#1 Resource for Lotus Professionals 
Home | Search

  Editorial
    DominoPro Articles
    Group Computing Archive
    Ask Ben
    News & Notes
    Tips Corner
    Certification Corner
    Gary's Page
    DominoPro Developer

  Forums
    Welcome
    General
    Administration
    Adv Programmability
    NT/2000 Integration
    AS/400 Integration

  Career
    Job Center

  Subscribe
    Group Computing
    DominoPro Developer
    DominoWire

  Site Info
    About Us
    Contact Us
    Masthead
    Media Kit
    Editorial Calendar
    Write for Us




AS400Network ad


 E-Mail and the Law

by Eric Arnum Group Computing Magazine, May 1999
Article ID: 162
Related Topics: e-mail

See more articles by Eric Arnum
  Printer-Friendly Version

Any company, even the most law-abiding, can get into trouble if it’s careless about its e-mail. That’s why most companies need a rigorous e-mail retention policy—specifically, a policy that states when to throw out e-mail. Otherwise it may find itself in court one day, fighting to keep other parties from rummaging through its e-mail archives in search of damning evidence. In light of the role that e-mail has played in recent high-profile trials, particularly the Microsoft antitrust trial, you’d be wise to establish a strict e-mail retention policy—and to follow it.

Basic Rules of E-Mail

It’s important to keep these basic rules of e-mail in mind:

  • E-mail is public. Never write something in an e-mail message that you wouldn’t want anyone to read. It’s a two-way communication, so there’s always another copy that you have no control over. The more controversial a message, the greater the chance that someone will keep a copy tucked away somewhere.
  • E-mail is news. Pretty much any article you read about the Microsoft antitrust trial will mention an e-mail message that the company is using in its defense, or one that Justice Department lawyers are using to bolster their prosecution.
  • E-mail is evidence. The report of independent counsel Kenneth Starr (www.house.gov/judiciary) refers to numerous e-mail messages exchanged by Monica Lewinsky, her friend Catherine Davis, and her confessor Linda Tripp.

The Starr report also demonstrates the folly of forgetting the first rule (e-mail is public). It alleges that after Lewinsky became a potential witness in the Paula Jones lawsuit, presidential friend Vernon Jordan told her to delete all files and e-mail messages about Bill Clinton. She and Davis had begun communicating by e-mail when Davis moved to Tokyo; although Lewinsky deleted all her messages, Davis’s copies stuck around. Whether deliberate or inadvertent, the retention of old e-mail is a potentially dangerous practice.

The Microsoft Case

Legal evidence left behind in e-mail messages can reveal a great deal about a witness’s motives or state of mind, as well as the timing of key events. It no longer matters what a witness can’t recall during a deposition—if an electronic paper trail can fill in the gaps.

In the Microsoft case, for example, e-mail figures prominently in the prosecution’s exhibits (www.usdoj.gov/atr/cases/ms_exhibits.htm). In one message, Bill Gates said that a worldwide "hit squad" should be sent after IBM. In another he seemed to suggest a cash payment to Intuit in return for their support in the browser wars. And in their messages, Microsoft engineers made statements that directly contradict Gates’s public comments about the inseparability of Windows and Internet Explorer.

The defense has also used e-mail to its advantage, including an e-mail in which a Sun Microsystems executive states that he trusts Saddam Hussein more than Netscape (see www.microsoft.com/presspass/trial/exhibits). In a 1977 message, a Netscape engineer wrote that Navigator 4.0 was such an awful product that it should never have been released. And in June 1995, Netscape CEO Jim Barksdale wrote in a "confidential" e-mail about his "very friendly" visit to Microsoft, during which top Microsoft executives offered to integrate the Navigator browser with Windows NT.

Did any of these authors think for a moment that their confidential advice and opinions would someday be read in a federal court? As e-mail becomes a mass communications medium, are people watching what they write and who they send it to? More importantly, is anyone cleaning up these e-mail systems so that these spontaneous utterances don’t someday become damaging evidence?

Legal Guidelines

Attorneys now routinely request copies of relevant e-mail in the discovery phase of a trial. "People say things in e-mail that they would never say in hard copy," said Jim Bruce, a partner in the Washington, D.C.-based communications law firm Wiley, Rein, and Fielding. Moreover, electronic communications are searchable by keyword. If a company hasn’t categorized its message archives by topic, opposing attorneys are likely to ask to see everything, so that they can go on what Bruce calls a "fishing expedition" into the company’s memory.

"It’s perfectly fine to destroy documents," Bruce said, but it’s too late to do so once they become relevant in a court proceeding. In addition, companies can’t destroy tax-related documents, and anyone doing business with the government has to follow strict document retention guidelines. But, he said, as long as e-mail is deleted according to a consistent and routine maintenance policy—not because the messages have been subpoenaed—it’s as legal as emptying the wastebaskets every night.

Companies also need to remember to delete old e-mail from backup tapes. "If they let backups pile up too long," Bruce explained, "they may not know what they contain." An opposing lawyer could fish through messages the users thought were deleted. "If you want to have backup storage, keep it for a fairly short time, and then get rid of it."

Despite the by now well-known legal consequences of e-mail retention, most system administrators are still far more concerned about purely technical issues of keeping e-mail—for example, the size of an unrestrained message store and the difficulty of backing it up and restoring mailboxes. Some companies routinely delete old messages, but they do so to reduce clutter, not to erase potential evidence. In the rest of the article, I’ll describe the e-mail policies of various companies and give you some ideas to apply to your own company’s e-mail retention policies.

E-Mail Policy Statements

Rohm and Haas, a chemicals manufacturer based in Philadelphia, has been acutely aware of the dangers of old messages since long before the Microsoft trial. According to Victor Ross, manager of corporate e-mail services, old messages are routinely deleted from an employee’s in-box after 45 days, while messages that have been moved from the in-box to a folder are retained for two years. Copies of sent messages are deleted automatically after 30 days unless they too are filed in a folder.

Ross said these policies were instituted because of how much time it took to run disk management utilities on an ever-enlarging cc:Mail message store. As Rohm and Haas upgrades from cc:Mail post offices to Domino servers, which store e-mail more compactly, concerns about the size of the message store will go away; nevertheless, Ross isn’t planning to change the company’s message retention rules. Employees have been trained to think about which messages they need to keep around and to move them into folders, and Ross doesn’t want those habits to end.

Rohm and Haas recently issued a policy statement reminding e-mail users that confidential documents should not be sent outside the company, and that users should be aware of who is on their cc: list before using the e-mail software’s reply-to-all feature. The policy tells users that they should be aware of the security risks involved with e-mail, and that they should control what they say, because they can’t always control who reads what they write.

That last point is particularly important. Ken Bisconti, senior director of communications product marketing for Lotus, said that Lotus withheld a certain feature from Notes to help breed good sending habits. "We’ve always tried to treat e-mail as legal documents," he explained. "That’s one of the reasons that we’ve long shied away from providing any e-mail recall functionality, which is requested by a lot of people who come to Notes from, for instance, a GroupWise system." (Some e-mail systems, such as Novell GroupWise and America Online, have an unsend feature that allows the sender to recall unread messages; if you don’t have this feature, you cannot recall a message.)

Ollie North and Iran-Contra

Even companies that diligently delete old messages and train users not to send confidential documents outside the company can find themselves burned by less obvious problems, such as autoforwarding. For example, Goran Fransson, chief technology officer and cofounder of TenFour Sweden AB, a Stockholm-based security software vendor with offices in Chantilly, Va., said he recently sat in on a meeting in which his company was trying to sell an outbound e-mail filtering system to a skeptical Notes administrator.

The administrator was talking proudly about how secure his e-mail system was, and how he had no need for TenFour’s filtering system. "But at that same meeting," Fransson recalled, "a user explained how he autoforwards all his Notes messages to his Hotmail account. The network administrator just looked at him and said, ‘You better not show anybody else how to do that.’" All it takes is one copy to fall into the wrong hands—stored on a stolen laptop or saved in an Internet cafe’s e-mail client—for all security efforts to be in vain.

Another problem that may escape notice is backup tapes, as attorney Bruce mentioned earlier. A vivid example of this occurred more than a decade ago, when Oliver North and his fellow White House PROFS (a mainframe e-mail system) users were shocked to find out that their top-secret discussions about Iran and Nicaragua were routinely backed up and filed away. To truly erase a message, not only must the sender and all recipients delete their copies, but the administrator must erase all the backup tapes made during that message’s life. In fact, as a direct result of the so-called PROFS case, all government e-mail messages are considered to be historical records (see http://www.cpsr.org/cpsr/foia/PROFS_CASE/).

Scott Mansfield, an e-mail specialist for pharmaceutical house Eli Lilly and Company in Indianapolis, said he regularly recycles old backup tapes after two weeks, because by then they’ve ceased to be useful for disaster recovery. Eli Lilly now uses Notes, but when he began recycling backup tapes the company was using a Digital TeamLinks system. Even then, though, old messages were never deleted. But each user’s trash folder was emptied once a week. "It was up to the individual users to police their own mail," he said.

Perot’s Company

Perot Systems, a Dallas-based information technology services company, routinely deletes messages after 30 days, but not for legal reasons, according to Michael Burchfiel, a Perot messaging engineer. On the company’s old cc:Mail system, now being replaced by a Microsoft Exchange Server network, disk space was scarce and backups were time-consuming. The new Exchange system doesn’t limit the size of the message store, and backups are performed automatically. As Perot Systems migrates to Exchange, the 30-day time limit will be dropped. However, to prevent users from becoming e-mail pack rats, the company will impose a per-user mailbox size limit.

Burchfiel said that Perot Systems has never been stung by a lawsuit that turned e-mail into evidence. "Every associate has to sign an employment agreement that covers as much of that as possible," he said. However, the agreement governs only the sending of potentially offensive e-mail, such as messages that contain threats, pornography, and dirty jokes, or that involve gambling. The e-mail in the Microsoft trial didn’t violate these guidelines; the executives and engineers at Microsoft, Sun, and Netscape were strategizing, advising, and generally thinking out loud—in e-mail. Nobody is saying that these messages shouldn’t have been sent, but should they have been kept?

Revising the corporate e-mail retention policy in light of e-mail’s role in the Microsoft trial has not been a big concern at Perot Systems, Burchfiel acknowledged. "We have thought about it, but it’s not something we worry ourselves with too much. We haven’t made any direct changes because of it. But it is kind of scary."

Quick Deletion?

At an international credit card company, the legal staff told a messaging services manager that they were concerned about e-mail retention because they didn’t want old e-mail to be used against the company in a court of law. So the messaging manager, who declined to be identified, instituted a policy that called for the deletion of any message more than 30 days old. "‘Anything of legal importance should be retained in a paper format,’" he said he told his colleagues. "‘I’ll keep backups for disaster recovery or operational recovery, not for archival purposes.’"

Executives at this company will probably never find themselves challenged in court to explain what they meant in some hastily written e-mail. However, that’s not the overt goal of the company’s policy; it’s just a consequence of the administrator’s aggressive housecleaning.

What if the legal department were to ask for seven-day deletions, or one day for certain sensitive users? What if an enterprising vendor were to add a feature to e-mail allowing senders to mark certain messages for self-destruction five seconds after they’re read? In other words, can a company legally destroy old messages just because they’re old and in the process erase the written record left by top executives? In short: yes, it can, as long as the procedures it adopts are orderly, routine, and consistent. But once a given topic becomes the subject of litigation, any further communications about that topic must be preserved.

Attorney Bruce believes that a system configured to automatically delete messages after a short time would not be sensible. Too many important documents would be destroyed, and the system might actually work against the company. Users fearful of losing old messages too quickly might print every message, creating a paper trail in spite of the stringent electronic housecleaning.

E-mail retention policies vary widely, but so far they’ve almost always been established for operational reasons, not to shield companies from legal risks. After a few more high-profile trials by e-mail, I expect that that will change.

ERIC ARNUM is the editor of Electronic Mail & Messaging System, a monthly newsletter about e-mail, fax, and telex. E-mail: earnum@rcn.com.

You are at groupcomputing.com.
Report Bugs | Submit Comments | Read Site Use Agreement | Read Privacy Policy | Contact Us
Copyright © 1999 Duke Communications International.

Duke Communications Group Computing | AS400 Network | Selling eServer Solutions | Business Finance | SQL Server Magazine | Windows 2000 Magazine