort of information can be sent \u2013 compliance officers run eDiscovery reports to assure nothing confidential is being shared and address problems and exceptions routinely<\/p>\n<h2><span style=\"color: #3366ff;\">5. Routinely audit the entire system to maintain compliance.<\/span><\/h2>\n<p>Organizations grow and change over time and remaining compliant with new regulations is key. ExchangeDefender Compliance Archiving service often sends out advisories, best practices, tips and suggestions to adjust your process because you are always expected to be in full compliance with the latest requirements. Every time you add a new employee or change your mail server configuration or new lines of business \u2013 compliance must extend to cover these new records that may be of interest to someone down the road.<\/p>\n<h3 style=\"text-align: left;\"><a href=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/05\/20180509_084307.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1722 alignleft\" style=\"margin-right: 15px;\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/05\/20180509_084307.jpg\" alt=\"\" width=\"154\" height=\"154\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/05\/20180509_084307.jpg 574w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/05\/20180509_084307-150x150.jpg 150w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/05\/20180509_084307-300x300.jpg 300w\" sizes=\"auto, (max-width: 154px) 100vw, 154px\" \/><\/a><\/h3>\n<h3><\/h3>\n<h3 style=\"text-align: left;\"><span style=\"color: #3366ff;\">&#8220;One of the biggest mistakes organizations make with regulatory compliance is thinking that it\u2019s a service, product or a one-time effort: quite the opposite!&#8221;<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\">Achieving regulatory compliance means implementing the right product, conducting routine audits, complying with changes in regulations and having full control of the environment where messages are stored as employees come and go.<\/p>\n<p style=\"text-align: left;\">In the event of an audit, you will be asked to produce record and you will be judged on your ability to provide specific records that are requested, not the best effort you made in trying to achieve compliance. Considering the fines and legal complications, it makes sense to revisit the five steps outlined here annually and make adjustments as necessary.<\/p>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":51,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44,49,33,4,1,47,22],"tags":[63,24,32,66],"class_list":["post-1708","post","type-post","status-publish","format-standard","hentry","category-archiving","category-business-continuity","category-compliance","category-exchangedefender","category-uncategorized","category-industrynews","category-pro-tips","tag-archiving","tag-compliance-archive","tag-exchangedefender","tag-pro-tips"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=1708"}],"version-history":[{"count":32,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1708\/revisions"}],"predecessor-version":[{"id":1735,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1708\/revisions\/1735"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=1708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=1708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=1708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}