policies and practices for e-mail management at the...

285
Policies and Practices for E-mail Management at the Canadian Government Natasha Zwarich School of Information Studies, McGill University Montreal, April 2014 A thesis submitted to McGill University in partial fulfillment of the requirements of the degree of Doctor of Philosophy © Natasha Zwarich 2014 All rights reserved

Upload: lethien

Post on 28-Jul-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

 

Policies and Practices for E-mail Management at the Canadian Government

Natasha Zwarich

School of Information Studies, McGill University

Montreal, April 2014

A thesis submitted to McGill University in partial fulfillment of the

requirements of the degree of Doctor of Philosophy

© Natasha Zwarich 2014 All rights reserved

   

ii  

ABSTRACT

As government agencies perform a large number of operations through e-mail,

appropriate e-mail management has become critical within the current information

accessibility- and accountability-driven environment.

The aim of this research is to understand how e-mail records are managed in the

Canadian government agencies and identify the characteristics that support the

management of e-mail records to ensure their reliability, integrity and authenticity. It

sought to answer the following research questions: (1) What are the general principles of

the e-mail management policies and guidelines within Canadian government agencies?;

(2) To what extent are these e-mail management principles implemented in the

government agencies?; (3) What are the variations and similarities of e-mail management

practices across government agencies? To what extent are they effective?; and (4) What

are the current practices to manage e-mail messages in order to ensure the reliability,

integrity and authenticity of this specific type of electronic records in government

agencies?

To answer these questions, this research uses a mixed methods approach. Three

data collection methods were used: (1) web-based survey with information management

professionals working at the Canadian government agencies; (2) in-depth interviews with

information management professionals involved in the process of e-mail management

from six government agencies; and (3) the relevant documentation. While a statistical

analysis was done on the data collection by using the web-based survey, a content

analysis combining both inductive and deductive methods has been done on the interview

data and relevant documentation.

The results indicated that e-mail is a widely used form of communication within

the Canadian government agencies. The practices to ensure the management of e-mail

across agencies tend to vary. The type of policies and guidelines developed in agencies

varies ranging from a specific e-mail management policy to a more general information

   

iii  

management policy according to each agency’s organizational context. In addition, an

electronic recordkeeping system for the management, retrieval and access of e-mail

records was identified as crucial to manage e-mail and ensure their reliability, integrity

and authenticity. The results show that although several participants recognize the

importance of e-mail in their work, their agencies often lack to practice compliance to

their e-mail management policy, guidelines and system considerations. The results

suggest that to be effective, the tools developed to manage e-mail records must be

adapted to their organizational context and information flow of an organization. The

results stressed the importance of managing e-mail records to: (1) ensure the continuity of

the activities of the agencies; and (2) ensure the authenticity and integrity of e-mail

records.

These findings have led us to suggest a framework for a comprehensive e-mail

management program that includes five components: (1) legal and organizational

requirements; (2) records management requirements; (3) systems requirements; (4)

training; and (5) auditing and compliance requirements. Based on the results of the

research, we also developed an e-mail management policy model that can be adapted to

government agencies as well as different organizational contexts.

Keywords: electronic message; e-mails, e-mail management, electronic messaging systems, Government of Canada, Canadian government agencies, compliance, training, records management.

   

iv  

RÉSUMÉ  

Plusieurs organisations, dont les gouvernements, effectuent un grand nombre

d'opérations par le biais du courrier électronique. La gestion du courrier électronique est

aujourd’hui devenue critique, notamment dans le contexte actuel d’accès à l’information

et de bonne gouvernance.

La présente recherche a pour but de développer une meilleure compréhension de

la gestion du courrier électronique dans les agences gouvernementales canadiennes et

d'identifier les caractéristiques qui soutiennent la gestion de ces documents électroniques

afin d’assurer leur fiabilité, leur intégrité et leur authenticité. La recherche vise à

répondre aux 4 questions suivantes: (1) Quels sont les principes généraux en matière de

gestion du courrier électronique au sein des agences gouvernementales canadiennes? ; (2)

Dans quelle mesure ces principes de gestion du courrier électronique sont-ils mis en

œuvre? ; (3) Quelles sont les similitudes et les différences dans les pratiques de gestion

du courrier électronique dans les agences gouvernementales canadiennes? Dans quelle

mesure sont-elles efficaces? ; et (4) Quelles sont les pratiques actuelles de gestion du

courrier électronique afin d'en garantir la fiabilité, l'intégrité et l'authenticité au

Gouvernement du Canada?

Pour répondre à ces questions, une méthodologie mixte a été utilisée. Trois

méthodes de collecte de données ont été utilisées: (1) un sondage en ligne s’adressant aux

professionnels en gestion de l'information qui travaillent au Gouvernement du Canada;

(2) des entrevues semi-structurées avec des professionnels en gestion de l'information

impliqués dans le processus de gestion du courrier électronique de six agences

gouvernementales; et (3) la documentation pertinente. Dans un premier temps, une

analyse statistique a été effectuée sur les données amassées à l'aide du sondage en ligne

et, dans un second temps, une analyse de contenu a été effectuée sur les données

recueillies par le biais d’entrevues et de la documentation pertinente.

Les résultats de la recherche montrent que le courrier électronique est un outil de

communication largement utilisé au sein des agences gouvernementales canadiennes. Or,

les pratiques visant à assurer la gestion du courrier électronique varient entre les agences

   

v  

gouvernementales. En effet, le type de politique utilisé pour encadrer la gestion du

courrier électronique diffère entre les agences gouvernementales allant d'une politique

spécifique de gestion du courrier électronique à une politique plus générale de gestion de

l'information variant selon le contexte organisationnel de chaque agence. En outre,

l’utilisation d’un logiciel de gestion électronique des documents permettant la gestion, la

recherche et l’accès aux messages électroniques a été identifié comme étant un outil

essentiel à la gestion du courrier électronique, notamment pour assurer la fiabilité,

l'intégrité et l'authenticité des messages. Les résultats montrent également que, malgré

l’importance de la gestion du courrier électronique, un manque de conformité envers la

politique de gestion du courrier électronique ou l’utilisation du système de gestion

électronique des documents a été souligné par plusieurs participants. Les résultats

suggèrent que pour être efficaces, les outils développés pour gérer le courrier

électronique doivent être adaptés au contexte organisationnel et au flux d'information

d'une organisation. Les résultats soulignent l'importance de la gestion du courrier

électronique afin: (1) d’assurer la continuité des activités des agences gouvernementales,

et (2) assurer l'authenticité et l'intégrité de ce type de document électronique.

Ces résultats nous ont amené à proposer un cadre théorique pour le

développement d’un programme de gestion du courrier électronique qui comprend cinq

composantes: (1) les exigences légales et organisationnelles, (2) les exigences liées à la

gestion documentaire; (3) les exigences liées aux systèmes informatiques; (4) les

exigences de formation; et (5) les exigences de conformité et d’audit. Nous avons

également développé un modèle de politique de gestion du courrier électronique qui peut

être adapté, tant aux agences gouvernementales qu’à différents contextes

organisationnels.

Mots-clés: courrier électronique; gestion du courrier électronique; système de messagerie électronique; Gouvernement du Canada; administration publique; conformité, formation, gestion des documents électroniques.    

   

vi  

TABLE OF CONTENTS

ABSTRACT ........................................................................................................................ ii RÉSUMÉ ........................................................................................................................... iv

TABLE OF CONTENTS ................................................................................................... vi LIST OF TABLES ............................................................................................................. ix

LIST OF FIGURES ............................................................................................................ x LIST OF ABBREVIATIONS ............................................................................................ xi

ACKNOWLEDGEMENTS .............................................................................................. xii

CHAPTER I. INTRODUCTION ...................................................................................... 13 1.1. Problem statement ............................................................................................................... 13 1.2. Purpose of the study ............................................................................................................ 19 1.3. Research questions .............................................................................................................. 20

CHAPTER II. LITERATURE REVIEW ......................................................................... 22 2.1. Electronic records: nature and characteristics ..................................................................... 22

2.1.1. Definition and characteristics of records ..................................................................... 22 2.1.2. Characteristics of electronic records ............................................................................ 27 2.1.3. Research projects on electronic records ....................................................................... 31

2.2. Government agencies as an institutional context .............................................................. 38 2.2.1. Government information and creation of e-government ............................................. 40 2.2.2. Management of federal records and creation of national archives .............................. 46 2.2.3. Information professionals in the Canadian government agencies ............................... 54

2.3. E-mail as a specific type of electronic records ................................................................. 58 2.3.1. Definition and Characteristics of E-mail ..................................................................... 58 2.3.2. Background and history ............................................................................................... 62 2.3.3. Issues regarding e-mail management ........................................................................... 65

2.4. Theoretical Framework ....................................................................................................... 76 Summary .................................................................................................................................... 78

CHAPTER III. RESEARCH DESIGN ............................................................................. 80 3.1. Rationale of study design .................................................................................................... 80 3.2. Selection of data sources and methods for data collection ................................................. 86

3.2.1. Survey .......................................................................................................................... 87 3.2.2. Interview ...................................................................................................................... 90 3.2.3. Supporting documentation ........................................................................................... 91

3.3. Pre-test of instruments for data collection .......................................................................... 92 3.3.1. Pre-test of online survey questionnaire ........................................................................ 92 3.3.2. Pre-test of interview guide ........................................................................................... 93

3.4. Data collection .................................................................................................................... 94

   

vii  

3.4.1. Population and sample ................................................................................................. 94 3.4.2. Survey .......................................................................................................................... 97 3.4.3. Interviews .................................................................................................................... 99 3.4.4. Supporting documentation ......................................................................................... 103

3.5. Data analysis ..................................................................................................................... 106 3.5.1. Quantitative data analysis .......................................................................................... 107 3.5.2. Qualitative data analysis ............................................................................................ 108

3.6. Limitations of the study .................................................................................................... 112 3.7. Quality assurance of the research ...................................................................................... 113 Summary .................................................................................................................................. 115

CHAPTER IV. FINDINGS ............................................................................................ 117 4.1. E-mail management principles and implementation ......................................................... 117

4.1.1. Respondent profile ..................................................................................................... 117 4.1.2. E-mail policies and guidelines ................................................................................... 119 4.1.3. E-mail system and recordkeeping system .................................................................. 125 4.1.4. Implementation and dissemination ............................................................................ 128 4.1.5. Issues .......................................................................................................................... 132

4.2. E-mail management: current practices and variations across Canadian government agencies .................................................................................................................................... 135

4.2.1. Absence of implementation ....................................................................................... 136 4.2.2. Partial implementation ............................................................................................... 144 4.2.3. Completed Implementation ....................................................................................... 153

4.3. Results of the research questions ...................................................................................... 172 4.3.1. Results of the first research question: What are the general principles of the e-mail management policies and guidelines within Canadian government agencies? ................... 173 4.3.2. Results of the second research question: To what extent are these e-mail management principles implemented in the federal agencies? ................................................................. 174 4.3.3. Results of the third research question: What are the variations and similarities of e-mail management practices across federal agencies? To what extent are they effective? .. 175 4.3.4. Results of the fouth reseach question: What are the current practices to manage e-mail messages in order to ensure the reliability, authenticity and integrity of this specific type of electronic records in federal agencies? ................................................................................ 176

Summary .................................................................................................................................. 178 CHAPTER V. DISCUSSION ......................................................................................... 180

5.1. E-mail Management Challenges ....................................................................................... 180 5.1.1. Records Management ................................................................................................ 181 5.1.2. Legal .......................................................................................................................... 183 5.1.3. Systems ...................................................................................................................... 187 5.1.4. Users and compliance ................................................................................................ 190

5.2. Framework for a comprehensive e-mail management program and implementation ....... 193 5.2.1. Five components for an e-mail management program .............................................. 193 5.2.2. Legal and Organizational Requirements ................................................................... 195 5.2.3. Records Management Requirements ......................................................................... 197 5.2.4. Systems Requirements ............................................................................................... 199 5.2.5. Training Requirements .............................................................................................. 206 5.2.6. Auditing and Compliance Requirements ................................................................... 209

   

viii  

5.3. E-mail Mangement Policy ................................................................................................. 211 Summary .................................................................................................................................. 217

VI. CONCLUSION ......................................................................................................... 218 6.1 Summary of the research .................................................................................................... 218 6.2 Contributions of the research ............................................................................................. 221

6.2.1. Theoretical Contributions .......................................................................................... 221 6.2.2. Methodological Contributions ................................................................................... 222 6.2.3. Practical Contributions .............................................................................................. 222

6.3. Future Research ................................................................................................................. 223 BIBLIOGRAPHY ........................................................................................................... 226

Appendix 1: Ethics Certificate ..................................................................................... ccxlvi

Appendix 2: Survey Instrument – English ................................................................. ccxlvii Appendix 2: Survey Instrument – French ...................................................................... cclvi

Appendix 3: Results of Survey Questionnaire ............................................................. cclxvi Appendix 4: List of Titles/Positions of the Respondents to the Survey .................... cclxxvi

Appendix 5: Invitation Letter to Interviews Participants – English ....................... cclxxviii Appendix 5: Invitation Letter to Interviews Participants - French ............................ cclxxix

Appendix 6: Informed Consent Form ......................................................................... cclxxx Appendix 7: Interview Instrument .......................................................................... cclxxxiii

Appendix 8: Thank You Letter to Interview Participants ........................................ cclxxxvi  

 

   

ix  

LIST OF TABLES

Table 3.1. Summary of interview activities at participating agencies……………..…...103

Table 3.2. List of collected documentation from 6 agencies…………………………...104

Table 3.3. List of collected documentation from Treasury Board of Canada Secretariat and Library and Archives Canada…...…………………………………..…..105

Table 4.1. Summary of e-mail management practices and implementation at GoC…...134

Table 4.2. Summary of the six in-depth interviews on e-mail management practices and variations………...…………………………………………………………..170

Table 5.1. Recommended content for e-mail management training program………….207

Table 5.2. Recommended content of an e-mail management policy…………………...213

   

x  

LIST OF FIGURES

Figure 2.1. Park’s conceptual framework on authenticity requirements and authentication processes…………………………………………………………………….37

Figure 3.1. Data sources and methods of data collection………………………………..87

Figure 4.1. Activity areas of the respondents…………………………………………..119

Figure 4.2. Importance of e-mail in business activities at GoC………………………...120

Figure 4.3. Policies and guidelines to manage e-mail records………………………….123

Figure 4.4. Implementation of corporate recordkeeping system……………………….126

Figure 4.5. Methods used to manage and save e-mail records…………………………128

Figure 4.6. Reasons for not being compliante with e-mail management policy and guidelines…………………………………………………………………..131

Figure 5.1. Components for an e-mail management program………………………….194

 

 

 

 

   

xi  

LIST OF ABBREVIATIONS

AIIM Association of Information and Image Management ARMA Association of Records Managers and Administrators CSA Canadian Securities Administrators DoD U.S. Department of Defense ECM Entreprise content management EDRMS Electronic document and records management system ERM Electronic records management ERMS Electronic records management system GEDS Government Electronic Directory Services GoC Government of Canada ICA International Council on Archives ICT Information and communication technology IM Information management InterPARES International research on Permanent Authentic Records in

Electronic Systems IT Information technology ISO International Standards Organization LAC Library and Archives Canada MAF Management Accountability Framework NAA National Archives of Australia NARA U.S. National Archives and Records Administration RDIMS Records, Documents, and Information Management System SAA Society of American Archivists SMTP Simple mail transport protocol TBS Treasury Board of Canada Secreatariat UBC University of British Columbia

   

xii  

ACKNOWLEDGEMENTS

I would like to express my sincere gratitude to many people who have contributed

to the realization of this dissertation.

First, I would like to thank my thesis supervisor, Dr. Eun Park, whose guidance

and encouragement helped me throughout the dissertation process. You provided me with

expert advice, professionnally and personnally, during all of these years. I am truly

grateful for your support.

My sincere thank you also go to the members of my thesis advisory committee,

Dr. France Bouthillier, Dr. Kimiz Dalkir and Dr. Doreen Starke-Meyerring, who have

improved my dissertation with their valuable suggestions. I appreciate your generosity

and donating your precious time.

I also would like to thank the information management professionals at the

Government of Canada who participated in this research and took the time to answer my

many questions. I would also like to express my sincere gratitude to the Fonds québécois

de recherche sur la société et la culture (FQRSC) for providing me with financial support

to pursue this research.

Finally, thank you to my family, especially my parents, and friends who have

endured my many existential anxieties and my constant questioning of the doctorate

process. Without their encouragement, this thesis perhaps would never have emerged. A

special thank you to Pascal and Victor who have made this journey possible. I appreciate

your understanding and patience when I had to work on my dissertation on weekends and

holidays.

Thank you to all those who helped me, one way or another, during these years of

hard work.

   

13  

CHAPTER I. INTRODUCTION

1.1. Problem statement

Information is at the center of every function and activity of an organization. The

way that an organization manages information and records can directly affect its ability to

operate its activities efficiently and effectively as well as to comply with laws and

regulations. Records are defined as “information created, received and maintained by an

agency or organization in pursuance of legal obligations or in the transactions of

business” (ISO 15489, 2001, p. 3). Records are evidence of each activity of an

organization and different from documents. Documents are “information or data fixed in

some media, but which is not part of the official record” (Pearce-Moses, 2005, p. 126),

such as drafts, duplicates of record copies, and other materials not directly relating to

business activities.

The rapid increase in the number of records created and maintained by electronic

communication systems has presented numerous opportunities and challenges for records

managers and archivists in different organizations. Today, most records in an

organization are created using information and communication technology (ICT) and

produced in different electronic format – e-mail, word processing documents, text

messages, voicemail, images, spreadsheets, web content, etc. The percentage of records

in electronic format continues to increase. As organizations increase their dependence

upon electronic records to make strategic decisions that have an impact on stakeholders

the need for professional management of these assets also grows. Applying records

   

14  

management principles from the creation of an electronic record to its final disposition

differs from doing so with their paper counterparts. During the information lifecycle,

issues of access, authenticity, integrity, security, privacy and retention are more

challenging to manage in the evolving environment of electronic records. These issues

are critical in the age of information technology. Indeed, the ease with which electronic

records can be altered, duplicated, distributed, or destroyed has often produced poor

quality records. In addition, too many types of records, created in different versions and

formats, are unreliable. Each specific type of electronic record poses its own challenges

regarding its management and preservation. Among the different types of electronic

records, electronic mail (e-mail), with its access points, has become a major tool for

organizational and interpersonal communications these days and is one of the most

business-critical information management applications as argued by the Radicati Group:

“the majority of email traffic comes from business email, which accounts for over 100 billion emails sent and received per day worldwide. In 2013, email remains the predominant form of communication in the business environment. The majority of business email accounts are currently deployed on-premises. However, with the adoption of cloud business email services, this trend is expected to increase. In addition, the mobile email market is showing a strong growth. Anywhere access has become a common feature for all users, who now access their mail from a number of devices, at any time and from any location. Growth of mobile email use is driven by affordable and advanced mobile devices, which allow users to easily access their email accounts from their mobile devices.” (Radicati Group, 2013, pp. 3-4)

With the increase of electronic records, more organizations have made records

management a necessity when confronted with changes in regulation and laws due to

their compliance and reporting requirements. Government regulations that require

“reporting and accountability have fuelled the implementation of formal records

management programs” (Smallwood, 2013, p. 5). For example, in the United States, the

   

15  

Sarbanes-Oxley Act (2002) enhanced standards for corporate governance and financial

reporting. The Canadian counterpart of the Sarbanes-Oxley Act has “been introduced

through various separate yet interrelated instruments and pieces of legislation by the

introduction of the Canadian Securities Administrators (CSA) rules that require the

certification of annual and quarterly report; audit committee, internal controls and

guidance for corporate governance practices” (Government of Canada, Library of

Parliament, 2005, p.8).

In addition, changes in legal procedures and requirements during litigation have

been noted. In the United States, in 2006, the U.S. Federal Rules of Civil Procedures

were amended to include requirements for legal discovery of electronically stored

information. Today, according to Smallwood, e-mail has become the leading form of

evidence requested in civil trials (2013, p. 5). In Canada, the discovery process is usually

covered in provincial regulations (Hrycko and Rothman, 2009, p. 35). However, because

of the nature of electronic records, guidelines and best practices specific to electronic

discovery were introduced as well as updated to relevant existing legislations. An

increase of awareness of information governance appeared as a result of the changing

regulations. Information governance is defined by the Association of Records Managers

and Administrators (ARMA) as a “strategic framework composed of standards, policies,

business processes, roles that hold organizations and individuals accountable to create,

organize, secure, maintain, use and dispose of information in ways that align with and

contribute to organization’s goals” (2012, p. 28). The legislations have made

organizations to be more “information governance aware” and implement means to

   

16  

control, manage and secure their information as well as respond to concerns related to

business continuity when managing electronic records (ARMA, 2012, p. 29).

The proliferation of electronic records has also changed the way that government

business is conducted. Indeed, more and more governments provide services through

Internet (or web-based applications) and e-mail to facilitate democratic participation,

known as e-government. As a result, governments have established guidelines and

professional standards for the management of electronic records that were created using

electronic and communication systems. The Government of Canada (GoC) followed this

trend and has developed a “federated architecture of information systems to foster

common standards, directories, and shared approaches to electronic records management

both within and across federal government agencies” (Allen, et al., 2001, p. 96).

The growth of e-mail has presented government agencies with new opportunities and

challenges. E-mail is defined as “electronically transmitted information created on or

received by a computer system and it can be used to accomplish different activities in an

organization” (Pearce-Moses, 2005, p. 141) and it is composed of a “header, a body

message and optionally, attachments” (Park and Zwarich, 2008, p. 469). The scope of this

research emphasizes on the management of e-mail so this study excludes text messaging

and web records. At the crossroads between the telephone and traditional mail, e-mail is

not as ephemeral as it seems and is now recognized as records as a result of what is now

known as the PROFS case, a lawsuit (Armstrong v. Executive Office of the President, 1

F.3d 1274 [DC Cir 1993]) filed by Scott Armstrong, American Historical Association,

the American Library Association, the Center for National Security relating to access to

and the disposition of e-mail records. Therefore, e-mail records must be managed

   

17  

properly. As government agencies perform a large number of operations through e-mail,

appropriate e-mail and electronic records management have become significant and

critical within the current information accessibility- and accountability-driven

environments. As the GoC is moving toward the electronic record as the preferred record

to conduct business, the Library and Archives Canada (LAC) declared in 2006 that

“email messages that are created, collected, received or transmitted in the normal course

of government business and reflect the functions, business activities, and decisions of the

government are official records and must be managed throughout their life-cycle”

(Government of Canada, Library and Archives Canada, 2006). E-mail records and

attachments must be archived in order to guarantee the integrity of organizational

memory at the GoC and maintain their value as evidence of government business. To

achieve this goal, government organizations are working to provide common general

guidelines for the development of standards, tools and best practices for information

management across the GoC. The term “guideline” is defined by ARMA as being “a

recommendation suggesting a course of action but not requiring specific practices” (2012,

p. 25). Guidelines are issued and may be used by any organization, including government

agencies, to make actions to manage its electronic records more predictable and

systematic. Guidelines also contribute to define principles and common practices to

manage electronic records. The “official expression of principles that direct an

organization’s operations” is contains in a policy (Pearce-Moses, 2005, p. 300). Policies

are different from procedures “which detail how policies are implemented at the

operational level” (Pearce-Moses, 2005, p. 300). The use of guidelines, policies and

procedures aims at developing best practices that are “an improvement in a particular

   

18  

process, approach, technique, or subject matter knowledge that is good enough to replace

an existing practice and general enough to merit being disseminated widely throughout an

organization; a “good work practice” or innovative approach that is capture and shared to

promote repeat applications” (Dalkir, 2005, p. 330).

The management approach for e-mail has not yet been clearly established in the

field. A number of studies have discussed electronic records management (ERM)

principles and practices in general (Huc, 2010; Saffady, 2009; Smith, 2008). Since e-mail

management research stems from the field of ERM, fundamental concepts can be

applicable to e-mail management in the same manner (Smallwood, 2013; Saffady, 2009;

Stephens and Wallace, 2003). Electronic records are discussed in a broad context without

any specific attention to the particularities of e-mail records. Among them, only a small

number of studies deal with e-mail in government environments (Parrish and Courtney,

2007; Patterson and Sprehe, 2002). Moreover, research into the effectiveness of

developing and implementing e-mail management systems and policy guidelines within

the Canadian government has been limited to date. The management of e-mail records

has not been extensively examined by records management researchers in terms of how

to manage e-mail messages in order to ensure their reliability, authenticity and integrity.

Little archival research has been conducted that focuses on the current management and

implementation of policies and procedures of e-mail records. In particular, in government

agencies, there is no research that is directed on at the implementation of e-mail

management policies and practices in order to create, receive, maintain, preserve and

provide access to this specific type of electronic records.

   

19  

1.2. Purpose of the study

This study aims to understand how e-mail records are managed in Canadian

government agencies and to identify the characteristics that support the management and

preservation of e-mail records to ensure the reliability, authenticity, and integrity of these

records.

There are two specific objectives to this study. The first objective of this study is

to identify the general principles in managing e-mail records within Canadian

government agencies and departments and see to what extent these principles are actually

implemented in these agencies.

The second objective is to determine and compare significant similarities and

differences in managing e-mail records in government agencies and identify the current

practices in managing e-mail messages in order to ensure the reliability, authenticity, and

integrity of e-mail records.

This study fits into the research area of records management, a holistic approach

concerned with the systematic and administrative control of records throughout their

lifecycle to ensure the efficiency and economy in their creation, use, handling, control,

maintenance, and disposition (Saffady, 2009).

The Canadian government offers an interesting setting to study e-mail

management. Government agencies have a unique institutional environment due to their

regulatory function; this has an impact on the context within which the enacting decisions

are made (Horn, 1995). Nevertheless, as per the Accountability Act as well as audit

   

20  

requirements from the Treasury Board of Canada Secretariat and the Auditor General of

Canada, these organizations need to be accountable and transparent to all their

stakeholders (Allen, et al. 2001). Also, public access to government information is seen

as fundamental to democracy, particularly with the adoption of the Access to Information

Act (Eschenfelder and Miller, 2007, Chadwick and May, 2003). Government agencies

are required by laws and regulations to manage their records.

1.3. Research questions

As a first step toward understanding the objectives of this study, the researcher

formulated the following four research questions:

(1) What are the general principles of the e-mail management policies and guidelines within Canadian government agencies?

(2) To what extent are these e-mail management principles implemented in the federal agencies?

(3) What are the variations and similarities of e-mail management practices across federal agencies? To what extent are they effective?

(4) What are the current practices to manage e-mail messages in order to ensure the reliability, authenticity and integrity of this specific type of electronic records in federal agencies?

1.4. Significance of the study

The study contributes to identifying requirements to manage electronic records and e-

mail to ensure their integrity, authenticity and reliability. The research helps advance our

understanding of the administrative and procedural contexts of government electronic

   

21  

records management. In addition, the results make contributions to building a framework

to ensure e-mail management in government agencies and to developing new e-mail

management and preservation policies and practices. The results of the research can be

used as evidence to move toward a better electronic records management and can be

applied to use in a variety of other organizational settings to meet the needs of e-mail

management.

 

   

22  

CHAPTER II. LITERATURE REVIEW

This literature review is divided into three sections: 1) the management of

electronic records; 2) Canadian government agencies as an institutional context; and 3) e-

mail management as a specific type of electronic records.

2.1. Electronic records: nature and characteristics

Examining and understanding how e-mails records are managed in government

agencies is the focal point of this study. The first section of the literature review

investigates the definitions and characteristics of and associated issues with electronic

records in general, since e-mails are one specific type of electronic records. In order to

comprehend the nature of electronic records basically and logically, the definitions and

characteristics of records are described from the following three perspectives: diplomatics,

archival science and records management.

2.1.1. Definition and characteristics of records

Diplomatics appeared as a science for:

“the study of the creation, form, and transmission of records, especially handwritten documents, and their relationship to the facts contained in them and to their creator(s), as a means of validating or disconfirming provenance and authenticity” (Duranti, 1998, p. 177).

Diplomatics requires examination of the internal and external characteristics of records,

such as the materials on which they are written, the script used by the writer, and the

literary style in which they are written in order to prove their reliability and authenticity

   

23  

(Duranti, 1998). The definition of records in the diplomatics refers to “the written

evidence of a fact having a juridical nature, compiled in compliance with determined

forms, which are meant to provide it with full faith and credit” (Duranti, Eastwood and

MacNeil, 2002, p. 10). In order to be considered as a record, three prerequisites must be

present: (1) it has to be written; (2) it has to be affixed to a medium; and (3) it has to be

related to a fact taken into consideration by the juridical system within which it was

created. Diplomatics deals with the concept of record in the singular, because its analysis

is carried out at the item level (Duranti, Eastwood and MacNeil, 2002, p. 9). Since

diplomatics first originated in the seventeenth century for the purpose of proving

authenticity of documents presented as evidence in court, the diplomatics’ definition of

records is directly related to a legal perspective. In the nineteenth century, diplomatics

gradually became an auxiliary science of history, where records served as a tool of

interpretation to understand the past. Nevertheless, the definition of records is still

relevant. Diplomatics gives importance, not only to the record itself but also, to the broad

context of creation by emphasizing the significance of the legal system, the persons

creating the records, and the functions that they serve (Duranti, Eastwood and MacNeil,

2002).

Archival science shares similar objectives with diplomatics in the sense that it

defines records as evidence, although it looks at records as aggregations rather than as

individual items. The definition of records in archives is now currently accepted among

researchers and practitioners as:

“materials created or received by a person, family, or organization, public or private in the conduct of their affairs and preserved because of the enduring value

   

24  

of the information they contain or as evidence of the functions and responsibilities of their creator” (Pearce-Moses, 2005, pp. 326-327).

Many archivists, especially those in the United States who are influenced by the

thinking of Theodore Schellenberg, follow an inclusive definition of archives, which

encompasses a wide variety of documents and records. Schellenberg also “distinguished

between the primary and secondary values of the materials; only materials with

secondary value, value beyond their original purpose, could be considered archival

materials” (Tschan, 2002, p. 180). For Schellenberg, archivists appraise records for

transfer to the archives based on their evidential, informationl or research value. Other

archivists follow the writing of Hilary Jenkinson, who argues that archives are

“documents which formed part of an official transaction and were preserved for official

reference” (Tschan, 2002, p. 178). For Jenkinson, it is the responsibility of the record’s

creator to evaluate and determine which records should be transferred to the archives.

Because Jenkinson considered that records are evidence of transactions, “he did not

recognize any collections of historical documents as archives, although he noted that

collections of personal papers were of value to historians because they complemented

archives” (Tschan, 2002, p. 179).

The concept of records can be further clarified from a records management

perspective. Records management is a specialized business discipline concerned with the

systematic and administrative control of records throughout their lifecycle to ensure

efficiency and economy in their creation, use, handling, control, maintenance, and

disposition (Saffady, 2009). Records have content and a structure/form and are created in

a context (McKemmish et al., 2005; Hofman, 1998; Bearman, 1994) and, according to

Thomassen (2001), “they are process bound information” (p. 375). Based on these

   

25  

definitions, full and accurate records should possess the following three essential

characteristics: “(1) the content consists of the text, data, images, sound, graphics, and

other information that make up the substance of the record; (2) the structure refers to a

record's physical characteristics and internal organization of the content (the record

structure is the form that makes the content tangible and intelligible); (3) the context is

the organizational, functional, and operational circumstances surrounding a record’s

creation, receipt, storage, or use” (Öberg and Borglund, 2006, p. 57). Cox (2001) has

stated that the evidential value can only exist if the content, structure and context are

preserved. Other definitions augment this previous statement by adding that a record

needs a context, content and structure which are “sufficient to provide evidence of the

activity” and provide meaning and functionality (International Council on Archives,

1997, p. 9). Thomassen (2001) argues that these three characteristics do not make a

record unique compared to other sorts of information and that other criteria make a record

unique: (1) records are evidence of actions and transactions; (2) records should support

accountability; (3) records are related to work processes; and (4) records must be

preserved. These four criteria make records different from other types of information.

Indeed, all records contain information but not all information-bearing objects are

considered records. Records are supposed to be trustworthy. In other words, they must be

reliable and authentic to serve as evidence and support accountability. Lemieux has

shown that “the relationship between records and accountability has shown that record

creation ensures reliability, authenticity and thus their trustworthiness is a quality

essential to the giving of and holding to account” (Lemieux, 2001, p. 92).

   

26  

The definition of records by the International Standard ISO 15489-1 Information

and documentation is “information created or received and maintained by an agency or

organization in pursuance of legal obligations or in the transactions of business” (ISO

15489, 2001, p. 3). Records management shows the importance of the trustworthiness of

a record, since records are created or received in the conduct of business activities and

serve as evidence of those activities. In an organization, records are part of the

organizational memory and are used to support its functions and activities. Records must

reflect what was communicated or decided, or what action was taken. It should be able to

support the needs of the organization to which it related and be used for accountability

purposes. In addition, by definition, records contain information that is captured in some

tangible form as opposed to memorized or exchanged verbally. Indeed, an important

notion of the concept of records is their fixity. As mentioned by the European

Commission, a record consists of “data or information that has been fixed on a medium”

(European Commission, 2001, p. 8). The characteristic of fixedness represents the quality

of content being stable and resisting change. To preserve the organizational memory

effectively, record content must remain consistent over time. The medium refers to the

physical material that carries the information. The medium is a part of the record itself.

In summarizing the definitions of records, we understand that a record is created,

received and used in the conduct of business activities as evidence of those activities.

Records support the continuing conduct of business, ensure compliance with the

regulatory environment and provide the necessary accountability to organizations. These

definitions may appear to be relatively straightforward in the paper environment. As a

   

27  

next step, we need to examine whether these definitions and characteristics apply to

electronic records as well.

2.1.2. Characteristics of electronic records

The applicability of the characteristics of paper records to electronic records has

presented a challenge to researchers and practitioners over the last two decades. David

Bearman briefly explained the difference between paper records and electronic

counterparts:

“the essential difference between electronic and paper records is that the former are only logical things while paper records are usually thought of as only physical things. Physical things can be stored in only one place and in one observable order, logical things can be physically housed in many places but seen together. They can appear to have different arrangements depending upon the views accorded to their users. In other words, the properties of logical things are associated with them through formal, defined, logical relations while the properties of physical things are associated with them as material objects with concrete locations, attachments and markings” (Bearman, 1996, p. 1).

The nature and characteristics of the terms “records” and “electronic records”

vary slightly as presented by Bearman as quoted above. The diplomatics’ examination

shows that an electronic record is just like traditional record, since it must have:

“1) an identifiable context; 2) an originator, an author,

a writer,

an addressee,

and a

creator; 3) an action, in which the record participates or which the record supports

either procedurally or as part of the decision-making process; 4) explicit linkages to other records within or outside the digital system, through a classification code or other unique identifier; 5) a fixed form; and 6) a stable content”. (Duranti, 2009, p. 45-46).

Unlike traditional records, electronic records’ components are not necessarily

linked together since their parts can exist and be managed separately depending of the

hardware and software that are being used. Therefore, the general principles of records

management can be applied to records in any format. Regardless, electronic records raise

   

28  

additional specific and distinctive issues. It is more difficult to ensure that the content,

context and structure of records are preserved and protected, when the records do not

have a physical existence. From Bearman’s definition, we understand that electronic

records are not simply an equivalent of traditional paper records in the 21st century. The

Pearce-Moses Glossary published by the Society of American Archivists (SAA) gives a

definition of the nature of electronic records: “data or information that has been captured

and fixed for storage and manipulation in an automated system and that requires the use

of the system to render it intelligible by a person” (Pearce-Moses, 2005, p. 141).

Electronic records can encompass both analog and digital information formats, although

the term most often refers to records created in electronic format (so called born digital)

but is sometimes used to describe scans of records in other formats (i.e. reborn digital or

born analog) and requires a system to access these records. The Government of Canada

(GoC) states that the content and business context, not the medium, defines a record so

that computerized information or data, such as e-mail, meets the definition of a

government record (Government of Canada, Treasury Board Secretariat, 2007, section 3).

The growth of electronic records emphasizes the fact that they must be managed in

accordance with the business needs of an institution and its legislation and policies.

Although both electronic and paper records contain the common as well as

distinctive characteristics to serve as evidence of business activities, in practice, two

types of records may require a different approach, because an electronic record is not

tangible like traditional records but a computer file format composed of hardware and

software. One major difference between records in electronic and paper-based format is

that electronic records are not “directly human-readable, thus their physical appearance

   

29  

alone does not provide sufficient information to identify their origin, purpose, uses or

other aspects of the context in which they were created and maintained” (International

Records Management Trust, 2009, p. 40). Maintaining content, structure and context of

electronic records becomes, therefore, more vital and difficult than with traditional

records. In addition, Duranti and Thibodeau indicated that

“an electronic record is an object that is output from a computer system, typically on a screen, when needed by a human, or in interactions between systems, but cannot be stored in the form in which it is seen or used (…). Instead, it is stored as one or more strings of bits that require processing by a computer to be seen or used again as a unit” (Duranti and Thibodeau, 2006, p. 7).

Research has shown that “preserving an electronic record consists of preserving the

ability to reproduce it” (Duranti and Thibodeau, 2006, p. 7). The information and

communication technologies that manage and preserve electronic records must locate the

different components of a record and use the appropriate software to each component to

reproduce the record. Duranti explains that

“digital components may contain all or part of a record, and/or the related metadata. For example, an e-mail containing a textual message, a picture and a digital signature has at least four digital components: the header data, which enable systems to properly route and manage the message, the text of the message, the picture, and the digital signature” (Duranti, 2009, p. 46).

The use of information and communication technologies affects the procedures for

creating, preserving, and disposing of records. It may affect the accessibility of electronic

information accordingly and result in new ways in which organizations communicate and

execute business processes. According to Meijer, the fact that many records are handled

exclusively in an electronic form may have an important impact on “the content and

quality of records kept for purposes of accountability” (Meijer, 2001, p. 261). Since an

important function of records management is to create and preserve the records in order

   

30  

for organizations to be held accountable, the loss or alteration of electronic records can

seriously affect public accountability. Therefore, Duranti argues that the “concepts of

fixed form and stable content, however, require elaboration, as these two characteristics

of a digital record are the most problematic” to ensure records trustworthiness (Duranti,

2009, p. 46).

Indeed, electronic records should meet the characteristics of trustworthy records:

(1) reliability, (2) authenticity, (3) integrity, (4) usability, and (5) compliance (ISO 15489,

2001). Reliable records are those whose “content can be trusted as a full and accurate

representation of the transactions or activities to which it attests and therefore can be

depended upon in the course of subsequent transactions or activities” (ISO 15489, 2001,

p. 7). Records should be created at the time of the transaction to which they relate by

individuals who have direct knowledge of the facts of the business transactions.

An authentic record is one that is “proven to be what it purports to be and have

been created by the organizations with which it is identified” (ISO 15489, 2001, p. 7). To

ensure the authenticity of records, organizations should implement policies and

procedures to control the creation, transmission and destruction of records and make sure

that they are protected against unauthorized deletion, alteration and use.

The integrity of a record refers to it being “complete and unaltered” (ISO 15489,

2001, p. 7). The creation and use of policies and procedures should document any

modifications made to a record and under what circumstances to be indicated and

traceable.

   

31  

A usable record is one that can be located, retrieved, presented, and interpreted

(ISO 15489, 2001, p. 7). A record should be directly connected to the business activity

that produced it and identify the record within the context of broader activity.

Finally, the electronic records must be managed in compliance with all

requirements arising from current business, the regulatory framework and community

expectations of the organizations activities (ISO 15489, 2001, p. 9).

Records in the electronic environment have other unique characteristics like:

“durability; lifespan; maintenance; ease of editing, copying, erasure, and reformatting (manipulability); ease of manipulation, including the difficulty of tracing manipulation; need for supporting documentation to describe the contents, arrangement, codes, and technical characteristics; need for specialized personnel for the processing and maintenance of the records, introducing a new player in the normal clique of archivist, creator, and user” (Suderman, 2001, p.2).

Therefore, a systematic records management policy is required to ensure that the

appropriate records will be available to respond to accountability needs. This involves

developing and maintaining policies and procedures for managing records. The issues

related to electronic records management have been widely acknowledged in the

international archival and records management communities.  

2.1.3. Research projects on electronic records

A number of research projects and initiatives have examined the nature and

characteristics of electronic records from conceptual, policy and implementation

perspectives. Each of these projects has made a significant contribution to the

advancement of the fields of archives and records management.

   

32  

Until the 1990s, few publications on electronic records have appeared in the

major literature of archives, records management, and library and information science.

Even then, most of these publications dealt with only guidelines for policymaking and

policy implementation concerning electronic records. Since the mid-1990s, the literature

on electronic records has become much richer. Several research projects on electronic

records have been conducted to examine the characteristics of electronic records. Some

of those projects focused on identifying the functional requirements of what an electronic

recordkeeping system might be (e.g. University of Pittsburgh project on Functional

Requirements for Evidence in Recordkeeping, Indiana University’s Electronic Records

Project, Victorian Electronic Records Strategy, etc.).

As an early conspicuous project, the University of Pittsburgh’s project Functional

Requirements for Evidence in Recordkeeping (1993-1996) conducted a study to develop a

set of well-defined recordkeeping functional requirements which satisfy all the various

legal, administrative, and other needs of a particular organization and can be used in the

design and implementation of electronic information systems. The research team focused

on practical considerations beginning with an expert panel composed of professionals and

practitioners in the records-related fields, including lawyers, records managers, auditors,

etc. and identified evidentiary requirements for electronic records. The project team

validated these functional requirements through the use of a literary warrant and

production rules for records. The concept of literary warrant consists of statutory,

regulatory, or organizational policy requirements to create and maintain electronic

records as evidence. The Pittsburgh Project’s requirements to preserve information about

an electronic record’s content, structure, and context have been universally adopted by

   

33  

other task forces and research projects on the design and implementation of electronic

recordkeeping systems. In addition, this project was able to provide a conceptual and

solid framework for the advancement of electronic records management programs in

different settings.

The University of British Columbia (UBC) project, entitled The Preservation of

the Integrity of Electronic Records (1994-1997), offered another conceptual perspective.

The researchers defined conceptual requirements for ensuring the integrity and reliability

of electronic records. One of the major contributions of the UBC project is an explicit

articulation of the concepts of reliable and authentic electronic records derived from the

fundamental concepts of diplomatics. Specifically, the reliability of records is defined as

their trustworthiness as “proof and memory of the activity of which they constitute the

natural by-product, that is, to their ability to stand for the facts they are about” (Duranti,

Eastwood and MacNeil, 2002, p. 25). In turn, the capacity of records to “stand for the

facts they are about” is determined by procedures that control their form and creation and

the trustworthiness of the creator in ensuring their accuracy (Duranti, Eastwood and

MacNeil, 2002, p. 27). Equally important is the authenticity of electronic records, which

the UBC project defines as “reliability over time” (Duranti, Eastwood and MacNeil, 2002,

p. 28). From this perspective, ensuring the authenticity of electronic records requires

protecting records against alteration from the moment of transmission through any

reproduction and preservation procedure. This is crucial because providing long-term

access to electronic records involves reformatting, copying, conversion, and/or migration

operations and procedures that expose the records to the risk of alteration or loss of

contextual information.

   

34  

Based on the outcomes of the UBC project, the U.S. Department of Defense’s

Records Management Task Force (1994-1996) project outlined a set of electronic records

management requirements in order to certify records management software applications

to make sure that they meet the requirements necessary to support business activities.

These requirements were later included in the Department of Defense standard (DoD

5015.2-STD) and has become an industry standard for many state, county, and local

governments. The requirements embodied in this standard have resulted, if implemented,

in a system that will manage electronic records with the desired levels of confidence and

integrity.

Building on the UBC and DoD research projects, the International research on

Permanent Authentic Records in Electronic Systems (InterPARES) aimed to develop the

conceptual and methodological knowledge necessary for the permanent preservation of

authentic records generated and/or maintained electronically and to formulate models,

policies, strategies and standards capable of ensuring that preservation. Composed of 14

countries, such as Canada, United States of America, Italia, Australia, Korea and others

in the InterPARES I, the research was first divided into four areas: the authenticity

requirements for the preservation of electronic records; the appraisal requirements for

authentic electronic records; the long-term preservation of authentic electronic records;

and finally, the formulation of policies, strategies and standards related to the long-term

preservation of authentic electronic records. The main contribution of this project is to

identify research methods to measure the authenticity, based on the specificities of

electronic records for long-term preservation.

   

35  

The InterPARES II research project (2002-2006) aimed to develop and articulate

the concepts, principles, criteria and methods that can ensure the creation and

maintenance of accurate and reliable records and the long-term preservation of authentic

records in the context of artistic, scientific, and government activities (InterPARES II,

2002). These contexts produce a lot of electronic records using experiential, interactive

and dynamic computer technology these days. Scholars in the arts and sciences,

archivists, artists, scientists, and government representatives worked together to address

the challenges drawn from the incompatibility of digital systems, technological

obsolescence, and media fragility and guarantee that society’s digitally recorded memory

will be accessible to future generations (InterPARES II, 2002). As an international,

collaborative and inter-disciplinary research, researchers in each working group identified

the perspective(s), research design, and methods to be most appropriate to their inquiry.

The concepts, principles and methods developed through scientific research constitute the

essential foundation and framework of best practices. Any solution to digital preservation

problems will be situation- specific and must be devised by preservers, depending on the

cultural, administrative, legal, and functional contexts in which they operate. By

exploring different environments, the researchers were able to look at the preservation of

authentic electronic records of different nature, such as photographs, moving images and

electronic mail.

The InterPARES III (2007-2012) project attemped a more practical focus by

applying the theory and methods of digital preservation drawn from the first and second

InterPARES project outcomes into concrete practice for existing bodies of records in

archives and archival/records units within an organization. The objectives are to

   

36  

determine: (1) how general theory and methods can be implemented in small and medium

sized archives and units and become effective practices; (2) what factors determine the

type of implementation that is appropriate for each body of records in each context; and

(3) what skills professionals will require to conduct such operations (InterPARES III,

2007). The participating teams have conducted case studies at diverse organizations in

each national team.

Park’s study (2002) examines the conceptual requirements for guaranteeing the

authenticity of records in academic electronic recordkeeping systems and examines how

these requirements are implemented to support business activities. The findings of her

research identified four requirements and their inter-relationships, namely juridical,

procedural, technological and sociocultural which are interrelated to ensure the

authenticity of electronic records. First, the juridical requirements encompass “any legal

or other external regulatory requirements for implementing and designing the students

information systems and creating, using, and storing student records, such as national and

state laws; regulations; university policy; organizational guidelines; and professional,

accreditation, and licensing requirements” (Park, 2002, p. 136). The juridical

requirements serve as a basis in each university to sustain their mission and objectives

(Park, 2002, p. 136). The procedural requirements include “procedural or functional

requirements, such as administrative mandate, organizational stuctures, business

procedures, workflow, and business processes” (Park, 2002, pp. 144-145). The

technological requirements refer to “how authenticity is ensured within the student

recordkeeping systems” by examing how the technology (e.g. hardware and software) is

implemented and used (Park, 2002, p. 154). The final component of her framework is the

   

37  

sociocultural requirements that refer to “any social, cultural, political, verbal, or

traditional requirements used in the practices associated with input, process, and output of

a student record system in a specific environment” (Park, 2002, p. 162). With these

requirements, Park develops a conceptual framework in composing of the hierarchy of

authenticity requriements and authentication processes as shown in Figure 2.1.

Figure 2.1. Park’s conceptual framework on authenticity requirements and authentication processes

Admissions Student Records

Registration/ Financial Aid

Enrollment/ Course

Grades Graduation

F u n c t i o n s

Juridical Requirements

Technological Requirements

Procedural Requirements

R e q u i r eme n t s

Sociocultural Requirements

   

38  

In summary, as electronic records have been defined from several relevant

disciplines, they have some common components with paper records: (1) records contain

a content, context and structure; (2) records are created in the business processes and

serve as evidence of organizations activities; and (3) evidence is one of the important

aspects to keep accountability of records at the holding organization. Importantly, to keep

these features to electronic records is more difficult than paper records. The preceding

research projects have made efforts in investigating the characteristics of electronic

records and especially, identifying the authenticity, reliability, and integrity of electronic

records for long-term preservation. However, most of them tend to be conceptually

conceived without practical implementations and seem to focus on electronic records in

general, not on specific type of electronic records, such as e-mail or web-based records.

2.2. Government agencies as an institutional context

In order to understand the institutional context of e-mail management, this section

presents the characteristics of government agencies and their records management

practices. There is a large body of literature on organizational theory, organizational

culture and decision-making practices in many institutions. Among them, an important

number of studies focus on federal governments and government agencies in general.

Most of those studies agree that government agencies have a unique institutional

environment (Bertot, et al., 2009; Rainey and Steinbauer, 1999; Tirole, 1994; Perry and

Rainey, 1988, Seidman, 1954). A government is defined “as the organization through

which a political unit exercises its authority, controls and administers public policy, and

directs and controls the actions of its members or subjects” (Allen, et al., 2001, p. 95).

There are different forms of government that vary both in theory and practices such as

   

39  

totalitarian, communism, monarchy, democracy and so on. Horn (1995) explains that

“governments are distinctive from other types of institutions by the following reasons: (1)

they have a regulatory function; (2) the regulation has a strong impact on their context;

and (3) their enacting decisions are made as the governing authority”. Indeed, one of the

fundamental purposes of a government is the maintenance of security and public order by

the creation and enforcement of laws and regulations. The Canadian government is

organized as a constitutional democracy. Democracy is a “political form of government

in which governing power is derived from the people” (Government of Canada, Canada’s

System of Government, 2011). Even though there is no specific, universally accepted

definition of democracy, equality and freedom have been identified as important

characteristics of democracy. These principles are reflected in all “citizens being equal

before the law and having equal access to power. The freedom of its citizens is secured

by legitimized rights and liberties that are generally protected by a constitution”

(Government of Canada, Canada’s System of Government, 2011). While the issues

surrounding the characteristics of democracy is beyond the scope of this dissertation, our

focus is on the implications of this form of government on records management practices.

Many democratic countries, such as Canada, use federalism in order to prevent

abuse and increase public input by dividing governing powers between municipal,

provincial and national governments. A federal government is the government at the level

of the nation-state. The structure of federal governments varies from institution to

institution. Usual responsibilities of this level of government which are not granted to

lower levels are maintaining national security and exercising international diplomacy.

Basically, the federal government has the power to make laws and regulations for the

   

40  

country, in contrast with provincial or local governments. To ensure the oversight and

administration, the government apparatus is organized in “government departments and

agencies, which are responsible for helping the federal government form and implement

policy within its jurisdictions” (Government of Canada, Canada’s System of

Government, 2011). A government agency can be defined as “a unit of government

authorized by law to perform a specific function” (Pearce-Moses, 2005, p. 84). There are

different types of agency since the autonomy, independence and accountability of

government agencies tend to vary. While the functions of an agency are essentially

executive, it is normally different from a department or ministry that focused mainly on

advisory functions, but this difference is often unclear in practice and in the literature

(Hu, et al., 2010; Luna-Reyes, et al., 2007; Dawes, Pardo and Cresswell, 2003). Agency

names may use another wording as equivalent, such as department, office, bureau,

authority or ministry. Therefore, in this research, government refers to the Canadian

federal government and agency is a generic term that encompasses all these other names.

2.2.1. Government information and creation of e-government

Information is a valuable asset that governments must manage as a “public trust

on behalf of all relevant parties, including citizens, businesses, stakeholders and political

parties” (Government of Canada, Treasury Board of Canada Secretariat, 2007, section 3).

Specifically, government information means “information created, received, used, and

maintained regardless of physical form, and information prepared for or produced by the

government and deemed to be under its control in the conduct of government activities or

in pursuance of legal obligations” (Government of Canada, Treasury Board of Canada

Secretariat, Glossary, 2003, Section G). Government information should be under its

   

41  

control in the conduct of government activities or in pursuance of legal obligations (Hu,

et al., 2010; Eschenfelder and Miller, 2006; Chadwick and May, 2003). This is seen as

fundamental to democratic society, since “governance power is delegated by citizens or

stakeholders to government agencies and in turn, government agencies supply

information to the public” (Walters, 2005). Because of the characteristics of government

agencies, governments need to be concerned with the efficient delivery of government

information to citizens and other users to facilitate citizen assessment of agency policies

and performance. At the same time, governments are obligated to collect information on

citizens’ opinions to inform policy making (Walters, 2005; Leonard, 2003). Here,

information flow of government information is two ways and information facilitates

better governance by permitting oversight and informing policy decisions. In this view,

“citizens are acting as a counterbalance to government agencies, overseeing policy

implementations, holding agencies accountable, and providing feedback for expert

agency decision makers to use in expert decision making” (Yildiz, 2007, p. 649).

However, the government size and the number of administrative units can affect the

efficiency of the agencies (Sarapu, 2010). At the government, the agencies often work

independently and might not be aware what information exists elsewhere. That is why the

government is often considered a “non-efficient producer” (Carrick, 1988; Rainey and

Steinbauer, 1999). As a result, citizens might be confused as to when and which agencies

to ask information of and find that there is a lack of coherence between agencies. Until

the widespread of the Internet, technology was used in government to enhance “the

managerial effectiveness of public administrators while increasing government

productivity” (Schelin, 2003, p. 122).

   

42  

In recent years, “governments worldwide are faced with the challenges of

transforming and reinventing government systems, delivering cost effective services

through information and communication technologies (ICT)”, and implementing new

ICT (Georgescu and Georgescu, 2008, p. 242). These needs come to change a lot of

aspects in government management leading up to e-government. More and more

governments provide services through Internet, specifically web-based applications, and

e-mail. E-government is defined:

“as a way for governments to use the most innovative information and communication technologies, particularly web-based Internet applications, to provide citizens and businesses with more convenient access to government information and services, to improve the quality of the services and to provide greater opportunities to participate in democratic institutions and processes” (Fang, 2002, p. 2).

E-government refers to technologies reconfiguration of the public administration and

governance and how knowledge, power and purpose are redistributed according to new

technological realities (Hu, et al., 2010, p. 6). Pardo outlined the five functions of the e-

government as follows: (1) citizen access to government information; (2) compliance

with a set of rules or regulations; (3) citizen access to personal benefits; (4) procurement

including bidding, purchasing, and payment; and (5) government-to-government

information and service integration (Pardo, 2000). Therefore, the use of ICT aimed at

improving government services and interactions with citizens (G2C), businesses and

industry (G2B), and different agencies of government (G2G). Overall, e-government was

a tool to ensure greater efficiency and better management of government services by

improving government coordination and collaboration in and between agencies,

enhancing public participation in the affairs of government and the democratic process

and bringing people and government closer together (Gauld, Gray and McComb, 2009).

   

43  

The United States and the Great Britain have led the way in establishing a basic

informational form of web presence since the mid-1990s (Chadwick and May, 2003). In

Canada, the change towards becoming "electronic governments" has been successful,

which places the Canadian government as one of the most active governments seeking

ICT implementation (Reddick and Turner, 2012). The GoC has clearly outlined its

mission to become one of the world's most connected governments by year 2004 and was

considered one of the most innovative governments in terms of information technologies,

online services, and organizational capacity to speedily adapt information (Roy and

Langford, 2008, p. 16). For a long time, Canada was the international leader of e-

government through the constant evolution of its e-government tool, Government On-

Line initiative, “a modern citizen-centric, one-stop integrated, multi-channel tool”

(Government of Canada, Public Works and Government Services Canada, 2005, p. 1). In

the years since its creation, the GoC put a lot of work into e-government for its citizens so

they could have access to government information and services.

Nevertheless, Canada has “fallen behind” in the e-government implementation

(Accenture, 2009). Based on four criteria (i.e. cost reduction, accessibility, retrieval, and

security), Fraser showed that the GoC, although it has made “valiant strides to make e-

government in Canada a universal reality, has not yet been able to achieve the full

potential for online government” (Fraser, 2009, p.11). Therefore, as electronic

government (e-government) services are implemented, several critical questions about

digital government information management, dissemination, access, and preservation of

electronic records still remain.

Another important concept is e-governance that is under wide discussion in the

   

44  

literature. Harris (2000) explains that e-governance is more than just installing a

government web site, offering services over the Internet, or simple access to electronic

payments. E-governance allows “citizens to communicate with government, participate in

the governments' policy-making and citizens to communicate each other and to

participate in the democratic political process” (Manohar, Rao and Mellam, 2010, p.

244). Along with e-governance, e-government is about government using information

technologies and then redefining its “social technologies” in order to remain relevant in a

more participative, interactive and informational era (Lips and Rapson, 2009). Noticeably,

e-government indicates that most of government information and records are now created

in an electronic format and electronic records became important issues to government

agencies.

Related to electronic records, one of the significant issues in government

information management is accountability. Generally speaking, accountability refers to

“informal giving that is part of everyday conversation, as well as more formal

transactions generally involving some sort of documentary support” (Munro, 1996, p. 2).

According to Kearns, accountability is a formal reporting to a higher authority and

includes expectations of performance and responsiveness to citizens and institutions

(Kearns, 1996, p. 8). This definition implies that accountability involves two parties who

render an account and judge that account. Yakel states an important point by saying that

“every setting organizes its activities to make its properties as an organized environment

of practical activities detectable, countable, recordable, reportable, tell-a-story-about-

able, analyzable—in short accountable” (Yakel, 2001, p. 234). Accountability serves as

evidence of current actions and activities and takes decisions for future actions. The SAA

   

45  

defines accountability as being “the ability to answer for, explain, or justify actions or

decisions for which an individual, organization, or system is responsible” (Pearce-Moses,

2005, p. 5). According to MacNeil, “the principle that underlies the concept of

accountability is linked to the conveying and evaluation of information” (MacNeil, 2000,

p. 50). For corporate bodies, accountability required the development and refinement of

procedures for carrying out actions and documenting them, “to ensure that everything

was done according to rule and in proper sequence, so that administrators could

account… at any time precisely for anything that had been done” (MacNeil, 2002, p. 50).

Islam and Gronlund define accountability in public administration as “an obligation of

the government officials regarding handling of public resources and answerability on

deviating from any stated performance objectives” (2012, p. 297). According to this

definition, the responsibilities of the public administration include operational

transparency and establishing trust within the government agencies as well as with the

citizens. Institutional accountability has depended on “recordmaking, recordkeeping and

access to those records, and it has influenced the procedures and timing of their creation,

form, maintenance and accessibility” (Lemieux, 2001, p. 93).

In relation to the characteristics of records, records serve a purpose in the

accountability process and evidence of it. Records management focuses on how

accountability is achieved through recordkeeping. Accountability has become, over the

years, a significant focus in records management. Bearman (1993) states that “archives

and records management share a simple goal: providing for organizational

accountability” (Bearman, 1993, p. 14). Traditionally, the relationship between records

and accountability has rested on a “belief that the usual circumstances of records creation

   

46  

gives assurances of reliability, authenticity, and trustworthiness of records. Therefore, it

is an essential quality to giving of and holding to account” (Lemieux, 2001, p. 92). A

systematic records management policy is required to ensure that the appropriate records

will be available for accountability processes. This involves developing and maintaining

policies, procedures, and methodologies.

2.2.2. Management of federal records and creation of national archives

In order to manage accountable and effective government records, most

governments have established national archives whose main mandate is to ensure the

preservation and management of federal government records and serves as the continuing

memory of the government and affiliated institutions. Over the years, the national

archives have become a “centre of expertise in creating, managing and preserving official

information and helped government and public sector bodies manage and use information

more effectively” (Government of the United States, National Archives and Records

Administration, 2007, General Information Leaflet, Number 1). The National Archives

and Records Administration (NARA), in the United States, was one of the first

government institutions to develop tools for other agencies so that they can manage their

records in electronic form. NARA is a federal agency whose primary responsibility

consists of: managing the records of all three branches of the United States federal

government; providing guidance to federal agencies on records management policies and

practices; and preserving records of permanent historical value to the United States in

both federal archives and presidential libraries (Government of the United States,

National Archives and Records Administration, 2007, General Information Leaflet,

Number 1). The electronic records management initiative is a part of the “e-government

   

47  

management agendas that aimed at making it simpler for citizens to receive high-quality

service from the federal government, while reducing the cost of delivering those

services” (Government of the United States, National Archives and Records

Administration, 2002). The US government has recognized that records management is

an important part of the infrastructure as one of 24 government initiatives in the States,

which will make e-government work. The electronic records management initiative has

provided guidance on electronic records management applicable to government-wide

agencies and enabled the agencies to transfer electronic records to NARA in a “variety of

data types and formats so that they may be preserved for future use by the government

and citizens” (Government of the United States, National Archives and Records

Administration, 2002, p. 3).

Also, the National Archives of Australia (NAA) has created several kinds of

procedures and policies to enable the strategic management of information. Especially,

the NAA accords a great deal of attention to the management of electronic records. For

example, the Strategic Information and Records Management Framework provides an

“approach to managing information and records; to reduces business risk; increases

accountability and improves operational efficiencies” (Government of Australia, National

Archives of Australia, 2014c). This approach to information and records management

implies focusing “on an effective information governance framework; adhering to

standards and legislation; allocating roles and responsibilities; and linking business to

records” (Government of Australia, National Archives of Australia, 2014c). More

specifically, the Government's Digital Transition Policy “aims to move Australian

Government agencies to digital recordkeeping for efficiency purposes” (Government of

   

48  

Australia, National Archives of Australia, 2014a). With the implementation of the e-

government, new types of electronic records started to appear such as e-mail and web-

based records and accordingly the NAA has declared those records as a new form of

evidence. As a result, the federal government started to develop and implement policies

that cover these types of records as well as completed policies on the preservation of

these records such as Archiving Websites: Advice and Policy Statement (Government au

Australia, National Archives of Australia, n.d.) and Managing Email (Government of

Australia, National Archives of Australia, 2014b).

In this context, the GoC has also made an effort in playing a leading role in

Canadian government agencies. In the past, government agencies worked separately and

government information was managed by each agency according to their own needs. In

Canada, in 2001, the Chief Information Officer’s Branch (CIOB) of the Treasury Board

Secretariat engaged in a Strategic Infrastructure Initiative (SII). “SII was based on the

development of a federated architecture of internal information systems – to foster

common standards, directories, and shared approaches both within and across federal

government departments” (Allen, et al., 2001, p. 96). The Canadian government created

and implemented policies and procedures to manage their records that were created

electronically. In the GoC, information is protected as a “public trust and managed as a

strategic asset to maximize its value in the service of Canadians” (Government of

Canada, Treasury Board of Canada Secretariat, 2007, section 3). This vision was

achieved through the implementation of the GoC Information Management (IM)

Strategy. The GoC IM Strategy is a “coordinated approach that ensures that the

appropriate enterprise-level governance, direction, information structures, processes,

   

49  

tools, and skill sets are in place across the GoC to support the effective management of

information” (Government of Canada, Treasury Board of Canada Secretariat, 2007,

section 6).

The GoC IM Strategy was crucial for managing the volume of information

produced, and the increasing number of available access points for its creation and

communication. At the same time, “complex issues such as national security required that

government establishes policies and procedures that often cut across the mandates of

several federal departments and agencies. Concurrent with this growing need for

horizontality, there were increasing demands by Canadian citizens for an integrated and

responsive government that can leverage information to make effective decisions that

support the delivery of high value programs efficiently, transparently and accountably”

(Government of Canada, Treasury Board of Canada Secretariat, 2010). The Treasury

Board of Canada developed general information management policies and procedures

that each department or agency could use to create their own policies for managing their

electronic records (Government of Canada, Treasury Board of Canada Secretariat, 2007,

section 6).

The Library and Archives Canada (LAC) was established to take on the

responsibility of managing government records and documents. Its mandate is to

facilitate the management of government information and provide leadership in the

government community by working collaboratively with the central agencies,

departments and agencies and develop standards, tools and best practices for information

management. In 2007, the Treasury Board of Canada Secretariat (TBS) adopted the

Policy Framework for Information and Technology. This policy encourages all

   

50  

departments and agencies to treat information as a critical resource that needs to be

managed, shared, and protected. The policy provides strategic direction for management

of information in the GoC, and facilitates implementation of information-related

provisions in legislation and policies (Government of Canada, Treasury Board of Canada

Secretariat, 2007, section 6). As a common body of practices, this framework ensures that

agencies share principles but maintain the capacity to adapt it to their organizational

contexts. Accordingly, different standards and tools have been created to implement the

framework and answer to the various needs and issues depending on the types of records

(Government of Canada, Treasury Board of Canada Secretariat, 2007, section 6). For

instance, a metadata scheme for the governmental resources, policies for the management

of web-based records and e-mail management policies were all developed.

In 2009, the Treasury Board of Canada Secretariat adopted the Directive on

Recordkeeping that shows the importance of appropriate records management practices at

the Government of Canada. Recordkeeping is defined as “a framework of accountability

and stewardship in which information resources are created or acquired, captured, and

managed as a vital business asset and knowledge resource to support effective decision-

making and achieve results for Canadians” (Government of Canada, Treasury Board of

Canada Secretariat, 2009). The objective of this directive is to “ensure effective

recordkeeping practices that enable departments to create, acquire, capture, manage and

protect the integrity of information resources of business value in the delivery of

Government of Canada programs and services”, thus establishing recordkeeping as a core

function within the Canadian government (Government of Canada, Treasury Board of

Canada Secretariat, 2009). The Directive on Recordkeeping also defines responsibilities

   

51  

for stakeholders involved in the creation and management of records. As such, “each

public servant has the responsibility to preserve and manage the information resources

created and used in their work” (Government of Canada, Treasury Board of Canada

Secretariat, 2009) while information management senior officials are responsible for

“overseeing the implementation and monitoring of this directive in their departments,

bringing to the deputy head's attention any significant difficulties, gaps in performance,

or compliance issues” (Government of Canada, Treasury Board of Canada Secretariat,

2009). In order to ensure the appropriate implementation of this directive, the information

management managers and operational managers are asked to collaborate. Consequences

for non-compliance to the Directive on Recordkeeping are defined and vary depending on

the nature of the infraction, ranging from additional training to disciplinary measures

(Government of Canada, Treasury Board of Canada Secretariat, 2009). According to

Buhlmann (2011), this directive marks as a paradigm shift in order to ensure

accountability, decision-making and governance.

In addition, with the increase of electronic records, electronic records

management systems (ERMS) have become important to e-government because of their

capacity of centralizing within a repository, managing and accessing government records

(Hu, et al., 2010, p. 7). Moloi and Mutula (2007) argue that an electronic records

management system support “agencies decision-making and performance” and report that

the “effective use of an ERMS can mitigate the key information gaps with enhanced

transparency, accountability, and governance” (pp. 302-303). To ensure the management

of electronic records of the GoC, the TBS has established the Records, Documents, and

Information Management System (RDIMS) as the suite of applications for records and

   

52  

document management in the federal government as part of the Shared Systems

Initiative. RDIMS is an electronic document and records management solution designed

to manage documents and records throughout their lifecycle and facilitate the sharing of

information within agencies and across the GoC. However, Roy and Langford (2008)

have shown that, in the Canadian government agencies as well as within other

government agencies worldwide, the implementation of ERMS has been uneven in the

context of e-government services. Moloi and Mutula (2007) have shown that in many

government agencies the slow implementation of ERMS is mainly due to the lack of

adequate policies, while Hu, et al.’s study (2010) explains that that “agencies usually

have considerable autonomy and indeed exhibit varying latitudes in the system choices

and implementation pace making it difficult to enforce ERMS on all agencies in a top-

down fashion” (p. 14).

To overcome these challenges and be more effective, the GoC is currently moving

forward in its commitment to enhancing transparency and accountability by

implementing open government efforts in order “to foster greater openness and

accountability to provide Canadians with more opportunities to learn about and

participate in government, to drive innovation and economic opportunities for all

Canadians and, at the same time, to create a more cost effective, efficient and

responsive government” (Government of Canada, Treasury Board of Canada

Secretariat, 2012, p. 1). The GoC has consulted the population and experts, in 2011, to

explore their views on how to increase government openness, transparency and

accountability. The GoC continues to work to give Canadians the opportunity to access

public information in more useful and readable formats, empower citizens to participate

   

53  

more directly in the decision-making process and use new technologies to strengthen

governance. The Open Government Initiative is structured along the three streams of

the Open Government Strategy: Open Information, Open Data, and Open Dialogue

(Government of Canada, Treasury Board of Canada Secretariat, 2012). The objectives

of the Open Information stream are to “releases information, including on government

activities, to Canadians on an ongoing basis. By proactively making government

information available, it will be easier to find and more accessible for Canadians”

(Government of Canada, Treasury Board of Canada Secretariat, 2012, p. 6). In order to

achieve these objectives, the GoC has created an advanced government-wide

recordkeeping system for use by government agencies called GCDocs. GCDocs is the

government new document and records management system from OpenText that will

ensure that “information is safeguarded as a public trust and managed as a strategic

asset; providing a comprehensive approach to increasing IM capacity, sharing best

practices, and reducing redundancy, provide consistent policies, standards, best

practices, guidance, and tools to departments to support the effective delivery of

programs and services and finally, foster alignment and ensure linkages with other

related enterprise-wide activities (e.g., security, identity management, service strategy,

etc.)” (Government of Canada, Treasury Board of Canada Secretariat, 2012, p. 3) by

managing all information coming from different channels such as e-mail records in

hope that this new solution will be more easily implemented than the RDIMS. The

implementation of this new government-wide recordkeeping system highlighted

difficulties in maintining the different agencies e-mail messaging systems. Indeed, “the

Government of Canada currently has over 100 separate email systems used by more

   

54  

than 300,000 government employees and maintaining these individually, given the

varying types and numbers of systems, is neither cost-effective nor is it conducive to

collaboration across government” (Government of Canada, Shared Services, Canada,

2013). As a result, the agencies have adopted different practices to manage their e-mail

systems. Starting in 2015, the GoC is planning to “consolidate and modernize email

services to reduce costs, increase security and enhance program delivery to Canadian

citizens and businesses” (Government of Canada, Shared Services, Canada, 2013) by

implementing a standard e-mail system to improve communication efficiency and

productivity in the agencies as well as make it easier for citizens to communicate with

the government.

2.2.3. Information professionals in the Canadian government agencies

The increase of electronic records had an impact on training programs offered by

schools on information science that had to introduce courses in digital technologies, but

also on the vocabulary used to appoint information professionals. According to Leroux,

Lemay et al. (2012), “this movement is the result of two dynamics: one is specific to job

families and the progressive systematization of knowledge in information management;

the other is external: the evolution of information media; after incorporating the

development of newspapers, the explosion of the "paperwork", the rise of audiovisual and

now, even more radical change with digital, Internet and the web” (pp. 28-29).

In 2011, Gartner, as reported by the Association of Information and Image

Management (AIIM), stated that

"the vast majority of organizations see the need to manage information as an enterprise resource rather than in separate 'silos,' departments or systems, but they don't know how to begin to address the challenge, as it is so large...Professional

   

55  

roles focused on information management will be different to that of established IT roles…An 'information professional' will not be one type of role or skill set, but will in fact have a number of specializations” (2012, p. 4).

AIIM agrees that information professionals

“provide a wide range of services in the areas of: classification systems, taxonomies, tagging structures, thesauri, retention schedules, assessment criteria, information audits, knowledge audits, information research, information resources planning and acquisition, training programs for people using information, information and knowledge literacy campaigns and other 'finding and organizational aids and approaches” (2012, p. 9).

The Special Libraries Association defined information profesional as being

“a professional that uses information in her/his job to advance the mission of the organization. The information professional accomplishes this through the development, deployement and management of information resources and services. The information professional harnesses technology as a critical tools to accomplished this goal” (2003, p. 1). While “information professionals can play a number of roles in organization,

only a few professionals currently have information professional as a title” but have the

management of information ressources as the main part of their job description (AIIM,

2012, p. 10). Some job positions for information professionals include: archivist, chief

information officer, knowledge or records manager, librarian, web manager, etc (Jordan

and de Stricker, 2013, p. 9). AIIM specifies that information professionals can be “found

among those whose primary focus is governance – e.g., information architects and

managers or, as do the new wave of information curators and community managers who

currently focus primarily on curation” (2012, p. 7).

According to Jordan and de Stricker, the “information management work in the

Government of Canada is carried out by librarians, archivists, web content manager, and

information technology professionnels” (2013, p. 5). In brief, a combinaison of

professionals involved to some extent in information management. In 2007, the Treasury

   

56  

Board of Canada Secretariat adopted the Directive on Information Management Roles

and Responsibilities to identify the roles and responsibilities of all agencies employees in

supporting the effective management of information in their agency. Managing

information is an “essential component in the effective management of business of an

agency and using and managing information is part of how the Government of Canada

conducts business” (Government of Canada, Treasury Board of Canada Secretariat,

2007b) In addition, the directive put forward information technology (IT) is a “key

enabler to achieving well-managed information in support of policies, programs and

services” (Government of Canada, Treasury Board of Canada Secretariat, 2007b). The

directive identifies 4 levels of information management roles and responsibilities within

the GoC: senior executive of each agency, manager, employees and IM functional

specialists. The senior executive for each agency is responsible for information

management. As such, the senior executive is “responsible for ensuring the appropriate

management direction, processes and tools are in place to efficiently manage information

under the control of the department to support the department's business and to retain the

quality of information throughout the information life cycle” (Government of Canada,

Treasury Board of Canada Secretariat, 2007b). Specifically, the senior executive must

collaborate with IT for all information management activities; co-ordinate resources and

implementation of information management activities including: service delivery,

internal development of policy instruments, training and development for staff; monitor

departmental information management resource and training requirements; ensure the

effectiveness of the IM policy and its instruments is regularly assessed against objectives

within the department (e.g., every three years) (Government of Canada, Treasury Board

   

57  

of Canada Secretariat, 2007b). The managers in agencies seem to

“have the role of managing resources, tools and processes in order to achieve assigned deliverables and outcomes. Managers are responsible for managing information as an integral part of their program and service delivery and as a strategic business resource by: analyzing the business process and conveying information requirements to information management functional specialists; applying information management policy, standards, procedures, directives, guidelines, tools and best practices, in the performance of the manager's duties, to ensure the authenticity and integrity of the information; identifying information issues and requirements of information management” (Government of Canada, Treasury Board of Canada Secretariat, 2007b).

The employees at the GoC are responsible for managing the “information they collect,

create and use as a valuable asset in their daily activities by applying the information

management policy, standards, procedures, directives, guidelines, tools and best

practices” (Government of Canada, Treasury Board of Canada Secretariat, 2007b).

Finally, the information management functional specialist is defined as:

“employee who carries out roles and responsibilities that require function-specific knowledge, skills and attributes related to managing information such as those found in records and document management, library services, archiving, data management, content management, business intelligence and decision support, information access, information protection and information privacy. The roles and responsibilities of information management functional specialists support departmental objectives and programs with planning, tools or services which provide accurate, reliable, current, and complete information to the appropriate people, in the appropriate format, at the appropriate time” (Government of Canada, Treasury Board of Canada Secretariat, 2007b).

Overall, information management in the Canadian federal government is “complex and

can involved many professions such as librarians, archivists, records managers and IT

professionnals” (Jordan and de Stricker, 2013, p. 3). In this research, the term information

management professionals is used to include the different professions involved in

information management and whose main responsibilities include: supporting business

activities; lifecycle management; policy and procedures development; dissemination,

   

58  

training and monitoring of information management activities, and more specifically e-

mail management.

In summary, as the challenges to effectively manage government information are

growing, so are the requirements to better align information exchange across and between

government agencies and departments and respond to public demands for enhanced

government information management. Different policies and procedures were created to

manage government records, more importantly electronic records including e-mail.

However, these policies are in most cases only conceptual and provide little information

on the implementation of these policies. Without a coherent, explicit, enterprise-wide

strategy to address these horizontal and government-wide issues, individual departments,

agencies and even the GoC as a whole will face increasing difficulty in meeting their

accountability commitments.

2.3. E-mail as a specific type of electronic records

Most of organizations today use electronic mail (e-mail) with all kinds of access

points (e.g. web-based, mobile, proprietary platforms) to conduct business activities. This

medium of communication has grown uncontrolled into one of the largest corporate

information repositories now. As e-mail becomes more popular in organizations rapidly,

a review of e-mail management is necessary. This section describes the definition and

characteristics of e-mail and discuss the key issues related to e-mail management.

2.3.1. Definition and Characteristics of E-mail

The term e-mail contains a conceptual duality. It refers to: “1) a computer system

   

59  

that enables users to create, transmit, receive, file, and respond to message electronically;

and 2) a message or messages sent or received in electronic form” (Government of

Canada, Library and Archives Canada, 2008, p. 16). The term e-mail is analogous to the

term mail, which indicates both the postal mail service and the letters themselves.

Regarding the former concept, ARMA International defines e-mail as being “in its

simplest form, e-mail is a ‘store and forward’, network independent, electronic messaging

technology that permits individuals to send and receive information without the use of, or

intervention by, internal and/or external mail distribution system” (ARMA, 2012, p. 18).

E-mail consists of messages sent or received by means of an e-mail messaging system.

The Society of American Archivists (SAA) also gives some technical precisions

regarding the messaging system: “an email system requires an application, sometimes

called a mail user agent (MUA), client or reader, that incorporates a simple text editor

used to compose messages and to send and receive messages” (Pearce-Moses, 2005, p.

121). The system also requires a mail transport agent (MTA) to store and forward

messages. However, an e-mail system typically “formats messages using the RFC 2822

Internet Message Format or Multipurpose Internet Mail Extensions (MIME) standards

when the messages are to be exchanged with another system” (Pearce-Moses, 2005, p.

121). E-mail systems commonly transmit messages using the “simple mail transport

protocol (SMTP) as an integral part of e-mail. Many MUAs and MTAs are based on

either the Post Office Protocol (POP3) or Internet Message Access Protocol (IMAP)

standards to keep interoperability between different e-mail systems” (Pearce-Moses,

2005, p. 121). E-mail system is considered an “individual-centric application”, meaning

that it can be customisable by an individual (Lappin, 2010, p. 259).

   

60  

Regarding the latter part, the concept of e-mail also includes the message itself.

“E-mail message is composed of a header, a message body and, optionally, attachments”

(Park and Zwarich, 2008, p. 469). The header includes “information that enables the

message to be delivered and additional metadata to identify, classify, and contextualize

the message”, such as sender, addressee, subject and date (Pearce-Moses, 2005, p. 121).

Routing information identifying the message sender, the recipient(s), and the date and

time distributed is generally considered a key element of e-mail use, providing the proper

context for understanding the message content. The message body can be notes or more

formal and substantial narrative documents. The message can contain “data in any

conceivable form such as ASCII text” (Pearce-Moses, 2005, p. 121). These days data

consists increasingly of images, text processing files or multimedia files. Attachments

may be “in any format, such as word processing documents, spreadsheets or media files”

(Pearce-Moses, 2005, p. 141). E-mail message goes “through an asynchronous process of

delivery” which involves a certain number of steps during which a message is stored by

an intermediate server on the network, to be forwarded at a later time, until it finally

reaches its destination. The delivery depends on the availability of connections on the

network (InterPARES 3 Project, 2011).

ARMA specifies that “electronic messages are potentially complex in that, in

addition to content and structure, they may comprise several sets of metadata (e.g.

identity, transmission, security, content-type, content-transfer-encoding, or format

metadata)” (ARMA, 2012, p. 2). Metadata consists of “structured information that

describes, explains, locates or otherwise make it easier to retrieve, use or manage

information resources” (Gilliland, 2008, p. 3). Electronic messages provide embedded

   

61  

information (metadata) by which those records are located and managed. In addition,

metadata serve as a mechanism for documenting the lifecycle of records; document how

electronic records behave its function, use, and relationships to other electronic records

and preserve the context of creation of an electronic record as well as support searching

and retrieval. Metadata are used to ensure the authenticity, reliability, integrity, and

usability of the record (Zeng and Qin, 2008, p. 7). The most common metadata in e-mail

messages are the addresses including senders and recipients that can refer to an

individual, a group, or a list, and the sender may be unaware of the type of address being

utilized (ARMA, 2013). Also, conversational threads are an important characteristic of e-

mail messages, which are a mechanism for linking related messages (InterPARES 3

Project, 2011). It may show a real conversation or provide information related to other

messages or conversations. Finally, the subject is an important metadata as subject

metadata can contribute to record’s management throughout its lifecycle, including

classification and search. E-mail messages are considered being semistructured data,

since they have well-defined header fields and an unstructured text body.

Electronic messages can vary in their purposes. E-mail messages have also been

defined based on their functions and value. In Canada, the Department of Natural

Resources defines e-mail messages as “e-mail records […] are required by the

Department to control, support, or document the delivery of programs, to carry out

operations, to make decisions, or to account for activities” (Government of Canada,

Natural Resources Canada, 2004, 6. Policy Requirements). This definition identifies e-

mail records as an important tool to conduct business operations. Indeed, electronic

messages should accurately reflect the purpose of intended communications, decisions or

   

62  

completion of actions. Retained as records, they should support the needs of the

organization to which they relate and be accessible for accountability purposes. However,

e-mail messages which contain information not pertaining to the conduct of business

activities is defined as being a non-record by the GoC (Government of Canada, Library

and Archives Canada, 2008, p. 16). While transitory e-mail messages are “an e-mail that

has little or no documentary or evidential value and that need not be set aside for future

use” (InterPARES and ICA, 2012, p. 10). Transitory e-mail messages do not include

information that has archival value or that is required by organizations to support their

activities or make decisions. In the literature, that are three terms that are used in mixed

way: e-mail, e-mail message and e-mail record. In this dissertation, e-mail record is

adopted and used.

In summary, an e-mail message is a document created or received over a

computer network. The data of an e-mail message includes header information, text body,

metadata and attachments. Based on its content, the value of an e-mail message can vary.

An e-mail message that contains information related to the conduct of business activities

is an e-mail record versus non-record e-mail message.

2.3.2. Background and history

Researchers started gaining interest in e-mail communication in the late 1980s

and, in the 1990s, more research studies have emerged (Daft and Lengel, 1986; Rice and

Bair, 1984; Eklundh and Macdonald, 1994; El-Shinnawy and Markus, 1998; Herring,

1996; Markus, 1994; Nickerson, 2000). According to Gimenez, the main “contributions

to the field have concentrated on the relation between organizational practices and e-mail

   

63  

communication” (2006, p. 156). For example, El-Shinnawy and Markus (1998) examined

user’s choice of medium in organizations and concluded that organizational medium

choice is dictated by social factors and technology. This study has found that users

generally preferred “electronic mail over voice mail for most communication purposes

because of the different useful features offered by e-mail, such as retrieving, preparing

messages, organizing, working in group settings, improving the overall effectiveness of

professional work and the quality of working life, etc” (El-Shinnawy and Markus, 1998,

p. 242). Also, some of these advantages of e-mail communication are found in the

“changes in structure and function that e-mails have undergone to accommodate to the

new exigencies made by international business communication” (Gimenez, 2006, p. 156).

Many organizations are now more geographically dispersed as a “consequence of

globalization and changes in the business environment” (Gimenez, 2006, p. 156).

According to researchers, these changes have had an impact on the way that

organizations communicate. For example, Hinds and Bailey have shown that “situations

where it is easy to handle in face-to-face meetings or over the telephone have become

more complex, when they are managed by geographically distributed workforce” (Hinds

and Bailey, 2003). Therefore, the new dynamic of business communication requires the

use of a medium that is more flexible and collaborative such as e-mails (DeSanctis and

Monge, 1999; Maznevski and Chudoba, 2000; Walker, Walker and Schmitz, 2002).

As mentioned in the previous section, an important issue in the context of this

new business communication dynamic is related to the organization accountability and

decision-making (Luo, 2000). Gimenez’s research (2006) have shown that the functions

of e-mails has evolved “turning the whole chain of messages into an internal record that

   

64  

can easily be stored, referenced and retrieved and be kept as records of corporate

activity” (p. 167). Related to accountability, organizations are now being required to keep

records of the “processes they have gone through to reach a final decision as a means of

monitoring their activities” (Gimenez, 2006, p. 157). In this process, organizations have

adopted and preferred using e-mail as a quick and convenient way than traditional

communication methods to engage in a variety of business activities. As a result, e-mail

is the most frequently used form of communication in organizations due to the ease and

speed of sending and receiving information electronically as well as cost effectiveness

(ARMA, 2012). However, at the same time, organizations are also facing problems

resulting from the explosive use of e-mail, such as e-mail overload, user time

consumption, storage burden, knowledge sharing, etc. (Yuan et al., 2013; Mano and

Mesch, 2010; Thomas and King, 2006). E-mail messages, when transmitted through an

organization’s e-mail system, come to be managed importantly as any other information.

In the United States, in the early years of litigation, the government argued that e-

mail systems did not produce official records. Rather, e-mail messages were considered

primarily a “surrogate for telephone-tag types of communications that allowed an e-mail

creator to send a message at any time of the day or night and a recipient to read and

respond to it at his or her convenience” (Groover, 2012, p. 714). In 1989, the National

Security Council, as well as other agencies, routinely destroyed e-mail, which according

to the National Archives did not meet the standard of a "record" (Government of United

States, National Archives and Records Administration, 2007). That was the year the

American Historical Association joined Scott Armstrong and other plaintiffs in seeking a

temporary injunction to prohibit the destruction of the National Security Council's

   

65  

electronic mail. This legal case, frequently refered to the PROFS case because the

electronic mail system used by the National Security Council was IBM's Professional

Office System (PROFS), dragged on for six years (Skupsky and Montana, 1994). In the

Armstrong v. Executive Office of the President’s case (1995), the court rejected the notion

that e-mail could be defined as a non-record because in the absence of a policy excluding

them as records and finally, the court decided to treat e-mail messages as records. The

court further concluded that the paper record of an e-mail did not provide all of the

information contained in the electronic document (Baron, 2003; Skupsky and Montana,

1994). Through this litigation, e-mail technology and management has become

significant as official records in any context where an official record is produced

(Wallace, 2001). As a result, other governments recognized “e-mail messages sent or

received in the course of business transactions as official records and must be retained for

as long as they are needed for Government and community requirements” (Government

of Canada, Department of Justice, 2009, Access to Information and Privacy Office). The

rise of e-mail as a fundamental business tool has presented organizations with new issues

regarding their management.

2.3.3. Issues regarding e-mail management

E-mail has indisputably become a great tool for any organization that wants to

improve communication. While the management approach for e-mail has not yet been

clearly established in the field, the five key issues regarding the management e-mail

records have been discussed in the literature: (1) legal issues; (2) system issues; (3)

business-related issues; (4) user issues; and (5) records management issues (ARMA,

2000).

   

66  

Firstly, legal issues refer to the organization’s legal and regulatory framework. E-

mail management needs to consider issues such as compliance with laws and regulations,

access issues, copyright restrictions, and privacy issues (ARMA, 2000, pp. 1-2). One of

major legal concerns related to e-mail records is electronic discovery (Lange, 2002).

Electronic discovery refers as “the process of identifying, preserving, collecting,

processing, searching, reviewing and producing electronically stored information that

may be relevant to a civil, criminal, or regulatory matter” (Grossman and Cormack, 2013,

p. 15). If a request is made, the organization must make electronic records, such as e-

mail, available or “face the potential accusation of spoliation of evidence” (Hrycko and

Rothman, 2009, p. 39). In addition, the cost of producing these records may be important

as records may be kept in different place such as the organzation’s servers, on personal

computers, in a backup system, or in an electronic records management system. Lange

also found “that organizations may mitigate these risks by developing and implementing

an e-mail management policy” (2002). McEvoy and Ciko (2004) have studied judicial

and legislative trends in regard to electronic discovery. One of these trends is “towards

increasing the accountability of corporations in ensuring the preservation and production

of electronic records, such as e-mail, for litigation” (p. 35). They provide further

explanation of this trend with the use of a legal case: Zubulake v. UBS Warberg LLC, 02,

Civ. 1243. In this employment discrimination case, “the defendant failed to produce e-

mails that were important to the litigation, and subsequent investigation revealed that

employees had deleted at least 45 e-mails after the case had been filed” (Robichaud and

Gilinsky, 2004, p. 2). According to McEvoy and Ciko, other evidence suggested that the

“company (UBS Warberg LLC) failed to give clear instructions to employees regarding

   

67  

e-mail retention and failed to preserve back-up tapes containing relevant information”

(2004, p. 35). Based on these circumstances, the court set forth four mandates regarding

an organization’s responsibility to preserve electronic evidence:

“(1) document preservation notices must be sent to employees on a periodic basis – once is not enough; (2) the corporation must involve its IT department in preservation efforts to ensure that back-up media containing potentially relevant evidence are identified and preserved; (3) it is not sufficient to merely direct employees to preserve evidence; rather counsel must actively monitor the employees to ensure compliance with the request; (4) outside counsel cannot rely on in-house counsel to ensure preservation; rather they should communicate directly with all relevant employees” (McEvoy and Ciko, 2004, p. 35).

These mandates indicate that the organization has the responsibility to preserve electronic

records in legal proceedings. In addition to the increased accountability described above,

some studies have shown that electronic discovery also applies to backup tapes that

contained electronic documents that might be admissible in court (DiGilio, 2001; Sedona

Conference, 2007). The underlying rules for electronic discovery are the same rules that

pertain to paper records discovery and are governed by regulation that also covers

electronic records (Government of Canada, Library and Archives Canada, 2008, p. 9).

Arkfeld (2004), as reported by Reavis, reinforces the “similarities between discovery

requests for paper-based information and electronic information by suggesting that the

scope of a request for electronic information should not be different than the scope of a

request for other types of information” (Reavis, 2006, p. 23). Regarding compliance, e-

mail record poses specific difficulties with the application of legal holds. A legal hold

consists of the suspension by an organization of “its routine retention and disposition

rules for those records that are relevant to current or anticipated litigation, audit, and/or

government investigation” (ARMA, 2013, p. 26). Under the rules of discovery, parties in

a legal matter can request all relevant records, including electronic messages. The failure

   

68  

to preserve and present relevant records can result in fines or sanctions. Following the

resolution of the legal matter, the legal hold is lifted, and the records may again be

managed according to the organization’s records retention and disposition procedures

(Hrycko and Rothman, 2009, p. 90). The duty to preserve relevant evidence requires that

parties involved in litigation make reasonable efforts to identify and manage the

electronic records, but the parties must also be allowed to continue to manage their

electronic information in the best interest of the organization (Montana, 2004).

Secondly, system-related issues pertain to properly functioning software

applications to organize, manage, store, and retrieve e-mail messages (ARMA, 2000, p.

2). System issues related to e-mail records may be grouped into two major areas of

research: electronic systems and security issues. The former domain of research concerns

electronic recordkeeping system. Indeed, without properly functioning electronic

recordkeeping software, it can be difficult to capture, manage, preserve and access e-mail

messages for a long period of time. Willemin (2006) argues that even if it is possible to

organize the information contained in e-mail messages by creating folders, the integrity

and evidential value of e-mail cannot be ensured. The integrity is one of the requirements

that must be met to ensure the “recordness” of an e-mail. A small number of case studies

present the implementation of electronic recordkeeping system to manage e-mail in

different organizational context. For example, Loussouarn (2006) shares, in his study, the

experience of implementing an electronic system for managing paper and electronic

records, including e-mail records, at the French Ministry of Justice’s in order to improve

control and management consistency. Loussouarn also discusses the situation prior to

implementation of the “new MESSAGER electronic (workflow) system and the inherent

   

69  

problems and concludes that the system has brought office improvements in mail and file

management, more efficient handling of business, as well as better service to those

seeking justice in the justice system” (Loussouarn, 2006, p. 91).

The second preoccupation when managing e-mail records is the security issues.

Different types of information can be exchanged by e-mail. While some might be public,

others might also be confidential or sensitive information. Considering the type of

information and attachments that can be exchanged by this mean of communication, the

fact that the system is secure becomes even more important. Some studies present that the

ways to avoid security breaches and facilitate the development of electronic

communication at any given organization, either governmental or private, can implement

such as a Public Key Infrastructure (PKI). This approach enables documents in electronic

form to be encrypted and carry a digital signature (Moecke and Volkamer, 2013; Kwon,

Jeong and Lee, 2009; Machanick, 2005; Eisenschitz, 2002).

Thirdly, business issues relate to improving productivity and communications

within an organization (ARMA, 2000, p. 2). One of the main concerns is dealing with e-

mail overload. Since e-mail has become the main tool of communication within

organizations, the volume of e-mail messages has increased exponentially. Researchers

have shown that employees tend to omit important information, when they are

overloaded, resulting in making the decision-making process more difficult (Szostek,

2011; Sumecki, Chipulu and Ojiako, 2011; Schuff et al., 2007; Thomas and King, 2006;

Sproull and Kiesler, 1991). In addition, one research has shown that e-mail volume can

cause an important amount of stress on organizations personnel (Jerejian, Reid and Rees,

2013). Another concern regarding business issues is the misuse of the e-mail system by

   

70  

employees in organizations. Indeed, the misuse of e-mail may lead to inefficiency in the

workplace as employees may spend more time dealing with e-mail rather than doing

other aspects of their jobs. Burgess, Jackson and Edwards (2005) concluded that e-mail

training is the solution of the e-mail misuse in organizations. Their study shows that

organizations are now becoming aware of the problems associated with e-mail use and

misuse and are keen to reduce these defects. These e-mail defects, according to the

authors, relate to the “ineffective way that e-mail is used within organizations, and are not

only limited to the volume of e-mail that is sent and received, but also the quality of the

e-mail content” (Burgess, Jackson and Edwards, 2005, p. 71). The study reports on the

effectiveness of e-mail training in reducing the defects associated with e-mail use. The

monitoring of employees is another solution presented in the literature to contain the

misuse of e-mail in businesses. Firoz, Taghi and Souckova (2006) argue that “security

and privacy have been heating up and that companies are under increasing pressure to

monitor employees’ electronic activities and workers should assume that their every key

stroke is being watched”, since e-mail messages are evidence of business activities

(Firoz, Taghi and Souckova, 2006, p. 71). Ackermann and Britz (2005) indicate that

employers should issue simple directives regarding the uses and misuses of e-mail in the

workplace. Employees should understand that abuse of the e-mail messaging system can

lead to the waste of valuable resources as well as affect the employer liability. As such,

employees should know their professional e-mail accounts may be monitored by the

employer (Ackermann and Britz, 2005, p. 30). The researchers concluded by mentioning

that through “regular monitoring, the employer will be able to cope with pitfalls during a

possible disciplinary process and avoid possible employer liability” (Ackermann and

   

71  

Britz, 2005, p. 30).

Fourthly, user issues refer to their responsibilities, e-mail etiquette and

compliance with e-mail management policy (ARMA, 2000, p. 2). Users behaviours and

interactions with e-mail communication system have interested numerous researchers. As

such, Marulanda-Carter and Jackson (2012) have studied the effect of e-mail

interruptions on tasks and the concept e-mail addiction within the workplace. The results

of this study highlighted many problems that are associated with e-mail use within

organisations and concluded that “e-mail interruptions have a negative time impact upon

employees as a typical task takes one third longer than undertaking a task with no e-mail

interruptions” (Marulanda-Carter and Jackson, 2012, p. 82). As a result of the misuse of

the e-mail systems by some employees, numerous organizations have developed some

tools to raise the users awareness to their responsibilities toward e-mail. Indeed, the

majority of the studies on e-mail management present the results of surveys or case

studies concerning the users responsibilities toward this mean of communication as “e-

mail is often mistakenly considered a form of ephemeral communication” (Meijer, 2008,

p. 447). As mentioned previously, e-mail is now considered official records and can serve

as evidence of business activities. As a result, employees must be aware of their

responsibilities regarding e-mail etiquette and compliance with e-mail policy. For

instance, as early as 1998, Hacker et al. have conducted a case study that investigates

employee attitudes toward e-mail and e-mail policies in a university library. The results

indicate differences in attitudes based on job position and frequency of e-mail usage. In

addition, the study indicates that “those who use e-mail more frequently have more

favorable attitudes about it than less frequent users. They are more opposed to policies

   

72  

that regulate their e-mail communication” (Hacker, et al., 1998, p. 422). The results show

that “employees generally prefer guidelines than restrictive policies for e-mail

communication” (Hacker, et al., 1998, p. 422). One of the biggest challenges facing e-

mail is that they are created, received and stored from the user’s computer. The users

must understand that they have the same responsibilities in managing e-mail, as they have

in other recorded information systems. Winget, Chang, and Tibbo (2006) conducted a

survey that seeks to understand the way in which Duke University and University of

North Caroline at Chapel Hill employees currently manage, interact with and think about

electronic files, particularly e-mail. Capra, Khanova and Ramdeen (2013) have provided

a comparison of use behaviours between work and personal e-mail accounts. The results

showed that the context (either work or personal) has an impact on the management of

messages. In work contexts, e-mail may have more importance as a means on

documenting records of activities and decisionmaking. Therefore, users tend to engage in

more “keeping and managing behaviours” (Capra, Khanova and Ramdeen, 2013, p. 34).

Organizational policies may influence the retention of e-mail messages. While in

personal contexts, “e-mail exchanges serve ephemeral purposes and retention tend to be

more ad-hoc” (Capra, Khanova and Ramdeen, 2013, p. 34). Seow, Chennupati, and Foo

(2005) conducted an exploratory survey on e-mail usage, policy, and technical

considerations among 76 corporate e-mail users in Singapore. The results showed that “e-

mails are recognized as important business records and that the establishment of an e-

mail policy and guidelines defining use of e-mail, as well as systems for managing them,

are deemed essential” (Seow, Chennupati, and Foo, 2005, p. 43). Most employees

recognized that e-mail records are important in the conduct of business activities.

   

73  

Therefore, compliance to the organization’s e-mail management policy and systems are

considered critical. Although several studies have been conducted to date regarding e-

mail communication, use, and policy-making in organizations, implementation and

practical guidelines for e-mail has not yet been clearly established in the field.

Lastly, records management issues concern managing e-mail messages and

require identifying the characteristics of records, their content, and their function within

the organization in order to preserve pertinent information (ARMA, 2000, p. 2).

Enneking (1998), in one of the first studies published on e-mail management, attempted

to define the state-of-the-art in sound records management and archival practice as

applied to e-mail messages. She investigated, by conducting a survey, the ways that

private and public industries and institutions implement e-mail records management

practices from both technological and policy perspectives. The results identified three

approaches to managing e-mail as a record: printing to paper; managing e-mail records

within the e-mail system; and integration of e-mail messages into a records management

system. Pennock (2006) argues that the successful management of “e-mail messages

requires effort across the entire lifecycle to ensure that e-mail records are identified,

captured, managed, preserved, and made accessible in a manner that safeguards the

authenticity and integrity of the records and any associated attachments” (p. 1). Unlike

other researchers, she gives guidelines on how to manage e-mail messages that are not

records. In order to manage records properly, other issues need to be identified,

understood and addressed such as technical, legal, organizational and cultural challenges.

In addition, she highlighted the importance of collaboration with all stakeholders

involved in the management of e-mail records such as the creators, IT staff, and

   

74  

managers. Pennock concluded that an “approach that integrates e-mail management into

overall digital records management is likely to be most successful, although some explicit

measures in the areas of policy and education are required to ensure that e-mails records

are afforded records status and treated appropriately by users” (Pennock, 2006, p. 1).

In addition, some researchers studied specific functions of records management

applied to the management of e-mail records. As such, Koprinska, et al. (2007) have

studied automatic filing of e-mails into folders based on the subject of each messages.

While Alberts and Forest (2012) have developed a two-phased research project aiming to

develop a typology of e-mail classification patterns. The retrieval of e-mail records have

also interested researchers and their studies have shown that often the organizing of e-

mail records is often left to personal preference making the retrieval of e-mail records

more difficult (Weerkamp, Balog and de Rijke, 2009; Wu and Oard, 2005; Klimt and

Yang, 2004; Mackenzie, 2002). The curation and long-term preservation of e-mail

records have been discussed in the literature (InterPARES 3 Project, 2009; Pennock,

2006). For instance, Prom (2011) argues that few institutions have developed policies,

procedures and tools to ensure long-term preservation of e-mail records but that

technology, such as technical standards and software, can contribute to the “preservation

of trusted e-mail records as a systematic part of our everyday operations” (Prom, 2011, p.

38).

Numerous studies acknowledged that e-mail messages must be managed properly

so that they can preserve their evidence value. In order to do that, some researchers

mentioned the importance for private or public bodies of having an e-mail management

policy (Gurushata and Smallwood, 2012; Saulnier, 2007; Flynn and Kahn, 2003; Périat,

   

75  

1997). Saulnier (2007) presents the main elements to include in an e-mail management

policy: guidelines that direct the use of e-mail; implement prescriptions regulating the

confidentiality of, and access to information; and standardize the creation, management

and preservation of electronic messages. The development of e-mail management

policies should be holistic and consider both the information contained in e-mails as well

as the e-mail systems. However, most of these researches are conceptual and have not

been implemented in an institutional setting.

In the field of information science in general, several researchers conducted

studies at government agencies as their research setting, since government agencies

usually provide general guidelines to different types of organizations, either public or

private, in order to develop standards, tools and best practices for information

management (Cumming and Findlay, 2010; McClure and Jaeger, 2008; Meijer, 2008;

Relyea, 2008; Gil-Garcia, 2004). However, research on e-mail management in a

governmental context has been rare to date. An important number of studies discuss

records management principles and practices in order to create, receive, maintain,

preserve and provide access to electronic records. Since e-mail management flows from

electronic records management (ERM), a number of concepts and issues surrounding

ERM are applicable to e-mail management (Smallwood, 2013; Saffady, 2009; Parrish

and Courtney, 2007; Stephens and Wallace, 2003; Swan, Cunningham and Robertson,

2002; McClure and Sprehe, 1998). However, most of them are discussed in a broader

context without any specific attention to the particularities of e-mail records. Only a small

number of studies deal with e-mails in government environments. Patterson and Sprehe

(2002) discussed the challenges of electronic records management in order to preserve

   

76  

authentic, usable and retrievable records, including e-mails in the United States federal

government, and emphasized the importance of integrated system design and total

information management to manage different types of electronic records, such as e-mail

and web-based records. A small number of studies examine the management and

implementation of policies of specific types of electronic records in government agencies

(Chebbi, 2013; Bertot, Jaeger and Grimes, 2010; Lips and Rapson, 2009; Zwarich and

Park, 2008). Research into the effectiveness of developing and implementing current e-

mail management systems and policy guidelines at the Canadian government has been

rare to date.  

2.4. Theoretical Framework  

In order to study e-mail management at the Government of Canada, this research

draws upon conceptual frameworks and models relating to electronic records

management, specifically e-mail management. While records management was

considered as a professional discipline, the development of electronic records research

gave rise to “a relevant body of theory and knowledge” (Yusof and Chell, 2002, p. 65).

Records management policy models and frameworks have been developed by national

archives institutions, professional records management associations as well as records

management scholars. However not many theoretical models and frameworks on

electronic records management research are available in the field, this study draws upon

the framework of Park’s study (2002) for the identification of requirements to ensure the

authenticity of electronic records because this study is closely relevant, theoretical and

feasible. The four requirements identified include: juridical, procedural, technological

and sociocultural requirements. As presented previously, the juridical requirements refer

   

77  

to the compliance of the organization to laws, regulations, policy and organizational

guidelines to sustain their mission and objectives (Park, 2002). The procedural

requirements include the analysis of business processes and the administrative context of

the organization (Park, 2002). The technological requirements refer to the

implementation and use of technology to ensure authenticity (Park, 2002). The

sociocultural requirements include the analysis of the organizational culture and practices

within in an organization. These four requirements provide the basis of identifying the

components of this research.  

In addition, ARMA International has been a main contributor to existing

knowledge on records management and e-mail management. This research focuses on the

five issues developed by ARMA (2000, pp. 1-2) in its standard for the creation and

maintenance of e-mail records. These issues include: legal, system, business, user and

records management aspects. The legal issues refer to “compliance with the laws and

regulations of the organization” (ARMA, 2000, p. 2). The system issues include

technology used to ensure the management of e-mail records such as e-mail system’s

functionalities, integrated records management functionalities, systems back-ups, audit

trail and security (ARMA, 2000). The business issues refer to the appropriate use of e-

mail to conduct business activities (ARMA, 2000). The user issues concern the “user’s

responsibility to communicate in a professional manner” (ARMA, 2000, p. 2). Finally,

the records management issues include the management and preservation of information

contained in e-mail records based on their value in accordance with the organization’s

policy and retention schedule (ARMA, 2000). According to ARMA, an e-mail

management policy should address all five issues comprehensively.  

   

78  

This reaseach integrates the two studies into a theoretical framework of building

and designing this research. The four requirements of Park’s study and five issues of

ARMA will be adopted as the main components and major approaches to examine the

objctives and questions of this research as well as configurate the data collection and

analysis.  

Summary  

The literature review provided a context for this study based on following

research objectives: (1) to identify the general principles in managing e-mail records

within Canadian government agencies and evaluate their level of implementation; and (2)

to compare similarities and differences in managing e-mail records in government

agencies and identify the current practices in managing e-mail messages in order to

ensure the reliability, authenticity, and integrity of e-mail records.

In the literature review, we first introduced the definitions of electronic records

from diplomatics, archival science and records management. From the definitions, it is

understood that there are common components between electronic and paper records, in

the sense that they contain content, context and structure and that they are created or

received in the business processes and serves as evidence of organizations activities.

However, by investigating the characteristics of electronic records, we have seen that to

keep these features is more complex than in the paper environment. In addition, the

specific types of electronic records, such as e-mail records, pose their own challenges

regarding their management and preservation.

   

79  

The analysis of the literature on the impact of information and communication

technology on government agencies has shown that the challenges to manage electronic

government information are growing, increasing difficulties in meeting accountability

requirements. As a result, different policies, procedures and systems were created to

manage government records, including e-mail.

The literature review highlighted that electronic mail (e-mail) has become the

major tool for organizational and interpersonal communications and is one of the most

business-critical information management applications. E-mail is electronically

transmitted information created on or received by a computer system and it can be used

to accomplish different activities in an organization. However, at the crossroads of the

telephone and traditional mail, e-mail is not as ephemeral as it seems. Some limitations of

the studies mentioned above are that they are mostly conceptually conceived and deal

with issues related to electronic records in a general sense only without addressing

concerns of e-mail as a specific type of electronic records in a practical and

organizational context. E-mail records have now been recognized as an increasingly large

part of an organization’s “knowledge assets” that must be managed properly. It is

important to realize that a new direction for research on the implementation of e-mail

management should be established and put into practice in order to create, receive,

maintain, preserve and provide access to e-mail records. The next chapter presents the

methodology used for this research.

   

80  

CHAPTER III. RESEARCH DESIGN  

This chapter presents the design of the research, selection of research methods

and data sources. Then, the chapter describes the data analysis methods of e-mail

management at the Canadian government.

3.1. Rationale of study design

There are two major types of social science methods that have been used in

information science research: quantitative and qualitative research methods.

In the social sciences, quantitative research refers to the systematic empirical

investigation of quantitative properties, phenomena and their relationships (Mertens,

2009). The objective of quantitative research is to “develop and employ mathematical

models, theories and/or testing hypotheses pertaining to a phenomenon” (Olson, 1995).

Quantitative research methods use techniques to collect quantitative data - information

dealing with numbers and anything that is measurable. Statistics, tables and graphs are

often used to present the results of these methods. This process of inquiry is unobtrusive

in the sense that the research is conducted while the subjects are unaware that they are

being studied and their behaviour is unaffected by the study (Lincoln and Guba, 2003).

Qualitative research is a process of inquiry that collects data from the “context in

which events occur in an attempt to describe these occurrences, as a means of

determining the process in which events are embedded and the perspectives of those

participating in the events and using induction to derive possible explanations based on

observed phenomena” (Hoepfl, 1997). A number of approaches have been introduced, in

   

81  

the literature, to describe qualitative research. Some examples include: ethnography,

grounded theory, phenomenology, participatory research, case studies. Qualitative

methods focus on observing experiences from the perspectives of those involved and

attempt to understand why individuals react and behave as they do (Mertens, 2009).

Qualitative approaches tend to be more subjective in that they draw upon human

experience and behaviour. Qualitative research aims to understand the situation as it is

constructed by the participants. Qualitative research attempts to capture what people say

and how the people interpret the world.

Since the 1990s, a third research approach has been gaining in popularity and

started being recognized among social science researchers: mixed methods research (Ma,

2012; Creswell and Plano Clark, 2007; Greene, 2006; Johnson and Onwuegbuzie, 2004;

Sandelowski, 2000). Creswell and Tashakkori define mixed methods as

“research in which the investigator collects and analyzes data, integrates the findings, and draws inferences using both qualitative and quantitative approaches or methods in a single study or program of inquiry” (Creswell and Tashakkori, 2007, p. 4).

From this previous definition, we understand that quantitative and qualitative methods

can be used at any stage of a research project as long as both are used in the same study.

Caracelli and Greene (1993) explain that a mixed methods study is one that

“planfully juxtaposes or combines methods of different types (qualitative and quantitative) to provide a more elaborated understanding of the phenomenon of interest (including its context) and, as well, to gain greater confidence in the conclusions generated by the study.” (p. 201)

The definition of Caracelli and Greene shows that the combination of quantitative and

   

82  

qualitative approaches provides a better understanding of research problems than either

approach alone. Over the years, researchers have identified different purposes for mixing

methodologies. For example, Greene, Caracelli, and Graham (1989) identified the

following five broad purposes or rationales of mixed methodological studies:

(a) triangulation (i.e., seeking convergence and corroboration of results from different methods studying the same phenomenon), (b) complementarity (i.e., seeking elaboration, enhancement, illustration, clarification of the results from one method with results from the other method), (c) development (i.e., using the results from one method to help inform the other method), (d) initiation (i.e., discovering paradoxes and contradictions that lead to are framing of the research question), and (e) expansion (i.e., seeking to expand the breadth and range of inquiry by using different methods for different inquiry components). (Greene, Caracelli and Graham, 1989, p. 259)

Most recently, Collins, Onwuegbuzie, and Sutton (2006) identified four rationales for

conducting mixed research:

“participant enrichment (e.g., mixing quantitative and qualitative research to optimize the sample using techniques that include recruiting participants, engaging in activities such as institutional review board debriefings, ensuring that each participant selected is appropriate for inclusion), instrument fidelity (e.g., assessing the appropriateness and/or utility of existing instruments, creating new instruments, monitoring performance of human instruments), treatment integrity (i.e., assessing fidelity of intervention), and significance enhancement (e.g., facilitating thickness and richness of data, augmenting interpretation and usefulness of findings).” (Collins, Onwuegbuzie, and Sutton, 2006, p. 71)

Generally, the motivation to mix methods in research is the belief that the quality of a

study can be improved when the biases and limitations of a method following one

approach compensated for, by mixing with a method belonging to the other approach.

Different types of mixed methods research design can be used in one study. The

mixed methods approaches are defined by the ordering of application of the quantitative

and qualitative methods (simultaneously or sequentially) as well as at one point in the

   

83  

study the mixing of the methods occurs. Quantitative and qualitative data collection can

occur in (1) parallel form or (2) sequential form. The parallel form consists of using

concurrent mixed methods in which two types of data are collected and analyzed

simultaneously to answer the research questions (Creswell, 2006). Whereas in the

sequential form, one type of data provides a basis for collection of another type of data

(Mertens, 2009). This approach can be illustrated by doing a statistically analyzed

questionnaire and then follow up with some in-depth interviews to better understand the

results.

The value of mixed methods research has been widely discussed in the literature

(Ma, 2012; Reams and Twale, 2008; Greene, 2006; Creswell, 2006). According to

Creswell (2006), mixed methods research provides strengths that supplement the

limitations of both quantitative and qualitative research. The author argues that

quantitative research is weak in understanding the context or that “the voices of

participants are not directly heard in quantitative research” (Creswell, 2006, p. 9).

Qualitative research makes up for these limitations. On the other hand, qualitative

research is seen as “deficient because of the personal interpretations made by the

researcher and the difficulty in generalizing findings to a large group because of the

limited number of participants studied” (Creswell, 2006, p. 10). It is argued by Cresswell

that quantitative research does not have these limitations. It is also argued that mixed

methods research can provide stronger evidence for a conclusion through convergence

and corroboration of findings (Creswell and Plano Clark, 2007; Greene, 2006; Johnson

and Onwuegbuzie, 2004, Greene, Caracelli and Graham, 1989). It can add insights and

understanding that might be missed when using only a single method. Researchers can

   

84  

use all of the tools of data collection available rather than being restricted to the types of

data collection typically associated with qualitative research or quantitative research.

Overall, several authors agree that qualitative and quantitative research used together

produce more complete knowledge of a phenomenon (Greene, 2006; Creswell, 2006;

Johnson and Onwuegbuzie, 2004). Despite its advantages, conducting mixed methods

research presents some challenges such as it takes time to collect and analyze both

quantitative and qualitative data. Researchers have to learn about multiple methods and

approaches and understand how to mix them appropriately. Some studies suggest that a

significant difficulty is that of merging analyses of quantitative and qualitative data to

provide an integrated analysis for better results. According to Pickard, “one consideration

that may aid the linking of analyses is not to lose sight of the rationale for conducting

mixed methods research” (Pickard, 2013, p. 18). The value of mixed methods research

seems to outweigh the potential difficulty of this approach.

In this study, to optimize the strengths of the quantitative and qualitative methods,

two methods are used. As presented in the previous chapter, the two objectives of the

study are to understand how e-mail records are managed in the Canadian government

agencies and identify the characteristics that support the management and preservation of

e-mail records. The first objective of the study is to identify the general principles in

managing e-mail records within Canadian government agencies and see how well these

principles are actually implemented in these agencies. To generate a sound

characterization and understanding of e-mail management practices at the Canadian

government, data was first collected using quantitative research methods. Quantitative

methods offers numerous strengths, such as achieving high levels of reliability of

   

85  

gathered data due to controlled observations or surveys and eliminating or minimizing

subjectivity of judgment. However, quantitative methods have some limitations that need

to be addressed: possibility to provide the researcher with information on the given

context of the phenomenon under study and limited outcomes to only those outlined in

the original research proposal due to closed type questions and the structured format.

Quantitative methods are employed to provide this study with reliable, valid, and

generalizable information on e-mail management practices at the Canadian government.

However, since the Library and Archives Canada (LAC) create and develop general

records management policies that each agency needs to adapt to its own business

processes, some background information on the context is of primary importance. Since

the different types of agencies composed the Canadian government, more in-depth data

on the agencies’ business processes was necessary because it can have an impact on how

e-mail records are managed within the given agency.

To supplement the limitations of quantitative methods, qualitative methods were

used to add more in-depth data. The second objective of this study is to determine and

compare significant similarities and differences in managing e-mail records in

government agencies and identify the current practices in managing e-mail messages in

order to ensure the reliability, authenticity, and integrity of this specific type of electronic

records. Based on data obtained using quantitative methods, we sequentially used

qualitative data collection tools to validate and add in-depth data. Qualitative methods

enable the researcher to identify contextual and setting factors as they related to the

phenomenon under study and provide individual case information. Qualitative methods

have also the advantage of allowing for more diversity in responses as well as the

   

86  

capacity to adapt to new issues during the research process itself. Therefore, in order to

obtain a richer and elaborate understanding of e-mail management in the Canadian

government agencies based on each agency specific context, the adoption of a qualitative

method provided information for in-depth analysis, confirm emerging issues, as well as

explain observed variations.

3.2. Selection of data sources and methods for data collection

Numerous strategies can be used to collect quantitative and qualitative data and

each of them has its strengths and weaknesses. Sequential mixed methods data collection

strategies involve collecting data in an iterative process whereby the data collected in one

phase contribute to the data collected in the next.

As this study examines the current e-mail management policies and practices in

Canadian government agencies, data collection that captures a portrait of the situation at

one point in time must be used to see emerging issues and explain observed variations.

This research draws on two types of data sources: (1) people (who are the information

management professionals involved in e-mail management); and (2) documents (which

are policies and/or guidelines of e-mail management as well as relevant documentation).

This study used multiple data collection methods to gather information on the

management of e-mail records and the process of implementation of e-mail management

policies. Three instruments were used to collect data and provide supplement information:

(1) an online survey; (2) in-depth interviews; and (3) supporting documents on the

government agencies or e-mail management policies. Each method is described further

below.

   

87  

Figure 3.1. Data sources and methods of data collection

3.2.1. Survey

Survey results are regularly cited in media. Surveys of human populations and

institutions are common in political polling and government, health and social sciences.

Surveys may focus on opinions or factual information depending on its purpose, and

surveys generally involve administering questions to individuals. This is a valuable

method for collecting quantitative data from a large number of individuals, often referred

to as respondents, with an appropriate number of sample subjects; the behaviour of that

population can then be inferred. There are two types of survey: descriptive surveys and

explanatory surveys. A descriptive survey aims “to describe a situation and look for

trends and patterns within the sample group” whereas an explanatory survey seeks “to

establish cause and effect relationships between variables by establishing an hypothesis”

(Pickard, 2013, p. 112). A questionnaire is the instrument used to conduct a survey; it

consists of a series of questions asked to individuals to gather information about a given

Information management professionals

E-mail management policies and/or guidelines and

supporting documents

Online Survey In-depth interviews

Analysis to extract appropriate information

Data  sources  

Methods  of  data  collection  

   

88  

topic (Mertens, 2009). The questions can be either open-ended or closed-ended questions.

An open-ended question asks respondents to formulate their own answer, whereas a

closed-ended question asks respondents to pick an answer from a given number of

options. The questions are usually structured and standardized to reduce bias. According

to Mertens, adequate questionnaire construction is critical to the success of a survey

(Mertens, 2009). Indeed, inappropriate questions, incorrect ordering of questions, or bad

questionnaire format can make the survey valueless, as it may not accurately reflect the

views and opinions of the respondents. Surveys need to be standardized to ensure

reliability, generalizability, and validity. However, surveys rely on individual self-reports

of their knowledge and attitudes (Mertens, 2009). In addition, when using a survey to

study human behaviour and conditions, a preunderstanding or prejudgement of the

situation in question by the researcher are deemed necessary (Ma, 2012, p. 1861).

Therefore, the validity of the information depends on the honesty of the respondent and

the researcher.

There are several ways of administering a survey. Researchers had, in the past, a

choice between mail and telephone. Technological advances have added a few options to

administer surveys including e-mail, social media and web-based surveys. The method

selected depends on the purpose of the survey, the nature of the data, cost factors as well

as the size and characteristics of the sample (Mertens, 2009). There are advantages and

disadvantages in using each approach. Mail surveys are a good method to collect

information in a close-ended format and the cost is relatively low, since bulk postage is

often cheap and they allow for the respondent to consult some documentation before

answering. However, there might be long delays before the questionnaires are returned

   

89  

and statistical analysis can begin. Also, it might not be suitable for issues that may

require clarification. Telephone interviews are appropriate for open-ended questions,

since the researcher can ask for additional information and it encourages persons to

respond, leading to higher response rates. However, this method is more costly than mail.

For web-based surveys, numerous advantages have been identified such as easy access to

respondents, reduced costs, faster responses and automated data collection. However,

some researchers have found that web-based surveys have a lower response rate than

more targeted surveys (Dillman, 2007; Shih and Fan, 2008; Converse, Wolfe, Huang and

Oswald, 2008). Numerous studies have shown that using mixed-mode strategies, such as

administering an online survey and follow-up by telephone, can improve the response

rates.

To generate a sound understanding of e-mail management practices across

government agencies, the researcher first collected primary data by conducting a web-

based descriptive survey with one category of subjects: information management

professionals. They can be defined as those who are involved in the creation and

implementation of e-mail management policies. The purpose of surveying information

management professionals is to collect as much information as possible that relates to

how they use, manage, and preserve e-mail records as well as their requirements to

ensure the reliability, authenticity and integrity of this specific type of electronic records.

In addition to the web-based survey, two other methods were added to collect

data.

 

   

90  

3.2.2. Interview

Qualitative interviews may be used either as the primary strategy for data

collection or in conjunction with other methods of inquiry such as observation, document

analysis, or other techniques (Bogdan and Biklen, 1982). The main purpose of

interviewing is to allow the researcher to take a close look into the other person’s

perspective. Qualitative interviewing utilizes generally open-ended questions that allow

for individual variations and minimizing the imposition of predetermined responses when

gathering data. Patton (2002) has identified three types of qualitative interviewing: (1) the

informal conversational interviews that relies on the spontaneous generation of questions

– unstructured interview; (2) the interview guide that consists of a list of questions or

general topics that are to be explored in the course of an interview – semi-structured

interview; and (3) standardized, open-ended interviews that requires carefully and fully

wording each questions before the interview – structured interview. These different

interviewing methods are not mutually exclusive. All three interviewing approaches

consist of asking questions that offer to the person being interviewed the opportunity to

respond in their own words and express their own personal perspectives or opinions. A

combined strategy offers the interviewer the flexibility in determining when it is

appropriate to explore certain subjects in greater depth or to pose questions about new

areas of inquiry that were not originally planned. Interviewing involves one-to-one or

group interviews with a sample of the population that are being studied. Interviews can

be administered either in person, by telephone or e-mail. The advantages of interviewing

participants are that interviews produce more elicit data and investigate the participant’s

attitudes and perceptions (Patton, 2002). Furthermore, interviews can bring out some

   

91  

ideas or issues that may have not been considered by the researcher. Also, interviews

provide the researcher with a chance to follow-up on issues that are discussed during the

interviews. In addition, the participants will be asked to supply supporting documentation

that can help the researcher with the data gathering process. However, one disadvantage

of using interviews is that due to the number of limited participants, they may not

represent the entire population of the government agencies enough to generalize the

findings to the entire governmental agencies.

Based on the online survey results, the researcher conducted in-depth interviews

with information management professionals to supplement online survey data. The

interviews provided a way to examine e-mail management practices in greater detail and

provide richer descriptions for better findings.

3.2.3. Supporting documentation  

Another source of information that is valuable to qualitative research is the

analysis of documents. All organizations produce documents and records that trace their

history and current activities. These documents and records include, not only paper

documents such as official records, letters, newspaper accounts, and reports, but also

computer files and other artifacts (Mertens, 2009). From the supporting documentation,

the researcher can get necessary background of the situation under study as well as

information and insights into the functions and dynamics at the organization.

The purpose of using multiple data collection methods is to validate the data,

provide a richer understanding of e-mail management in a government setting and

supplement the data that may be missed by one method.

   

92  

3.3. Pre-test of instruments for data collection  

In order to validate the research design and test the adequacy of the data

collection instruments, a pilot study was carried out. “A pilot study, is a small scale

preliminary study conducted before the main research in order to check the feasibility or

to improve the design of the research” (Teijlingen and Hundley, 2001). Pilot studies are a

crucial element of a good study design.

The data collection instruments were pre-tested in May and June 2011. The online

survey questionnaire and the interview guide were pre-tested subsequently in two phases.

The criteria for selecting participants for a pre-test may differ from those used for final

selection. The subjects studied must match the context and the research questions

(Babbie, 2005), but can be chosen for reasons of feasibility and accessibility (Yin, 2003).

3.3.1. Pre-test of online survey questionnaire  

The online survey questionnaire was pre-tested in two steps: (1) with two

information management professionals that are not part of the agencies surveyed but

working in similar organizational contexts; and (2) with two information management

professionals currently holding a position at the Government of Canada (GoC). Thus, the

first step of the online survey pre-test involved two information management

professionals that are not part of the study sites, but working in the Government of

Québec. The pre-test took place in May 2011. The objectives of this pre-test were to (1)

ask the respondents for feedback to identify ambiguities and difficult questions and (2)

assess whether each question gives an adequate range of responses. According to their

   

93  

comments, the wording of some questions was revised and the order of some questions

was also changed for a better fluidity.

Subsequently, a preliminary online survey was conducted among information

management professionals of the GoC from June 6 to June 20, 2011. The questionnaire

was conducted in order to test the appropriateness of the content and structure of the

questionnaire. The questionnaires were sent to 50 information management professionals

and 31 (62%) responses were received. As a result of the pilot study, some questions

were revised for precise expression and one question was added concerning the number

of years that the information management professionals had worked in the archival field.

According to Mertens (2009), pilot studies may also have a number of weaknesses. One

of the problems is contamination. Contamination may arise: “(1) where data from the

pilot study are included in the main results; and (2) where pilot participants are included

in the main study, but new data are collected from these people” (Teijlingen and

Hundley, 2001). The main concern is that if there were problems with the research

instruments and modifications had to be made based on the comments received from the

pilot study, data could be flawed or inaccurate. That is why the data of this pilot study are

not included in the results of the main study because of some changes that have been

made.

3.3.2. Pre-test of interview guide  

The pre-test of our second instrument for data collection was conducted with two

information management professionals working at the Canadian government in order to

test the adequacy of the interview guide and collect preliminary data. The interviews

   

94  

were conducted over telephone since the participants have their workplace in Ottawa.

The two interviews, lasting an average of one hour and half, were held at the end of June

2011. They allowed the researcher to control the interview guide and briefly check the

type of information collected was in line with the research questions. The interviews were

recorded, with the written consent of respondents. Their contents have been transcribed to

allow analysis. The interview transcripts were analyzed in a general way to check

whether the information obtained allowed to answer the research questions. In light of

this analysis, it emerged that the interview guide used allowed to obtain quality data.

Following this pre-test, the instrument used for in-depth interviews has been slightly

modified to adjust the wording of some questions. Since these minor changes did not

affect the intention or the type of data collected, the data obtained from the pre-test of the

interview guides were incorporated into the complete data of the study. Overall, the pilot

studies have contributed to testing the research instruments, assessing the feasibility of

the research and collecting preliminary data.

3.4. Data collection  

This section explains the sampling method and the conditions under which data

collection took place: (1) for the online survey with information management

professionals involved in e-mail management; (2) for the in-depth interviews; and (3) for

the relevant documentation collected.

3.4.1. Population and sample  

A population is “the entire community under investigation” (Pickard, 2013, p.

325). In order to understand the e-mail management principles and practices at the

   

95  

Government of Canada, the population of our research is information management

professionals working in Canadian government agencies. As discussed in Chapter 2, the

term “information management professionals” is used to include the different professions

involved in information management and whose main responsibilities include: supporting

business activities; lifecycle management; policy and procedures development,

dissemination, training and monitoring of information management activities, and more

specifically e-mail management.

The participants were identified using the Government Electronic Directory

Services (GEDS) available on the Internet. GEDS provides a directory of the Canadian

public service for all regions across Canada and managed by the Public Works and

Government Services Canada. The Canadian government's Information Technology

Services Branch developed GEDS to integrate the Government of Canada telephone

directories and the Email Address Exchange Service. Individual federal agencies are

responsible for maintaining information in GEDS (e.g. staff changes). However, there is

often a considerable lag-time in updating information due to the significant number of

employee changes in the federal public service. Users can search for federal employees

by surname, given name, telephone number, title, role, or organization. It is also a useful

system to learn the hierarchical structure of organizations within the Canadian public

service.

The search was executed within the current agencies that published their

personnel coordinates on the GEDS. Originally, the researcher planned to use the

advanced search options of GEDS, by using the “title” options to find the information

management professionals working at the Canadian government. However, searches by

   

96  

title proved to be complicated as the title of an employee can sometimes vary from one

agency to another, depending on responsibilities or ranking in the hierarchy of an agency.

Therefore, different persons having different titles can play a role in the management and

preservation of records, such as archivist, records management officer, information

management advisor, etc. In addition, searches were complicated due to the limited

number of search results. Indeed, the search results display is limited at 325 items, which

made it harder to retrieve the names of all the information management professionals

contained in the database. When the results entries were higher than 325 items, the

following note that appeared on top of the result page of the employee database:

WARNING: Not all entries could be returned because a size limit was exceeded. There is no way to defeat this feature, but if you know who you are looking for, try choosing the Search option listed above and specifying the name of the entry you want.

Instead, the researcher searched the database using the surnames of the employees by

taking the letters of the alphabet. This search enabled to find all the persons listed in the

directory and select the persons working in information and records management field for

all type of professions ranging from clerks to managers and directors.  

There are currently more than 200 main agencies in the Canadian government and

as many information management professionals working in those agencies. Therefore, the

population for our research was composed of these information management

professionals. Researchers rarely survey the entire population for the following three

reasons: the cost is too high; it is time consuming; and the population is dynamic in that

the individuals making up the population may change over time (Adèr, Mellenbergh and

Hand, 2008). The respondents who were invited to participate in this study were selected

using a sampling strategy. The main advantages of using a sampling strategy are that data

   

97  

collection is faster. Since the data set is smaller, it is possible to ensure homogeneity and

improve the accuracy and quality of the data. This survey used a simple random sampling

method as a mean to select the respondents. Random sampling is useful, when every

member of the population has an equal chance of being included in the sample and is

deemed to be a representative of the population when selected randomly (Pickard, 2013,

p. 61; Wildemuth, 2009, p. 118). Each information management professional included in

our population was assigned a number. The numbers were be assigned sequentially

ranging from 1 to 1650. These numbers were then integrated in a random sampling

software, Research Randomizer, that generated some numbers. Based on the numbers

generated by the software, the corresponding information management professionals

were contacted and invited to participate in this study on the management of e-mail

records. The researcher contacted about a third of our population (550 information

management professionals). Some agencies which do not include information

management professionals or that the coordinates of their personel were not available in

the GEDS were excluded from this study.  

3.4.2. Survey  

An online survey was used to collect quantitative data on the general principles in

managing e-mail records within Canadian government agencies and see how well these

principles are actually implemented in the agencies (Objective 1 of this study). The

respondents for the online survey were selected based on the following criteria: (1)

persons who are employed in one of the Canadian government agencies; (2) information

management professionals who create, manage, use, and preserve records in their daily

operations; (3) information management professionals who hold a higher-level position in

   

98  

the government agencies; and (4) information management professionals that certainly

are involved in the creation and implementation of information management policies

and/or procedures.

A survey software and questionnaire tool, SurveyMonkey, was used to create the

online survey, send the invitations to the participants, manage the responses and provide

a descriptive analysis of the data. An electronic invitation was sent to the professional e-

mail addresses of selected information management professionals to participate in this

research. The invitation explained the objectives of this study and asked for their consent

to participate in this research. The online survey for this study was a simple descriptive

survey that enabled to describe the characteristics of our selected sample population at

one point in time. The questionnaire is comprised of 30 questions organized into the five

sections: (1) respondent profile; (2) e-mails policies and guidelines; (3) e-mail system and

recordkeeping system; (4) implementation and dissemination; and (5) issues and

suggestions (see the survey instrument at Appendix 2). Among 30 questions, five

questions are open-ended and 25 questions are close-ended to facilitate the completion of

the questionnaire and increase the participation level. Every respondent was presented

with the same questions in the same order. Since there are two official languages in

Canada, the questionnaire was available both in English and French so that the

respondents have the option to answer the questions in the language of their choice. A

total of 550 questionnaires were distributed by e-mail and the survey was administered

from September 28 to October 21, 2011. A total of 204 responses (37%) were received in

76 agencies and analyzed. As previously mentionned, researchers have found that web-

based surveys often have a lower response rate, ranging usally between 10% and 25%

   

99  

(Pickard, 2013; Wildemuth, 2009; Converse, Wolfe, Huang and Oswald, 2008; Shih and

Fan, 2008; Dillman, 2007; Sax, Gilmartin and Bryant, 2003; Griffis, Goldsby and

Cooper, 2003). Compared to the literature, the response rate obtained to our web-based

survey is higher and acceptable. Thus it increases the validity of the results of our

research. The response rate can be explained by the fact that a reminder was sent by e-

mail to the respondents to increase the response rate and that our survey targeted a

specific sample population, information management professionals working in the

Canadian government.

3.4.3. Interviews  

Subsequently, interviews were used to collect in-depth qualitative data in order to

provide comparison on e-mail management between government agencies as well as

identify current practices of e-mail management to ensure the authenticity, reliability and

integrity of e-mail records in Canadian government agencies (Objective 2 of this

research). The participants for the in-depth interviews were selected, based on the

following criteria: (1) information management professionals who participated to the

online survey on e-mail management; (2) information management professionals who

agree to participate in the interview by answering positively to the question 29 of the

online survey; (3) information management professionals whose agencies represent

information-rich cases that are representative of the implementation of e-mail

management practices; and (4) information management professionals working in

agencies of different sizes.

Whereas the quantitative data that were collected using the online survey

provided more general information on e-mail management practices, the qualitative data

   

100  

provided more in-depth information to understand each agency’s legal and administrative

context and nuances that can influence their current practices of e-mail records

management. For the interviews, the participants were selected to represent six (6)

different government agencies, including: (1) two organizations that have not

implemented any e-mail management policies; (2) two organizations that have initiated

the implementation of such policies; and (3) the two organizations that have fully

implemented e-mail management policies and guidelines. The Center for American

Politics and Public Policy defined implementation as being:

“the carrying out, execution, or practice of a plan, a method, or any design for doing something. As such, implementation is the action that must follow any preliminary thinking in order for something to actually happen. In an information technology context, implementation encompasses all the processes involved in getting new software or hardware operating properly in its environment, including installation, configuration, running, testing, and making necessary changes”. Specifically, “policy implementation is the stage of policy-making between the establishment of a policy and the consequences of the policy for the people whom it affects. Implementation involves translating the goals and objectives of a policy into an operating, ongoing program” (Center for American Politics and Public Policy, 2010).

Therefore, implementation ranges from the problem identification to the evaluation of

solutions implemented. Different models exist to analyze the creation and

implementation of policy. Models are used to identify important aspects of policy, as well

as explain and predict policy and its consequences. Some examples of models are the

institutional model, the process model, the rational model, the group model and the elite

model. The policy cycle is a five-step model used in political science and management

for the analyzing and implementation of policies, namely information policy. It was

developed as a theory from Harold Lasswell's work and used in different settings. One

   

101  

standardized version includes the following stages:

1. Analysis of the situation and problem identification 2. Policy formulation 3. Adoption 4. Implementation 5. Evaluation

This standardized model inspired the researcher to determine the level of implementation

of e-mail management solutions within the government agencies. To take a close look at

the three different levels of e-mail management implementation policies, this study

accordingly included interviewees to provide valuable information on how each agency

implemented to manage e-mail records.

To ensure consistency between interviews, an interview protocol was designed

and used (See the interview instrument at Appendix 7). An interview protocol is a list of

questions or general topics that the interviewer wants to explore during each interview.

Although it is prepared to ensure that the same information is obtained from each

participant, there are no predetermined responses, and in semi-structured interviews the

interviewer is free to explore within these predetermined inquiry areas. Interview guides

ensure a good use of limited interview time; they make interviews with multiple subjects

more systematic and comprehensive; and they help to keep interactions focused. In

keeping with the flexible nature of qualitative research designs, interview guides can be

modified over time to focus attention on the areas of particular importance, or to exclude

the questions that the researcher has found to be unproductive for the goals of the

research (Lofland and Lofland, 1984). The interview protocol is composed of 33 open-

ended questions that cover the following themes: e-mail policy and guidelines,

implementation and compliance, e-mail system and recordkeeping system and associate

   

102  

issues such as preservation, authenticity and accessibility. For each of those categories,

the participants were asked to express their thoughts, opinions and experiences on

effective e-mail management, evaluate their level of satisfaction regarding their current

practices and help identify the strengths and weaknesses of the management of e-mail as

official records within the GoC.

The first contact with the information management professionals was established

by sending an invitation letter informing them of the research project in progress, the

interest in their involvement and an upcoming phone call aiming at making an

appointment with them (See the invitation letter in Appendix 5). Subsequently, a phone

call was made to ascertain their interest in participating in the project and, where

appropriate, to make an appointment. If they did not agree to participate, or were not

available, they were not interviewed for this study and another participant was selected

according to the criterka. Interviews were conducted at the participants’ workplaces.

These interviews had an ethical approval from the Research Ethics Board Office of

McGill University for research involving human subjects (See the Ethics Certificate at

Appendix 1). The researcher explained in the beginning of the interviews, they would not

be exposed to any foreseeable harms and risks. Their participation in the interviews was

voluntary, free to withdraw and confidential. Written informed consent was explained

and obtained by them (See the Informed Consent Form at Appendix 6). Each interview

lasted an average of one and a half hour. These interviews were recorded using a digital

recorder, with the written consent of participants, and subsequently transcribed. The

researcher re-listened the interviews to validate the transcript made by research assistants.

The transcriptions were made available to the participants for them to review in order to

   

103  

ensure that the answers were properly interpreted and see if there is any information that

they want to withdraw. A letter was sent to participants in the days following their

interview to thank them for their participation (See the Thank You Letter at Appendix 8).

The interviewed information was used for in-depth analysis.

Table 3.1. Summary of interview activities at participating agencies

Agency A

Agency B

Agency C

Agency D

Agency E

Agency F

Interviwees’

Title

Records

Management

Specialist

Information

Management

Officer

Head of

Information

Management

division

Director of

Information

and Library

Management

Chief

Information

Management

Director of

the IM/IT

Architecture

and Planning

Date

Feb.13, 2012

Feb.14,

2012

Feb.13,

2012

Feb. 20,

2012

Feb.21,

2012

Feb.20,

2012

Duration

1 hour and a

half

1 hour and

20 minutes

1 hour and

a half

2 hours

2 hours

2 hours

Supporting

documentation

Collected

Collected

Collected

Collected

Collected

Collected

Follow-up

No

No

No

No

Yes

Yes

3.4.4. Supporting documentation

During interviews, when participants mentioned any documentation, they were

also asked if they could provide the relevant documentation for further collection and

   

104  

analysis. Participants were open to provide the requested documents when they were in

their possession. As a result, several documents were collected, including mission

statements, annual reports, e-mail management policies, guidelines and other available

documents that relate to e-mail management and electronic records management systems.

In addition, general policies and guidelines from the Treasury Board Secretariat and

Libray and Archives Canada were also consulted.

Table 3.2. List of collected documentation from 6 agencies

Agency A

• Museum Act • Mission statement • Organizational chart • Mandate of the Research and Collections division • Annual reports • Library, Archives and Documentation services internal

audit • Information policy

Agency B

• Privacy Act • Personal Information Protection and Electronic

Documents Act (PIPEDA) • Mission statement • Organizational chart • Annual reports • Internal audit report • Electronic Records Management Policy

Agency C

• Act of Parliament • Mission statement • Organizational chart • Annual reports • Governance Policy • Internal audit report • Electronic Records Management Policy (including draft of

e-mail management section) • RDIMS user guide

   

105  

Agency D

• Mission statement • Organizational chart • Annual reports • Internal audit report • Electronic Records Management Policy • E-mail management policy • RDIMS user guide

Agency E

• Mission statement • Organizational chart • Annual reports • Internal audit report • E-mail management policy and guidelines • Microsoft Outlook user guide • Dissemination announcement for policy • Welcoming package for new employees • Training program

Agency F

• Mission statement • Organizational chart • Annual reports • Internal audit report • Electronic records management policy • RDIMS user guide • Training program • Monitoring guidelines

Table 3.3. List of collected documentation from Treasury Board of Canada Secretariat and Library and Archives Canada

Framework

• Management Accountability Framework (MAF). • Policy Framework for Information and Technology

Policy

• Policy on Information Management • Policy on Management of Information Technology • Policy on Access to Information • Policy on Government Security • Policy on Internal Audit • Policy on Privacy Protection • Strategic Direction for Government: Information Management • Policy on the Use of Electronic Networks

   

106  

Directive

• Directive on the Administration of the Access to Information Act • Directive on Information Management Roles and Responsibilities • Directive on Internal Auditing in the Government of Canada • Directive on Management of Information Technology • Directive on Privacy Practices • Directive on Recordkeeping

Standard

• Common Look and Feel Standards for the Internet, Part 4: Standard on Email

• Standard for Electronic Documents and Records Management Solutions (EDRMS)

• Internal Auditing Standards for the Government of Canada • Operational Standard for the Security of Information Act • Standard on Optimizing Websites and Applications for Mobile

Devices

Guideline

• Information Management – Guidelines • Guideline for Employees of the Government of Canada:

Information Management (IM) Basics • Guidelines For Records Created Under a Public Key

Infrastructure Using Encryption And Digital Signatures • Email Management Guidelines

In summary of data collection methods, this exploratory and descriptive research

uses a mixed methods approach based on three modes of data collection: (1) web-based

survey with information management professionals involved with e-mail management;

(2) in-depth interviews in person with information management professionals and (3)

relevant documents from the interviews. These different modes of data collection were

designed to draw from different sources in order to optimize the research outcomes and

answer the research questions.

3.5. Data analysis

This section describes the methods used for data analysis and is divided into the

three parts: (1) the analysis of the online survey made with information management

professionals working at the GoC; (2) the analysis of interviews with information

   

107  

management professionals from six Canadian government agencies; and (3) analysis of

relevant documentation.

Data analysis in mixed methods research is influenced by the design of the study.

Mixed methods research designs have mostly been convergent or sequential in nature,

with priority given to one type of data (Creswell and Plano Clark 2007; Teddlie and

Tashakkori 2003). When a sequential design is used, like in our study, the data analysis

of one type of data precedes that of the other type of data (Mertens, 2009). This research

design is employed to collect data on information management professionals’ perceptions

and satisfaction regarding effective e-mail management as official records within the

GoC. The researcher used an iterative data collection strategy consisting of two data

collection phases. In the first phase, survey data were collected; in the second phase,

interview data were collected. The survey questions are mostly close-ended. The

subsequent in-depth, semi-structured interview instruments were intended to explore

particularly interesting issues on e-mail management.

3.5.1. Quantitative data analysis

As previously mentioned, an online survey was used to collect quantitative data

on the general principles in managing e-mail records within Canadian government

agencies and see how well these principles are actually implemented in these agencies.

Statistics is the most widely used branch of mathematics in quantitative research.

Statistics is considered to be a science pertaining to the collection, analysis, interpretation

or explanation, and presentation of data. Statistics can be thought of as being descriptive

   

108  

(e.g. the characteristics of a sample, etc.), correlational (e.g. the strength and direction of

relationships, etc.) and inferential (e.g. group comparison, etc.).

Through out our study, a survey software and questionnaire tool, SurveyMonkey,

was used to create our online survey, send the invitations to the participants and manage

the responses. The descriptive analysis of the data was done using the Statistical Package

for Social Sciences (SPSS). Descriptive statistics, such as measures of central tendency

(e.g. mean, median and mode) indicated several basic characteristics and a common trend

of our sample. The analysis of the survey responses showed the general principles in

managing e-mail records within Canadian government agencies and see in what extent

these principles are actually implemented in these agencies.

3.5.2. Qualitative data analysis

In order to gain a closer perspective and understanding of the information

management professionals’ perspectives on e-mail management within the GoC, a

qualitative content analysis was conducted to analyze the information collected in

interviews and supporting documents.

Content analysis is one of major qualitative methods used to analyze textual data.

“It is a generic form of data analysis in that it is comprised of an theoretical [sic] set of

techniques which can be used in any qualitative inquiry in which the informational

content of the data is relevant” (Forman and Damschroder, 2008, p. 40). Qualitative

content analysis examines data that is most often the product of open-ended data

collection techniques aimed at detail and depth rather than measurement. The “qualitative

content analysis is to identify, codify and categorize recurring structures in the data”

(Patton, 2002). The objective of this analysis was to identify the presence in the data, of

   

109  

concepts studied, such as the implementation of e-mail management policies. Since this

study aims to determine the current practices to manage e-mail messages in order to

ensure their reliability, authenticity and integrity in federal agencies, content analysis was

an appropriate method for data analysis by using data that were collected mainly with

open-ended questions.

Content analysis requires both looking at interviews transcription as a whole and

breaking up and reorganizing the data. The first phase of the data analysis consisted of

engaging with the data in order to obtain an understanding of the whole before

rearranging it into themes for analysis. The analysis was then carried out deductively with

categories that are defined a priori from the interview guide and research questions and

inductively categories extracted from interviews outcomes. For this study, the categories

and their values were developed by combining three sources: (1) interview guide; (2)

policy and guidelines; and (3) other documentation (Miles and Huberman, 2003), such as

e-mail policy and guidelines, implementation and compliance, e-mail system and

recordkeeping system and associate issues, such as preservation, authenticity and

accessibility. The set of categories was then supplemented and improved by studying the

raw data collected. The development of categories was made in two stages (Tesch, 1990):

(1) data organization; and (2) data interpretation. Data organization was to identify the

different themes in the data, make combinations among them and come up with an

organized set of themes. This step is done iteratively starting with a subset of data

collected during pre-test to identify preliminary themes that have been used in the data in

order to clarify and consolidate the categories. By examining the data as it is collected,

the researcher became familiar with its informational content and identified new themes

   

110  

to be explored and develop analytic hunches and connections that can be tested as

analysis progresses. This approach allows to adapt the data collection for potential

sources of bias or detected deficiencies (Miles and Huberman, 2003). A first general

analysis was made at pre-test. Subsequently, the analysis was completed for all 6

interviews. As some authors suggested (Forman and Damschroder, 2008; Huckin, 2004;

Hoepfl, 1997), a ‘‘comment sheet’’ was completed immediately after each interview to

record our first impressions as well as new topics to be added in future data analysis. The

second step was the interpretation of data. That occurred when the content attached to

each theme was analyzed in order to highlight the commonalities and unique elements in

relation to the research questions.

The analysis was conducted with the use of a qualitative analysis software NVivo

10 which is a software application program developed by the company Qualitative

Solutions and Research Pty Ltd. The software allows to: “creates categories or codes for

thinking about the data and to manage the categories in an index system; explore patterns

in the data, record, in notes and memos, emerging theories and explanations of the data”

(Pickard, 2013, p. 279).

The coding gives rigor to the content analysis process. The goals of this phase are

to: “(1) reduce the amount of raw data to that which is relevant to answering the research

question(s); (2) break the data (transcripts) into more manageable themes and thematic

segments; and (3) reorganize the data into themes in a way that addresses the research

question(s)” (Huckin, 2004). The researcher first proceeded to an initial coding, based on

the themes that were identified in the interview guide and the research questions. In this

research, four units of analysis were considered, namely: (1) e-mail management policy

   

111  

and guidelines; (2) electronic messaging system and electronic recordkeeping system; (3)

implementation and dissemination; and (4) associated issues. Subsequently, more coding

was developed as the researcher analyzed the data to identify emergent themes relevant to

the management of e-mail records. The content of the interviews were analyzed to

highlight the differences and similarities across government agencies in order to specify

the categories and values. For instance, the content analysis of e-mail management policy

has defined categories such as policy development and information management

professional roles. The researcher has collected, in a codebook, all information related to

the categories, such as name and definition (Miles and Huberman, 2003). The codebook

contributed to organizing the codes that were used and ensure that they are used

consistently. The development of categories and their values have been governed by the

following main principles: “(1) the categories and their values were consistent with the

objectives of the research; and (2) the values of the categories should be exhaustive and

mutually exclusive” (Pickard, 2013, p. 82). Categories and category values were applied

to the relevant units of text, Same segment of rich text information could be encoded by

several categories and category values (Wildemuth, 2009). The categories have been

defined and refined throughout the analysis process to achieve a stable level where any

new data could be added without adding categories.

The analysis of relevant documents supplemented the data from in-depth

interviews with information management professionals on e-mail management. E-mail

management policies and/or guidelines were coded with the same categories developed

for in-depth interviews to add to the understanding of e-mail management at the GoC.

   

112  

In summary of data analysis, a statistical analysis was used for data collected

using a web-based survey with information management professionals working at the

GoC to gather basic characteristics and common trends of our sample. Subsequently, a

content analysis of both inductive and deductive analysis was used for data in-depth

interviews with information management professionals involved in e-mail management

as well as to provide an analysis of the supporting documents gathered during the in-

depth interviews.

3.6. Limitations of the study

Due to the small sampling size of participants in this study, generalizations beyond

the context of this study may not be easy to infer. Indeed, the data was first collected

using an online survey in 76 Canadian government agencies and subsequently, interviews

have been conducted with 6 information management professionals from 6 government

agencies only. The result of this study may not represent the entire population of

information management professionals in Canadian government agencies. Also, only

information management professionals were surveyed and interviewed. Other

stakeholders involved in the process of managing e-mail records were not included in this

research. In addition, this study focused on e-mail management policies and practices

within the selected agencies only so that the results may not reflect the e-mail

management policies for the whole body of Canadian government agencies. Despite these

constraints, the instruments developed for this research has enabled us to collect rich data

and provide information on the characteristics of e-mail records and practices for their

management.

   

113  

3.7. Quality assurance of the research

To ensure the methodological rigour of this research, various steps were taken

throughout the reseach process. Since our study is a mixed methods research, criteria

pertaining to both quantitave research methods and qualitative research methods were

used to measure the quality of the research (rigour and trustworthiness). Methods

contributing to the validity, reliability, credibility and transferability of the results in this

research are explained below.

Validity is defined as “the way in which a casual reslationship is demonstrated”

(Pickard, 2013, p. 22). According to Winter (2000), when “validity definitions are

concerned, two common strands begin to emerge: firstly, whether the means of

measurement are accurate. Secondly, whether they are actually measuring what they are

intended to measure”. To ensure the validity of our study, the questionnaires of survey

and interviews were designed based on the objectives of our research in order to ensure

that the data collection instruments measure what they intends to measure. To be

effective, the data collection instruments must answer the reserch questions and applied

uniformly (Pickard, 2013; Widemuth, 2009). In order to do so, we ensured to establish a

link between research questions and data collection instruments.

Reliability of research is “concerned with stability of the research findings over

time and across locations” (Pickard, 2013, pp. 22-23). It is defined in terms of usefulness,

accuracy and stability of the tools used in the research (Pickard, 2013; Wildemuth, 2009;

Winter, 2000). Reliability consists of ensuring that another researcher is able to reproduce

the same research and arrive at the same conclusions (Yin, 2003). To meet the criteria of

reliability, we developed a research protocol to standardize the research process. In

   

114  

addition, the survey questionnaire was constructed in a way that respondents can

understand the questions easily. The data collection instruments were pilot tested to

ensure their stability and ability to collect quality data. Conducting a pre-test helped to

better assess the adequacy of these instruments data collection and research issues, to

check the stability of these tools and their ability to collect quality data. It was a crucial

step in the research process since it has enabled us to control our tools and to clarify our

questions research.

Credibility is “demonstrated by the prolonged engagement with the research

participants, persistent observation of those participants, triangulation of the techniques

used to study those participants and their contexts, peer defriefing and member checks”

(Pickard, 2013, p. 21). To increase the credibility of our research, we used multiple data

sources (e.g. web-based survey, semi-structured interviews, supporting documentation),

which contributes to the quality of our results. Also, the data was collected from different

government agencies allowing for rich and diverse data. We also developed tools for

ensuring the consistency of our approach to collecting and analyzing data (e.g. research

protocol, codebook). We documented systematically our decisions during the realization

of this research. For instance, interview summary notes were created after each interview

for review by participants. In addition to these measures, we also paid attention validation

of our results by our peers. The research proposal was the subject of a presentation to the

advisory committee. Also, some of the data collected and analyzed was also subject to

peer review since the content was presented at some academic conferences.

External validity and transferability aim to assess the quality of the research in

relation to its context. External validity, according to Pickard (2013), is “concerned with

   

115  

the extent to which findings from the investigation can be generalized to the wider

context” (p. 22). Our research aims not to verify the generalization of our results, but

instead achieved what Miles and Huberman called "theoretical representativeness" (Miles

and Huberman, 2003, p. 59). To ensure transferibility, we produced a description of the

study sample. The government agences and participants in our research were carefully

selected for the representative of their role on e-mail management and the relevance of

their characteristics to the objectives of our research. In addition, the agencies studies

share common features that create a context for the study of e-mail management

practices. The sample size achieved the theoretical saturation which means redundancy in

the data collected from different respondents (Wildemuth, 2009).

Finally, to ensure the confirmability of the results, the research objectives and

procedures must be explicit. The confirmability of the results highlights the importance

of neutrality in relation to the researcher bias (opinions, disciplinary assumptions,

research interests) (Pickard, 2013, p. 22). Different strategies have been used to ensure

the confirmability of the results. To counter the effects of the researcher bias, we

developed a set of procedures such as instruments of data collection and the codebook to

make possible the reproduction of the study by other researchers (Miles and Huberman,

2003, p. 502). These tools provide stable and comprehensive descriptions and the

strategies that led to the results have been explained in the dissertation.

Summary  

Our research aims to: (1) identify the general principles in managing e-mail

records within Canadian government agencies and see to what extent these principles are

   

116  

actually implemented in these agencies; and (2) determine significant similarities and

differences in managing e-mail records in government agencies and identify the current

practices in managing e-mail messages in order to ensure their reliability, authenticity,

and integrity. This chapter has described the various methodological components of this

research project.  The study is based on a mixed methods approach by using three ways of

data collection: (1) web-based survey with information management professionals

working at the Canadian government agencies; (2) in-depth interviews in person with

information management professionals involved in e-mail management from six

government agencies; and (3) the relevant documentation. A statistical analysis was done

on the data collection by using the web-based survey, while a content analysis combining

both inductive and deductive methods has been done on the interview data and relevant

documentation. Finally, various means have been taken by the researcher to ensure the

quality of research in its preparation (such as the research protocol, pre-test and use of

multiple data sources). The next chapter presents the research findings that are obtained

from the methodology previously described.

 

   

117  

CHAPTER IV. FINDINGS

The findings of this research are organized according to the research questions.

We draw a picture of practices of e-mail management within Canadian government

agencies and take a look at the level of implementation of these practices in agencies.

Then, the similarities and differences in managing e-mail records in government agencies

are described. Finally, answers to our four research questions are provided.

4.1. E-mail management principles and implementation

To answer the first two research questions of this research (e.g. “What are the

general principles of e-mail management within Canadian government agencies?”; and

To what extent these principles are implemented in the federal agencies?), this section

presents the results of the data analysis of the web-based survey by the following five

sub-sections: (1) respondent profile; (2) e-mail policies and/or guidelines; (3) e-mail

system and recordkeeping system; (4) implementation and dissemination; and (5)

relevant issues. The entire results of questionnaire are provided in Appendix 3.

4.1.1. Respondent profile

As mentioned in the research design of Chapter 3, 204 respondents (37% out of

550 contact persons) participated in the web-based survey on e-mail management

practices and implementation. The first section of the survey (Questions 2 - 7)

investigated general information concerning the respondents to the survey, including

information related to government agencies, position, and records

management/information management experience. Among the 204 respondents, the

   

118  

majority holds a director position (n=121, 59%) in a federal agency, while 49 respondents

(24%) are managers and 34 respondents are professionals (17%). The list of the

titles/positions of respondents can be found in Appendix 4. The half of respondents

(n=109, 53%) that participated to the survey have work experiences in the field of records

management/information management ranging between 11 to 20 years, while 51

respondents (25%) have been in this field less than 10 years. 26 respondents (13%)

mentioned to be active in records management/information management between 21 to

30 years, while a small number of respondents (n=18, 9%) have been working more than

31 years in the field.

The respondents come from a large variety of activity areas as shown in Figure

4.1. 37 respondents (18%) identified the general public services as the key activity of

their agency. 29 respondents (14%) come from health activity areas. 27 respondents

(13%) worked in agencies whose activities are related to finance and economic affairs.

26 respondents (13%) are working in agencies whose main activity are related to justice,

24 respondents (12%) from recreation and culture, 21 respondents (10%) from the public

order and safety, 18 respondents (9%) from the environment sector. 13 respondents (6 %)

come from the defense activity areas and finally, 9 respondents (5%) have identified

education as the main activity of their agency. Respondents are working in nine different

activity areas across agencies.

   

119  

Figure 4.1. Activity areas of the respondents

 

The size of the agencies is variable. The majority of the respondents (n=119,

58%) work in medium size agencies (between 250 and 500 employees); 53 respondents

(26%) are from large size agencies, such as Health Canada or Treasury Board Canada,

while 32 respondents (16%) are working in federal agencies that have less than 250

employees.

4.1.2. E-mail policies and guidelines

In the online survey, questions 8 - 16 asked how respondents perceive the use of

e-mail as a business communication tool and understand the creation and implementation

of policies and guidelines to manage e-mail records in the Canadian agencies.

In Question 8, for the entire respondents (n=204; 100%), e-mail is used on a daily

General public services 18%

Defense 6%

Public safety and order 10%

Finance and economics affairs

13% Environment

9%

Health 14%

Recreation and culture 12%

Justice 13%

Education 5%

   

120  

basis in their agency to conduct business operations, which reflects that e-mail has

become prevalent as the de facto tool for business-wide communication and

collaboration. However, the level of importance tends to vary between agencies. Indeed,

as shown in Figure 4.2, e-mail was identified by information management professionals

as a very important or fairly important tool (n = 188, 92%) of communication to conduct

business activities in government agencies. Some information management professionals

(n = 16, 8%) identified that e-mail is not so important within their agencies to conduct

business. None of the respondents mentioned that e-mail is neutral or that is not

important at all within their agencies to conduct business.

Figure 4.2. Importance of e-mail in business activities at GoC

 

In Question 10, numerous information management professionals stated having

encountered difficulties in managing e-mail messages (n=179, 87%), while only a small

Very important 68%

Fairly important 24%

Not important 8%

   

121  

number of respondents (n=25, 13%) mentioned that they did not have any difficulty in

managing e-mail messages. The nature of the encountered difficulties varied across

agencie and were identified by the following order (multiple answers were allowed):

applying appropriate retention periods to e-mail messages (n=83); gathering the complete

information and documents regarding a subject (n=76); retrieving critical information to

take a business decision (n=68); the capture of e-mail records in corporate repository

(n=62); the distinction between an e-mail records that have business value and transitory

e-mail messages (n=51); information overload (n=46); ensuring the continuity of

activities when employees leave (n=34); storage issues (n=21); and electronic discovery

issues (n=17). The problems identified by the respondents are various across the lifecycle

management of e-mail records, which reflects the importance of proper management of

electronic mail messages.

The results of question 11 showed that all the respondents (n=204; 100%) agreed

that an e-mail message can be considered as one type of corporate records, when they are

used to conduct business activity. Therefore, e-mail messages need to be managed

according to laws and regulation applicable to their own organizational context and

subject to the records management tools (i.e. classification plan and retention schedule)

and approved in their respective agency. Among the respondents, five respondents (n=5)

provided additional comments by mentioning that while e-mail messages that have a

business value are records, most e-mail messages have a transitory value. Four

respondents (n=4) also added that, even if they do consider e-mail as corporate records,

their views are not shared with other professionals in their agency, such as IT

professionals and senior managers who sometimes consider e-mail as form of ephemeral

   

122  

communication. The findings of questions on the use of e-mail suggest that there is a

need for a common understanding of the value of e-mail across professionals involved in

the management of electronic records.

In order to ensure appropriate management of e-mail records in Question 12,

almost half of the respondents (n=92, 45%) indicated that their agency had developed and

implemented tools to manage e-mail records, while 79 respondents (39%) stated that their

agency is currently developing or implementing tools to ensure the appropriate

management of e-mails records. Also, 20 respondents (10%) mentioned that their agency

plans to develop tools to manage e-mail records in compliance with the policies and

procedures that the Treasury Board of Canada Secretariat and the Library and Archives

Canada (LAC) put forward. Eight respondents (3%) stated that their agencies don’t have

any e-mail management policy and/or guidelines and are not planning to develop any

kind of tools to manage e-mail records. Seven respondents (3%) don’t know if their

agency has some sort of tools to manage e-mail records or not.

In addition, in Question 13, the results show that, among repondents who had, in

the past, developed or were currently in the process of developing tools to manage e-mail

records, the nature and format of these tools tend to vary across agencies as shown in

Figure 4.3. An important number of respondents (n=64, 37%) have a separate written e-

mail management policy and/or guidelines. More than a quarter of respondents (n=46;

27%) have a general electronic records management policy applicable to different types

of electronic records while 28 respondents (16%) have included a section on e-mail

management in their general electronic records management policy. Some information

management professionals (n=26, 16%) confirmed that their organizations did not have a

   

123  

written e-mail policy and guidelines. Six respondents (3%) mentioned that they don’t

know which type of policy or guideline is used in their agencies. Finally, two respondents

(n=2, 1%) specified that their respective agencies have an information management

policy that encompasses all media including electronic records and e-mail records.

Figure 4.3. Policies and guidelines to manage e-mail records

Importantly, in Question 14, the content of the policy seems to vary, depending on

its functions, activities and resources available (multiple answers were allowed). The

majority of respondents specify that their policy declare e-mails to be corporate records

(n=100) and the property of the Government of Canada (GoC). Therefore, they should be

managed adequately (n=109). 92 respondents mentioned that e-mail records need to be

captured and managed in an organizational records management systems (n=92). Also,

more than half of the respondents whose agency possess an e-mail management policy

and/or guidelines (n=85) contains information concerning the retention period as well as

written electronic records

management policy 27%

written electronic records

management policy that

addresses e-mail management 16%

specific written e-mail management policy and guidelines 37%

no policy or guidelines 16%

I don't know 3%

information management policy 1%

   

124  

appropriate disposition of e-mail records. Finally, 89 respondents mentioned that their e-

mail management policy and/or guidelines provide information on appropriate storage,

protection and accessibility.

The results of Question 15 indicate that while more than half (n=69, 62%) of the

respondents felt that their agency’s e-mail policy and guidelines should be modified to

address other specific issues, a small number of respondents (n=43, 38%) are satisfied

with their organization’s current e-mail policy and/or guidelines. In addition, the

respondents were asked to specify what other issues they felt should be added to their

current e-mail management policies and guidelines. Among the respondents who feels

that their e-mail policy and guidelines should be modified, 27 respondents felt that the

roles and responsibilities of professionals should be clearly defined between records

managers, IT professionals and users. Also, issues related to users were raised, because

the process of managing e-mail begins with users, at their own desktops, making

decisions every day about what e-mail messages to delete and keep, and where to file

them. Therefore, some respondents stated that their agency’s e-mail management policy

and/or guidelines should provide boundaries regarding the use of e-mail system and e-

mail etiquette (n=34) and provide guidelines for the creation and edition of e-mail records

(n=23). Also eleven respondents addressed that the e-mail management policy and/or

guidelines should be enforced by identify corporate tools to, not only ensure the lifecycle

management of e-mail records, but also compliance.

In Question 16, the majority of the respondents that participated in this research

(n=73, 67%) were involved in the creation and/or implementation of the e-mail

management policy and/or guidelines, while 29 respondents (33%) were not involved.

   

125  

The nature of the involvement tends to vary, depending on the agencies. Specifically, 21

respondents (19%) indicated to have participated closely to the creation of the e-mail

management policy within their agency, while 31 respondents (28%) participated in the

implementation of their agency’s e-mail management policy to ensure the training and

compliance of the users. The results suggest that the nature of the involvement tends to

vary according to the position the respondents are holding. Indeed, the majority of the

respondents that were involved in the creation of e-mail management policy tend to have

a higher position in their agency, such as director and manager, whereas the respondents

who are mostly responsible for the implementation tend to be professionals in the

medium level, mostly responsible for training to the users.

4.1.3. E-mail system and recordkeeping system

The questions 17 - 19 investigated e-mail messaging system and recordkeeping

system for the management, retrieval and access of e-mail records, since technology can

contribute to the management of electronic records including e-mail records. In Question

17, respondents provided the name of the messaging system used in their respective

agency. The majority of respondents (n=162, 79%) answered that Microsoft Outlook is

used in their agency, while twenty-seven respondents (n=27, 13%) identified IBM Lotus

Notes as the e-mail system used at their workplace. A small number of respondents

(n=15, 8%) mentioned using Novell GroupWise in their agency.

Regarding the use of an electronic records management system in Question 18,

the majority of the respondents (n=149, 73%) have access to a recordkeeping system to

manage corporate records, while a small number of respondents (n=55, 27%) have not

yet implemented a recordkeeping system, as shown in Figure 4.4.  The results indicate

   

126  

that the respondents who have access to electronic records management systems within

their agency are using the Records, Documents, and Information Management System

(RDIMS) provided by the GoC. However, since GCDocs is currently being implemented

in the agencies, some respondents that were surveyed do not currently use an electronic

records management system. For example, five respondents (3%) mentioned using

Documentum for print records only; while eleven respondents (7%) are in the process of

implementing GCDocs. Among the five respondents, one respondent specified that

RDIMS is currently used in 1/3 of the organization but for three respondents (2%), the

implementation was delayed for different reasons: conversion of the software to a new

version, an impending merger with another agency and lack of funding.

Figure 4.4. Implementation of corporate recordkeeping system

 

Therefore, the results indicate that there are different practices in managing and

Yes  73%  

No  27%  

   

127  

saving e-mail records across agencies, as shown in Figure 4.5. Indeed, half of

respondents (n=107, 53%) indicated that their practice is to save e-mail records in a

corporate recordkeeping system such as the RDIMS or GCDocs; for 59 respondents

(29%), their practice is to print and file hardcopies of e-mail records either in personal

files or in shared files; for 27 respondents (13%), their practice is to keep e-mails records

in each user’s inboxes, while 11 respondents (5%) encourage its users to save their e-

mails records to corporate servers. Some respondents provided additional comments. As

such, five respondents indicated that there is no consistency to save and manage e-mail

records. Indeed, one respondent mentioned that “older one was print and file,

unfortunately a lot kept in email inbox, and some saved in our EDRMS (which is the goal

to achieve)”, while another respondent explained that “everyone does whatever they want

because the guideline is not enforced”. These results suggest that the lack of consistency

seems to have an impact on the appropriate management of e-mail records as remarked

by one respondent: “employees are using whatever means possible to ensure the emails

are safeguarded. There is little done on the purging and disposition front of emails”.

 

 

 

 

 

 

 

 

 

   

128  

Figure 4.5. Methods used to manage and save e-mail records

 

4.1.4. Implementation and dissemination

This section of the questions 20 - 24 investigated how the government agencies

plan the dissemination and implementation of their e-mail management policies and/or

guidelines as the goal was to determine the effectiveness of e-mail management tools and

compliance to support e-mail management principles.

The results of Question 20 (multiple answers were allowed) indicate that the

respondents used different means to communicate and disseminate e-mail management

tools in their respective agencies. Thus, 47 respondents (42%) tend to disseminate their

policy and/or guidelines by publishing it on their agency’s website or intranet. While 31

information management professionals (28%) used training to disseminate their e-mail

management policy and/or guidelines. Thirteen respondents (12%) mentioned that their

Print and file the hardcopy 29%

Keep in e-mail inbox 13%

Save to corporate server

5%

Save to corporate recordkeeping system 53%

   

129  

e-mail management policy was disseminated by making a formal announcement to their

users. Still eighteen respondents (16%) stated that the employees in their agency learned

of the existence of the e-mail management policy and/or guidelines from their colleagues,

while two respondents (2%) used other means of dissemination such as occasional

information sessions. One respondent commented that using multiple ways of

dissemination tends to be a more successful approach by saying that:

“we communicated the development and implementation of the policies through various means, including broadcast, targeted and included compliance requirements in all training material. There were subsequently posted on intranet site as well as IM [information management] working databases for ease of access by all employees and managers”.

Another respondent mentioned that the main difficulty resides, not in the dissemination,

but in the lack of interest from the users:

“due to lack of interest from employees to attend IM [information management] training the best practices are being missed. As we’ve considered IM training mandatory for ECM [entreprise content management] implementation clients are starting to be interested in learning the best practices. Slow progress but slowly gaining interest as employees realized that they need help managing the mess they’ve made”.

Therefore, in Question 21, the level of compliance of users to support e-mail

management practices tends to vary across agencies, because it has not been

standardized. 39 respondents (35%) indicated that the employees within their agency to

be fairly compliant. According to 32 respondents (28%), the users in their agency tend to

be poorly compliant, while seven respondents (6.5%) identified the users within their

agency to be very poorly compliant with their e-mail management policies and/or

guidelines. According to 29 respondents (26%), the level of compliance within their

agency is considered being good, as a few respondents (n=5, 4.5%) identified the level of

   

130  

compliance as being excellent. The results suggest that compliance is an important issue

in e-mail management but the level of compliance tends to vary across agencies.

In Question 22 regarding the means to ensure compliance of users, other than

ensuring the communication and dissemination of e-mail management tools, some

respondents implemented different means to ensure compliance of the users. The results

showed that 27 respondents (24%) make an internal periodical audit on an annual basis to

verify the appropriate application of e-mail management policy and guidelines by the

users; 39 respondents (35%) stated to have developed a monitoring program, while 22

respondents (20%) do quality control to ensure that the e-mail management policy and/

guidelines are applied appropriately; 10 respondents (9%) uses other means to ensure

compliance, such as mailbox quotas or developing automatic tools of classification in

order to take the responsibility of the users. However, 14 respondents (12%) stated that

no process to ensure compliance is currently in place.

Regarding the reasons why users are not being fully compliant in Question 23

(Figure 4.6.), more than half of the respondents (n=74, 66%) felt that the users in their

agencies had no time or were too busy to manage their e-mail records; 14 respondents

(13%) identified complexity as the main reason for not being fully compliant with e-mail

management policy and/or guidelines; 17 respondents (15%) mentioned that the users did

not know they had to apply the e-mail management policy, while 7 respondents (6%)

mentioned that other reasons are behind the fact that the employees are not being fully

compliant. One respondent provided additional comment and specified that, in his/her

agency, some employees felt it was not their responsibility to manage e-mail and this

responsibility should fall on records managers instead:

   

131  

“Employees are running at 100%. Generally, they do not understand the shift from centrally managed to locally manage at their desktop. Many refuse to become recordkeepers. Somewhat a stereotype situation thus resistance continues at all levels.”

In addition, two respondents identified the lack of training and/or continuous education as

the main reason for not being fully compliant. One respondent stated that “compliance to

email policy, other to minimize the volume of emails, is not viewed as a priority”.

Another two respondents identified the absence of the RDIMS solution as being one

reason for not being compliant. Additionally, one respondent identified a combination of

factors as being responsible: “a combination of not having a specific email management

policy, too many emails to manage, and no system or guidelines for employees to use”.

Figure 4.6. Reasons for not being compliante with e-mail management policy and guidelines

Too busy 66%

Complex 13%

Didn't know they should apply the policy and/or guidelines

15%

Other 6%

   

132  

Question 24 asked repondents to bring several interesting issues related to

compliance. One issue is the fact that there are no consequences for not being compliant

to e-mail management policy and guidelines with 40 respondents (36%). In some

agencies, consequences can be put into effect. For example, eighteen respondents (16%)

identified a written warning as a possible consequence for not complying: fourteen

respondents (12.5%) stated that employees can receive a verbal warning; eleven

respondents (10%) identified suspension from work as a possible consequence; nine

respondents (8%) mentioned that, in their agency, when employees don’t comply with e-

mail management policy and/or guidelines, their access to the e-mail system might be

limited and/or suspended; and six respondents (5%) mentioned that consequences can

lead to termination of work. Fourteen respondents (12.5%) mentioned that they don’t

know if there are consequences or not in their agencies. In addition, two respondents

provided additional comments to this question. One respondent indicated that within

his/her agency, employees can have a suspension from their position or even be

terminated depending on the severity of the situation as “consequences should be a result

of not adhering to Government of Canada legislation on IM”, while another respondent

highlighted that enforcement of disciplinary measures as an issue by specifying that

“while disciplinary measures can be enforced, the organization is not equipped to manage

across the board, nor properly monitor compliance. Therefore, not disciplinary measures

can be enforced”.

4.1.5. Issues The final section of our questionnaire (Questions 25 - 30) investigated if there are

any comments, opinions or thoughts related to e-mail management by the respondents.

The addressed comments focused on the two issues: 1) the awareness of e-mail

   

133  

management; and 2) the creation e-mail management tools to ensure the appropriate

management of e-mail records. For example regarding the former issue, one respondent

mentioned that “e-mail management and the management of e-mail records were

identified by employees as the #1 priority for the IM program strategy and roadmap”,

which reflects the awareness of this issue. However, in order to ensure the appropriate

management of e-mail records, e-mail management must be perceived as an IM issues,

another commenter mentioned that: “email management is viewed as an IT function in

term of storage costs and not an IM function in terms of the value of the record”. The

respondent goes further by adding that “unless this perception changes, it will be hard to

implement tools to manage e-mail records”.

Interesting comments related to the absence of tools for e-mail management are:

“Awareness of the issue of email management comes in waves, usually when there is an

issue due to litigation, etc. and emails cannot be found. The lack of good tools for

lifecycle management of email in the department is also an issue”. Another respondent

provided information on the information management functions that are difficult to

manage for e-mail records:

“employees may overall recognize the need to keep e-mail of business value but do not have the tool to make them easily accessible to others in the nature of a corporate management system. This makes e-mail difficult to manage in terms of accessibility, and for retention and disposition purposes”.

Importantly, one respondent addressed the need of appropriate systems to play a crucial

role in the management of e-mail records like: “with the lack of an official electronic

content/records management system to give the proper tools to the clients in effectively

managing their emails, it becomes an exercise in futility”. Even with these issues, the

   

134  

information management professionals try to implement different solutions to facilitate e-

mail management. Another respondent also agreed by saying that: “our “clean up and

win” contest did reduce emails by encouraging deletion of transitory emails, but that

didn’t help with corporate emails not saved in RDIMS. We will be introducing email

quotas on mailbox size. That should help”.

In summary, the following issues have been raised and discussed by the

respondents: awareness of e-mail management, the creation of tools to manage e-mail

records, and access to an electronic recordkeeping system to facilitate e-mail

management and ensure users buy-in to e-mail management.

The results of the web-based survey are summerized in Table 4.1.

Table 4.1. Summary of e-mail management practices and implementation at GoC

Categorie

Description

E-mail policies and

guidelines

- E-mail is used as a business communication tool; - Various difficulties exist in managing e-mail messages; - No common understanding of the value of e-mail records; - E-mail policy and guidelines are used unevenly to manage e-

mail records; - Type of policies used varies across agencies according to

organizational context; and - Most respondents are not satisfied with their current e-mail

policy.

E-mail system and

recordkeeping

system

- All agencies have access to an e-mail messaging system;

- Some agencies used a recordkeeping system to manage their e-mail records;

- Currently, there are different practices to manage and save e-mail records.

   

135  

Categorie

Description

Implementation

and dissemination

- Different means are used to communicate and disseminate e-

mail policy and guidelines;

- Level of compliance of users varies across agencies; - Agencies developed different tools to ensure compliance;

- Several agencies are often in absence or lack of training program;

- There are often no consequences for not being compliant.

Major issues

The following issues are identified:

- Awareness of e-mail management; - Access to an electronic recordkeeping system; - Compliance of users to e-mail management tools.

Overall, the results of the survey suggest that e-mails are recognized as important

business records. The establishment of an e-mail policy and guidelines to define the use

and management of e-mail in a recordkeeping system is deemed essential. The results

show that although several respondents recognize the criticality of e-mail in their work,

their agencies often lack ensuring compliance to their e-mail management policy,

guidelines and technical considerations.

4.2. E-mail management: current practices and variations across Canadian government agencies

The second section of the findings chapter explores the differences and similarities

of e-mail management practices across government agencies as stated by our research

   

136  

questions (e.g. “What are the variations and similarities of email management practices

across federal agencies?; and To what extent are they effective?”). Results presented in

this section are primarily from the in-depth interviews with six information management

professionals that represent information-rich cases. The results are divided into the three

sub-sections according to the level of implementation of e-mail management policies and

guidelines within the selected agencies: (1) two agencies that have not implemented any

e-mail management policies (Section 4.2.1); (2) two agencies that have initiated the

implementation of such policies (Section 4.2.2); and (3) two organizations that have fully

implemented e-mail management policies and guidelines (Section 4.2.3).

4.2.1. Absence of implementation  

This sub-section presents descriptive contextual information on two (2) Canadian

government agencies which have yet not implemented any e-mail management policies

and guidelines.

4.2.1.1. Contextual information on agencies Agency A

Agency A was first founded in 1856 and gradually became a major tourist

attraction. Agency A has a mandate to "increase, throughout Canada and internationally,

interest in, knowledge and critical understanding of and appreciation and respect for

human cultural achievements and human behaviour." (Government of Canada, Agency

A, About us, n. d.). Agency A currently employed more than 200 employees.

   

137  

Agency A is divided into seven divisions. The research and collections division is

responsible for the management of library, archives and documentation services. The

specific mandate of this division is:

“to contribute to the knowledge of Canadian historical and cultural experience particularly in the fields of Canadian archaeology, ethnology, cultural studies and history, by: undertaking research programmes and adding to the collections and programmes of the Agency A; curating exhibitions, writing for publication, and providing expertise; maintaining and preserving Agency A’s collections; to develop, manage and implement a publishing programme for the Agency’s various clienteles; and making accessible both to internal and external users, the Agency’s collections and related information” (Government of Canada, Agency A, Mandate of the Research and Collections Branch, n. d.).

One of the sub-divisions of the Research and Colletions Division, the Library,

Archives and Documentation Services (LADS) is composed of 11 employees: one

director, two managers (one for library services and one manager in archives services),

three professional archivists and records managers, three reference librarians and two

assistants. The LADS is responsible for the management of the library as well as

historical archives and records relating to government business. Therefore, the personnel

must ensure the proper application of relevant policies, guidelines and procedures as well

as provide assistance and advice to the various units within the agency.

Agency B

The mandate of Agency B is to protect and promote the privacy rights of

individuals. Agency B is divided into eight branches and can count on 225 employees to

accomplish its mandate and activities. The information management (IM)/information

technology (IT) Division is responsible for information management governance as well

as the information technology systems which carry the electronic information through

Agency B.

   

138  

4.2.1.2. E-mail policy and guidelines  

The goal of this section was to investigate if the absence of an e-mail management

policy and/or guidelines can have an impact on the appropriate management of e-mail

records and discussed the satisfaction level of the two participants.

Agencies A and B do not currently have an e-mail management policy and/or

guidelines to manage their e-mail records. This being said, in both agencies, the

personnel used the e-mail messaging system daily to send and receive information related

to business activities and e-mails are deemed as being very important. However, in both

agencies, difficulties regarding the management of e-mail messages were identified,

especially the value of e-mail messages and retrieval. In Agency A, a records

management specialist informed us that “their list of problems regarding e-mail is quite

long.” First, there seem to be no common understanding of the value of e-mail messages

and how to identify e-mail records among the important numbers of e-mail messages

currently being exchanged (e.g. which ones should be kept; which ones can be destroyed

and which ones have a transitory value). This lack of common understanding is present

among the users of the e-mail messaging system but also in professionals who, according

to the participant, should be involved in the management of e-mail messages, such as IT

professionals, lawyers and higher managers.

In addition, there is no standard filing system. Within Agency A, there is a

classification structure implemented for both paper and electronic records saved on the

corporate servers. However, its structure is not implemented or enforced for e-mail

records which causes important issues with the retrieval of e-mail records. Another

difficulty resides in limited inboxe sizes. As a result, since there is no storage to file

   

139  

important e-mails records, they tend to be often deleted without prior evaluation of their

content. Finally, the volume of e-mail messages that is exchanged and kept by employees

in their inboxes without document and records management processes can have a serious

impact on the accountability of the agency.

In Agency B, the situation is similar. The Information Management Officer

(IMO) explained that because the mission of the agency is to protect and promote the

privacy rights of Canada, IM is an important part of Agency B's daily activities. These

are equipped with numerous tools and systems contributing to managerial decision-

making. Some tools and systems are already implemented to ensure the appropriate

management of paper and electronic records but do not support the appropriate

management of e-mail records. As a result, the staff personnel of the agency has inboxes

that are full of messages to be deleted or kept without any evaluation regarding their

relevance. Also, it seems problematic to retrieve information that is kept in inboxes.

According to the IMO, when retrieving information, “it can [be] hard, even impossible”.

Since e-mail records are kept in each employee’s inbox, it’s impossible to manage. The

IMO explained that just like other type of electronic records, e-mail records must be

evaluated, based on their content, such as adequately managing, storing, protecting and

having access to them when necessary.

In these situations of the two agencies, both agencies are planning to develop in

the near future an e-mail management policy and/or guidelines to address the problems

faced with e-mail records. Agency A already has a general information policy that

includes the management of electronic resources. According to the records management

specialist who participated in the study, this policy can be applied to electronic resources

   

140  

that are saved on the corporate server. However, since e-mail records are kept in each

employee’s inbox, it becomes complicated to know what information exists or not, what

information is exchanged, or what information needs to be accessible. Therefore, a more

structured policy and guideline need to be created. Agency B has already implemented a

written electronic records management policy. However, for similar reasons like Agency

A, a specific policy on e-mail management should be developed and address issues,

especially the ownerships, lifecycle management, disposition, security, accessibility of e-

mail records.

4.2.1.3. E-mail System and Recordkeeping System  

Both agencies are using a messaging system Microsoft Outlook as an e-mail

application. Outlook has many features, like viewing, sorting and searching e-mails. For

example, to make e-mails easier to find, they can be categorized by color and making

them quickly distinguishable from each other. Along with searching through contacts,

users also can search the contents of e-mails and attachments for keywords. Another

feature regarding attachments is the ability to preview them instantly. This allows users to

view the contents of attachments without saving and opening each one. Microsoft

Outlook also has security features to protect the e-mail account from junk and phishing e-

mails. For instance, when an e-mail is sent from an untrustworthy sender, its built-in

email scanner alerts users through which live links can be disabled and then senders can

be blocked.

Among many functionalities of Microsoft Outlook, searching and organizing

functions of e-mail messages are really important to Agency A where there is no

   

141  

corporate recordkeeping system due to a lack of funding. Because there is no specific

guideline on e-mail management, the employees of Agency A can adopt different

strategies to manage their e-mail records, whether they save them in their inboxes on the

corporate server, or print/file their hard copy. The records management specialist added

that often staff would save their e-mail records in two or three different places, resulting

in several duplicates. Even attachments can be applied in the same treatment, which are

often of great importance to the business activities of the agency and for decision-

making. In addition, in Agency A, back-up tapes are currently used as a storage for e-

mail records that need to be retained for long period of time. While, according to the IT

professionals of Agency A, this method meets the current needs of the organization, this

is, from the records management specialist’s perspective, not a mean to ensure the long-

term preservation of records.

In Agency B, its situation is similar as in Agency A. Employees mostly rely on

the functionalities of Microsoft Outlook to manage their e-mail records. Employees can

also use different strategies to save their e-mail records, as mentioned by the IMO, “older

ones were print and file, and, unfortunately, a lot are kept in email inboxes”. The

interviewed IMO specifies that within Agency B, there is a corporate recordkeeping

system used to manage paper and other electronic records. Indeed, Agency B has several

internal IM and knowledge sharing tools to support the continuity of departmental

operational needs, including shared network drives, RDIMS and SharePoint.

However, the RDIMS is not being fully leveraged as an information management

tool due to a number of factors. One interviewee pointed out by saying that: “There is no

formal quality assurance process for information contained within RDIMS, consequently

   

142  

it is difficult for users to judge the quality (i.e. confidence, reliability, finality,

authenticity, etc.) of the information contained within it and although outgoing e-mails

can be filed in the e-mail inboxes, the RDIMS feature for e-mail management is not

used”.

4.2.1.4. Implementation and compliance  

Since the two agencies are planning to develop an e-mail management policy

and/or guidelines in the near future, there are currently no implementation, training and

compliance structure in place regarding the management of e-mail records.

In Agency B, there is an audit mechanism in place that is conducted in accordance

with the GoC's Policy on Internal Audit as well as the Institute of Internal Auditors

International Standards for the Professional Practice of Internal Auditing. Agency B has

invested considerable efforts to put in place a solid management framework, such as

developing and approving a Performance Measurement Framework, and implementing a

method to self-assess management processes and practices against the requirements of

the Management Accountability Framework (MAF). Each branch is regularly audited,

including the information management sector that is audited every two years. The

objective of the audit is to identify the effectiveness of governance, risk management

processes, and the management and operational controls that are in place to support

Agency B's IM activitivies. The audit report revealed that there are no documented

formal employee training on the use of the systems and policies in information

management. Also, according to the IMO of Agency B, the Corporate Services does not

have the source documents or mandate required to perform an effective quality review of

   

143  

the practices in information management. Also, regarding the IM policies of Agency B, a

communication and change management plan will be important to implement to ensure

that the resulting changes are embraced by the organization. Most of the initiatives

identified to improve information management have a "human component" in addition to

the system component, and by following a formal communication and change

management plan, Agency B will increase the return on its investment. The IMO

mentioned that the tools identified in the audit report have to be developed for the entire

information management program in Agency B and thus, they should be applied to the

management of e-mail records as well.

4.2.1.5. Issues  

Both participants agreed that improvement is needed in their current practice to

ensure the appropriate lifecyle management of e-mail records. The records management

specialist of Agency A stated that e-mail represents a huge challenge to its agency.

Determining which e-mails are records and integrating policies and processes together

with archiving technology are the core of many records programs. An even greater

challenge is enabling consistent e-mail deletion, finding effective strategies for

classifying e-mails records, building a consensus and drive program execution, and

finally ensuring change management strategies to implement enterprise-wide employee

compliance.

The IMO of Agency B concludes that different strategies need to be developed

and implemented to ensure the appropriate management of e-mail records. As mentioned,

paper-based information and some types of electronic records are managed as valuable

   

144  

assets. The information management governance structure, mechanisms and resources

should be in place to ensure the continuous and effective management of information.

Due to the continuously evolving nature of technology, there are opportunities for further

improvement in this area, such as the management of e-mail records. Improvements are

required to provide e-mail records that are accurate, reliable, complete, relevant, and

accessible, which should be incorporated into management/operational decision-making.

She also added that a lack of controls over end-user computing applications including e-

mail messaging system increases the risk to the continuous and effective management of

information which currently relies on commercial software applications. However, when

creating tools to manage e-mail records, an agency must keep in mind to provide

communication, training and change management initiatives to ensure compliance.

Both participants concluded that without appropriate tools, it become harder to

ensure the lifecycle management of e-mail records.

4.2.2. Partial implementation  

This sub-section presents information on two Canadian government agencies

which have started to implement e-mail management policies and guidelines. Indeed, the

two agencies are currently elaborating an e-mail management policy and/or guidelines

and in the process of implementing the policy throughout the agencies.

4.2.2.1 Contextual information on the agencies  

Agency C Agency C was created by an Act of Parliament in 1957 and offers a broad range

of grants and services to professional Canadian artists and arts organizations in music,

   

145  

theatre, writing and publishing, visual arts, dance, media arts and integrated arts

(Government of Canada, Agency C, Overview, n. d.).

To fulfill the agency’s goals and objectives, Agency C has 419 employees

distributed in four divisions), each led by a Divisional Director reporting to the Director

and CEO (Government of Canada, Agency C, Corporate Information, n. d.). Other than

its activities related to finances and general administration activities, the Finance and

Administration Division includes the Information Management Services whose main

responsibilities are preparing, administering and monitoring compliance with policies,

procedures and standards, maintaining and administering the Agency C’s electronic

reporting systems, information technology and telecommunications; ensuring the Agency

C’s compliance with the Access to Information Act and the Privacy Act; safekeeping the

management and storage of all Agency C’s records in all formats (e.g. paper, electronic,

etc.) in accordance with federal policy and legislation; and delivery of services to staff

and researchers through the Agency C’s reference and library collection. The Information

Management Services sub-division is composed of eleven information management

professionals and technicians.  

Since 2001, Agency C has adopted a Governance Policy which establishes the

corporate governance framework for the organization. The objectives of this policy are

to: (1) define Board and Management roles and responsibilities; (2) provide a consistent,

coherent and comprehensive accountability framework which spans the entire

organizational structure; (3) facilitate strategic decision-making for Board and

Management; and (4) heighten Board, staff and external stakeholder confidence in the

stewardship of the Board, the professionalism of Management and the integrity of the

   

146  

organization’s activities and processes (Government of Canada, Agency C, Governance

Policy, 2011, p.1). According to the Governance Policy, Agency C should ensure reliable

information systems and internal control mechanisms to safeguard assets and timely and

accurate accounting data. It should also promote operational efficiency and adherence to

prescribed policies and standards which are in compliance with applicable laws and

regulations. To control internally at the agency, the policies and procedures are

established and implemented alone, or in concert with other policies or procedures in

order to manage and control activities in which the organization is engaged or risks to

which it is exposed (Government of Canada, Agency C, Governance Policy, 2011, p. 18).

Information management policies, including e-mail management, are developed and

adopted in accordance with the Governance Policy.

Agency D

Agency D was created on April 1, 2004. Agency D is mandated to: “encourage

pride and excellence in the public service; foster a common sense of the purposes, values

and traditions of the public service; support the growth and development of public

servants; help ensure that public servants have the knowledge, skills and competencies

they need to do their jobs effectively; assist deputy heads in meeting the learning needs of

their organization; and pursue excellence in public management” (Government of Canada,

Agency D, About us, 2013).

Agency D is headed by a Deputy Minister/President who has supervision over and

direction of the work and 450 employees of Agency D (Government of Canada, Agency

D, Governance Structure, 2013). The activities of Agency D are carried out by three

   

147  

branches and regional offices under the leadership of the Deputy Minister/President's

Office. The Corporate Management and Registration Services Branch is responsible for

corporate management services in the areas of finance, administration, registration, IT/IM

and human resources.

4.2.2.2. E-mail policy and guidelines

Agency C and Agency D are both currently in the process of developing and

implementing an e-mail management policy and/or guidelines. In both agencies, e-mail

messages are used to conduct business but numerous difficulties were identified, such as

the classification, retention, management, retrieval and preservation of email- messages.

In Agency C, the Head of Information Management division specified that “many

employees in the agency suffer the standard human trait of hoarding - in that sense they

keep the majority of emails "just in case" without accurately defining information of

business value (i.e. corporate record) versus transitory information kept for convenience”.

Challenges include also uncontrolled growth of e-mail messages volume, inability to

locate e-mail records for litigation or business purposes, inability to apply disposition

instruments, and finally, lack of more effective repositories to keep those records of

business value and ensure their lifecycle management (e.g. disposition according to

departmental file classification system and retention schedule). Whereas the Director of

Information and Library Management in Agency D has mentioned that the employees

have a tendency of hoarding all e-mails in their inboxes or, at the opposition to delete e-

mail messages that should have been saved as records and used in the conduct of business

activities. Also, they have to cope with the volume of messages, identifying e-mail

   

148  

records, finding information or records in e-mails, sharing e-mail records, and ensuring

the appropriate management of threads and attachments.

To overcome these problems, Agency C is currently developing an electronic

records management policy with a section on e-mail management policy that will provide

the staff with specific principles on e-mail records. This policy includes general

principles that can be applied to all types of electronic records, such as records ownership

and the tools to manage electronic records including retention schedule and classification

structure. The second section of the policy focuses exclusively on the management of e-

mail records and covers the following topics: creation and edition of e-mail messages;

evaluation and selection of e-mails; access and retrieval; preservation, conservation and

disposition; security and confidentiality of information; use of the messaging system, and

finally roles and responsibilities of employees. The policy is currently being developed in

collaboration with other sectors of the agency, namely higher management, legal counsel,

records management/archives, information technology and users.

Agency D has an electronic records management policy that has been developed

and implemented in 2005. However, according to the Director of Information and Library

Management, the policy can be easily applied to electronic records that are kept on the

corporate servers, such as word processing document or excel spreadsheet. However, it

was found to be hardly applicable to e-mail records. Indeed, because of the nature and

use of e-mail records and the necessity to manage other types of electronic records, a

separate e-mail management policy was required to be establishes. In their new e-mail

management policy, specific information needs to be included: (1) e-mail records

ownership; (2) evaluation and selection of e-mails; (3) classification, access and retrieval;

   

149  

(4) security and confidentiality of information; and (5) use of the messaging system.

Hopefully, with establishing a new policy on e-mail management, they will be able to

manage e-mail records throughout their entire lifecycle and destroy messages that have a

transitory value.

Both participants consider that their policies will contribute to establishing the

principles of e-mail management and cover all the issues related to the management of e-

mail records.

4.2.2.3. E-mail system and recordkeeping system  

According to the Director of Information and Library Management division of

Agency D, “the technology plays an important role in the successful management of e-

mail records” as systems can automate certain elements of e-mail management.

Both agencies use Microsoft Outlook to send and receive e-mail messages. Like

other agencies, they used the functionalities of Microsoft Outlook in the messaging

system for organizing and searching. Agency C already has implemented a recordkeeping

system. The electronic recordkeeping system, namely RDIMS, offers functionalities to

ensure the management of the lifecycle of electronic records as well as searching and

protecting of information. With the RDIMS, all types of records can be captured and

managed according to information management policies. However, even if an RDIMS is

implemented within Agency C, there is no consistency on where the e-mail records are

being captured. According to the Head of Information Management Services, the staff

members can save their e-mails records in the electronic recordkeeping system but most

of employees keep their e-mail messages within their e-mail inboxes or still print and file

   

150  

the hardcopy. Employees are using whatever possible means to ensure that the emails are

safeguarded. This lack of consistency causes serious problems with the retrieval of e-mail

records and attachments that are necessary for the conduct of business.

In Agency D, an electronic recordkeeping system is also implemented. The

RDIMS had been in use in approximately a third of the organization. Therefore, like in

Agency C, there is no consistency on how the agency manages its e-mail records. Agency

D is currently implementing GCDocs which is a Government of Canada initiative to

“support the implementation of recordkeeping policies and directives, and an advanced

government-wide recordkeeping regime and establish a hosted government-wide solution

for records and documents management to serve government departments and agencies”

(Government of Canada, Canada’s Action Plan on Open Government, 2012, p. 7). The

solution used is OpenText Content Server that offers different modules to manage

different type of content. One of these modules offers the specific functions to capture

and manage e-mail records. The Director of Information and Library Management

mentioned that once its implementation is completed for paper and other electronic

records, they will implement the module for the management of e-mail records and

hopefully, by automating a few functionalities, the management will become easier.

4.2.2.4. Implementation and compliance

All staff using an e-mail messaging system to conduct business activities needs to

be informed of the electronic messaging policy and the agencies must provide training for

all users to ensure that they understand the policies and agree to abide by them. Both

agencies, while creating and developing their e-mail management policies, are thinking

   

151  

about the means available to facilitate the compliance of the staff and the format of the

training that will be offered to the employees.

In Agency C, the Head of Information Management Services mentioned that they

are planning to use different strategies to disseminate the e-mail management policy (e.g.

an announcement on the agency’s intranet) and provide training sessions to employees.

The training will be organized in small groups and provide specific examples to

employees. The Head of Information Management Services specified that they are

exploring the idea of making the training mandatory. The training sessions will present

the following topics: the general principles of e-mail management, the responsibilities of

each employee, e-mail messages evaluation, classification, and retention and

consequences for not being compliant. Also, in a situation where numerous employees

are often not compliant since it constitutes a burden to manage their e-mail records, he

considers that the agency has a role to play in developing tools or automating certain

functionalities to facilitate the compliance. For example, Agency C intends to develop a

new profile form in the RDIMS that will automatically populate e-mail fields in an effort

to make it easier to save e-mails. However, other mechanisms must be in place to ensure

compliance and process improvement. Agency C is currently exploring monitoring,

mailbox quotas and periodical audit to enforce e-mail management policy to be

compliant. Change management must be considered when implementing e-mail

management tools.

Agency D, like Agency C, intends to publish their e-mail management policy on

the agency intranet as well as provide occasional information sessions to the employees.

The information sessions will present the general principles of e-mail management, such

   

152  

as: responsibilities of each employee, e-mail messages evaluation, classification,

retention, access and security of e-mail records. However, the Director of Information

and Library Management division mentioned that they are not planning to implement a

process to ensure compliance of employees to e-mail management policy, since

“compliance to e-mail policy, other than to minimize the number of emails, is not viewed

as a priority”. Before implementing the e-mail management policy, higher managers will

have to be clearly informed of the impacts on the agency, if not complying with the e-

mail management policy.

4.2.2.5. Issues

Overall, both participants consider that current practices regarding e-mail

management is not appropriate so improvement is needed. The first step taken to improve

their practices is the creation of an e-mail management policy that will provide the

general principles to manage e-mail records within their respective agency. As Agency C,

the Head of Information Management Services explained that:

“a policy guides toward accepted business strategies and objectives. Policies identify the key activities and provide a general strategy to employees on how to handle issues as they arise. This is accomplished by providing the reader with limits and a choice of alternatives that can be used to "guide" their decision making process as they attempt to overcome problems”.

Therefore, the policy is a very important tool to possess to manage e-mail records, since

it allows for consistency in operational activities. Policies also provide clarity to the

employees, when dealing with accountability issues or activities that are of critical

importance to the agency, such as legal requirements or other issues.

Indeed, one issue faced by numerous agencies includes e-discovery that required

that e-mail records can be easily retrieved and that organizations can ensure their

   

153  

integrity, authenticity and reliability. In addition, the Head of Information Services is

preoccupied by vital records that can be contained in e-mail and disaster recovery.

Agency C has back-up policy and disaster plan. However, back-up policies is not a

substitute for a records management program that includes the proper retention of

messages with continuing value to the messages deemed vital for business continuity.

The Director of Information and Library Management division of Agency D

specified that a good e-mail management policy is not enough to ensure the management

of this electronic record. One challenge is to ensure the adequacy between an e-mail

management policy, an electronic records management software application and users.

She added that only when the adequacy is achieved, they will be able to focus on specific

issues, such as long-term preservation or security. Most of all, the basics need to be

implemented first, which is not the case in their current reality.

4.2.3. Completed Implementation  

This sub-section presents information on the other two Canadian government

agencies which have developed and implemented e-mail management policies and

guidelines.

4.2.3.1. Contextual information of two Canadian agencies  

Agency E

Agency E has a mandate to ensure the sustainable development and responsible

use of Canada’s natural resources (Government of Canada, Agengy E, The Department,

2013). Agency E has currently more than 80 divisions and sub-divisions and employed

4500 employees (Government of Canada, Agency E, Organizational Structure, 2013). At

   

154  

the top of the organizational structure, there is the Deputy Minister's Office which is

responsible for the administration of federal and departmental program objective and also

for the overall management of the agency. One sub-division of the Deputy Minister’s

Office is the Corporate Management and Services Sector. The mandate of this sector is to

provide Agency E:

“with a systematic, directional and guiding approach to achieve its strategic and operational objectives through leadership in the areas of Finance, Human Resources, Health and Safety and Emergency Management, Information Management, Information Technology, Access to Information and Privacy, and Real Property through the following four primary roles: (1) Ensuring legislative, regulatory, and policy obligations are identified, understood and met; (2) Providing strategic, functional leadership and guidance; (3) Maintaining oversight and compliance monitoring and reporting; and (4) Enhancing corporate decision-making and management practices in response to (Agency E) business needs” Government of Canada, Agency E, Organizational Structure, 2013).

The Corporate Management and Services sector is then divided into specific units. There

is one unit that groups all information management activities, the Chief Information

Office Branch, with more 73 employees. Among these employees, 26 employees are

working in records management related activities.

Agency F  

Agency F’s mandate is to develop and maintain Canada’s transportation system

(Government of Canada, Agency F, Organization, 2010). The Agency F currently

employed more than 4700 employees (Government of Canada, Agency F, Our People,

2010).

The Corporate Services Group comprises four directorates and four branches

including technology and information management services. The Technology and

Information Management Services Directorate (TIMSD) consists of five branches:

   

155  

Information Management; Computer Operations and Network Services; Application

Management Services; IM/IT Architecture and Planning; and IT/IM Security and

Infrastructure Planning. The Director General of TIMSD is also the department’s Chief

Information Officer. The Information Management Branch’s responsibilities include all

components of IM planning, policy, procedures, monitoring, reporting and training.

Information Management also delivers a full range of services, including electronic

document management, database support, data management, and records and mail

management. IM/IT Architecture and Planning is responsible for all components of

IM/IT architecture, research and development, IM/IT standards and policies, business

transformation and service improvement, as well as IM/IT strategy, vision and

integration. Finally, the IT/IM Security and Infrastructure is responsible for managing the

development and delivery of the IT/IM Security program to identify and mitigate threats,

risks and vulnerabilities; carrying out requirement analysis and business case

development to obtain infrastructure project funding; acting as project technical authority

on approved major and minor IT/IM projects; and directing the lifecycle management of

corporate IT/IM infrastructure.

4.2.3.2. E-mail policy and guidelines  

Both Agency E and Agency F have developed in the past the tools to manage e-

mail records. The creation of tools to manage e-mail records at both agencies resulted in

difficulties and raised issues concerning the management of e-mails messages. In Agency

E, the identified problems were mainly: the ability to identify between e-mail records of

business value versus e-mail records of transitory value; the inability to capture e-mail

messages of business value in a document and records management system; and the

   

156  

ability to ensure the retrieval of e-mail records. While in Agency F, the main difficulties

were to ensure the appropriate retention of e-mail records based on their content and

value and to ensure the long-term preservation of these e-mail records that have an

historical value. As a result, both agencies have developed a policy to manage e-mail

records. Both information management professionals mentioned that the policy was the

result of a complete analysis of the risks and organizational context.

As such, the types of policy that is being used to manage e-mail records are

different in the two agencies. Agency E has developed a separate written e-mail

management policy and guideline. The Chief Information Management of Agency E

explained that before choosing the type of tool to manage e-mail records, the agency

must consider the other type of policy and guidelines used to manage other contents in

the agency, since e-mail messages are one piece of the total enterprise information

management that usually includes all the agency’s electronic contents (e.g. web sites,

intranet, digital images of scanned paper records, presentation files, word processing

files, etc.). Therefore, the chosen type of policy to manage e-mail records must reflect the

organization’s information flow and be included in a more general information

management program.

The e-mail management policy and guidelines of Agency E was first created and

adopted in 2004. The e-mail management policy includes the general principles that have

been adopted from those of the LAC, to ensure the management of e-mail records,

including records ownership, disposition according to the value of the e-mail records, the

capture of e-mail records into a system, management, protection and accessibility of e-

mail records. Their e-mail management guidelines offer step-by-step procedures on how

   

157  

to put the general principles in practice, such as guidelines on how to write effective e-

mail messages; rules on the usage and functionalities of the e-mail system; and the

inappropriate e-mail content and warning of risks. The Chief Information Management

states that the strength of their tools to manage e-mail records comes from the

combination of the policy and guidelines that ensure that the main issues are covered.

The creation of the e-mail management policy and guidelines was made by a multi-

disciplinary team that is composed of IT professionals, lawyers, managers, and

information management professionals. IT professionals intend to ensure that the

hardware and software architecture is appropriate to sustain the management of e-mail

records. Managers intend to ensure that their respective institutions follow the policies,

guidelines and procedures for the capture and management of e-mail. Finally,

information management professionals intend to manage information throughout its

lifecycle in a way that supports sound and timely decision making, maintaining

compliance with legislative requirements and respecting information privacy and security

requirements. In Agency E, the Chief Information Office Branch is responsible for

overseeing e-mail management but the Chief Information Management believes that to

ensure the proper management of e-mail records, different professionals must be

involved.

Agency F developed a written electronic records management policy in 2003.

The Director of the IM/IT Architecture and Planning explained that since different types

of electronic records have been created and used within Agency F, higher management

wanted to create a policy, where principles could be applied to all types of electronic

records including e-mail records. The principles that are covered in their electronic

   

158  

records management policy include records ownership, the retention periods of electronic

records according to their value, the proper management of electronic records by an

electronic records management system, the long-term preservation and accessibility of

electronic records, the roles and responsibilities of employees to ensure the adequate

management of electronic records. According to the Director of the IM/IT Architecture

and Planning, their written electronic records management policy is satisfactory and

covers the main issues related to the use and management of electronic records including

e-mail records. He specifies that the key to the appropriate management of e-mail records

is clearly defining the roles and responsibilities of each category of professionals

involved in e-mail management. As mentioned in the description of Agency E, the IM/IT

Architecture and Planning Department is responsible for overseeing the development and

implementation of e-mail management, because the management of e-mail messages is a

part of a global information management program. In addition, other professionals must

be included in the management process of electronic records due to the impact and issues

associated with e-records such as technology and e-discovery.

4.1.3.3. E-mail System and Recordkeeping System  

Like in the previous agencies, Agency E and Agency F are currently using a

messaging system to conduct business. Both agencies are using Microsoft Outlook as an

e-mail application. Outlook has many features that contribute to viewing, sorting,

searching, protecting and blocking e-mails.

Agency E’s Chief Information Management explained that the functionalities

embedded in the e-mail messaging system are very important within their agency, since

   

159  

no electronic records management system has been implemented. So the employees rely

mainly on Microsoft Outlook to manage their e-mail messages. The employees at Agency

E used the search functions of Outlook to retrieve e-mail messages as well as the

organizing features to sort e-mail messages that have a business value. To protect each

user, each employee has its own e-mail account protected by a password so that only

designated employees can have access to their own e-mail messages and apply the

appropriate retention periods. E-mail messaging system is backed up everyday and kept

for a month in case of a system default.

In addition, in case of emergency, access to the e-mail messages can be provided.

For employees, who are working on shared projects, they must print and file the hardcopy

of their e-mail messages with other records or save e-mail messages to the corporate

server with other electronic records. The Chief Information Management stated that this

practice is, for now, acceptable considering the absence of an electronic records

management system.

In Agency F, employees rely mostly on the RDIMS to ensure the appropriate

management of e-mail records. Indeed, Microsoft Outlook is used to send and receive e-

mail messages. But their management is made through the RDIMS which is used to

capture, manage, store, preserve, and deliver content and documents related to

organizational processes. The RDIMS covers the management of information within the

entire scope of the agency, whether that information is in the form of a paper document,

an electronic file, a database print stream, or an e-mail. RDIMS aims to make the

management of corporate information easier through simplifying storage, security,

   

160  

version control, process routing, and retention. The benefits of this approach to Agency F

include improved efficiency, better control, and reduced costs. The capture of e-mail

records is made possible by integrating Microsoft Outlook with the RDIMS. Therefore,

by clicking a button, it can be automatically transferred to the RDIMS and erased from

the employees’ inboxes.

According to the Director of the IM/IT Architecture and Planning of Agency F,

the indexing components of the RDIMS improve searches and provide alternative ways

to organize the information. The management aspect of the RDIMS comprises several

components which can be used in combination or separately. Document management,

web content management, collaboration, workflow and business process management are

the dynamic part of the information's lifecycle. Records management focuses on

managing finalized documents in accordance with the organization's document retention

policy, which in turn must comply with government practices. In Agency F, for e-mail

management, the main functionalities used within the RDIMS are those related to records

management through a classification plan, record retention schedules and deletion

schedules, the protection and access to information in accordance with its characteristics,

sometimes down to individual content components in the records. With the recordkeeping

functionalities of the RDIMS, e-mail records are not managed in the e-mail messaging

system. However, according to the Director of the IM/IT Architecture and Planning of

Agency F, the e-mail messaging system can cause other difficulties as Microsoft Outlook

is more than simply sending and receiving messages and can offer functions to enhance

connectivity with phones. For example, some managers tend to transfer some of their e-

mail records to other portable applications.

   

161  

4.2.3.5. Implementation and compliance  

For the implementation of an e-mail management program and compliance, both

agencies made sure that their e-mail management policy and electronic records

management policy are disseminated within their agency respectively. In Agency E, the

Chief Information Management mentioned that they use different means to disseminate

their e-mail management policy in order to make sure that every employee is aware of the

policy. For example, they publish their e-mail management policy on the agency’s

intranet so that the current version of the policy is always accessible on the intranet. Also,

when it was first adopted, they made announcements, verbally in employees meeting, but

also a written announcement that was posted in the kitchen near the copy machines. For

new employees, upon their hiring, a copy of their policy is given to them as a part of a

welcoming package.

In addition, both agencies developed training programs on e-mail management.

Agency E and Agency F both offers training to the employees in their respective agency.

The Director of the IM/IT Architecture and Planning of Agency F believes that “you can

devote enormous amounts of time to researching, planning and writing your

organizations e-mail policies, only to see your guidelines fails if you don’t devote an

equal amount of attention to implementation and enforcement.” But before the training

with employees can begin, the Director of the IM/IT Architecture and Planning at

Agency F mentioned that like any other training program in information management,

effective education starts with the managers and executives. Higher management must

   

162  

play a role as policy advocates and enforcers. For a successful strategy of e-mail

management, executive and management must receive training prior to the employee

training in order for them to ask questions and express concerns that they would not feel

comfortable in front of employees. At the IM/IT Architecture and Planning Department

of Agency F, once the management embraces their electronic records management policy

and then if the e-mail rules were introduced to employees, they relied on managers along

with legal and IT teams to conduct ongoing employee education to enforce compliance.

In both agencies, the training program is similar and covered the following topics:

(1) e-mail risks and liabilities facing that agency and employee; (2) e-mail content and

characteristics; (3) e-mail ownership and privacy; (4) e-mail as business records; (5) e-

mail retention and deletion; (6) governmental laws and regulations; (7) e-mail as legal

evidence; (8) security and confidentiality; and (9) netiquette. In addition, only in Agency

F, there is another section that covers e-mail variations and alternative communication

technologies.

In Agency E, since 2009, IM specialists have conducted internal workshops to

help staff manage their workloads of e-mail records. These workshops were organized in

small groups of 7-8 persons working within the same department in order to provide the

examples that are related to the daily activities. At Agency F, the Director of the IM/IT

Architecture and Planning believes that the training sessions are the key to support and

compliance to e-mail management. They first started the training in organizing the

meeting in large groups for each department to present the general principles and

advantages of e-mail management. Other training sessions were organized in small

groups of 5 or 6 persons to explaine how e-mail management can be applicable on a daily

   

163  

basis. After the approval of the departmental IM Policy in April 2010 the unit initiated a

calendar of events that included presentations, training and showcases. The IM team has

provided about 300 training and awareness sessions over two years (2011-2012) and

established an IM Awareness wiki site with on-line training resources. The wiki also

included, such topics as Web 2.0, Knowledge Search, Agency E’s IM Policy, Information

Classification Structure, e-mail management and “To Keep or Not to Keep”. The training

program contributes to ensuring compliance to the e-mail management principles and

guidelines within the agencies.

However, the Chief Information Management of Agency E mentioned, “it’s often

not enough” and other measures of quality control (audit) must also be implemented to

verify the compliance with the e-mail management policy. The audit methodology

developed in Agency E was based on the Treasury Board’s guidelines on internal

auditing and standards defined by the Institute of Internal Auditors. The scope of the

audit included the governance, policy, IM practices and tools at headquarters and in the

regions. The audit focused on the information lifecycle to assess the continuous and

effective management of information and the responsabilities of employees who manage

that information. All GoC employees are responsible for managing their own

information. These responsibilities include (among other things) documenting decisions,

storing, protecting, preserving information at the end of the useful lifecycle of that

information, and following the approved processes for the disposal of information. As a

result, the employees in Agency E are considered being fairly compliant to e-mail

management policy.

   

164  

However, there are still a few “black sheep” in the agency. The Chief Information

Management provided some explanations as to why employees are not fully compliant:

(1) the staff is too busy with its daily activities; (2) there is no mandatory training for e-

mail management; and (3) there are no consequences for not being compliant.

In Agency F, the managers rely on monitoring to ensure compliance to their

electronic records management policy. The Director of the IM/IT Architecture and

Planning explained that “many agencies have implemented electronic message

monitoring technology as a means of detecting illegal activity, including misuse of

corporate resources, discrimination, harassment, or sending messages with prohibited

content”. He added that human resources, in Agency F, developed guidelines to frame

how monitoring can be done. It may include identifying who may approve monitoring,

the procedures for obtaining such an approval regarding who may intercept and view

messages, and procedures and guidelines for handling messages intercepted from the

electronic messaging system, etc. As a result, there is a good level of compliance with

Agency F. Also, the Director of the IM/IT Architecture and Planning specified that there

are consequences for not being compliant to e-mail management guidelines and

information management in general. The consequences can vary, depending on the level

of severity of not adhering to the GoC legislation on information management. It can be

ranged from a verbal warning to termination, depending on the result of monitoring. In

the training sessions, the penalties for violations are clearly stated.

4.2.3.5. Issues  

During the interviews, numerous issues were raised by the participants in both

agencies. The primary issues that were raised are the electronic discovery (as known as e-

   

165  

discovery) and the retrieval of e-mail records. As defined in Chapter 2, electronic

discovery refers as “the process of identifying, preserving, collecting, processing,

searching, reviewing and producing electronically stored information that may be

relevant to a civil, criminal, or regulatory matter” (Grossman and Cormack, 2013, p. 15).

According to the Chief Information Management, Agency E is not well positioned to

respond to a legal e-discovery in a cost effective manner because the department does not

have an efficient e-discovery mechanism. Currently, without an electronic records

management system, there is no way to validate whether the process has captured the

entire set of documents required by the legal process. Without an efficient retrieval

mechanism, employee’s time and costs associated with the retrieval of information can

become excessive. It is possible that, even after a rigorous manual search, a court order

could demand additional information and the cost of additional retrieval that has not been

budgeted for. This issue is significant due to the cost implications associated with each

request and the information retrieval process.

As e-mail records and electronic documents are the primary source of information

to address an e-discovery request, there are a certain numbers of risks that were identified

in Agency E. There is a great dispersion of electronic records. For example, e-mail

records that are kept in each employee inbox attempting to conduct searches in all

locations is a very time and resource intensive process to respond to a request. In addition,

there is a legal risk of not disclosing the proper information in accordance with the

Access to Information request. Furthermore, the agency may have an inability to meet

disclosure deadlines. There is a legal risk of modification of documents. There is also a

concern with the constant updating and transmission of documents through tools, such as

   

166  

e-mail. At the time a legal hold is placed on a file, the related documents must not be

altered. Without a process to “lock” files, there may be no guarantee that the hold

conditions are not violated. Untimely or unreliable document disclosure creates the risk

that litigation strategies will need to be subsequently reconsidered, hampering Agency

E’s legal position and causing increased legal costs.

In Agency F, the Director of the IM/IT Architecture and Planning explained that

e-discovery is not as an important issue as in other agencies, because they have

implemented the RDIMS in which all records in different formats can be captured,

managed and easily searched. Regarding e-mail records, he added that they have an

electronic records management policy and a complete training program to ensure

compliance and the capture of e-mail records in the RDIMS. However, he mentioned that

there is a constant preoccupation with meeting legal requirements and, for e-mail records,

preoccupation becomes more important with the use of portable applications, where e-

mail records can be kept without being captured in the RDIMS. The management of

information at Agency F impacts all lines of business operations and is a key component

of service delivery. In addition to legacy information currently held in all agencies, new

information is being created at an unprecedented rate with different applications. Without

the ability to effectively manage this information, Agency F may be at risk of losing its

ability to identify and retrieve information needed for decision-making in an organized

and timely fashion. This could also result in an inability to meet information requests

from Canadians and to fully support statutory and other mandated requirements for the

handling and safeguarding of information required in the conduct of operations.

The cloud computing and its relevancy to e-mail management are the next

   

167  

important issues that were discussed by the participants. The National Institute of

Standards and Technology defines Cloud Computing as: “a model for enabling

convenient, on-demand network access to a shared pool of configurable resources (e.g.,

networks, servers, storage, applications, and services) that can be rapidly provisioned and

released with minimal management effort or service provider interaction” (Mell and

Grance, 2011, p. 2). Cloud Computing refers essentially to services that are available

online through the Internet. Both agencies are currently interested in cloud computing as

an information management solution for data storage. At Agency F, the Director of the

IM/IT Architecture and Planning explained that considering the amount of information

currently being kept and exchanged in e-mail inboxes, the cloud computing might be an

interesting solution. Also, according to the Chief Information Management of Agency E,

e-mail archiving solutions based in the cloud provide many advantages for them, one of

which is the reduced cost of investing in technology services, as opposed to

implementing the technology. This option is particularly appealing to Agency E, since

they don’t have an RDIMS. However, this option raised a certain number of questions

since, as mentioned by the Treasury Board Canada Secretariat, the government

information being held, processed, or transferred on a "government network", whereas

the cloud computing refers to any acquired services from outside the GoC. Therefore,

numerous risks must be evaluated, such as namely contractual risks, ownership of data,

location, security and data recovery. According to Agency E, there are some important

benefits to cloud computing in costs, performance, and delivery of information

technology services; therefore with continuing budgetary pressures, it is expected that

interest in cloud computing solution will continue.

   

168  

Other important issues discussed by the participants are the security and

confidentiality of information contained in e-mail records. Electronic messaging systems

are an organizational resource to be used in the conduct of the organization’s business.

Agency E and Agency F are looking into cryptography and digital signature to ensure the

protection of information contained in e-mail records and ensure their integrity and

authenticity. When an electronic message is encrypted, only individuals with the

encryption key can view the message. There are two main types of cryptography offering

differing levels of security. Besides encrypting messages, another important application

of public-key encryption is digital signature. The use of a digital signature can

authenticate the other party (e.g. sender or receiver of messages). The use of these

technologies will necessitate another policy and guideline to frame their use, but both

participants think that it could add another layer of protection for e-mail records.

The last issues that were discussed by the participants are long-term preservation

and storage of e-mail records. Electronic messaging systems are designed to get messages

from one recipient to another and not serve as a recordkeeping system. At Agency F, the

Director of the IM/IT Architecture and Planning addressed that a process must be

established to support the movement of official records to a repository that allows longer

retention of records and associated metadata. In GoC, all records that have a historical

value, whether in paper or electronic format, need to be transferred to the LAC. However,

before it can be transferred to LAC, a strategy must be thought of to ensure the

accessibility of e-mail records. The Chief Information Management of Agency E stated

that “in general, a good practice is to retain the message in its original or “native” format.”

   

169  

His perspective seems very important enough to raise questions to be answered regarding

file format choices, media selection, obsolescence, and migration.

The findings of the six in-depth interviews are summerized in Table 4.2.

Table 4.2. Summary of the six in-depth interviews on e-mail management practices and variations

Category Agency

A B C D E F

Contextual characteristics

• 200 employees; • Library, Archives and

Documentation Services composed of 11 employees.

• 225 employees; • IM/IT Division

responsible for information management governance.

• 419 employees; • Information

Management Services composed of 11 employees.

• 450 employees; • Corporate Management

and Registration Services Branches responsible of information management.

• 4500 employees; • Chief Information Office

Branch, with more 73 employees, with 26 employees working in records management related activities.

• 4700 employees; • Technology and

Information Management Services Directorate responsible for all information management activities.

E-mail policy and guidelines

• No policy or guidelines to manage e-mail;

• No common understanding of the value of e-mail messages;

• Difficulties with retrieval; • Limites inbox sizes so

random purges of e-mail messages;

• Has a general information policy.

• No policy or guidelines to manage e-mail;

• No evaluation of e-mail messages;

• Retrieval difficult; • Has a written electronic

records management policy.

• Developing e-mail management policy;

• Difficulty managing lifecycle of e-mail records;

• Difficulty managing threats and attachments;

• No common understanding of the value of e-mail messages;

• Policy developed in collaboration with other professionals.

• Has a written electronic records management policy;

• Developing a section of the management of e-mail records.

• Difficulties regarding the value of e-mail messages;

• Inability to capture e-mail messages;

• Difficulties in the retrieval of e-mail records;

• Risks analysis to develop appropriate tools;

• Adopted a specific e-mail management policy in 2004.

• Ensuring the appropriate retention of e-mail records;

• Developed a common understanding of the value of e-mail messages;

• Risks analysis to develop appropriate tools;

• Adopted an electronic records management policy in 2003 that covers e-mail management.

E-mail system and Recordkeeping

system

• Use Microsoft Outlook and its features (viewing, sorting and searching);

• No recordkeeping system due to lack of funding;

• Users save and manage e-mail messages in multiple storage places;

• Back-up tapes used as a

• Use Microsoft Outlook and its features (viewing, sorting and searching);

• Has IM and knowledge sharing including recordkeeping system but not fully implemented.

• Use Microsoft Outlook and its features (organizaing and searching);

• Has a recordkeeping system but still no consistency in managing e-mail records.

• Use Microsoft Outlook and its features (organizaing and searching);

• Has a recordkeeping system but still no consistency in managing e-mail records.

• Use Microsoft Outlook and its features (viewing, sorting and searching);

• No recordkeeping system.

• Use Microsoft Outlook and its features (viewing, sorting and searching);

• Use a recordkeeping system to capture, store, manage and preserve e-mail records.

   

171  

Category Agency

A B C D E F

E-mail system and

Recordkeeping system cont’d

preservation medium.

Implementation and compliance

• No implementation, training and compliance structure in place regarding the management of e-mail records.

• No implementation, training and compliance structure in place regarding the management of e-mail records;

• Raised the importance of change management.

• Will use different means of dissemination;

• Training may be mandatory for e-mail records;

• Will develop tools to ensure compliance and process improvement;

• Raised the importance of change management.

• Will use different means of dissemination;

• Plan to offer training sessions;

• No tools will be developed since e-mail management is not viewed as a priority.

• Used different means of dissemination;

• Training programs adapted to each employee;

• Compliance tool: auditing.

• Used different means of dissemination;

• Training programs adapted to each employee;

• Compliance tool: monitoring;

• Implemented consequences for not being compliant.

Major issues

• Ensuring the lifecycle management of e-mail records;

• Integrating policy and technology;

• Building a consensus among stakeholders.

• Ensuring communication, training and change management;

• Ensuring the lifecycle management of e-mail records.

• Importance of the policy to ensure effective e-mail management;

• E-discovery; • Vital records and

disaster recovery.

• Ensuring adequacy between policy, systems and users;

• Ensuring the lifecycle management first before more complex issues.

• E-discovery; • Cloud computing; • Security and confidentiality; • Long-term preservation.

• Management of e-mail records kept in portable applications;

• Cloud computing; • Security and

confidentiality; • Long-term preservation.

   

172  

The findings from the in-depth interviews with six information management

professionals have led us to examine the variations in managing e-mail records in

different Canadian government agencies. The findings show that the use of e-mail

messaging system to conduct business can lead to several difficulties regarding the

classification, retention, management, retrieval and preservation of e-mail messages.

Developing an e-mail management policy and/or guidelines can contribute to an effective

management of e-mail records. However, the participants suggest that to be effective, the

tools developed to manage e-mail records must be adapted to the organizational context

and information flow of an organization. In addition, the results suggest that the

management of e-mail records must be included in the overall information management

program and include different components: policy and/or guidelines, recordkeeping

system and users compliance.

4.3. Results of the research questions

Our research aims to develop a better understanding of how e-mail records are

managed in Canadian government agencies and to identify the characteristics that support

the management and preservation of e-mail records to ensure their reliability, authenticity

and integrity. The summary of the results described in this section provides answers to

our four research questions: (1) What are the general principles of the e-mail

management policies and guidelines within Canadian government agencies?; (2) To what

extent are these e-mail management principles implemented in the federal agencies?; (3)

What are the variations and similarities of e-mail management practices across federal

agencies? To what extent are they effective?; (4) What are the current practices to

   

173  

manage e-mail messages in order to ensure the reliability, authenticity and integrity of

this specific type of electronic records in federal agencies?.

4.3.1. Results of the first research question: What are the general principles of the e-mail management policies and guidelines within Canadian government agencies?

The first research question has led us to develop a comprehensive portrait of the

general principles of the e-mail management policies and/or guidelines at the

Government of Canada. The results first highlighted that e-mail is widely use as a

business communication tool within the Canadian government agencies. However, the

use of e-mail has led to difficulties regarding its management. Challenges related to e-

mail management have been identified by respondents, such as areas on retention, capture,

retrieval, overload, sotorage and discovery of e-mail records. Another specific e-mail

challenge identified by respondents is the absence of a common understanding of the

value of e-mail records among professionals involved in the management of e-mail

records.

To define the use and management of e-mail records, the establishment of an e-

mail policy and/or guidelines was deemed essential. In addition, a typology of policies

and/or guidelines used within the Canadian government agencies was identified: (1)

information management policy; (2) electronic records management policy; (3) electronic

records management policy that addresses e-mail management and (4) specific e-mail

management policy. Organizational factors such as functions, activities and available

resources seem to influence the type of policy used to manage e-mail records. The

principles to manage e-mail records include: e-mail records ownership; recognized

   

174  

records management system; retention and disposition of e-mail records; storage,

protection and accessibility of e-mail records. However, the results show that, according

to respondents, the principles contained in e-mail management policy and/or guidelines

should be expanded to include other specific issues: defining roles and responsibilities of

professionals (records managers and IT) and users involved in e-mail management,

training, e-mail etiquette, creation and edition of e-mail records and compliance to e-mail

management policy and guidelines.

4.3.2. Results of the second research question: To what extent are these e-mail management principles implemented in the federal agencies?

The second research question has brought us to describe the implementation of

the e-mail management principles in the selected government agencies. The results

indicate that technology, namely the electronic messaging system and the electronic

recordkeeping system, is used to manage e-mail records. While all agencies have access

to an electronic messaging system, the results showed that the use of an electronic

recordkeeping system has been inequal across agencies and have resulted in different

practices to manage and save e-mail records. These different practices indicate that there

is a lack of consistency in managing e-mail records within agencies were and may hinder

the integrity and authenticity of e-mail records.

To ensure the implementation of e-mail management principles, agencies rely on

dissemination and compliance tools to support e-mail management principles. The results

show that the level of compliance varies across agencies and the tools used to ensure

compliance do not seem to be standardized. The respondents identified different means to

ensure compliance: auditing, monitoring, quality control, quotas and automatic tools.

   

175  

However, these means are often not implemented in agencies. In addition, user’s training

was identified by respondents as being a real challenge since, often, no training program

exists in agencies. Also, measures for non-compliance to e-mail management policy

and/or guidelines are often absent in agencies. For respondents, it appears that a

combination of methods to ensure compliance tends to be a more successful approach,

when awareness to e-mail management challenges are raised within the agencies.

4.3.3. Results of the third research question: What are the variations and similarities of e-mail management practices across federal agencies? To what extent are they effective?

The third research question has led us to examine the variations and similarities in

managing in e-mail records in different Canadian government agencies.

The findings have highlighted differences in managing e-mail records in

interviewed agencies. We must remind that the agencies were selected based on their

different level of implementation of e-mail management policies and guidelines: (1) two

agencies that have not implemented any e-mail management policies (agencies A and B);

(2) two agencies that have initiated the implementation of such policies (agencies C and

D); and (3) two organizations that have fully implemented e-mail management policies

and guidelines (agencies E and F). The results from two agencies which have not

developed an e-mail management policy indicate that the use of e-mail messaging system

can lead to several difficulties regarding the classification, retention, management,

retrieval and preservation of e-mail messages leading to an interest in developing a new

e-mail management policy. Two agencies which are currently developing an e-mail

management policy and guidelines aim at ensuring the effective management of e-mail

records. However, the participants suggest that to be effective, the tools developed to

   

176  

manage e-mail records must be adapted to the organizational context and information

flow of an organization. In addition, the management of e-mail records must be included

in the overall information management program. Finally, two agencies which have

developed an e-mail management policy proved that to be successful, e-mail management

solutions must include additional components: policy and/or guidelines, recordkeeping

system and users compliance. The results suggest that managing e-mail records should be

considered with a holistic approach.

Regarding similarities, the results show that there are also commonalities across

the six interviewed agencies from their addressed issues. It appears that the e-mail

management challenges faced by information management professionals in the six

agencies are similar. Indeed, issues related to evaluation, retrieval, storage, e-mail

overload, management of threads and attachments, retention, classification and long-term

preservation of e-mail records were addressed by participants. In particular, the absence

of a common understanding of the value of e-mail records is a recurring theme across

agencies. To the interviewed agencies, these challenges seemed to have been the reasons

for developing and implementing e-mail management policies and/or guidelines as well

as associated tools.

4.3.4. Results of the fouth reseach question: What are the current practices to manage e-mail messages in order to ensure the reliability, authenticity and integrity of this specific type of electronic records in federal agencies?

The fourth research question has led us to create a portrait of the current practices

of e-mail management in federal agencies. The results highlighted four units to consider

in e-mail management: (1) e-mail management policy and/or guidelines; (2) electronic

   

177  

messaging system and electronic recordkeeping system; (3) implementation and

dissemination; and (4) associated issues.

Regarding the e-mail management policy and/or guidelines, while the

establishment of an e-mail policy and/or guidelines in defining the use and management

of e-mail records was deemed essential, in reality, not all agencies have developed and

implemented this kind of tool. For agencies that have not developed or implemented a

policy or guidelines, it appears that a lack of awareness of e-mail management and the

value of e-mail records may impact the management of e-mail messages. For the agencies

that have an e-mail management policy and/or guidelines, the results show that some

participants feel that their policy is inadequate to ensure the appropriate management of

e-mail records. Because the principles are limited, they should be expanded to cover

more issues to ensure the management of the lifecycle of e-mail records. For the agencies

that are satisfied with their current e-mail management policy and/or guidelines, it seems

that the fact that it was developed by a multi-disciplinary team and included in a more

general information management program, may have a positive effect on the content of

the policy. The results show that the policy seems to improve the overall quality of e-mail

management.

Furthermore, the results suggest that the e-mail management policies and/or

guidelines must be supported by proper implementation and use of an electronic

messaging system and/or electronic recordkeeping system. The results show that, since

all the interviewed agencies have access to an electronic messaging system, the system’s

functionalities are used to facilitate the management of e-mail records. However, the

results indicate that the functionalities of an electronic messaging system are not adapted

   

178  

to ensure the lifecycle management of e-mail records. More than half of interviewed

agencies have access to an electronic recordkeeping system that contains functionalities

related to records management, such as classification plan, retention schedules, protection

and access, retrieval and metadata. While the functionalities of an electronic

recordkeeping system can contribute to ensuring the authenticity and integrity of e-mail

records, the implantation of this software is inequal across agencies.

The third component, implementation and dissemination, seems to be difficult in

many interviewed agencies. The results suggest that, to be successful, the dissemination

and training should be carefully planned, adapted to the audience and the organizational

context as well as receive the approbation of higher management. The training should

cover a variety of topics, such as liabilities facing the agency and employee; e-mail

content and characteristics; e-mail ownership and privacy; e-mail as business records; e-

mail retention and deletion; governmental laws and regulations; e-mail as legal evidence;

security and confidentiality; and netiquette. The results highlighted also the need to

develop additional tools to ensure compliance of users.

Finally, the results have shed light on issues faced by the interviewed agencies

that must be adressed in e-mail management. These issues include electronic discovery,

disaster discovery, portable application and long-term preservation.

The results are further discussed in the next chapter.

Summary  

This chapter presented the results that provide answers to our research questions.

   

179  

First, we examined the e-mail management principles and implementation across

Canadian government agencies. The analysis revealed that e-mails are recognized as

important in the government agencies to conduct business. However, the volume of

messages increased as well as a lack of common understanding of the value of e-mail

messages have led to difficulties in managing and preserving this type of records. The

establishment of an e-mail management policy and the implementation and use of e-mail

messges systems for managing them are deemed important.

Second, we examined the differences and similarities of managing e-mail records

in six government agencies. The findings indicated that e-mail management tools must be

developed in cohesion with the organization’s information management program. The

tools must be developed in collaboration with other professionals and must include

different components. In the next chapter, we interpret and discuss the main results

obtained during our study, based on the objectives of this research, and suggest a

framework for a comprehensive e-mail management program.

   

180  

CHAPTER V. DISCUSSION

This research examines how e-mail records are managed in Canadian government

agencies and how e-mail management tools are implemented in six agencies. For the

purpose of this study, four research questions were postulated to seek a better

understanding of e-mail management as the following: (1) the general principles of the e-

mail management policies and guidelines within Canadian government agencies; (2) the

level of implementation of these e-mail management policies; (3) the variations and

similarities of e-mail management practices across federal agencies; and (4) the current

practices to manage e-mail messages in order to ensure the reliability, authenticity and

integrity of records. This chapter interprets the results based on these research questions.

The discussion is organized into three sections. First, we reflect on the challenges raised

from the use of e-mail as a communication tool to conduct business activities and the

management of e-mail records within Canadian government agencies. In the second

section, we suggest a framework for a comprehensive e-mail management program.

Finally, we propose a policy model to manage e-mail records that takes into account the

specific characteristics of e-mail records and the reality of the studied government

agencies.

5.1. E-mail Management Challenges  

The data analysis has shown that numerous issues or challenges need to be

addressed when managing e-mail records. The issues are divided into four categories: (1)

records management; (2) legal; (3) systems; and (4) users and compliance issues.

   

181  

5.1.1. Records Management  

As previously mentioned, many governments including the Government of

Canada (GoC) are moving toward electronic records as the preferred record of business.

The Library and Archives Canada (LAC) states that “99.9% of government records are

digital” (Government of Canada, Library and Archives Canada, 2011). More importantly,

the GoC provides more and more services through web-based applications and, as a

result, performs more operations through e-mail. More than “70% of GoC business is

now conducted by e-mail and as a result, the GoC sends globally 18 million e-mails per

day” (Government of Canada, Library and Archives Canada, 2011). Therefore,

appropriate e-mail management has become critical within the information accessibility-

and accountability-driven environments.  

The results have shown that legal value of e-mail records is not always recognized

and accepted among professionals involved in electronic records management, such as IT

professionals, lawyers, management and users. Organizations must recognize that an

electronic message can qualify as a record (ARMA, 2012). For an effective management

of e-mail records, a common understanding of what constitutes an electronic record is a

prequisite. Concerning the management of e-mail records, Smallwood (2013, p. 179)

argues that e-mail management must focus on the electronic information (e-information)

lifecycle phases. As such, the Government of Canada has developed the Information

Management Life Cycle that has seven stages: (1) planning; (2) collection, creation,

receipt and capture; (3) organization; (4) use and dissemination; (5) maintenance,

protection and preservation; (6) disposition and (7) evaluation to ensure the appropriate

management of its electronic records. In accordance with the Policy on Information

   

182  

Management, federal government agencies (institutions) are obligated to collect, create,

receive and capture all business related records including e-mail messages (e-mail) that

contain “corporate memory information or data used to make a decision or to initiate an

action”(Government of Canada, Library and Archives Canada, 2008, p. 9). As a result,

LAC has introduced, in 2008, the E-mail Management Guidelines to guide agencies in

the development of policies and procedures for the appropriate management of the

lifecycle of e-mail records and TBS has adopted, in 2009, the Directive on

Recordkeeping to ensure “effective recordkeeping practices” at the GoC.

Nevertheless, numerous issues were raised by participants regarding the

management of the lifecycle of e-mail records, namely apparaisal, classification,

retention, management, retrieval and preservation of e-mail messages. As such, during

interviews, five out of six agencies identified difficulties regarding the classification of e-

mail records to facilitate the management and retrieval of e-mail records. In addition, four

participants specify the difficulty of assigning retention periods to e-mail records

contained in employees mailboxes. It is now widely accepted that e-mail messages

pertaining to the business of the government are records and, as such, must be preserved

for a specific amount of time or kept permanently in accordance with legislation

(Government of Canada, Library and Archives Canada, 2008). While some types of

records must be preserved for a minimum period of time, other types are subject to longer

retention periods, after which they must be disposed of by law. Government agencies

should keep only active records, dispose e-mail records based on their value

(administrative, legal, financial, informational, historical), and retain the active records

according to their retention and disposal schedules. Finally, throughout the entire

   

183  

lifecycle of an e-mail record, it should be stored, protected, and accessible when

necessary.

In order to ensure the management of the entire lifecycle of e-mail records,

several authors have discussed in the literature that effective records management

requires the creation and implementation of a policy as addressed in Chapter 2

(Gurushanta and Smallwood, 2012; Saulnier, 2005; Flynn and Kahn, 2003; Périat, 1997).

The results of the research showed that the Canadian government agencies developed

different kind of policies and guidelines to manage e-mail records, ranging from general

information management policies to specific e-mail management policies, depending on

each agency organizational structure, technology and business needs. Among

participants, it is widely accepted that an e-mail management policy and/or guideline is

an important tool for effective management of e-mail records.

However, the practices vary among agencies as some of them don’t have an e-

mail management policy and thus failed to capture and manage e-mail records according

to laws and regulations as well as business needs. With e-mail records, effective e-mail

management must be enclosed in a policy and/or guidelines, since the process of

managing e-mail begins with users, at their own desktops, making decisions about what

e-mail messages to delete, or keep and where to file them. In addition, the content of the

policies and guidelines also tend to vary across agencies and their practices vary, too.

5.1.2. Legal  

Agencies’ e-mail management policies and usage must comply with the laws and

regulations of the jurisdictions in which they are conducting business. In Canada,

   

184  

according to Gurushanta and Smallwood (2012),

“there are six areas of law applicable to the management of paper and electronic records: (1) the laws of evidence applicable to electronic and paper records; (2) national standards of Canada concerning electronic records; (3) the records requirements of government agencies; (4) the electronic commerce legislation; (5) the access to information and privacy laws; and (6) the guidelines for electronic discovery in legal proceedings” (pp. 32-33).

Each of these areas of law affects records and information management, just as they are

affected by the laws governing the use of records as evidence in legal proceedings - the

laws of evidence.

Under the rules of discovery, parties in a legal matter can request all relevant

records and information from each other, including electronic records and e-mail. The

failure to preserve and present relevant information can result in sanctions and adverse

rulings for the offending organization (Martin, 2012). “Electronic discovery (also called

e-discovery or ediscovery) refers to any process in which electronic data is sought,

located, secured, and searched with the intent of using it, as evidence in a civil or

criminal legal case” (Grossman and Cormack, 2013, p. 15). According to Hrycko and

Rothman, the nature of electronic records makes it well-suited to investigation because it

can be electronically searched with ease (2013, p. 2). Furthermore, electronic records are

difficult and almost impossible to destroy, particularly if it gets into a network and a

backup is made. In the process of electronic discovery, electronic records of all types can

serve as evidence such as text, images, databases, Web sites. Martin argues that “e-mail

can be an especially valuable source of evidence in civil or criminal litigation, because

people are often less careful in these exchanges than in hard copy correspondence, such

as written memos and postal letters” (Martin, 2012, p. 188).

   

185  

Our research has shown that some agencies are worried about electronic

discovery, mentioning that legal hold is difficult to apply since there are no uniform

methods to organize e-mail records, and retrieval was also hard to achieve. As

recommended by Hrycko and Rothman (2013), organizations should have formal

(documented) policies and procedures in place to identify, preserve, and produce records

in any format in response to discovery proceedings. The policies and procedures should

specifically address how to handle e-mail in compliance with a legal hold. Organizations

with technology-enabled legal hold processed should consider integrating automated

processes into the organization’s e-mail system to manage e-mails affected by legal holds

(ARMA, 2013).

In addition, in most jurisdictions, messages sent over the agency’s systems are the

property of the agency and the agency should set a policy to ensure that the messages sent

and received over the system are secure, that their authenticity can be assured, and that

the use of the system does not compromise the integrity of the agency. Information

management programs are usually developed with legal counsel to address privacy and

security issues. A risk assessment with respect to privacy and security needs to be

identified and addressed regarding improper disclosure of information, integrity of the

data, and systems safeguards (ARMA, 2009). The needs analysis must take into

consideration any regulatory requirements governing the organization’s industry and

location, as well as considerations such as the size and culture of the organization. For

Canadian government agencies, the risks are evaluated through the Management

Accountability Framework (MAF) developed by the Treasury Board Canada.

Implemented in 2003, each agency is assessed under 14 areas of management including

   

186  

people management, financial management, internal audit, etc. (Government of Canada,

Treasury Board of Canada Secretariat, 2011). All major federal departments and a third

of small agencies are assessed on an annual basis, which represents 45 to 50

organizations each year. Smaller organizations are assessed on a three-year cycle using a

more targeted approach to reduce the burden of the exercise on them (organizations have

between 150 and 499 employees and an annual budget of at least $300 million)

(Government of Canada, Treasury Board of Canada Secretariat, 2011). Despite the risk

assessments, concerns regarding security and confidentiality were raised by the

participants.

The agencies must also consider the security and confidentiality of information in

the form of e-mail, attachments, or linked documents that reside on third party servers.

The electronic messaging policy should include ways to ensure the protection of

information and make a distinction between public and confidential information. E-mail

that contains sensitive information must be subject to the same standards and precautions

as afforded information in any other medium. The e-mail system should not be used to

transmit messages that contain confidential business information, information covered by

privacy regulations, or other sensitive information. Employees should be made aware of

information confidentiality as it applies to e-mail. Many jurisdictions have developed

privacy regulations that govern the transmission and retention of personal information. In

Canada, the Personal Information Protection and Electronic Documents Act (PIPEDA),

updated in 2006, protects personal information that is collected, used, or disclosed in

certain circumstances by providing for the use of electronic means to communicate or

record information or transactions. Privacy legislation and regulations change as new

   

187  

technologies are employed and new privacy concerns come to the surface, as privacy

issues are addressed in courts. Organizations need to stay on the top of new requirements

in the jurisdictions in which they do business.

5.1.3. Systems  

A corporate recordkeeping system is considered a very important tool in order to

manage efficiently e-mail identified as records by the participants in this study.

The results of the study showed that a certain number of Canadian government

agencies are using the electronic messaging system to manage their e-mail records. An

electronic messaging system is a “one or more computer applications used to create,

receive, and transmit messages and other documents electronically. It differs from other

computer applications in that its purpose of communication, along with the collecting and

conveying of context information” (ARMA, 2012, p. 2). Electronic messaging systems

vary in their structure and functionalities: message creation, transmission, storage of

messages, research, and security. E-mail systems continue to evolve at a rapid rate

(Government of Canada, Library and Archives Canada, 2011).

However, even if electronic messaging systems allow for some automatic

functionnalities, an evaluation of the content of messages should be done. In addition, as

mentioned by Agency C, e-mail messaging systems should not be subjected to periodic

and indiscriminate purges of messages, either by manual or by automated means, whether

by users themselves or by system administrators. Messages should only be deleted or

disposed of in accordance with agency approved disposition schedules and must not be

disposed of simply because the inbox is full or because the messages have aged beyond

   

188  

some arbitrary time limit (Saffady, 2013; Prom, 2011; Franks, 2004). The electronic

messaging systems are not designed to ensure the appropriate management of e-mail

records. As such, effective records management may require conversion or migration to a

more appropriate system. These practices can have serious implications for agencies. E-

mails and their attachments as official records must be retained and managed securely in

order to support regulatory compliance and satisfying business needs (ARMA, 2013;

Enneking, 1998). Failure to produce such documentation in a timely manner can result in

legal problems. Moreover, the actual process of searching unmanaged and unclassified e-

mails can be an enormous financial burden on the government agencies. Therefore, other

systems should be used to accomplish these functions.

To provide an infrastructure for records managements systems, including e-mail

messages, the GoC has identified an overwhelming and urgent need for an electronic

document and record management (EDRM) system to meet the needs of its diverse users,

comply with regulatory standards, ensure the management of the entire lifecycle of

records, and control the significant costs associated with meeting these requirements.

This approach is supported by Shupe and Behling (2006), who recommended that

installing one integrated records management system that includes e-mail management is

greatly effective across multiple departments within an institution. GoC has developed an

integrated system, called Records, Documents and Information Mangement Sstem

(RDIMS) (Government of Canada, Treasury Board of Canada Secretariat, 2007). The

Treasury Board of Canada Secretariat has chosen and established the RDIMS as the suite

of applications for records and document management in the federal government as part

of the Shared Systems Initiative. RDIMS is an electronic document and records

   

189  

management solution designed to manage documents and records throughout their

lifecycle and facilitate the sharing of information within departments and across the GoC.

RDIMS integrates “commercial-off-the-shelf software applications to operate as a single,

seamless application in an electronic work environment” (Government of Canada, Public

Works and Government Services Canada, 2006, p. 1). The system establishes corporate

repositories for the effective implementation of information policies, and provides

various functionalities to capture, manage, and share records until it no longer have value.

The RDIMS solution combines functionality for “document management, records

management, workflow, routing, imaging, and reporting” (Government of Canada, Public

Works and Government Services Canada, 2006, p. 1). Through RDIMS, all kinds of

documents and records can be created, managed, searched, preserved, and accessed,

including word-processing documents, e-mail messages, spreadsheets, presentations,

images, photos, and forms (OpenText, 2012). However, RDIMS has had limited success

within the Canadian government. As a result, a new government-wide recordkeeping

system, called GCDocs, was developed to manage all information coming from different

channels such as e-mail records. For different reasons, the implementation of this system

is inequal across agencies.  

The results showed that systems used across government agencies are different

and illustrate a lack of consistency in practices, whereas some agencies have access to an

electronic records management system that ensures the management of e-mail records

throughout their entire lifecycle and other agencies use an e-mail messaging system to

manage e-mail records.

   

190  

5.1.4. Users and compliance  

This study found that an e-mail management policy and an electronic records

management system with its functionalities can contribute to an effective management of

e-mail records. However, the findings of this study stressed the importance of training

and ensuring compliance to e-mail management tools.

Dissemination of an e-mail management policy is as important as implementation.

As shown at the GoC, different means should be used to disseminate the e-mail

management policies and procedures to reach as many users as possible, whether by

diffusion on the agency website or by the mean of training (ARMA, 2013). In addition,

top managers at government agencies must support e-mail management policy and

emphasize its importance within the organization. Different kinds of professionals are

also involved in the process of e-mail management, such as IT professionals and

information management professionals, because e-mail management cannot be separated

from records management or from computer systems.

Employee training is raised as an essential aspect for effective e-mail

management. In the current practice, GoC tends to rely heavily on employees’

responsibility to manage e-mail messages. The likelihood that employees will actually

perform e-mail management may depend on the training that employees receive.

However, our study shows that GoC does rarely provide a specific guideline on e-mail

management training or that there is only a section dedicated to training in their e-mail

management policy. LAC recommends that training take a different shape or form by

using different media (Government of Canada, Library and Archives Canada, 2008, p.

   

191  

24). However, the implementation of different training programs was observed in one of

the studied agencies.

In addition, according to the Association of Records Managers and

Administrators (ARMA), “organizations must have mechanisms in place for enforcing

the messaging policy and for taking appropriate action against employees who violate it”

(2013, p. 38). Thus quality control programs are necessary to verify whether employees

correctly recognize e-mail records and file them in compliance with the official e-mail

records management policy. As such, the TBS has developed a Guideline for Employees

of the Government of Canada: Information Management (IM) Basics that with the

introduction of the Policy on Information Management (2007), the Directive on

Information Management Roles and Responsibilities (2007) and the Directive on

Recordkeeping (2009). They have been designed to help all GoC employees understand

their roles and responsibilities in managing information resources effectively regardless

of the medium, including data and information in e-mails and documents produced in

word-processing systems. According to these guidelines, all employees are accountable

and responsible for ensuring quality of information in their area of responsibility at all

stages of information lifecycle; in addition, employees must follow the advice and

guidance of information professionals with regard to the creation of accurate, complete,

reliable, authentic, and accessible information. However, as Sprehe and McClure (2005)

have pointed out, training is often insufficient. It is necessary to raise awareness within

GoC regarding the importance of implementing e-mail management training and

appropriate quality assurance at government agencies, which should be further examined

and implemented.

   

192  

In relation to compliance, an effective training program minimizes compliance

problems related to employees’ not knowing what is and is not expected of them. Though

some agencies have implemented recordkeeping and/or records management systems to

manage corporate e-mails, according to the respondents, many employees seems not to

use them because of tedious office procedures and lack of sufficient training in their use.

To increase the level of compliance to e-mail management policies and guidelines, the

majority of the respondents have implemented different methods to ensure compliance. In

some circumstances, risk factors may justify more enforcement efforts. Considering that

electronic messaging systems are a corporate resource and that the organization has the

right to monitor and control their use, there are other means for monitoring compliance

available. In reality, at the GoC, few participating agencies have implemented solutions

to ensure compliance. However, some agencies (agencies B, E and F) are relying on

periodical audit in conformance with the Management Accountability Framework

developed by the Treasury Board of Canada Secretariat that contributes to evaluating

information management in government agencies.

In summary, the results of the analysis show that e-mail messaging system is used

widely within the GoC to conduct business activities and that e-mail records are

recognized as important business records. In addition, the participants in this research

agreed that it is crucial that e-mails should be managed properly. The results have shown

that different challenges must be overcome to manage e-mail records. As suggested in

this research, four kinds of issues have been addressed. The records management issues

include the appraisal, classification, retention, management, retrieval and preservation of

e-mail records and the creation of tools to ensure their management, such as an e-mail

   

193  

management policy. Legal issues include security, confidentiality, e-discovery, and

privacy. System issues are related to the use of an electronic recordkeeping system and its

features to ensure the proper management of e-mail records. Finally, users-related issues

raised proper training, compliance and enforcement of e-mail management tools.

5.2. Framework for a comprehensive e-mail management program and implementation  

Based on the results of this study, this research highlighted five components of e-mail

management that must be aligned in a comprehensive e-mail management program.

5.2.1. Five components for an e-mail management program  

Five components must be addressed and aligned in an e-mail management program as

shown in Figure 5.1. The five components identified are the following:

1. Legal and Organizational Requirements: Laws and regulations have an impact on the ways in which governments and organizations in general conduct business. Also, laws and regulations affect the way in which organizations create and use records since records form the basis for legal evidence. In addition, each organization has its own organizational culture. Therefore, understanding how to manage records, particularly electronic records, requires understanding the legal and organizational environment. 2. Records Management Requirements: Records need to be managed in an appropriate way so they can be accessed and used in the course of daily business functions throughout the organizational environment and served as legal evidence. The way that records, including electronic records, are managed throughout their lifecycle is formalized into the policies and practices of the records and information management program. 3. Systems Requirements: Technology is used to create, transmit and manage electronic records such as e-mail records. To ensure the implementation of records management policies, functionalities of systems used within the organizations must be investigated to evaluate the compatibility of the systems with the e-mail management program’s objectives. 4. Training Requirements: Records management, more specifically e-mail

   

194  

management, is reliant on the participation of users. Therefore, the users requirements must be addressed in a complete e-mail management program to understand the e-mail management policy and guidelines as well as to use the electronic messaging systems effectively and appropriately. 5. Auditing and Compliance Requirements: Records management activities, such as e-mail management, must be reviewed (1) to ensure that sufficient policies, training programs and controls are in place; (2) to comply with all operational and legal, obligations and; (3) to identify the improvements that should be made.

Figure 5.1. Components for an e-mail management program

E-MAIL MANAGEMENT PROGRAM

LEGAL AND ORGANIZATIONAL REQUIREMENTS

 

AUDITING AND COMPLIANCE REQUIREMENTS

RECORDS MANAGEMENT REQUIREMENTS

SYSTEMS REQUIREMENTS

TRAINING REQUIREMENTS

   

195  

As shown in Figure 5.1., each component is interrelated to operationalize the use and

management of e-mail records.

Each component is further explained in the subsequent sections.

5.2.2. Legal and Organizational Requirements  

The first component of the framework is legal and organizational requirements.

This component can be mapped with the juridical requirements of Park’s study (2002)

and the legal and business issues presented by ARMA (2000). Both studies as well as the

results of our research have shown that the understanding of legal requirements and the

business activities of an organization are the premises to understanding how electronic

records are managed. Every organisation is subject to laws and regulations which govern

the way that agencies conduct business. As a result, the laws and regulations affect how

electronic records are created, used, captured and managed, as records are the basis for

legal evidence. Legal systems depend on “access to trustworthy evidence”, which often

takes the form of documentary evidence, such as letters, minutes, photographs and

different types of electronic records including e-mail records (International Records

Management Trust, 2009, p. 40). Therefore, the ability to access reliable and authentic

information and records is vital to any legal system, since decisions are made, based on

the analysis of evidence (Smallwood, 2013). According to Thurston (2012), “efficient

record keeping will greatly improve the chance that these documentary materials will be

considered authentic and reliable” (p. 33).

In addition, “each organisation has its own ‘culture’ or way of operating, which

influences the decisions they make and the actions they take” (International Records

Management Trust, 2009, p. 39). In order to manage the records of a particular

   

196  

government agency or organisation effectively, it is important to understand the ‘culture’

of that organisation: the political, economic and organisational environment in which that

agency operates (Wright, 2013). According to Thurston (2009),

“understanding the organisational culture also involves considering the different elements that make up the organisation, including the following:

• the mandate: why does the organisation exist; when and why was it established; has its purpose changed over time; does it perform functions other than those identified as its core business?;

• the people: how many people work in the organisation; what do they do; what are their qualifications?;

• the financial structure: what is the organisation’s budget; what are its usual financial expenditures; what economic constraints does it face and how does it decide on priorities?;

• the physical environment: what kind of building(s) are in use; what hazards or risks exist inside or near the facility;

• the geopolitical environment: is the jurisdiction in which the agency operates stable; do governments and administrations change frequently or remain the same for years?;

• the technological environment: what is the state of the technological infrastructure; what level of technical support is available to the agency to manage electronic information resources what technical constraints are in place that may hinder effective electronic records management?;

• the information environment: what is the level of control over records and information; is information used regularly or well to support business functions and activities; what support is in place for improvements to information resource management?; the information flow; the different work environments (use of remote locations)” (International Records Management Trust, 2009, p. 41).

Therefore, understanding the unique characteristics of an organization is necessary to

ensure an effective electronic records management programme, including e-mail

management. As seen in Chapter 2, a government agency is a “permanent or semi-

permanent organization that is responsible for the oversight and administration of specific

functions within the government” (Garvin, 2011, p. 1). There is a variety of agency types.

The autonomy, independence and accountability of government agencies can vary. The

agencies that participated in this research have different mission, goals and objectives. In

   

197  

order to accomplish their mission, all the agencies have different available resources (e.g.

financial, human, technological). In addition, each agency must operate its functions and

activities according to their own legal requirements and business needs. Understanding

which tasks and functions are or are not unique to a particular agency is essential as

records are created and received in these contexts and attest of the functions and activities

of each agency.

Therefore, understanding the legal and organisational environments in which

records are created and used is essential to establishing a successful and effective records

management programme.

5.2.3. Records Management Requirements  

The second component of the framework consists of records management

requirements and policy to manage e-mail records. This component can be mapped with

the procedural requirements of Park’s study (2002) and records management issues of

ARMA (2000) since records must be properly managed so they can be used in the

conduct of business activities to be served as legal evidence.

According to the International Standard Organization (2001), records

management is the “field of management responsible for the efficient and systematic

control of the creation, receipt, maintenance, use and disposition of records including the

processes for capturing and maintaining evidence of and information about business

activities and transactions in the form of records” (ISO15489, 2001, p. 3). Records

management applies to all records regardless of format, whether electronic records or

paper records. Organizations create and maintain records in order to operate effectively.

To deliver information with value, that information must be recorded and managed to

   

198  

ensure its: “(1) Authenticity – The record is proven to be what it claims to be; (2)

Reliability – Contents can be confirmed as dependable, full, accurate representations of

the transactions to which they relate; (3) Integrity – It is a complete, unaltered record; and

(4) Usability – The record can be located, accessed, understood, and utilized” (ISO15489,

2001, p. 7).

Gradually, electronic records management (ERM) have moved to the front of

business issues with the increasing automation of business processes and the increasing

volume of electronic records such as e-mail records. Smallwood (2013) argues that “these

factors, coupled with expanded and tightened reporting laws and compliance regulations,

have made ERM increasingly essential for most entreprises – especially highly regulated

and public ones such as government agencies – over the past decade” (p. 3). The

management of e-mail messages is one of the biggest information management

challenges. Comprehensive planning by organizations is aimed at gaining control over

the explosive growth of this electronic medium and its growing range of uses, features

and functionalities.

To ensure ongoing records management, the records lifecycle – from creation to

disposition or preservation – provides the structural foundation. This is applicable to all

records, including e-mail records. The records lifecycle, as suggested by InterPARES and

the International Council on Archives (ICA), consisted of:

• “Creation: in the course of business activities, electronic messages can be transmitted (i.e., sent and received) by the organization and added to a recordkeeping system. The organization considers business and legal requirements when considering an electronic message to be a record.

• Appraisal: process of determining the value of the record to the organization. Schedule periodic or random audits to ensure program compliance.

   

199  

• Classification: classification scheme allows for the identification and indexing of records. Classification may be automated through the use of technology. Or, it may be manual, requiring human intervention. Selection of the appropriate method depends on specific characteristics of the organization and its policies.

• Disposition: the disposition of a record may result in: 1) its destruction or 2) its transfer to another entity and/or archive. Specific conditions/events triggering a disposition action (e.g., the end of the business process or activity supported by a record or the expiration of a retention period) should be clearly documented. Actions spawned by disposition events should be logged, and those logs should be retained for audit purposes.

• Preservation: A record should be preserved in a trustworthy way during its entire retention period, up to and including long-term preservation in an archive, if appropriate. For a record in the form of an electronic message, the content and metadata must remain linked to the electronic message throughout the retention period. This requires deployment of technological and organizational resources including time, money, personnel, hardware, software, network systems, and other e-mail management program-related features. Such resources, when properly instituted and implemented, help to ensure the records’ authenticity, accuracy, reliability, and usability”. (InterPARES and ICA, 2012, pp. 9-10).

In order to ensure the lifecycle management of records, a risk assessment and analysis

is conducted to identify risks pertaining to records loss or damage (ARMA, 2012;

Lemieux, 2010; Thurston, 2009; Duranti, 2009). These activities will also be useful to the

organization’s planning efforts regarding vital records, business continuity, and disaster

response. Based on the previous requirements, tools are created by information

management professionals, such as policies and procedures, to ensure that business need

for evidence, accountability and information about an organization’s activities are met.

As such, an e-mail management policy is identified as being an important tool to ensure

the appropriate management of e-mail records throughout their lifecycle.  

5.2.4. Systems Requirements  

The third component in the framework is systems. This component can be

mapped with the technological requirements of the theoretical framework in Park’s study

   

200  

(2002) and systems issues of ARMA. To ensure the implementation of records

management policies, functionalities of systems used within the organizations must be

investigated to meet the records management objectives. The systems refer to the

technology used to produce, transmit and manage e-mail records, mainly the electronic

messaging system and the electronic recordkeeping system. In order to manage e-mail

records appropriately, the systems requirements related to the functional components of

e-mail management program must evaluate the compatibility of the systems with the

program’s objectives. When properly executed, systems design and the systems-related

specifications can facilitate the implementation of an efficient e-mail management

program (ARMA, 2013). System(s) design should reflect the e-mail management

program requirements.

As seen in this research, organizations provide electronic messaging services to

send, receive, classify, and store electronic messages. When using multiple systems-

related tools to accomplish these functions, such as an electronic records management

system, the level of interoperability can be an important factor. It is also important to

consider the degree of integration between systems that can be expected.

In addition, the functionalities of the systems used to manage e-mail records must

be evaluated to meet the e-mail management program requirements (ARMA, 2013). For

example, systems design, file formats, search, retrieval, and security are important

considerations. As seen in the research results, it is possible that an electronic messaging

system can enhance the search and retrieval of e-mail records facilitating access.

However, the type of search engine can affect the system performance and reliability

   

201  

(ARMA, 2013). Therefore, the organization business requirements must guide search and

retrieval features and/or functionalities.

In the organizational environment, technology plays an important role in ensuring

the governance of activities. However, technology is always evolving. Therefore, the e-

mail management program needs to be flexible and “forward-looking enough to

anticipate the dynamic nature of technological options” (Smallwood, 2011, p. 59), as the

hardware and software used become obsolete as a result of technological innovation. The

e-mail management program must anticipate the technological obsolescence by keeping

an eye on safeguarding the records. It is important to determine how to preserve access to

the organization’s records (ARMA, 2013) as keeping the e-mail records’ reliability,

authenticity, and integrity remain of great importance.

In order to ensure the integrity and authenticity of e-mail records, security

features of systems are important to consider. Security features can vary from one system

to the other. Access to electronic messaging systems should be authenticated by a unique

identifier assigned to each individual and is not to be shared among users. This security

technique ensures that a user is authorized for access to electronic messaging resources as

appropriate to job title, work activity, and/or organizational role; each time the system is

accessed, validation occurs via the unique identifier. As recommended by ARMA,

“records management and information technology personnel should collaborate to define

and designate levels of user authorization” (ARMA, 2013, p. 36). When a user leaves an

organization, whether permanently or temporarily, the access to the organization’s

electronic messaging system should be terminated on the date of departure and the

account should be desactivated. The messages in the account of the user who is leaving

   

202  

the organization may be accessed by authorized individuals in compliance with the e-mail

management policy. Also, other security features can be used to ensure the integrity and

authenticity of e-mail records such as an “auto-lock feature to safeguard information

when the equipment is left unattended and users should not share access passwords”

(ARMA, 2013, p. 37).

The ability of the organization to attest the authenticity of e-mail records should

be preserved. Therefore, the organization’s systems must include audit trails to ensure the

integrity and authenticity of electronic records. Records management personnel should

verify the audit data as one way to monitor the authenticity of records throughout the

organization as suggested by ARMA (2013). Encryption is another methods may also be

used to ensure the integrity and authenticity of electronic messages. When a message is

encrypted, only individuals with the encryption key can view the message. Another

important application is the digital signature. The use of a digital signature can

authenticate the other party (sender or receiver of message). A digital signature consists

of two components: the digital signature and proof of authenticity of the identity of the

user. As mentioned by InterPARES, “digital signatures are subject to obsolescence and,

together with the entities to which they are attached, cannot be converted to new or

updated software applications. Indeed, the life span of authentication technologies may

be shorter than the length of time that an e-mail record must be retained” (InterPARES 3

Project, 2011, p. 56). Security breaches are important to consider and should be

minimized in order to ensure the integrity and authenticity of e-mail records.

As such, spam is one primary security threat to e-mail. Indeed, “as a delivery

mechanism, it can spread viruses and/or malicious software; threats that originate in the

   

203  

e-mail system may quickly spread to other electronic systems in the organization,

destroying data, stealing information, compromising the authenticity of information, and

infecting entire networks” (ARMA, 2013, p. 35). The organization should also have

appropriate firewall protection, intrusion detection systems, and operating system

security patches. As Flynn and Kahn recommend that “organizations should seek

professional legal counsel to develop protocols for addressing and responding to different

types of security incidents and breaches of confidentiality” (Flynn and Kahn, 2003, p.

122). Depending upon the nature of the incident or breach, the type of information

comprised, and the legal jurisdiction within which the incident or breach occurred,

security incidents may need to be reported to a regulatory agency. Organizations with

technology-enabled legal hold processes should consider integrating that technology into

the organization’s electronic messaging system to automate the legal hold process for

electronic messages. Ultimately, as recommended by ARMA, “an organization’s

approach to legal hold and discovery processes should be informed by industry best

practices and relevant statutes, in conjunction with an organization’s risk profile”

(ARMA, 2013, p. 19).

As seen in the research results, many organizations are now faced with a situation

in which employees use mobile devices from which electronic records are managed.

Many of these devices (e.g., smartphones and tablets) are “user-owned, giving rise to the

“bring your own device” (BYOD) trend” (Saffady, 2013, pp. 50-51). This trend can be

challenging for ensuring information governance in organizations, considering that

device monitoring and control is more complicated with devices not provided by the

organization as many records are created, accessed, retrieved, transmitted and/or stored in

   

204  

mobile devices. The organization needs to address the use of both organization-owned

and user-owned devices and provide guidance.

To ensure the appropriate management of e-mail records, the technical aspects of

management and preservation must be considered. Several technical factors make e-mail

records difficult to preserve. Indeed, Christopher Prom (2011) specify that:

“email allows people to send any type of digital information, including information generated using other applications, from one email account to any other email account. In other words, email programs are simply communication utilities that support activities undertaken in the course of fulfilling daily work duties or in our personal lives. As a result, a single email account contains records of disparate context, structure and content, documenting activities both mundane and extraordinary (p. 8).”

In addition, an e-mail message includes both structured data (i.e.the header) along with

unstructured data (i.e. the body and the attachments). Therefore, the preservation can be

complex. In order to understand the basic technical difficulties of preserving e-mail, we

must understand how a wide range of hardware and software systems interact to send,

receive, and store messages (Pennock, 2006). An organization must determine how to

manage their e-mail records and ensure their long-term preservation in their electronic

form, either in their “native format” that retains metadata of the messaging system or in a

standard format such as simple message transfer protocol (SMTP). To ensure the

appropriate preservation of e-mail records, the organization should assess the risk

according to their legal requirements and business needs. Ensuring long-term

preservation of e-mail records means ensuring accessibility of stored data and its

components. As mentioned in Chapter 2, electronic messages usually comprise several

digital components, such as headers, digital signatures, and metadata. Electronic

messages should remain linked to their components. Electronic preservation of e-mail

   

205  

records will, over the long term, require records conversion and/or migration. ARMA

recommends that “the organization’s preservation strategy should plan for this situation

as part of the normal course of business. Ideally, a message destined for long-term

preservation should be converted to a persistent format at the beginning of that record’s

lifecycle. Embedding this activity in the records management workflow will further add

to the efficiency and cost-effectiveness of preservation efforts” (ARMA, 2013, p. 14).

Another system requirement is the backup. Backup consists of “a copy of

information created as a precaution in case the original is lost or destroyed” (ARMA,

2012, p. 5). Backup activities should encompass electronic messages as well as electronic

messaging systems. While backups facilitate “improved response in the event of a

disaster, they should not be a substitute for a comprehensive records management

program” (ARMA, 2013, p. 22). As Prom mentioned, “even if incremental backups of

email accounts are being completed, many messages may never enter the system or may

be quickly purged from backup as old backups are overwritten. Additionally, a single

message may be stored in many locations: on the server, on handheld devices, in local

library files, on local file systems, on networked drives and on backup devices (p. 10).”

Therefore, any system attempted to preserve e-mail must begin not only with an

understanding of the specific technologies used in an e-mail, but a detailed knowledge of

how server administrators and end users have configured software and hardware.  

It is widely accepted among records managers that systems can contribute to

managing e-mail records by enforcing classification rules and retention periods, deleting

records as soon as possible after meeting compliance requirements (Smallwood 2008, pp.

30-31, 97-103). However, two research projects from Steven Howard and James Lappin

   

206  

have shown that most “attempts to capture and preserve email in ERMS systems have not

proven themselves to be that effective” (Howard, 2011; Lappin, 2011). In reality, many

institutions set quotas, leaving e-mail management to users forcing the information

management professionals to work in collaboration with IT professionals and users to

manage e-mail records (Cox, 2008, p. 233).

In summary, system design and systems functionalities need to be evaluated and

properly executed to facilitate the implementation of e-mail management program as well

as be as technology-neutral as possible.  

5.2.5. Training Requirements  

The fourth component of the framework for a comprehensive e-mail management

program is training requirements. This component is mapped with the sociocultural

requirements of Park’s study (2002) and user issues of ARMA as records management,

precisely e-mail management, is reliant on the participation of users.

Research has shown that one of the biggest challenges faced by information

management professionals is the “lack of users involvement” (Bailey and Vidyarthi,

2010, p. 279). As such, records management, and more precisely e-mail management, is

heavily reliant on the participation of individual users. Therefore, the users requirements

must be addressed in a complete e-mail management program. Training is deemed an

essential component of an organization’s e-mail management program (Smallwood,

2013; ARMA, 2013; Flynn and Kahn, 2003). Training activities should be designed to

ensure that individuals understand the e-mail management policy and guidelines and the

skills to use the electronic messaging systems effectively and appropriately. To ensure

   

207  

the appropriate management of e-mail records and preserve the records’ reliability,

authenticity and integrity, training activities should highlight these areas: proper

electronic messaging system usage, including “netiquette” of electronic communications;

records management practiced (e.g., lifecycle, retention schedule, disposition); security,

confidentiality, privacy, and copyright issues pertaining to electronic messaging; and

statutory, legal, and/or regulatory requirements pertaining to electronic messaging

(Pennock, 2007). Table 5.1. shows the recommanded content for an e-mail management

training program based on the comments of the participants as well as suggested in the

literature (Smallwood, 2013; Saffady, 2013; ARMA, 2012; Huang, Sheng and Lin, 2011;

Burgess, Jackson and Edwards, 2005 ; Flynn and Kahn, 2003). The content is not

exhaustive.

Table 5.1. Recommended content for e-mail management training program

Category Content

Legal and organizational

Legal framework (records management, privacy, confidentiality, copyright, etc.) Objectives of e-mail management program Issues of the organization regarding e-mail management

Records Management

Charateristics of e-mail messages Appraisal of e-mail messages Classification of e-mail records Retention of e-mail records Preservation of e-mail records Destruction of e-mail records Accessibility of e-mail records

Systems

Functionalities of e-mail messaging system Appropriate e-mail security practices through out the information lifecycle Functionalities of electronic recordkeeping system

Training and auditing

Use of misuse of e-mail messaging system Respectful and good manners when using e-mail (Netiquette) Training programs available Compliance tools

   

208  

Potential consequences for non-compliance to employees Roles and responsibilities of the different stakeholders involved in e-mail management

Authors recommend that training take various forms depending on each

organization’s culture and available technology (ARMA, 2013; Gurushanta and

Smallwood, 2012; InterPares 3 Project, 2011; Pennock, 2006; Saulnier, 2005; Flynn and

Kahn, 2003). As such, different media can be used to ensure that the e-mail management

program is understood and applied within the organization. As recommended by Library

and Archives Canada, “the use of multiple media to provide training can accommodate

individuals’ various learning styles and enforce key points related to electronic

messaging” (Government of Canada, Library and Archives Canada, 2008). Regardless of

the chosen training format, collaboration between information management professionals

and IT is essential. In addition, training should be provided for all individuals within the

organization and tailored to the audience’s needs, depending on their responsibilities.

Specialized training should be developed for executives, managers, information

management specialists and network or system administrators, because each of these

audiences has a different set of responsibilities. Attendance and completion of training

activities has proven to be difficult within organizations. Burgess, Jackson and Edwards

(2005) suggest that an attendance sheet be signed by each user and that the log be

maintained and retained as records for audit purposes. An effective training program can

ensure better compliance within the organization’s e-mail management program and

further enhance positive outcomes. As suggested by ARMA (2013), “periodic reminders

related to electronic messaging policy, procedure, and process can reinforce users’ proper

   

209  

behaviours and attitudes. These reminders can take many forms, including newsletter

articles, intranet messages, posters, or other communications collateral” (p. 38).

Regarding training, an evaluation of the training content and activities need to take place

on a regular basis to assess accuracy and utilization of the e-mail management program.

In addition, training experiences of the users should be evaluated to encourage quality

improvement-related feedback.

In summary, training requirements are important to consider in an e-mail

management program and systematic training is an important way to ensure that e-mail

records are management effectively. With proper training, users are made aware of all the

requirements necessary to manage e-mail records as well as their responsibilities

regarding the management of their information.

5.2.6. Auditing and Compliance Requirements  

The final component of the framemork for a comprehensive e-mail management

program is auditing and compliance requirements. This componenet is also mapped with

the juridical requirements of Park’s study (2002) as well as legal issues of ARMA, since

an e-mail management program should comply with legal and organizational obligations

of the organization.

Audit is defined as “a review and examination of records and activities to test for

compliance with established policies or standards, often with recommendations for

changes in controls or procedures. Audits may also review programs to ensure they are

accomplishing their intended purposes. Sometimes called program reviews, evaluations,

assessments, or inspections” (Pearce-Moses, 2005, p. 40). In the professional and

academic literature, it is now recognized that including audit and compliance activities

   

210  

into organizational and records management processes will ensure that records are

created in a cost-efficient manner, are accessible for their entire lifecycle, are properly

managed and store; their integrity and authenticity are maintaned, and that records are

properly disposed of at the end of their lifecycle (ARMA, in press). Therefore, audit and

compliance activities should focus on evaluating the success of the e-mail management

program and all of its components.

To ensure compliance to an e-mail management program, training alone has

proven to often be insufficient. Organizations should implement mechanisms to ensure

compliance with the e-mail management policy. Some authors recommend that there

should be consequences for not being compliant with records management policies

(including e-mail management program) as the users must be responsible for their actions

(Pennock, 2006). ARMA specifies that “organizational culture and practices will impact

how intrusive compliance and enforcement efforts can be” (2013, p. 21). The basic means

of enforcement are through training and periodic reminders that can facilitate user buy-in,

support the organization’s goals and appropriate management of e-mail records.

Compliance monitoring can be performed considering that electronic messaging

systems are generally considered a corporate resource and the organization has the right

to monitor and control their use (ARMA, 2013). Technology can be used to monitor

specific components of the policy. As such, as suggested by LAC, software applications

can be programmed, based on the organization’s policy, to scan outgoing e-mail content

to identify violations and automatically redirect the message for corrective action. Policy-

based applications are also available that will automatically apply encryption and other

enforcement options. These applications may be based on word lists identifying specific

   

211  

proscribed words or word groups. Similar products for content filtering and blocking, file

transfer controls, as well as compliance-enhancing logging features are becoming

available for information management as well. While these products are aimed at

enforcing policy with regard to outgoing messages, similar functions protect the

organization from incoming threats such as viruses, unsolicited commercial messages,

and oversize files that can cause degradation in network service, loss of data, and/or

breaches of confidentiality. Also, as mentioned by ARMA, “to function effectively as a

deterrent, the organization must inform its employees that such a software application has

been installed and to what extent their messages may be monitored for compliance”

(ARMA, 2013, p. 22). In addition, as required by GoC, conducting audits on

organizations activities including information management in order to remain compliant

with internal and external authorities is important to the success of the e-mail

management program.  

Finally, the assessment of the e-mail management program needs to be conducted

periodically. All e-mail management program components should be evaluated to

improve the management of e-mail records and ensure their integrity, authenticity and

reliability (i.e. user feedback, program deficiencies, corrective actions, implementation,

etc.) so that the program can effectively serve the organization and its users.

5.3. E-mail Mangement Policy  

This study showed that to manage e-mail records effectively and appropriately,

different requirements - legal and business, records management, systems, training and

compliance – must be mapped and aligned. Based on the five components of Figure 5.1.,

to define the proper use and management of e-mail, the establishment of a policy and/or

   

212  

guidelines is deemed essential as several authors agreed (Smallwood, 2013; InterPARES,

2012; ARMA, 2012; Saulnier, 2005).

Considering the importance of establishing any policy, basically, the term policy

is defined by Mayer-Schönberger and Lazer (2007) as being:

“a documented set of broad guidelines, formulated after an analysis of all internal and external factors that can affect an organization’s objectives, functions and activities. Formulated by the organization's higher management, a policy lays down the organization's response to known and knowable situations and circumstances. It also determines the formulation and implementation of strategy, and directs and restricts the decisions, and of the organization’s personnel in achievement of its objectives” (Mayer-Schönberger and Lazer, 2007, p. 2).

As shown in the definition above, a policy should be appropriate to each agency’s unique

business requirements, organizational culture, and technology. Indeed, “a policy guides

toward accepted business strategies and objectives. Policies identify the key activities and

provide a general strategy to employees on how to handle issues as they arise. This is

accomplished by providing the reader with limits and a choice of alternatives that can be

used to "guide" their decision making process as they attempt to overcome problems”

(Smallwood, 2013, p. 24). Therefore, we see that the policy is a very important tool to

possess to properly and efficiently manage e-mail records since it allows for consistency

in operational activities. Policies also provide clarity to the employees when dealing with

accountability issues or activities that are of critical importance to the agency.

Smallwood (2011) identifies the four aspects that need to be included in an e-mail

management policy: “(1) commercial – guidelines on how to write effective message; (2)

productivity – rules on the usage of the e-mail system; (3) records management – rules

for the management of the lifecycle of an e-mail record; and (4) legal - prohibit

inappropriate e-mail content and warn of risks” (pp. 19-20). However, the results of this

   

213  

research as well as some authors suggest that the e-mail management policy should be

more specific (ARMA, 2013; Smallwood, 2011). As such, we suggest the components of

an e-mail management policy as illustrated in Table 5.2. The components that we propose

describe the general statement of the policy, its objectives, scope, the legal framework,

the guiding principles on which it is based, the roles and responsibilities of stakeholders,

the measures that must be implemented to achieve the objectives. The order of

presentation of these elements is suggestive and the content is not exhaustive, as specific

sections could be added according to each institution’s legal and organizational

requirements. The detailed and recommended contents of e-mail management policy are

described as the following in Table 5.2.

Table 5.2. Recommended content of an e-mail management policy

Section Content Description General General

Statement Describes the reason for the policy. It is pertinent to indicate that e-mail records are derived from the business conduct of the organization and thus, it is important to ensure the appropriateness for business continuity and its needs for evidence.

Objectives Describes the expected outcomes are pursued by the policy. The objectives must be consistent with the general records management program.

Scope Specifies the organizations or persons or systems subject

to the policy.

Definitions Describes the definition of key terms used in the policy, ensuring that all stakeholders affected by the policy will have the same understanding of terms.

Legal Framework

Provides a list of laws and regulations that are in relation or the source of the prepration of policy. This section can also provide a list of related policies or procedures.

   

214  

Section Content Description Guidelines Provides general rules for e-mail management inspired by

the basic principles of records management. These principles serve as a reference or authority principles.

Roles and Responsibilities

Determines the responsibility of each stakeholder involved in e-mail management or using e-mail messaging system.

Approval and Effective Date

The policy must be approved by the higher management

of the organization, which should be recognized. The effective date should indicate when the policy is started to be in effect.

Review The review process should be mentioned. Traceability of the different revisions to the policy should be kept. The policy should be revised depending on the evolution of the legal framework, the information technology, the feedbacks from users, the efficiency measures as well as the needs of the organization.

Records Management

Ownership Provides a statement that the electronic messges belong to the organization.

Appraisal Provides guidance on the value of e-mail messages and identification of e-mail messages that qualify as records and if so, they are subject to the policy.

Classification Provides guidance of the classification system available as messages should be indexed and retrievable.

Retention Provides guidance that e-mail records should be disposed of according to retention schedules.

Legal Holds Provides guidance on how the e-mail records will be managed in case of litigation.

Preservation Provides guidance on preservation methods for e-mail records as well as their digital components through time.

Destruction Provides guidance on the appropriate disposition of e-mail messages. The disposition of e-mail records should be secure and recoverable.

Access Provides guidance on access to information contained in e-mail records.

Confidentiality – Privacy

Provides indications between information that may be disclosed and information that need proper authorization to be disclosed. In addition, the level of privacy should be expected.

Disaster and Recovery

Provides information on the available means of business continuity for electronic messages and electronic messaging systems in case of a disaster.

   

215  

Section Content Description System Functionnalities

of e-mail messaging

system

Provides information on the functionalities of the e-mail messaging system to ensure the management, security, and retrieval of messages.

Functionnalities of electronic

recordkeeping system

Provides information on the electronic recordkeeping system used to ensure the appropriate management of e-mail records (metadata, audit trail, access rights, etc.)

Security Provides information on the security features used in the organization (authentication, password, access rights, encryption, digital signatures etc.)

Back-up and storage

Provides information on the back-up procedure that should be performed on a regular basis to meet business needs as well as storage information.

Training and Auditing

Creation and edition of e-mail

messages

Provides indications on the appropriate content allowed in e-mail messages as well as the appropriate language to be used.

Use and misuse of e-mail

messaging system

Provides indications of the allowable use as well as prohibited activities of e-mail messaging system (personal use vs professional use).

Training program

Provides information on the available training program that should be designed to ensure that users develop the knowledge and skills to use and manage e-mail messages.

Dissemination Provides indication on the dissemination methods

Auditing – Monitoring

Provides indications on available means to ensure users compliance to e-mail management policy.

Violations Provides indications on the actions that will be taken in case of violations (penalties, suspension, personal liability for misuse).

The scope of the e-mail management policy must be comprehensive and specific enough

to ensure that e-mail messages are managed consistently across the organization. The

policy must address the management of e-mail messages as well as the technology used

to produce and manage the messages. Indeed, “the Email Management Guidelines must

   

216  

pertain to human processes as much as to machine processes. In simple terms, machines

are incapable of making all of the decisions involved in managing email” (Government of

Canada, Library and Archives Canada, 2008, p. 9). Smallwood (2013) sums it up as

“first, better policies; then, better technology for better enforcement” (p. 12).

In addition, the creation of an e-mail management policy requires a team

approach that may include members from different professions. Experts from these

sectors may be sought:

• Higher management to consider compliance requirements, productivity and communication within the organization;

• Legal professionals to ensure that the e-mail management is consistent with the legal framework;

• Records Management/Archives to ensure the appropriate management of e-mail records for their entire lifecycle;

• Information technology to assess the ability of the organization’s current technologies to meet the needs of the e-mail management policy; and

• Users to provide inputs on how e-mail messages are used and controlled in their day-to-day work.

Richard Cox and many other authors argue that archivists, “records managers and IT

administrators should work together to develop policies and procedures to manage email

for its long-term value” (Cox, 2008) or such policies will be ineffective, unless they are

also developed in close collaboration with the e-mail system’s users. In addition, e-mail

management must be integrated into the overall recordkeeping infrastructure to “tackle

perception of individual ownership of e-mail records; enable shared access to messages

and related records from a single location which will prove useful when dealing with

discovery requests” (Pennock, 2006, p. 31).

In summary, the e-mail management policy is an important tool that contributes to

meeting the legal requirements and business needs of organizations as well as records

   

217  

management requirements, as long as the policy are not incomplete and out-of-date, and

have been adjusted to changes in the business requirements, such as new technology

platforms, changing laws, and additional regulations. “Email policy failure can arise from

one of two things — failure to establish proper policy or failure to enforce it” (Flynn and

Kahn, 2003, p. 56). The policy must be consistent with the business needs, legislation,

regulations, and other policies or best practices already implemented.

Summary  

The GoC and the public sector in general have high standards on information

management to ensure accountability, transparency, accessibility and provide quality

services to stakeholders. The study results indicate that the organization needs to

implement measures to manage e-mail records appropriately and effectively. These

measures must be planned to cover several requirements of e-mail management –

specifically, legal and organizational, records management, systems, training, and

auditing and compliance - for a holistic e-mail management program. Although some

agencies have already developed some tools to manage e-mail records, there seem to be

little resources to support training and compliance on e-mail management. Therefore, we

suggest that the e-mail management policy should be develped in government agencies

and the components of the policy should include the general statement of the policy, its

objectives, scope, the legal framework, the guiding principles on which it is based, the

roles and responsibilities of stakeholders, the measures to be implemented to achieve the

objectives.

   

   

218  

VI. CONCLUSION  

This chapter aims to present the conclusion of our research. First, we present the

summary of our study. Then, we present the main contributions of our research to the

fields. Finally, we present recommendations for future research.

6.1 Summary of the research

The aim of this research was to understand how e-mail records are managed in the

Canadian government agencies and identify the characteristics that support the

management of e-mail records to ensure their reliability, authenticity and integrity. It

sought to answer the following research questions:

(1) What are the general principles of the e-mail management policies and guidelines within Canadian government agencies?

(2) To what extent are these e-mail management policies implemented in the government agencies?

(3) What are the variations and similarities of e-mail management practices across government agencies? To what extent are they effective?

(4) What are the current practices to manage e-mail messages in order to ensure the reliability, authenticity and integrity of this specific type of electronic records in government agencies?    

 The research methodology adopted to answer the research questions is a mixed

methods approach. Our study is descriptive seeking to explore practices related to

management of e-mail records. Three main methods of data collection were used: (1)

web-based survey with information management professionals working at the Canadian

   

219  

government agencies; (2) in-depth interviews with information management

professionals involved in the process of e-mail management from six government

agencies; and (3) the relevant documentation. While a statistical analysis was done on the

data collection by using the web-based survey, a content analysis combining both

inductive and deductive methods has been done on the interview data and relevant

documentation. Four units of analysis were considered, namely: (1) e-mail management

policy and guidelines; (2) electronic messaging system and electronic recordkeeping

system; (3) implementation and dissemination; and (4) associated issues.

The results show that electronic messaging is widely used in the Canadian

government agencies to conduct business activities and that they are recognized as

important business records. The management of e-mail records is an obligation when the

organization is subjected to provisions of laws and regulations, such as Access to

Information Act, and secondly, to ensure the continuity of activities of the organization.

The results of the survey indicated that e-mail is a widely used form of

communication within the Canadian government agencies. While the value of e-mail

records are recognized among information management professionals, the methods to

manage this type of records vary between agencies. The establishment of e-mail

management policy and/or guidelines to define the management and use of e-mail is

considered important by the respondents. The type of policies and guidelines developed

in agencies varies ranging from a specific e-mail management policy to a more general

information management policy according to each agency’s organizational context. In

addition, an electronic recordkeeping system for the management, retrieval and access of

e-mail records was identified as crucial to manage e-mail and ensure their reliability,

   

220  

authenticity and integrity. The results show that although several respondents recognize

the importance of e-mail in their work, their agencies often lack to practice compliance to

their e-mail management policy and/or guidelines as well as technical considerations. The

results stressed the importance of managing e-mail records to: (1) ensure the continuity of

the activities of the agencies; and (2) ensure the authenticity and integrity of e-mail

records.

The findings from the in-depth interviews with six information management

professionals from different Canadian government agencies have led us to examine how

e-mail records are managed in different organizational settings. The data collected from

agencies which did not develop e-mail management policies indicate that the use of e-

mail messaging system to conduct business can lead to several difficulties regarding the

classification, retention, management, retrieval and preservation of e-mail messages.

Agencies which are in process of developing e-mail management policies showed that

developing the policy and guidelines can contribute to an effective management of e-mail

records. However, the participants suggest that to be effective, the tools developed to

manage e-mail records must be adapted to their organizational context and information

flow of an organization. In addition, the management of e-mail records must be included

in the overall information management program. Finally, agencies which have developed

e-mail management policies proved that to be successful, e-mail management solutions

must include different components, such as policy and/or guidelines, recordkeeping

system and users compliance.

Together, these findings led us to suggest a framework for a comprehensive e-mail

management program, including: (1) legal and organizational requirements; (2) records

   

221  

management requirements; (3) systems requirements; (4) training requirements and (5)

auditing and compliance requirements. These components must be addressed and aligned

in an e-mail management program, as each component is interrelated and has an impact

on the requirements of the upper level.

6.2 Contributions of the research  

The contributions of this research to the relevant academic and professional fields

are considered from the theoretical, methodological and practical aspects. These

contributions are described in the following points.

6.2.1. Theoretical Contributions  

Most of all, this research contributes to the recognition of the value of e-mail

records and the need to ensure the long-term preservation of this type of electronic

records. This research demonstrates that the use of information and communication

technology in organizations has led to the creation of different types of electronic records

with their own specific features. While technology is constantly evolving, the practices to

manage e-mail records are the result of an ongoing reflection on the methods and

techniques to manage e-mail records and will evolve through the experiences of different

organizational contexts. Nevertheless, the analysis of the current practices of e-mail

management at the government agencies has allowed us to develop a framework for a

comprehensive e-mail management program. The framework can serve as a theorical

foundation to build an e-mail management program in any type of organization and

identify the different requirements as well as their relationships to manage e-mail records

as all five requirements have been rarely documented together in existing literature. The

   

222  

framework has been drawn from the field investigation, which presents how policies are

implemented in actual government settings. The field investigation has offered us the

opportunity to develop a better understanding of the administrative and procedural

contexts of government electronic records management. Further, the result can help to

draw a general picture of electronic records management in the various types of

organizational environments in the fields.

6.2.2. Methodological Contributions  

The use of a mixed methods approach to study e-mail management has provided

rich data for this research. The data collection tools that have been developed for this

research could be used by various stakeholders involved in the management and

archiving of e-mail records as well as other types of electronic records and use to monitor

e-mail management practices in terms of technology and policy development.  

6.2.3. Practical Contributions  

From the findings of this research, we noted that in the absence of an appropriate

policy of e-mail management, agencies don’t seem to feel obliged to ensure the

management of e-mail records or when they wish to do so, they are not properly

supervised in their work. The current methods used to manage e-mail records are not

always appropriate and can affect their authenticity and integrity. Therefore,

organizations need to adopt a systematic approach and integrate e-mail records within

their orverall records management program and systems.

For professionals, the findings could contribute to raising awareness of the

importance to manage e-mail records and offer new insights on the requirements

   

223  

necessary to manage both paper and electronic records, when using information

technologies with e-mail to conduct business activities. As such, one major contribution

of this research is to develop a policy model for managing e-mail records. This policy can

support records related professionals (e.g. records managers and archivists) during the

implementation of e-mail management tools within their organization, since there are

only a few references in the field. The policy model is comprehensive enough to be

adapted to government agencies as well as different organizational contexts.

In addition, the results of this research emphasize that the implementation process

should involve different organizational actors. During the development and

implementation of an e-mail management policy, information management professionals

must play a more active role by becoming more involved in the design process and

management of e-mail records. Their roles and responsibilities must be also clearly

defined.

6.3. Future Research  

This research on e-mail management practices and policies at the Government of

Canada (GoC) has provided results that can be enriched by future research. Three areas

of research are particularly relevant.

First, to obtain a general picture of e-mail management practices in the Government

of Canada, the number of participants and the number of agencies could be increased to

allow the generalization of the results. In addition, the results of this research should be

complemented by the study of the users involved in the management of electronic

records. The results of such a study would provide an additional picture of the

   

224  

management of electronic records in government institutions and forsee possible

strategies to facilitate the management of these records. In our research, respondents

identified several users-related difficulties: usability of systems, privacy, resistance to

change and lack of user training. Considering these difficulties that result from the

interpretation of employee needs, a more in-depth assessment would be suggested to

contribute in the design of a training program in records management as well as a

practical solution to ensure compliance of users.

Second, future research could be directed toward finding technical ways to design

better electronic records management systems in order to automate and facilitate the

management of electronic records. As seen in our research, the GoC is currently moving

forward to enhancing transparency and accountability by implementing open government

efforts “to foster greater openness and accountability, to provide Canadians with more

opportunities to learn about and participate in government, to drive innovation and

economic opportunities for all Canadians and, at the same time, create a more cost

effective, efficient and responsive government” (Government of Canada, Treasury Board

of Canada Secretariat, 2012, p. 1). The Open Government initiative is structured along

the three streams of our Open Government Strategy: Open Information, Open Data, and

Open Dialogue. In line with this movement, as technology is used to provide greater

access to information, better systems should be used to ensure the reliability, authenticity

ans integrity of electronic records. In addition, technology used to ensure the storage of

electronic records, in particular in clouding environments, should be further studied.

Finally, the selection of records for permanent preservation depends on several

criteria, including their potential uses for research. The long-term preservation of

   

225  

electronic records has been mainly studied to date in the field of records management

(Smallwood, 2013; Saffady, 2009; InterPARES, 1998). However, further research should

be conducted on a new document type emerging after the implementation of new

technology or changes in its uses, such as e-mail, other web-based or smart phone-based

applications. These types of document will be more prevail in future and getting related

to e-mail records in every aspect of business activities in organizations.

   

226  

BIBLIOGRAPHY  

Accenture. (2009). Leadership in customer service: Delivering on the promise. [Available online] https://www.accenture.com/Global/Research_and_Insights/By_Industry/Government_and_Public_Service/default.htm (Accessed August 15, 2013).

Ackermann, M. F. and Britz, J. J. (2005). The Use of E-Mail in the South African Workplace. A Legal Overview. Journal of Information Ethics, 14 (2), 20-31.

Adèr, H. J., Mellenbergh, G. J. and Hand, D. J. (2008). Advising on research methods: A consultant's companion. Huizen, The Netherlands: Johannes van Kessel Publishing.

Alberts, I. and Forest, D. (2012). Email pragmatics and automatic classification: A study of the organizational context. Journal of the American Society for Information Science and Technology, 63 (5), 904-922.

Allen, B. A., Juillet, L., Paquet, G. and Roy, G. (2001). E-governance and government on-line in Canada: partnerships, people and prospects. Government Information Quarterly, 18, 93-104.

Arkfeld, M. R. (2004). Electronic Discovery and Evidence. Phoenix, AZ: Law Partner Publishing.

Association of Information and Image Management. (2012). The Rise of the Information Professional. A Career Path for the Digital Economy, Silver Spring, MD: AIIM.

Association of Records Managers and Administrators (ARMA), International Standards Committee E-mail Task Force. (2000). Guideline for managing e-mail. Prairie Village, KS: ARMA International.

Association of Records Managers and Administrators (ARMA), International Standards Committee. (2012). Glossary of Records and Information Management Terms. Overland Park, KS: ARMA International, 4th edition.

Association of Records Managers and Administrators (ARMA), International Standards Committee. (2012). Policy Design for Managing Electronic Messages. Overland Park, KS: ARMA International.

Association of Records Managers and Administrators (ARMA), International Standards Committee. (2013). Best Practices for Managing Electronic Messages. Overland Park KS: ARMA International.

Association of Records Managers and Administrators (ARMA), International Standards Committee. (in press). Auditing for Records and Information Management Program Compliance, Overland Park KS: ARMA International.

   

227  

Association of Records Managers and Administrators (ARMA), International Standards Committee. (2009). Evaluating and Mitigating Records and Information Risks, Overland Park KS: ARMA International.

Babbie, E. R. (2005). The basics of social research. Belmont, CA: Thomson/Wadsworth, 3rd edition.

Bailey, S. and Vidyarthi, J. (2010). Human-computer interaction: the missing piece of the

records management puzzle?. Records Management Journal, 20 (3), 279-290.

Baron, J. (2003). The PROFS Decade: NARA, E-mail, and the Courts. In Ambacher, B. L., Ed., Thirty Years of Electronic Records, Lanham: Scarecrow Press, 105-137.

Bearman, D. (1993). Archival data management to achieve organizational accountability

for electronic records. Archives and Manuscripts, 21 (1), 14–28.

Bearman, D. (1994). Electronic evidence: strategies for managing records in contemporary organizations, Pittsburgh: Archives and Museum Informatics.

Bearman, D. (1996). Item level control and electronic recordkeeping. Paper presented at the Society of American Archivists, 1996 Annual Meeting. San Diego, California.

Bertot, J. C., Jaeger, P. T. and Grimes, J. M. (2010). Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies. Government Information Quarterly, 27, 264–271.

Bertot, J. C., Jaeger, P. T., Simmons, S. N. and Grimes, J. M. (2009). Reconciling

government documents and e-government: Government information in policy, librarianship, and education. Government Information Quarterly, 26, 433–436.

Bissonnette, N. (2013). Gestion des courriels: stratégies, technologies et bonnes pratiques. Archives, 44 (1), 77-114.

Bogdan, R. C. and Biklen, S. K. (1982). Qualitative research for education: An introduction to theory and methods. Boston: Allyn and Bacon, Inc.

Bryman, A. (2007). Barriers to Integrating Quantitative and Qualitative Research. Journal of Mixed Methods Research,1 (1), 8-22.

Buhlmann, J. (2011). Libray and Archives Canada: Recordkeeping and Appraisal in the Government of Canada. Presentation made at ACA-UBC, February 2011.

Burgess, A., Jackson, T. and Edwards, J. (2005). Email training significantly reduces email defects. International Journal of Information Management, 25, 71-83.

Capra, R., Khanova, J. and Ramdeen, S. (2013). Work and personal e-mail use by university employees: PIM practices across domains boundaries. Journal of the American Society for Information Science and Technology, 64 (5), 1029-1044.

   

228  

Caracelli, V. J. and Greene, J. C. (1993). Data Analysis Strategies for Mixed-Methods Evaluation Designs. Educational Evaluation and Policy Analysis, 15 (2), 195-207.

Carrick, P. M. (1988). New Evidence on Government Efficiency. Journal of Policy Analysis and Management, 7 (3), 518-528.

Center for American Politics and Public Policy. (2010). Policy Agenda Project [Available online] http://www.policyagendas.org/page/topic-codebook (Accessed August 15, 2013).

Chadwick, A. and May, C. (2003). Interaction between States and Citizens in the Age of the Internet: e-Government in the United States, Britain, and the European Union. International Journal of Policy, Administration and Institutions, 16 (2), 271-300.

Chebbi, A. (2013). Archivage du Web organisationnel dans une perspective archivistique. Thèse de doctorat, Université de Montréal.

Choo, C. W. (2006). The Knowing Organization. How Organizations Use Information to

Construct Meaning, Create Knowledge, and Make Decisions, New York and Oxford: Oxford University Press, 2nd edition.

Coffey, A. J., and Atkinson, P. A. (1996). Making sense of qualitative data: Complementary research strategies. Thousand Oaks, CA: Sage.

Collins, K. M. T., Onwuegbuzie, A. J. and Sutton, I. L. (2006). A model incorporating the rationale and purpose for conducting mixed methods research in special education and beyond. Learning Disabilities: A Contemporary Journal, 4, 67-100.

Converse, P. D., Wolfe, E. W., Huang, X., and Oswald, F. L. (2008). Response rates for mixed-mode surveys using mail and e-mail/Web. American Journal of Education, 29, 99-107.

Cox, R. J. (2001). Managing records as evidence and information. Westport, Conn.; London: Quorum Books.

Cox, R. J. (2008). Chapter 7: Electronic Mail and Personal Recordkeeping. In Personal Archives and a New Archival Calling: Readings, Reflections and Ruminations. Duluth, Minnesota: Litwin Books, pp. 201–242.

Creswell, J. W. (2006). Qualitative Inquiry and Research Design Choosing Among Five

Approaches. Thousand Oaks, CA: Sage. 2nd edition.  Creswell, J. W. and Plano Clark, V. L. (2007). Designing and conducting mixed methods

research. Thousand Oaks, CA: Sage.

Creswell, J. W. and Tashakkori, A. (2007). Differing Perspectives on Mixed Methods Research. Journal of Mixed Methods Research, 1, 303-308.

   

229  

Cumming, K. and Findlay, C. (2010). Digital recordkeeping: are we at a tipping point?. Records Management Journal, 20 (3), 265-278.

Daft, R. L. and Lengel, R. H. (1986). Organizational information requirements: Media richness and structural design. Management Science, 32 (5), 554–571.

Dalkir, K. (2005). Knowledge Management in Theory and Practice. Amsterdam; Boston: Elsevier/Butterworth Heinemann.

Davenport, T. H. (1997). Information Ecology: Mastering the Information and Knowledge Environment. New York: Oxford University Press.

Dawes, S. S., Pardo, T. A. and Cresswell, A. M., (2004). Designing electronic government information access programs: a holistic approach. Governement Information Quaterly, 21, 3–23.

DeSanctis, G. and Monge, P. (1999). Introduction to the special issue: Communication

processes for virtual organizations. Organization Science, 10 (6), 693–703.

DiGilio, J. J. (2001). Electronic Mail: from computer to courtroom. Information Management Journal, 35 (2), 32-44.

Dillman, D. A. (2007). Mail and Internet surveys: The tailored design method. Hoboken, NJ: John Wiley, 2nd edition.

Duranti, L. (1998). Diplomatics: New Uses for an Old Science. Chicago, Ill.: Society of American Archivists, Association of Canadian Archivists, and Scarecrow Press.

Duranti, L. (2009). From Digital Diplomatics to Digital Forensics. Archivaria, 68 (Fall 2009): 39-66.

Duranti, L. and MacNeil, H. (1996). The protection of the integrity of electronic records: An overview of the UBC-MAS Research Project. Archivaria, 42, 46-67.

Duranti, L. and Thibodeau, K. (2006). The Concept of Record in Interactive, Experiential and Dynamic Environments: the View of InterPARES. Archival Science, 6, 5-68.

Duranti, L., Eastwood, T. and MacNeil, H. (2002). Preservation of the Integrity of Electronic Records. Netherlands: Kluwer Academic Publishers.

Eisenschitz, T. (2002). E-mail Law. ASLIB Proceedings, 54 (1), 41-47.

Eklundh, S. K. and MacDonald, C. (1994). The use of quoting to preserve context in electronic mail dialogues. IEEE Transactions on Professional Communication, 37 (4), 197–202.

El-Shinnawy, M., and Markus, M. L. (1998). Acceptance of communication media in organizations: Richness or features?. IEEE Transactions on Professional Communication, 41 (4), 242–253.

   

230  

Enneking, N. E. (1998). Managing E-mail: Working Toward an Effective Solution. Records Management Quaterly, 24-43.

Eschenfelder, K. R. and Miller, C. A. (2007). Examining the role of Web site information in facilitating different citizen-government relationships: A case study of state Chronic Wasting Disease Web sites. Government Information Quarterly, 24, 64-88.

European Commission. (2010). Model Requirements for the management of electronic records (MoReq Specifications). Brussels, Luxemburg: Cornwell Affiliates.

Fang, Z. (2002). E-Government in Digital Era: Concept, Practice, and Development. International Journal of The Computer, The Internet and Management, 10 (2), 1-22.

Fidel, R. (2008). Are we there yet?: Mixed methods research in library and information science. Library & Information Science Research, 30, 265–272.

Firoz, N. M., Taghi, R. and Souckova, J. (2006). E-mails in the Workplace: the Electronic Equivalent of ‘DNA’ Evidence. The Journal of the American Academy of Business, 8 (2), 71-78.

Flynn, N. and Kahn, R. (2003). Email rules: a business guide to managing policies, security and legal issues for e-mail and digital communication, New York: AMACOM.

Forman, J. and Damschroder, L. (2008). Qualitative Content Analysis. Empirical Methods for Bioethics: A Primer Advances in Bioethics, 11, 39–62.

Franks, P. C. (2004). E-mail Risk Management. Issues and Challenges related to records retention and electronic discovery. Doctoral Dissertation. Minneapolis: Capella University.

Fraser, C. (2009). E-Government: The Canadian Experience. Dalhousie Journal of Interdisciplinary Management, 4, 1-14.

Garvin. P., Ed. (2011). Government Information Management in the 21st Century: International Perspectives, Burlinton, VT: Ashgate Publishing Limited.

Gauld, R., Gray, A. and McComb, S. (2009). How responsive is E-Government? Evidence from Australia and New Zealand. Government Information Quarterly, 26, 69–74.

Georgescu, M.-R. and Georgescu, I. (2008). Do We Need a Powerful E-Government?. Communications of the IBIMA, 5 (30), 242-249.

Gil-Garcia, J. R. (2004). Information technology policies and standards : A comparative review of the states. Journal of Government Information, 30, 548–560.

Gilliland, A. (2008) “Setting the Stage.” Introduction to Metadata 3.0. [Available online]

http://www.getty.edu/research/conducting_research/standards/intrometadata/index.html (Accessed on August 15, 2013).

   

231  

Gimenez, J. (2006). Embedded business emails: Meeting new demands in international

business communication. English for Specific Purposes, 25, 154–172. Government of Australia. National Archives of Australia. (n.d.). Archiving Websites.

Advice and Policy Statement. [Available online] http://www.naa.gov.au/Images/Archiving%20websites%20advice%20and%20policy%20statement_tcm16-47166.pdf (Accessed February, 28, 2014).

Government of Australia. National Archives of Australia. (2014a). Digital Transition Policy. [Available online] http://www.naa.gov.au/records-management/digital-transition-policy/index.aspx (Accessed February, 28, 2014).

Government of Australia. National Archives of Australia. (2014b). Managing Email. [Available online] http://www.naa.gov.au/records-management/agency/digital/managingemail/index.aspx (Accessed February, 28, 2014).

Government of Australia. National Archives of Australia. (2014c). Strategic Information and Records Management. [Available online] http://www.naa.gov.au/records-management/strategic-information/ (Accessed February, 28, 2014).

Government of Canada (2011). Canada’s System of Government. [Available online] http://www.canada.gc.ca/aboutgov-ausujetgouv/structure/menu-eng.html (Accessed July 30, 2013).

Government of Canada. Department of Justice. (2009). Access to Information and Privacy Office. [Available online] http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12742&section=text#appA (Accessed August 15, 2013).

Government of Canada. Library and Archives Canada. (2006). Email Management in the Government of Canada. [Available online] http://www.collectionscanada.gc.ca/government/products-services/007002-3008-e.html (Accessed August 15, 2013).

Government of Canada. Library and Archives Canada. (2008). Email Management Guidelines. 101 p.

Government of Canada, Library and Archives Canada. (2011). Leveraging Technology to Improve Efficiencies in Government. New Challenges and Opportunities, remarks by Daniel J. Caron at the 2nd Annual Public Sector CIO Forum [Available online] http://www.bac-lac.gc.ca/eng/news/speeches/Pages/New-Challenges-and-Opportunities,-remarks-by-Daniel-J--Caron-at-the-2nd-Annual-Public-Sector-CIO-Forum.aspx (Accessed on August 15, 2013).

Government of Canada, Library of Parliament. (2005). Canadian Response to the U.S. Sarbanes-Oxley Act of 2002: New Directions for Corporate Governance. PRB 05-

   

232  

37E. [Available online] www.parl.gc.ca/content/lop/researchpublications/prb0537-f.htm (Accessed August 15, 2013).

Government of Canada. Natural Resources Canada. (2004). NRCan guidelines on managing electronic mail messages (e-mail). [Available online] http://www.nrcan.gc.ca/em-ce/emgd2-e.htm#2S1_ (Accessed August 15, 2013).

Government of Canada. Public Works and Government Services Canada. (2006). RDIMS Best Practices. [Available online] http://louisetestwiki.pbworks.com/f/RDIMS+Best+Practices.pdf (Accessed August 15, 2013).

Government of Canada. Shared Services Canada. (2013). Email Tranformation Initiative. [Available online] http://www.ssc-spc.gc.ca/pages/ml-crrl-eng.html (Accessed August 15, 2013).

Government of Canada, Treasury Board of Canada Secretariat (2003). Glossary. [Available online] http://www.tbs-sct.gc.ca/atip-aiprp/glossary-eng.asp (Accessed August 15, 2013).

Government of Canada. Treasury Board of Canada Secretariat. (2007a). Information Management Strategy. [Available online] http://www.tbs-sct.gc.ca/im-gi/index-eng.asp (Accessed August 15, 2013).

Government of Canada. Treasury Board of Canada Secretariat. (2007b). Directive on Information Management Roles and Responsibilities. [Available online] http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12754&section=text (Accessed August 15, 2013).

Government of Canada. Treasury Board of Canada Secretariat. (2009). Directive on Recordkeeping. [Available online] http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=16552&section=text (Accessed August 15, 2013).

Government of Canada, Treasury Board of Canada Secretariat (2010). GC IM Strategy Storyline. [Available online] https://tbs-­‐sct.gc.ca/im-­‐gi/ims-­‐sgi/overview-­‐apercu-­‐eng.asp  (Accessed August 15, 2013).

Government of Canada. Treasury Board Secretariat. (2011) Management Accountability Framework. [Available online] http://www.tbs-sct.gc.ca/maf-crg/index-eng.asp (Accessed August 15, 2013).

Government of Canada, Treasury Board of Canada Secretariat. (2012a). Canada’s Action Plan on Open Government, 14 p.

Government of Canada. Treasury Board of Canada Secretariat. (2012b). Policy on Information Management. [Available online] http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12742&section=text#appA (Accessed August 15, 2013).

   

233  

Government of the United States. National Archives and Records Administration. (2002). Electronic Records Management Initiative. [Available online] http://www.archives.gov/records-mgmt/initiatives/erm-overview.html (Accessed August 15, 2013).

Government of the United States. National Archives and Records Administration. (2002). E-Government Strategy. [Available online] http://www.whitehouse.gov/sites/default/files/omb/inforeg/egovstrategy.pdf (Accessed August 15, 2013).

Government of the United States. National Archives and Records Administration. (2007). General Information Leaflet. Number 1. [Available online] http://www.archives.gov/publications/general-info-leaflets/1.pdf (Accessed August 15, 2013).

Greene, J. C. (2006). Toward a methodology of mixed methods social inquiry. Research in the Schools, 13 (1), 93-98.

Greene, J. C., Caracelli, V. J. and Graham, W. F. (1989). Toward a Conceptual Framework for Mixed-Methods Evaluation Designs. Education Evaluation and Policy Analysis, 11 (3), 255-274.

Griffis, S. E., Goldsby, T. J. and Copper, M. (2003). Web-Based and Mail Surveys: a Comparison of Response, Data and Cost. Journal of Business Logistics, 24 (2), 237-258.

Groover, M. (2012). The White House E-Mail Destruction Scandal of 2007: A Case

Study for Digital Heritage. In Duranti, L. and Shaffer, E., Conference Proceedings of The Memory of the World in the Digital Age: Digitization and Preservation. An international conference on permanent access to digital documentary heritage, 713-723.

Grossman and Cormack. (2013). The Grossman-Cormack Glossary of Technology-

Assisted Review. Federal Courts Law Review, 7 (1), pp. 1-34. Gurushanta, V. and Smallwood, R. F. (2012). Canadian Email Policy and Records

management. Developing, Monitoring and Enforcing Email, IM and Electronic Communications Policy and Archiving Email and IM Records. Toronto: IMERGE Consulting. E-Records Institute.

Hacker, K. L., Goss, B., Townley, C. and Horton, V. J. (1998). Employee attitudes regarding electronic mail policies. A case study. Management Communication Quaterly, 11 (3), 422-452.

Harris, B. (2000). E-governance. [Available online] http://www.iadb.org (Accessed August 15, 2013).

   

234  

Herring, S. C. (1996). Two variants on an electronic message schema. In S. C. Herring (Ed.), Computer mediated communication: Linguistic, social and cross-cultural perspectives. Amsterdam: John Benjamins.

Hinds, P. J. and Bailey, D. E. (2003). Out of sight, out of sync: understanding conflict in distributed teams. Organization Science, 14 (6), 615–632.

Hoepfl, M. C. (1997). Choosing Qualitative Research: A Primer for Technology Education Researchers. Journal of Technology Education, 9 (1). [Available online] http://scholar.lib.vt.edu/ejournals/JTE/v9n1/hoepfl.html (Accessed August 15, 2013).

 Hofman, H. (1998). Lost in cyberspace: where is the records?. In K. Abukhanfusa (Ed.),

The concept of record. Report from the Second Stockholm Conference on Archival Science and the Concept of Record, 30-31 May, 1996, Stockholm: Swedish National Archives, 115-129.

Holloway, I. (1997). Basic Concepts for Qualitative Research, Oxford: Blackwell Science.

Horn, M. L. (1995). The Political Economy of Public Administration: Institutional Choice in the Public Sector. Cambridge: Cambridge University Press.

Howard, S. (2011). Why Preserving Email is Harder than it Sounds: Steven Howard | Practical E-Records. In DPC Briefing: Preserving Email: Directions and Perspective. [Available online] http://e-records.chrisprom.com/?p=2192 (Accessed August 15, 2013).

Hrycko, O. and Rothman, C. (2009). Electronic Discovery in Canada: Best Practices and

Guidelines. Toronto, Ontario: CCH, 2nd edition.

Hu, J.-H.; Hsu, F.-M., Hu, H.-F. and Chen, H. (2010). Agency satisfaction with electronic records management systems. Journal of the American Society for Information Science and Technology, 61 (12), 2559-2574.

Huang, E. Y., Sheng, W. L. and Lin, S.-C. (2011). A quasi-experiment approach to study the effect of e-mail management training. Computers in Human Behaviour, 27 (1), 522-531.

Huc, C. (2010). Préserver son patrimoine numérique. Classer et archiver ses e-mails, photos, videos et documents administratifs. Paris: Eyrolles.

Huckin, T. (2004). Content analysis: What texts talk about. In C. Bazerman and P. Prior (Eds.), What writing does and how it does it: An introduction to analyzing texts and textual practices. Mahwa. NJ: Lawrence Erlbaum Association, Publishers, 13-32.

International Council on Archives. Committee on Electronic Records. (1997). Guide for managing electronic records for an archival perspective. Paris: International Council on Archives.

   

235  

International Records Management Trust. (2009). Module 1. Understanding the Context of Electronic Records Management. London: International Records Management Trust.

International Standards Organization. (2001). ISO 15489-1, Information and Documentation – Records Management – Part 1: General. Geneva, Switzerland: ISO, 2001.

InterPARES 3 Project. Team Italy. (2009). General Study 05 – Keeping and Preserving E-mail, 55 p.

InterPARES 3 Project. Team Italy. (2011). Guidelines and Recommendations for E-Mail Records Management and Long-Term Preservation. 80 p.

InterPARES and International Council on Archives (ICA). (2012). Digital Records Pathways: Topics in Digital Preservation. Module 6: Email Management and Preservation, 51 p.

Islam, M.S. and Gronlund, A. (2012). Investigating the Relationships between Accountability and Governments’ Transformation to eGovernment. In Gil-Garcia, J.R., Helbig, N. and Ojo A, Eds. Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, ACM International Conference Proceedings Series, 297-300.

Jerejian, A. C. M., Reid, C. and Rees, C. S. (2013). The contribution of email volume, email management strategies and propensity to worry in predicting email stress among academics. Computers in Human Behavior, 29, 991–996.

Johnson, R. B. and Onwuegbuzie, A. J. (2004). Mixed methods research: A research

paradigm whose time has come. Educational Researcher, 33 (7), 14-26.

Johnson, R. B., Onwuegbuzie, A. J. and Turner, L. A. (2007). Toward a Definition of Mixed Methods Research. Journal of Mixed Methods Research, 1 (2), 112-133.

Jordan, I. and de Stricker, U. (2013). Information Management in the Canadian Federal Government: Principles, Practices and the Role of Information Professionals. 45 p. [Available online] http://curve.carleton.ca/facultyresearch/27422 (Accessed August 15, 2013).

Kearns, K. P. (1996). Managing for accountability: Preserving the public trust in public

and nonprofit organizations. San Francisco: Jossey-Bass.

King, B. G., Felin, T. and Whetten, D. A. (Eds). (2009). Studying differences between organizations: comparative approaches to organizational research. United Kingdom; North America; Japan; India; Malaysia; China: Emerald. Research in the sociology of organizations, volume 26.

Klimt, B. and Yang, Y. (2004). The Enron Corpus: A New Dataset for Email Classification Research. In Boulicault, J.-F., Esposito, F., Giannotti, F. and Pedreschi,

   

236  

D., Eds. Proceedings of the 15th European Conference on Machine Learning, 217-226.

Koprinska, I., Poon, J., Clark, J. and Chan, J. (2007). Learning to classify e-mail. Information Sciences: an International Journal, 177 (10), 2167-2187.

Kwon J. O., Jeong, I. R. and Lee, D. H. (2009) A forward-secure e-mail protocol without certificated public keys. Information Sciences: an International Journal, 179 (24), 4227-4231.

Landry, R. (1998). L’analyse de contenu. In Gauthier, B., éd. Recherche sociale. De la problématique à la collecte de données. Sainte-Foy: PUQ, 329-356.

Lange, M. (2002). Document retention policies can help pare legal bills. Financial

Executive, 18 (9), 3-45.

Lappin, J. (2010). What will be the next records management orthodoxy?. Records Management Journal, 20 (3), 252-264.

Lappin, J. (2011). Preserving E-mail –   Records Management Perspectives. Thinking Records. [Available online] http://thinkingrecords.co.uk/2011/08/11/preserving-e-mailrecordsmanagement-perspectives/ (Accessed August 15, 2013).

Lemieux, V. L. (2001). Let the Ghosts Speak: An Empirical Exploration of the 'Nature' of

the Record. Archivaria, 51, 81–111.

Lemieux, V. L. (2010). The records-risk nexus: exploring the relationship between records and risk. Records Management Journal, 20 (2), 199-216.

Leonard, P. (2003). Promoting welfare? Government information policy and social citizenship. Bristol, UK: University of Bristol: The Policy Press.

Leroux, É., Lemay, Y., Bergeron, P., Dufour, C., Gazo, D., Marcoux, Y., Mas, S. and Salaün, J.-M. (2012). Les professions et les institutions. In Arseneault, C. and Salaün, J.-M. (Eds.). Introduction aux sciences de l’information, Montréal: Les Presses de l’Université de Montréal, 15-52.

Lincoln, Y. S. and Guba, E. G. (1985). Naturalistic inquiry. Beverly Hills, CA: Sage Publications, Inc.

Lincoln, Y. S. and Guba, E. G. (2003). Paradigmatic controversies, contradictions, and emerging confluences. In N. K. Denzin and Y. S. Lincoln (Eds.). The landscape of qualitative research. Thousand Oakes: Sage, 253-291.

Lips, M. and Rapson, A. (2009). Emerging Records Management in 21st Century, New Zealand Government, Victoria University of Wellington.

Lofland, J. and Lofland, L. H. (1984). Analyzing social settings. Belmont, CA: Wadsworth Publishing Company, Inc.

   

237  

Loussouarn, O. (2006). Records Management. A case study from the French Ministry of Justice. Records Management Journal, 16 (2), 91-96.

Luna-Reyes, L. F., Anderson, D. F., Richardson, G. P., Pardo, T. A. and Cresswell, A. M. (2007). Emergence of the Governance Structure for Information Integration across Governmental Agencies: A System Dynamics Approach. The Proceedings of the 8th Annual International Digital Government Research Conference, 47-56.

Luo, Y. (2005). Corporate governance and accountability in multinational enterprises:

Concepts and agenda. Journal of International Management. 11 (1), 1-18.

Ma, L. (2012). Some Philosophical Considerations in Using Mixed Methods in Library and Information Science Research. Journal of the American Society for Information Science and Technology, 63 (9), 1859-1867.

Machanick, P. (2005). A distributed systems approach to secure Internet mail. Computers and Security, 24, 492-499.

Mackenzie, M. L. (2002). The Personal Organization of Electronic Mail Messages in a Business Environment: An Exploratory Study. Library & Information Science Research, 22 (4), 405–426.

MacNeil, H. (2002). Trusting Records: Legal, Historical, and Diplomatic Perspectives.

Kluwer, 2000. Quoted in Richard Cox. Rediscovering the Document: Three Recent Views. Records & Information Management Report, 18 (3), 1–13.

Mano, R. S. and Mesch, G. S. (2010). E-mail characteristics, work performance and distress. Computers in Human Behaviour, 26 (1), 61-69.

Manohar, P., Rao, P. S. and Mellam, A. (2010). Study of e-Governance Initiatives in Papua New Guinea (PNG). Proceedings of the 4th European Conference on Information Management and evaluation, 243-249.

Markus, M. L. (1994). Electronic mail as the medium of managerial choice. Organization Science, 5 (4), 502–527.

Martin, M. J. (2012). The Discoverability of E-Mails: The Smoking Gun of the Modern Era, UMass Law Review, 7 (1), 182-206.

Martins, L. L., Gilson, L. L. and Maynard, M. T. (2004). Virtual teams: what do we know and where do we go from here?. Journal of Management, 30 (6), 805–835.

Marulanda-Carter, L. and Jackson, T. W. (2012). Effects of e-mail addiction and interruptions on employees. Journal of Systems and Information Technology, 14 (1), 82-94.

Mayer-Schönberger, V. and Lazer, D., Eds. (2007). Governance and information

technology : from electronic government to information government, Cambridge, Massachussetts and London, England : The MIT Press.

   

238  

Maykut, P. and Morehouse, R. (1994). Qualitative data analysis: Using the constant comparative method. Beginning Qualitative Research: A Philosophic and Practical Guide. London and New York: Routledge Falmer, 121-149.

Maznevski, M. L. and Chudoba, K. M. (2000). Bridging space over time: Global virtual team dynamics and effectiveness. Organization Science, 11 (5), 473–492.

McClure, C. and Jaeger, P. T. (2008). Government information policy research: Importance, approaches and realities. Library & Information Science Research, 30, 257–264.

McClure, C. and Sprehe, T. (1998). Analysis and Development of Model Quality Guidelines for Electronic Records Management on State and Federal Websites. [Available online] http://www.ii.fsu.edu/~cmcclure/nhprc/nhprc_toc.html (Accessed August 15, 2013).

McEvoy, R. and Ciko, E. (2004). Three things every in-house employment lawyer should know about electronic discovery. The Metropolitan Corporate Counsel. [Available online] http://www.metrocorpcounsel.com/current.php?artType=view&artMonth=November&artYear=2010&EntryNo=1851 (Accessed August 15, 2013).

McKemmish, S., Piggott, M., Reed, B., and Upwards, F. (Eds). (2005). Archives: Recordkeeping in Society, Wagga Wagga: Charles Stuart University, Center for Information Studies.

Meijer, A. (2001). Electronic Records Management and Public Accountability: Beyond an Instrumental Approach. The Information Society, 17, 259–270.

Meijer, A. J. (2008). E-mail in government: Not post-bureaucratic but late-bureaucratic organizations. Government Information Quaterly, 25, 429-447.

Mertens, D. M. (2009). Research and Evaluation in Education and Psychology. Integrating Diversity with Quantitative, Qualitative and Mixed Methods. Los Angeles; London; New Delhi; Singapore; Washington DC: Sage, 3rd Edition.

Miles, M. B. and Huberman, A. M. (2003). Analyse des données qualitatives. Paris: De Boeck Université. 2nd edition. 626 p. (Méthodes en sciences humaines).

Moecke, C. T. and Volkamer, M. (2013). Usable secure email communications: criteria

and evaluation of existing approaches. Information Management & Computer Security, 21 (1), 41-52.

Moloi, J. and Muluta, S. (2007). E-records Management in an E-Government Setting in

Botswana. Information Development, 23 (4), 290-306. Montana, J. C. (2004). E-Mail, Voice Mail and Instant Messaging: A Legal Perspective.

Information Management Journal, 37-41.

   

239  

Munro, R. (1996). Alignment and identity work: The study of accounts and accountability. In R. Munro and J. Mouritsen, Eds. Accountability: Power, ethos and the technologies of managing. Boston: International Thomson Business Press, 1-19.

Nickerson, C. (2000). Playing the corporate language game. An investigation of the genres and discourse strategies in English used by Dutch writers working in multinational corporations. Amsterdam-Atlanta: Rodopi, volume 15.

Öberg, L.-M. and Borglund, E. (2006). What are the characteristics of records?. International Journal of Public Information Systems, 2006, 1, 55-76.

Olson, H. (1995). Quantitative versus qualitative research: the wrong question. [Available online] http://www.ualberta.ca/dept/slis/cais/olson.htm (Accessed August 15, 2013).

Onwuegbuzie, A. J. and Teddlie, C. (2003). A framework for analyzing data in mixed methods research. In A. Tashakkori and C. Teddlie (Eds.), Handbook of mixed methods in social and behavioral research (pp. 351-383). Thousand Oaks, CA: Sage.

OpenText. (2012). Records Management. [Available online] http://www.opentext.com/2/global/products/products-records-management.htm (Accessed August 15, 2013).

Pardo, T. A. (2000). Realizing the Promise of Digital Government: It’s More than Building a Web Site. Information Impact.

Park, E. G. (2002). Developing a Framework for Authenticity Requirements in University Student Records Systems: An Exploratory Study. Thesis in Library and Information Science, University of California Los Angeles.

Park, E. G. and Zwarich, N. (2008). Canadian Government Agencies Develop E-mail Management Policies, International Journal of Information Management, 28 (6), 468-473.

Parrish, J. L. and Courtney, J. F. (2007). Electronic Records Management in Local Government Agencies: The Case of the Clerk of Courts Office in Lake County Florida. Information Systems Management, 24 (3), 223-229.

Patterson, G., and Sprehe, J. T. (2002). Principal challenges facing electronic records management in federal agencies today. Government Information Quarterly, 19 (3), 307-315.

Patton, M. Q. (1990). Qualitative Evaluation and Research Methods. Newbury Park, CA: Sage Publications, Inc., 2nd edition.

Patton, M. Q. (2002). Qualitative Interviewing. Qualitative research and evaluation methods. Thousand Oakes: Sage, 3rd edition, 44-67.

Pearce-Moses, R. (2005). A Glossary of Archival & Records Terminology. Society of American Archivists, Chicago IL. [Available Online] http://www2.archivists.org/glossary (Accessed August 15, 2013).

   

240  

Pennock, M. (2006). Curating E-mails: A life-cycle approach to the management and preservation of e-mail messages. In Ross, S. and Day, M. Eds., DCC Digital Curation Manual [Available online] http://www.dcc.ac.uk/resource/curation-manual/chapters/curating-e-mails (Accessed August 15, 2013).

Périat, N. (1997). Politique de gestion du courrier électronique: Des mesures à prendre. Archives, 29 (1), 3-56.

Perry, J. L. and Rainey, H. G. (1988). The Public-Private Distinction in Organization Theory: A Critique and Research Strategy. The Academy of Management Review, 13, 2, 182-201.

Pickard, A. J. (2013). Research Methods in Information, London: Facet Publishing, 2nd edition.

Prom, C. J. (2011). Preserving Email. DPC Technology Watch Report 11-01, 57 p.

Radicati Group, inc. (2013). Email Statistics Report, 2013-2017. Executive Summary. [Avaialble online] http://www.radicati.com/wp/wp-content/uploads/2013/04/Email-Statistics-Report-2013-2017-Executive-Summary.pdf (Accessed August 15, 2013).

Rainey, H. G. and Steinbauer, P. (1999). Galloping Elephants: Developing Elements of a Theory of Effective Government Organizations, Journal of Public Administration Research and Theory, 9 (1), 1-32.

Reams, P. and Twale, D. (2008). The promise of mixed methods: discovering conflicting realities in the data. International Journal of Research & Method in Education, 31 (2), 133–142.

Reavis, D. R. (2006). Electronic Mail Retention Policies in Mid-sized Manufacturing Companies in the United States. Ph.D. dissertation, Graduate School of Computer and Information Sciences, Nova Southeastern University.

Reddick, C. G. and Turner, M. (2012). Channel choice and public service delivery in Canada: Comparing e-gouvernment to traditional service delivery. Government Information Quaterly, 29, 1-11.

Relyea, H. C. (2008). Federal government information policy and public policy analysis: A brief overview. Library & Information Science Research, 30, 2–21.

Rice, R. E., and Bair, J. H. (1984). New organizational media and productivity. In R. E.

Rice (Ed.), The new media: Communication, research and technology. Newbury Park: Sage.

Robichaud, T. and Gilinsky, M. (2004). Zubulake V: Emerging trends in the duties regarding electronic evidence. Mealey’s Litigation Report, 1 (12), 1-5.

Roy, J. and Langford, J. (2008). Integrating Service Delivery Across Levels of Government: Case Studies of Canada and Other Countries. IBM Center for The Business of Government, Collaboration: Networks and Partnerships Series,1-64.

   

241  

Saffady, W. (2009). Managing Electronic Records. Lenexa, Kansas: ARMA International, 4th edition.

Saffady, W. (2013). E-Mail Retention and Archiving. Issues and Guidance for Compliance and Discovery. Overland Park, KS: ARMA International.

Sandelowski, M. (2000). Combining Qualitative and Quantitative Sampling, Data Collection, and Analysis Techniques in Mixed-Method Studies. Research in Nursing & Health, 23, 246–255

Sarapu, K. (2010). Comparative Analysis of State Administrations: The Size of State as an Independent Variable. Halduskultuur – Administrative Culture, 11 (1), 30-43.

Saulnier, C. (2007). Les courriels: actif informationnel de nos organisations. Archives, 37 (2), 119-139.

Sax, L. J., Gilmartin, S. K. and Bryant, A. N. (2003). Assessing Response Rates and Nonresponse Bias in Web and Paper Surveys. Research in Higher Education, 44 (4), 409-432.

Schelin, S.H. (2003). E-Government: An overview. In G. David Garson, Editor, Public information technology: Policy and management issues, Idea Group Publishing: Hershey, PA, 120–137.

Schuff, D., Turetken, O., D’Arcy, J. and Croson, D. (2007). Managing E-Mail Overload: Solutions and Future Challenges. IEEE Computer Society, 31-36.

Sedona Conference (2008). Framework for Analysis of Cross-Border Discovery

Conflicts: A Practical Guide to Navigating the Competing Currents of International Data Privacy & e-Discovery - Public Comment Version. The Sedona Conference Journal, 9, 2- 19.

Sedona Conference. (2007). Commentary on Email Management: Guidelines for the selection of retention policy. The Sedona Conference Journal, 8, 239-250.

Seidman, H. (1954). The Government Corporation: Organization and Controls. Public Administration Review, 14 (3), 183-192.

Seow, B. B., Chennupati, R., and Foo, S. (2005). Management of e-mails as official records in Singapore: A case study. Records Management Journal, 15 (1), 43-57.

Shih, T.-H. and Fan, X. (2008). Comparing response rates from Web and mail surveys: A meta-analysis. Field Methods, 20 (3), 249-271.

Shupe, C., and Behling, R. (2006). Developing and implementing a strategy for technology deployment. Information Management Journal, 40(4), 52– 57.

Skupsky, D. S., J.D., CRM and Montana, J. C. J.D. (1994). Law records and information

management. Denver, CO. Information Requirements Clearinghouse.

   

242  

Smallwood, R. F. (2011). Email and IM Governance, Security and Archiving. Developing, Monitoring and Enforcing Email, IM and Electronic Communications Policy Sucessfully. Toronto : IMerge Consulting. E-Records Institute.

Smallwood, R. F. (2013). Managing Electronic Records: Methods, Best Practices, and Technologies. United States : Wiley CIO.

Smith, K. (2008). Planning and Implementing Electronic Records Management. Lenexa, Kansas: ARMA International.

Special Libraries Association. (2003). Competencies for Information Professionals of the 21st Century. Report prepared for the Special Libraries Association Board of Directors by the Special Committee on Comptetencies for Special Librarians.

Sprehe, J. T. and McClure, C. R. (2005). Lifting the burden. Information Management Journal, 39(4), 47–52.

Sprehe, T. (1987). OMB Circular No. A-130, the management of federal information

resources: Its origins and impact. Government Information Quarterly, 4 (2), 189–196.

Sproull, L. and Kiesler, S. (1991). CONNECTIONS New Ways of Working in the Networked Organization, MIT Press.

Stephens, D. O., and Wallace, R. C. (2003). Electronic Records Retention: New

strategies for data life cycle management. Lenexa, KS: ARMA International.

Suchan, J. and Hayzak, G. (2001). The communication characteristics of virtual teams: a case study. IEEE Transactions on Professional Communication, 44 (3), 174–186.

Suderman, J. (2001). Context, Structure and Content: New Criteria for Appraising Electronic Records. [Available online]. http://www.rbarry.com/suderman-wholepaper7_postscript011102.htm (Accessed August 15, 2013).

 Sumecki, D., Chipulu, M. and Ojiako, U. (2011). Email overload: Exploring the

moderating role of the perception of email as a ‘business critical’ tool. International Journal of Information Management, 31, 407– 414.

Swan, K., Cunningham, A. and Robertson, A. (2002). Establishing a high standard for

electronic records management within the Australian public sector. Records Management Journal, 12 (3), 79-86.

Szostek, A.M. (2011).‘Dealing with My Emails’: Latent user needs in email management. Computers in Human Behavior, 27, 723–729.

Tapscott, D. and Agnew, D. (1999). Governance in the digital economy. Finance and Development, 84–87.

   

243  

Teijlingen, E. R. and Hundley, V. (2001). The importance of pilot studies. Social Research Update, 35. [Available online] http://sru.soc.surrey.ac.uk/SRU35.html (last accessed August 15, 2013).

Tesch, R. (1990). Qualitative research: analysis types and software tools. Bristol, PA: Falmer Press.

Thomas, G. F. and King, C. L. (2006). Reconceptualizing E-Mail Overload. Journal of

Business and Technical Communication, 20 (3), 252-287.

Thomassen, T. (2001). A First Introduction to Archival Science. Archival Science, 1, 373-385.

Thurston, A. (2012). Digitization and Preservation: Global Opportunities and Cultural Challenges. In Duranti, L. and Shaffer, E., Conference Proceedings of The Memory of the World in the Digital Age: Digitization and Preservation. An international conference on permanent access to digital documentary heritage, 31-38.

Tirole, J. (1994). The internal organization of government. Oxford Economic Papers, 46, 1-29.

Tschan, R. (2002). A Comparison of Jenkinson and Schellenberg on Appraisal. The American Archivist, 65, 176-195.

University of British Columbia. International Research on Permanent Authentic Records in Electronic Systems (InterPARES). [Available online] http://www.interpares.org/ (Accessed on August 15, 2013).

Walker, D., Walker, T. and Schmitz, J. (2002). Doing business internationally: The guide to crosscultural success. New York: McGraw-Hill, 2nd edition.

Wallace, D. A. (2001). Electronic Records Management Defined by Court Case and Policy. The Information Management Journal, 35 (1), 4-15.

Walters, J. (2005). U.S. government publication: Ideological development and institutional politics from the founding to 1970. Lanham: MD7 Scarecrow Press.

Weerkamp, W., Balog, K. and de Rijke, M. (2009). Using contextual information to improve search in email archives. In Boughanem, M., Berrut, C., Mothe, J, and Soule-Dupuy, C., Eds. Advances in Information Retrieval, Proceedings of 31th European Conference on IR Research, pp. 400-411.

Wildemuth, B. M., Ed. (2009). Applications of Social Research Methods to Questions in Information and Library Science, Westpot, Conn. and London: Librairies Unlimited.

Willemin, G. (2006). The International Committee of the Red Cross (ICRC) official e-mail system. An example of records management. Records Management Journal, 16 (2), 82-90.

   

244  

Winget, M. A., Chang, K. and Tibbo, H. (2006). Personal Email Management on the University Digital Desktop: User Behaviors vs. Archival Best Practices. In Proceedings of the 69th Annual Meeting of the American Society for Information Science & Technology (ASIS&T), Vol. 43, Austin, TX (November 3-November 8, 2006). [Available online] http://www.ischool.utexas.edu/~megan/research/ASIST-MDUD-Formatted.pdf (Accessed August 15, 2013).

Winter, G. (2000). A Comparative Discussion of the Notion of “Validity” in Qualitative and Quantitative Research. The Qualitative Report, 4 (3-4). ). [Available online] http://www.nova.edu/ssss/QR/QR4-3/winter.html (Accessed February 28, 2014).

Wright, T. (2013). Information culture in a government organization. Examining records management training and self-perceived competencies in compliance with a records management program. Records Management Journal, 23 (1), 14-36.

Wu, Y. and Oard, D. W. (2005). Indexing Emails and Email Threads for Retrieval. Proceedings of the 28th annual international ACM SIGIR conference on Research and development in information retrieval, pp. 665-666.

Yakel, E. (2001). The Social Construction of Accountability: Radiologists and their Record-Keeping Practices. The Information Society, 17, 233–245.

Yildiz, M. (2007). E-government research: Reviewing the literature, limitations and ways forward. Government Information Quaterly, 24, 646-665.

Yin, R. K. (2003). Case study research: design and methods. Thousand Oaks: Sage Publications, 3rd edition.

Yuan, Y. C., Zhao, X., Liao, Q. and Chi, C. (2013). The Use of Different Information and

Communication Technologies to Support Knowledge Sharing in Organizations: From E-mail to Micro-Blogging. Journal of the American Society for Information Science and Technology, 64 (8), 1659-1670.

Yusof, Z. M. and Chell, R.W. (2002). Towards a theoretical construct for records management. Records Management Journal, 12 (2), 55-64.

Zeng, M. L. and Qin, J. (2008). Metadata. New York and London: Neil-Schuman Publishers, Inc.

Zwarich, N. and Park, E. G. (2008). Policies of Managing Web Resources at the Canadian Government: A Records Management Perspective. In Guastavino, C. and Turner, J. (Eds). Proceedings of the Canadian Association for Information Science Conference 2008, Vancouver, Canada, 5-7 June, 2008. [Available online] http://www.cais-acsi.ca/search.asp?year=2008 (Accessed August 15, 2013).

   

ccxlvi  

Appendix 1: Ethics Certificate

 

   

ccxlvii  

Appendix 2: Survey Instrument – English

 

   

ccxlviii  

 

   

ccxlix  

 

   

ccl  

 

   

ccli  

 

   

cclii  

   

ccliii  

 

   

ccliv  

 

   

cclv  

   

cclvi  

Appendix 2: Survey Instrument – French

   

cclvii  

   

cclviii  

 

   

cclix  

 

   

   

cclx  

 

   

cclxi  

 

   

cclxii  

 

   

cclxiii  

 

   

cclxiv  

 

   

cclxv  

 

   

cclxvi  

Appendix 3: Results of Survey Questionnaire

Questions Frequency (%)

1. Consent − I agree to participate in the study − I do not agree to participate in the study

204

23

2. What is the name of your agency?

N/A

3. Which of the following best describes the key activity areas of your agency? − General public services − Defense − Public order and safety − Finance and economics affairs − Environment − Health − Recreation and culture − Justice − Education − Other (please specify)

37 (18%)

13 (6%)

21 (10%)

27 (13%)

18 (9%)

29 (14%)

24 (12%)

26 (13%)

9 (5%)

4. What is the staff size of your agency? − Less than 250 employees − Between 250 and 500 employees − More than 500 employees

32 (16%) 119 (58%) 53 (26%)

5. What is your position / title?

See Appendix 4

6. Which of the following categories best represent your position classification? − Director

   

cclxvii  

Questions Frequency (%)

− Manager − Professional − Technician − Clerk − Other (please specify)

121 (59%)

49 (24%)

34 (17%)

0 (0%)

0 (0%)

7. For how many years have you been working in records management / archives? − Less than 10 years − 11 to 20 years − 21 to 30 years − More than 31 years

26 (13%)

51 (25%)

109 (53%)

18 (9%)

8. Do the employees, in your agency, use emails in their daily business activities? − Yes − No

204 (100%)

0 (0%)

9. How important are e-mails in daily business activities in your agency? − Very important − Important − Neutral − Not important − Not at all important

139 (68%)

49 (24%)

0 (0%)

16 (8%)

0 (0%)

10. In your agency, have you ever encountered some problems in managing e-mail messages? − Yes

   

cclxviii  

Questions Frequency (%)

− No − If so, please specify the nature of these difficulties:

179 (87%)

25 (13%)

− Apply retention periods to e-mail messages (n=83)

− Gather complete information and documents related to a subject (n=76)

− Retrieval information for business decision (n=68)

− Capture of e-mail records in corporate repository (n=62)

− Value of e-mail messages (n=51)

− Information overload (n=46) − Continuity of activities when

employees leave (n=34) − Storage (n=21) − Electronic discovery (n=17)

11. Do you considered emails as corporate records? - Yes - No - If no, please explain why:

204 (100%)

0 (0%)

− while e-mail messages that have a business value are records, most e-mail messages have a transitory value (n=5)

− IT professionals and senior managers sometimes consider e-mail as form of ephemeral communication and not as records (n=4)

12. Does the agency that you are working for: - Have developed and implemented, in the past, tools

to manage email records - Is currently developing or implementing an email

management policy and/or guidelines - Is planning to develop an email management policy

and/or guidelines in the near future - Don’t have any email management policy and/or

guidelines and is not planning to develop any king of specific tool to manage email records

- I don’t know

92 (45%)

79 (39%)

20 (10%)

   

cclxix  

Questions Frequency (%)

8 (3%)

7 (3%)

13. Does your agency have one of the following: - A written electronic records management policy - A written electronic records management policy that

addresses email management - A separate written email management policy and

guidelines - No policy and/or guidelines to manage email records - An information policy - I don’t know

46 (27%)

28 (16%)

64 (37%)

25 (16%)

2 (1%)

6 (3%)

14. Which issues are discussed in your email management policy and/or guidelines? (Check all that apply) − E-mails are corporate records − E-mails should be adequately managed − E-mails need to be managed by a records

management system − E-mails should be disposed timely depending on

their value − E-mails should be appropriately stored, protected,

and accessible when necessary − Other, please specify:

100

109

92

85

89

15. Are you satisfied with your current email management policy? − Yes − No

   

cclxx  

Questions Frequency (%)

− If no, what other issues should be included in your email policy and/or guidelines (please specify):

43 (38%)

69 (62%)

− Defined roles and responsibilities between IT, records managers and users (n=27)

− Defined boundaries for use of e-mail system and e-mail etiquette (n=34)

− Guidelines for creation of messages (n=23)

− Enforce compliance (n=11)

16. Were you involved in any way in the creation and/or the implementation of the email

management policy and/or guidelines?

− Yes − No − Please specify the nature of your involvement:

73 (67%)

29 (33%)

− Participated in the creation of e-mail policy (n=21)

− Implementation of e-mail management policy (n=31)

17. Which email system is used in your agency? (please specify) :

− Microsoft Outlook 162 (79%) − IBM Lotus Notes 27 (13%) − Novell GroupWise 15 (8%)

18. Is there a recordkeeping system in your agency? − Yes − No − If yes, please provide the name of the system:

149 (73%)

55 (27%)

− RDIMS (n=121) − Using Documentum for print

records (n=5) − Are currently implementing

RDIMS (n=11) − Implementation delayed (n=3)

   

cclxxi  

Questions Frequency (%)

19. How does your agency manage and save emails that are identified as corporate records (check all that apply)? − Print and file the hardcopy − Keep in e-mail inbox − Save to corporate server − Save to corporate recordkeeping system − Other, please specify:

59 (29%)

27 (13%)

11 (5%)

107 (53%)

0 (0%)

− No consistency in managing e-mail records (n=5)

− older one was print and file, unfortunately a lot kept in email inbox, and some saved in our EDRMS (which is the goal to achieve) (n=1)

− everyone does whatever they want because the guideline is not enforced (n=1)

− “employees are using whatever means possible to ensure the emails are safeguarded. There is little done on the purging and disposition front of emails” (n=1)

20. How is your e-mail management policy and/or guidelines disseminated within your agency (check all that apply)? − Announcement − Training − Agency website or intranet − From employees − Other (please specify)

13 (12%)

47 (42%)

31 (28%)

18 (16%)

2 (2%)

− “we communicated the development and implementation of the policies through various means, including broadcast, targeted and included

   

cclxxii  

Questions Frequency (%)

compliance requirements in all training material. There were subsequently posted on intranet site as well as IM [information management] working databases for ease of access by all employees and managers”. (n=1)

21. To what extent do employees in your agency recognize email management policy and

implement it to their daily activities?

− Excellent − Good − Fair − Poor − Very poor

5 (4.5%)

29 (26%)

39 (35%)

32 (28%)

7 (6.5%)

22. How do you ensure compliance of employees to your email management policy and/or guidelines? − Periodical audit − Monitoring − Quality control − Other, please specify − None

27 (24%)

39 (35%)

22 (20%)

10 (9%)

14 (12%)

23. In your opinion, what is the main reason for employees not being fully compliant with

your agency email management policy and/or guidelines?

− Too busy − Complex − Didn’t know employees should adopt email

management policy − Other (please specify):

74 (66%)

14 (13%)

17 (15%)

   

cclxxiii  

Questions Frequency (%)

7 (6%)

− “Employees are running at 100%. Generally, they do not understand the shift from centrally managed to locally manage at their desktop. Many refuse to become recordkeepers. Somewhat a stereotype situation thus resistance continues at all levels.” (n=1)

− Lack of training and continuous education (n=2)

− “compliance to email policy, other to minimize the volume of emails, is not viewed as a priority” (n=1)

− Absence of RDIMS (n=2) − “a combination of not having a

specific email management policy, too many emails to manage, and no system or guidelines for employees to use” (n=1)

24. In your agency, what are the consequences for not complying with e-mail management policy and/or guidelines? − Verbal warning − Written warning − Limited access to e-mail system − Suspension − Termination − No consequences − I don't know − Other, please specify:

14 (12.5%)

18 (16%)

9 (8%)

11 (10%)

6 (5%)

40 (36%)

14 (12.5%)

− “consequences should be a result of not adhering to Government of Canada legislation on IM” (n=1)

− “while disciplinary measures can be enforced, the organization is not equipped to manage across the board, nor properly monitor compliance. Therefore, not disciplinary

   

cclxxiv  

Questions Frequency (%)

measures can be enforced” (n=1)

25. How do you rate retrieving stored emails in your agency? − Very easy − Fairly easy − Moderate − Difficult − Very difficult  

32 (16%)

41 (20%)

57 (28%)

49 (24%)

25 (12%)

26. Has your agency ever practiced ways to ensure long-term preservation of email

records?

− Yes − No − I don't know

107 (52%)

61 (30%)

36 (18%)

27. Has your agency ever been in a situation where it needed to prove the integrity of an email records? − Yes − No − I don’t know

53 (26%)

40 (20%)

111 (54%)

28. Has your agency ever been ordered by a court or regulatory body to produce an e-mail record? − Yes − No − I don’t know

65 (32%)

32 (16%)

107 (52%)

29. If you have any comments related to email − “e-mail management and the management of e-mail records were

   

cclxxv  

Questions Frequency (%)

management in your agency, please write

your opinions or thoughts.

identified by employees as the #1 priority for the IM program strategy and roadmap”

− “email management is viewed as an IT function in term of storage costs and not an IM function in terms of the value of the record. unless this perception changes, it will be hard to implement tools to manage e-mail records”.

− “Awareness of the issue of email management comes in waves, usually when there is an issue due to litigation, etc. and emails cannot be found. The lack of good tools for lifecycle management of email in the department is also an issue”.

− “employees may overall recognize the need to keep e-mail of business value but do not have the tool to make them easily accessible to others in the nature of a corporate management system. This makes e-mail difficult to manage in terms of accessibility, and for retention and disposition purposes”.

− “with the lack of an official electronic content/records management system to give the proper tools to the clients in effectively managing their emails, it becomes an exercise in futility”.

− “our “clean up and win” contest did reduce emails by encouraging deletion of transitory emails, but that didn’t help with corporate emails not saved in RDIMS. We will be introducing email quotas on mailbox size. That should help”.

30. May I contact you again for future information and clarification? − Yes − No

110 (54%)

94 (46%)

   

cclxxvi  

Appendix 4: List of Titles/Positions of the Respondents to the Survey

ATIP and IM Coordinator

Audit Manager IM/IT

Business Information Officer

Chief, Classification and Organization

Chief, Information Management

Director General, Chief Information Officer

Director General, IM/IT

Director, Enterprise IM/IT Strategic Services

Director, Information and Methodology

Director, Information and Library Management

Director, Information Management & Records Management

Director, Library Archives and Documentation Services

Enterprise Management Information Analyst

Head of Archives, Library and Collections

Head, Information Management

Head, Records Management

IM Advisor

IM Policy and Planning Officer

IM Training and Outreach Officer

IM/IT Planning Analyst

IMT Corporate Reporting Analyst

Information Advisor

Information and Records Management Analyst

Information Holdings and Records Administrator

Information Management Officer

Information Specialist

   

cclxxvii  

Manager, Enterprise Information and Records Management

Manager, Life Cycle Management

Recorded Information Specialist

Records and Documents Management Specialist

Records Integrity Specialist

Records Management Coordinator

Records Management Specialist

Records Management Supervisor

Records Retention Analyst

Records Team Leader

Sr Information Analyst

Supervisor, Records Operations

 

   

cclxxviii  

Appendix 5: Invitation Letter to Interviews Participants – English  

 

Montreal, (Date)

(Name of organization) (Address)

Mr/Ms ________________________

I am contacting you to invite you to participate in a research study that I am conducting as part of my Ph.D. dissertation at the School of Information Studies at McGill University.

The study investigates the current e-mail management principles in federal government organizations. More specifically, this study aims to determine and compare significant differences in managing e-mail records in government organizations and to identify the best practices to manage e-mail messages in order to ensure reliability, authenticity, and integrity of this type of electronic records.

You were indentified as a potential participant due to your position as a information management professional. If you accept to participate in this study, I will ask you to conduct an oral interview and help collect supporting documentation. The interview can take place at the location of your choosing and be held at a time that suits you best. The interview can be conducted in French or in English, depending on your preference. I will contact you shortly in hope to make an appointment. Your participation is voluntary and the data will only serves research purposes.

If you have any questions, please contact me.

Best regards,

Natasha Zwarich Eun G. Park Doctoral Candidate and Principal Investigator Associate Professor and Faculty Advisor School of Information Studies School of Information Studies McGill University McGill University 3661 Peel Street 3661 Peel Street Montreal (Quebec) H3A 1X1 Montreal (Quebec) H3A 1X1 Tel. : (450) 482-0802 Tel. : (514) 398-3364 E-mail : [email protected] E-mail : [email protected]  

   

cclxxix  

Appendix 5: Invitation Letter to Interviews Participants - French

Montréal, le (date)

(Organisation)

(Adresse)

Monsieur / Madame ________________________

 

La présente vise à vous inviter à participer à l'étude que je mène dans le cadre de mon doctorat en sciences de l'information, sous la direction de la professeure Eun G. Park de la School of Information Studies de McGill University. L'étude s’intéresse aux pratiques actuelles de gestion du courrier électronique au Gouvernment du Canada afin de garantir leur fiabilité, authenticité et intégrité. Votre participation à tire de professionnel«le» de l'information est essentielle à la réalisation de ce projet de recherche. J'aimerais donc vous rencontrer pour conduire une entrevue d'environ une heure et demie. L'entrevue pourra se dérouler, selon votre préférence, en français ou en anglais et se tiendra au moment qui vous convient le mieux. Je vous remercie de l'attention que vous porterez à cette demande. Je communiquerai avec vous sous peu pour connaître votre disponibilité et, je l'espère, prendre rendez-vous. Votre participation est volontaire et les données receuillies ne serviront qu'à des fins de recherche. Je vous prie d’agréer, Monsieur/Madame, l’expression de mes salutations les plus distinguées,  Natasha Zwarich Eun G. Park Doctoral Candidate and Principal Investigator Associate Professor and Faculty Advisor School of Information Studies School of Information Studies McGill University McGill University 3661 Peel Street 3661 Peel Street Montreal (Quebec) H3A 1X1 Montreal (Quebec) H3A 1X1 Tel. : (450) 482-0802 Tel. : (514) 398-3364 E-mail : [email protected] E-mail : [email protected]  

   

cclxxx  

Appendix 6: Informed Consent Form

CONSENT TO PARTICIPATE IN RESEARCH

Policies and Practices at the Canadian Government for E-mail Management: an Exploratory Study

You are invited to participate in a research study being conducted by Natasha Zwarich, doctoral candidate at the School of Information Studies, McGill University, Montreal as her dissertation research, and for potential scholarly publications.

IDENTIFICATION OF INVESTIGATOR

Natasha Zwarich, Doctoral Student and Principal Investigator School of Information Studies McGill University 3661 Peel Street Montreal (Quebec) H3A 1X1 Tel.: (450) 482-0802 E-mail : [email protected] Eun G. Park, Associate Professor and Faculty Advisor School of Information Studies McGill University 3661 Peel Street Montreal (Quebec) H3A 1X1 Tel.: (514) 398-3364 E-mail: [email protected]

PURPOSE OF THE STUDY

The study investigates the current e-mail management practices in federal government organizations. More specifically, this study aims to determine and compare significant differences in managing e-mail records in government organizations and to identify the best practices to manage e-mail messages in order to ensure reliability, authenticity, and integrity of this specific type of electronic records.

   

cclxxxi  

PROCEDURES

Your participation in the study will entail an oral interview. This interview will last approximately one hour and a half and will be conducted in your workplace or at a location of your choosing. During the interview, the investigator will ask you a series of questions relating to how e-mail records are managed in your organization and how you ensure the reliability, authenticity and integrity of e-mail records. In addition, the investigator will ask your consent to be audiotaped to help the investigator taking notes. Also, after the interview, the investigator might contact you by telephone or electronic mail if there are any points arising from the interview that she needs to clarify.

POTENTIAL BENEFITS

You will have the opportunity to express your thoughts about effective e-mail management and you will learn more about what are the best practices to manage e-mail messages. The findings of this study will characterize administrative and procedural contexts of government records management and identify the strengths and weaknesses of management of e-mail as official records within the Government of Canada (GoC). Also, this research will support a better understanding of the factors that facilitate and limit electronic records management in the GoC. In addition, it is expected to contribute to the development of improved e-mail management practices and preservation policies at the GoC. Moreover, the expected results will add to research in the records management field and be applicable for use in other organizational settings to meet their needs in e-mail management. You will receive a summary of the interview for your records and also for you to review to make sure that I have correctly interpreted your answers. Copies of the final results of this study will be made available to you.

POTENTIAL HARMS AND RISKS

Participation in this research does not pose any foreseeable harms and risks.

PRIVACY AND CONFIDENTIALITY

Any information that is obtained and that can be identified with you will remain confidential and will be disclosed only with your permission. The data will only be used for the purpose of this research study. Your name will not be used. However, you should know that you or the government institution for whom you work for might be identifiable from the description of your work functions and the mission statement of your institution. If you are uncomfortable with this possibility, this information will not be disclosed. Confidentiality will be maintained by assigning a code number to you. The code will be kept by the investigator and will not be made accessible to any other individual. Identifiable information will not be given to anyone other than the dissertation committee and the investigator itself. If you have any concerns about the possibility of being identified, please express them to the investigator.

You will have the right to review your interview information and withdraw permission to use it at any time. You also have the possibility to review the recordings made for this study and edit and/or erase any information that you are not comfortable with. Anything you say will only be attributed to you with your permission, otherwise the information will be reported in such a way

   

cclxxxii  

as to make direct association with yourself impossible. The information will be stored in a secure place and will not be made available to anyone other than the investigator and the dissertation committee. The recordings will be kept by the investigator for the duration of the study. After the research is over, the recordings will be kept in a secure place, if you agree, or erased.

COMPENSATION

You will not receive any compensation for your participation in this research project.

PARTICIPATION AND WITHDRAWAL

Your participation is voluntary. If you accept to participate in this research, you are able to withdraw your consent and stop your participation at any time without any penalty. You also have the right to refuse to answer any questions you do not want and still remain in the study. Any information that is obtained and that can be related with you will remain confidential and will be disclosed only with your permission.

SIGNATURE OF RESEARCH PARTICIPANT AND PRINCIPAL INVESTIGATOR

I have read the above information and I agree to participate in this study

______________________________ ____________________________________

Signature of the participant Signature of the principal investigator

_____________________________ ___________________________________

Date Date

   

cclxxxiii  

Appendix 7: Interview Instrument  

Interview instrument for data gathering

This interview is being conducted as part of a doctoral dissertation research study that is investigating the current e-mail management practices in federal government organizations. More specifically, this study aims to determine and compare significant differences in managing e-mail records in government organizations and to identify the best practices to manage e-mail messages in order to ensure reliability, authenticity, and integrity of this specific type of electronic records. This interview is only for research purposes and your participation is completely voluntary.

Code #: _______________

Profile

1. What is your position /title in your institution? How long have you been working for that institution? What is your hierarchical rank?

2. What is the mission of your institution? Can you please provide the mission statement of your institution?

3. What is the staff size of your institution?

4. What is the organizational structure of your institution? Can you please provide a copy of the organization chart?

5. What are the main tasks or missions of your administrative unit?

6. Can you describe the composition and the tasks of the information management team?

E-mail policy and guidelines

7. Does your institution have written e-mail management policies or guidelines explaining the use of e-mails?

8. If so, when was it introduced? Who produced it? Can you please provide a copy of your e-mail management policy? If not, are you planning to develop any kind of policy for managing e-mail messages?

9. What information does it contain? In your opinion, do you think your e-mail management policy is satisfactory or not and covers all the issues related to the use and management of e-mail messages?

10. How does your institution deal with e-mail attachment?

11. How does your institution keep e-mails that are identified as corporate records? Do you think practices of employees are appropriate in your institution?

12. In your opinion, what is the effort required to retrieve stored e-mails and attachments?

13. Which office or administrative unit is responsible for overseeing e-mail management?

   

cclxxxiv  

14. What are your duties and responsibilities relating to e-mail management?

15. In your opinion, who should be responsible of e-mail management in an institution? What should be the roles of the different stakeholders involved in e-mail management?

Implementation and compliance

16. Please explain how employees put e-mail management policy into practice in their works.

17. How do employees learn or know the existence of your e-mail management policy or any new notices related to e-mail management?

18. In your opinion, to what extent is your institution compliant with your e-mail management policy? How would you explain the fact that some employees are not being fully compliant with your institution e-mail management policy?

19. Did you develop some tools to facilitate the compliance of the employees? If so, can you please describe the tools that have been developed?

20. Does your institution offer some training to ensure the compliance of the employees? If so, how the training is organized? What is the content of the training session? Do new employees receive some training upon their arrival?

21. Does your institution do some sort of quality control (audit) to verify the compliance with the e-mail management policy? If so, on what basis (annually, quarterly or monthly?)? If not, why not offered? How can you measure the compliance of employees?

E-mail System and Recordkeeping System

22. Which e-mail system is used in your institution? What are the main functionalities of this system? What functions are most frequently used? 23. Do some employees use the e-mail system to manage their messages? Do you think that this practice is appropriate for the management of e-mail records? 24. Are e-mail messages backed-up ? If so, for how often? Please explain e-mail back–up policy in your institution. 25. Is there a corporate recordkeeping system in your institution? If so, what is the name of the system? Can you describe its main functionalities? Do you use the recordkeeping system to manage e-mail records in your institution?

Issues

26. How do you preserve e-mail records? Please explain in detail. Does your institution ever consider ways to ensure the long-term preservation of e-mail records? If so, what methods did your institution chose and why? In your opinion, what is the best way to preserve e-mail records? 27. Can you give me an example where your institution needed to prove the authenticity and integrity of an e-mail message? 28. When employees in your institution create and work with records, do they trust e-mail records?

   

cclxxxv  

29. In your opinion, what means can ensure the authenticity and reliability of e-mail records? 30. Overall, are you satisfied with your current practices in your institution?

31. Would you recommend any improvement in your current practice?

32. Are there other issues that were not discussed in the interview that you would like to raise?

33. May I contact you again for follow-up and further information as well as supporting documentation?

Natasha Zwarich Eun G. Park Doctoral Candidate and Principal Investigator Associate Professor and Faculty Advisor School of Information Studies School of Information Studies McGill University McGill University 3661 Peel Street 3661 Peel Street Montreal (Quebec) H3A 1X1 Montreal (Quebec) H3A 1X1 Tel.: (450) 482-0802 Tel. : (514) 398-3364 E-mail : [email protected] E-mail : [email protected]

   

cclxxxvi  

Appendix 8: Thank You Letter to Interview Participants Montreal, (Date)

(Name of organization) (Address)

Dear Mr/Ms ________________________

Many thanks for your participation in my research project aimed at a better understanding of the practices for e-mail management at the Canadian government. Your interview provided me with information essential for my research for which I am grateful. Best regards,

Natasha Zwarich Doctoral Candidate and Principal Investigator School of Information Studies McGill University 3661 Peel Street Montreal (Quebec) H3A 1X1 E-mail : [email protected]