Email Mis/Management 📂

(NOTES by KATIE M.)

Seemingly reckless email use had a major impact on this year’s presidential campaign—this was framed as both a matter of secrecy and irresponsible record keeping—but a central issue is the sticky nature of the format. As a new technology, email in its founding years was disregarded as an informal communication mode until significant legal cases in the early 2000s raised the status of information transmitted in this form. Advancements in the format have only increased the impact of mismanagement as messages more easily proliferate and storage costs drop. Let’s review some recent instances where email records have made headlines.

2012
The Account of Richard Windsor

richard_windsor
EPA Administrator, Lisa Jackson, becomes target of an audit after she is discovered to have a private account under the nom de plume “Richard Windsor,” a combination of her former residence and family dog’s name. In defense, “assigning a secondary email account to the administrator at EPA is not new to this administration. The intent, the agency says, is for the administrator to have a manageable email account in addition to the one that is openly available to the public.” http://politi.co/2gPAY3i

2013
The IRS Gets Personal

irs

Lois Lerner, an IRS official, is asked to turn over six years of official correspondence after she is suspected of having used a personal email address to discuss the targeting of specific political groups interested in tax-exempt status, namely those related to the Tea Party movement. http://bit.ly/2gc9vca

2013
Sekisui Medical America v. Hartfire_email2

Sekisui fails to provide evidentiary documents during a financial dispute with a client, claiming “during that period, the business unit’s HR director deleted the relevant emails because they were cluttering the company’s servers.” This results in a renewed awareness of the need to redefine rules governing electronic discovery, producing a number of legal and social conclusions.

  • Legally, there isn’t a difference between negligent destruction to save space or to hide evidence. As Judge Shira Scheindlin states, “The law does not require a showing of malice to establish intentionality with respect to the spoliation of evidence.” http://bit.ly/2gcKrlm
  • Continually, while organizations retain responsibility for their electronic records, legal sanctions regarding electronic discovery need to be updated once more to fit with the evolution and proliferation of email. http://bit.ly/2gN8x7i
  • Emails need to remain in their original format. Sekisui’s practice of printing important emails for their archive instead of retaining the electronic form contributed to a significant loss of data. This was supported in court by referencing a tool newly developed by the MIT Media Lab to visualize a person’s professional and personal history using compressed email metadata: https://immersion.media.mit.edu/.

2014-2016
hdr22@clintonemail.com

screen-shot-2016-12-02-at-2-04-01-pm

In 2009, Hillary Rodham Clinton becomes secretary of state and begins using hdr22@clintonemail.com for personal email. After a committee is formed in 2014 to investigate the 2012 Benghazi attacks, the State Department requests all of her emails and private and public reviews of her correspondence ensues. One year later, the investigation is continued by the FBI, impacting HDR’s presidential campaign in 2016. http://nyti.ms/1TNFlMg

2014-2016
fort_lee

A federal investigation into Bridgegate uses NJ Gov. Chris Christie’s personal and government email accounts for evidence. Two and a half years later, messages from a private account between Christie and his wife contribute further information about his involvement in the matter.  http://bit.ly/2g0XoRy

These are extraordinary examples of unexceptional issues related to records management: blended personal and professional correspondence, reactions to the cost of space, and unclear legal retention periods. Legal aspects may similarly inform policies within arts organizations but collecting for institutional memory requires separate attention to long-term preservation and access. Over the past few months, I’ve been considering the retention policies surrounding electronic records in place at BAM and SRGM in an effort to understand how they may or may not be compatible with the everyday habits of staff. It has exposed how email, as a digital format, exists on the periphery of electronic records management in the broad category of ‘correspondence.’ In a way, this neglects the complexity of a mode that allows a thick web of overlapping data to form through attachments, forwards, personal talk, and professional updates. I thought it might be helpful to review recommendations provided to government staff during email management training.

“Digital curation is not simply a matter for those charged with care of resources at the end of their active lives, for the term ‘digital curation’ refers to the ongoing management of digital materials for both current AND future use. Curation issues are relevant from day one of the records life-cycle, from creation through to curation and including re-use of the data.”
-Maureen Pennock (2006)

org_chart
(Texas State Library and Archives Commission recommendations used during records management training for state agencies and local governments)

1. Is it a record?

As Geof Huth notes in his recommendations for digital appraisal, in the context of an institution addressing its own records, appraisal is usually an extension of records scheduling. Using the example of an arts institution, a retention schedule may suggest the following record categories for a valued creative department:

  • Collection Object Files & Artist Files
  • Exhibition Files
  • Correspondence: significant, routine, and related to other records (*including email)
  • Education Programming
  • Research Files

Organizing messages and evaluating the significance of content delivered through email is easier when reviewed in relationship to each record category, rather than as an extension of ‘correspondence.’ For example, receiving an email with a link to download images of artworks may fall under ‘Research’ rather than ‘Correspondence,’ and can be deleted after extracting the files. This approach relies on communication and collaboration between all participating departments to curate content accordingly.

  • Collection Object Files & Artist Files: Information on artworks and artists in collection, including documentation on the installation of an artwork. For permanent collection works, includes treatment reports and incident reports related to artworks. Also includes artist interviews.
  • Exhibition Files: Information collected and created by conservation related to exhibitions including traveling, foundation and affiliate exhibitions. For loans, includes treatment reports and incident reports related to artworks.
  • Correspondence: Correspondence that documents important activities, events, operations, policy changes, etc. Correspondence with artists (email, audio/video recordings).
  • Education Programming: Programming: Includes documentation [correspondence, contracts, planning, lectures, surveys] on programming such as symposiums, and conversations with contemporary artists.
    Visual Materials: Includes photographs, videos, and/or films of programs, residencies, publicity, etc. as well as photo permissions.
  • Research Files: Information collected and created by curatorial related to collections,provenance, and other topics.

2. Is it related to your job? 

  • Personal mail may seem like the most obvious non-work related message type. A simple solution would be to make a list of friends and family who you correspond with regularly and filter those messages into their own folder.
  • CCs are often courtesy copies shared to keep different parties up to date on a project, but a copy does not need to be maintained. Unless you go on to contribute to the conversation in a notable way, CCs can be deleted.
  • Unsolicited messages, even when work-related, can be deleted. This includes newsletters, office updates, PR announcements, etc.

3. Are you the custodian?

  • The person who wrote and sent the email can be considered the custodian of the record copy. 

These recommendations are meant to be applied at the creation stage to influence routine maintenance of email correspondence. Additionally, desktop and cell phone applications offer private access to the creator which lead to the perception of email existing as a data source for personal reference only, unlike departmental records which are usually saved to a shared drive. Training can alter this view by making connections between these records and the development of an organization’s history. Tips for curating email have contributed to my review of two email accounts provided by BAM and SRGM, the first containing valuable record of a project’s development, and the other a broader reflection of the institution formed over the course of a director’s career. Over the next posts, I will be exploring what it has been like to use ePADD to appraise records while considering a digital curation (and risk management) framework, and how conversations with staff and other archivists have continued to reveal the complex qualities of this format.


Huth, G. (2016). Appraisal and acquisition strategies. Chicago: Society of American Archivists.

Pennock, M. (2006). Preservation of e-mail messages. DCC Digital Curation Manual, S.Ross, M.Day (eds). Retrieved from http://www.dcc.ac.uk/resource/curation-manual/chapters/curating-e-mails

Texas State Library and Archives Commission (2013). Email management [PowerPoint slides]. Retrieved from https://slrmtraining.tsl.texas.gov/index.php?