Security and confidentiality

E-mails play a significant role in companies for both internal and external communications. And of course, they are also subject to data protection regulations. This is why the assurance and protection of confidentiality and consideration of technical factors regarding e-mail is so important.

The following descriptions are examples of real issues, this is why we recommend that you observe these points and take our recommendations regarding e-mail security seriously.

Backing up

Making back ups helps to protect against data loss, for example, this can occur if a computer or hard drive is defective. For this reason, we recommend that you do not create a backup on the same computer the data is stored on, because if anything were to happen to this computer, you would also lose this backup data.

In this case, e-mails available offline are synchronized with the mailbox on the e-mail server everytime you switch into online mode or everytime you access the mailbox on the e-mail server.

Saving alone in offline mode is not a backup. If a backup is not available for the e-mail server, and you open the mailbox, then any e-mails which are no longer available on the e-mail server will be deleted locally on your computer or from a network folder.

Protecting confidentiality

The confidentiality of these e-mails depends on your company's data protection policy.

In this case too, a username and a password are available for such mailboxes. All colleagues who use the mailbox have to know the username and password so that they can access the mailbox if they need to. Confidentiality is thus only available within this group.

Company e-mails are usually saved for business process purposes and can be found in dossiers and are thus relevant for participating colleagues. You can enter participants and grant access rights for archived e-mail data records.

You can always archive e-mails.

As soon as you work on such e-mails, for example, while in offline mode, then the e-mails will be found in this folder: ..\Users in subordinate folder..\TEMP. Only the user who is logged on to Windows and using the current computer can access this folder.

Technical conditions

For more information you can contact CAS Software AG support.