Email Retention Policies: What You Need to Know

Akins IT • May 4, 2016
GET MICROSOFT VIRTUAL DESKTOP FOR YOUR BUSINESS

After awarding a $500 million iPad contract, emails surfaced demonstrating that former Los Angeles Unified School District (LAUSD) superintendent had begun meeting personally with Apple and Pearson a year before the contract went out to public bid. The FBI is now sorting through old emails as evidence and LAUSD has announced recently that it will double the amount of time emails are saved to two years. 


Companies that cannot produce electronic documents, including emails, during the process of legal discovery are generally disfavored in court. At times, the inability to produce such documents may even be seen as destruction of evidence. A good email retention policy can protect against this.


An email retention policy determines how long emails will exist in your archiving solution before being automatically deleted. Even beyond a working email retention policy, you should consider using legal holds which allow you to prevent particular mailboxes or messages from being automatically deleted from the email archiving system.


Why it’s a big deal: In a nutshell, an email archiving policy reduces your risk for liability. Your industry may even be regulated by federal or state laws requiring that you maintain emails for a specific period of time. Even within industries the details of the laws and regulations may have nuances depending on the type of work being performed or area of expertise so it’s important to take the time to really familiarize yourself with them. The chart below lists out some of the regulated industries.


You can start to build a best practice retention policy with these few tips:


  1. Determine what regulations apply to your organization and start with those as minimums
  2. Segment to avoid keeping everything for the legal maximum. You can segment by content (for example, you might have different policies for sales records, invoices, etc.). You can also segment by department or use- for example, human resources, executive emails, marketing, etc.
  3. Consider other department and business needs
CONTACT US TO LEARN MORE ABOUT THIS TOPIC OR TO SCHEDULE A CALL
Data security needs layers of protection throughout its lifecycle.  Akins IT and Microsoft Purview
By Shawn Akins May 15, 2025
Strengthening Your Security Posture with Dynamic Access Control
By Shawn Akins May 15, 2025
Discover Affordable and Reliable Virtualization Platforms
By Shawn Akins May 13, 2025
Discover the Key Differences Between Mimecast and M365 Email Security Solutions and Learn Why Akins IT is Your Trusted Partner for Email Protection
More Posts