Sprehe: Pop-up policies

E-mail is an essential part of agency business processes, but only a handful of officials are properly managing e-mail records.

The majority are ignoring the grave liability issues associated with their failure to keep either electronic or paper records of important agency actions and decisions conveyed via e-mail.

When they are called to account for actions that were discussed and decided on via

e-mail — whether in court or by Congress — agencies will come up empty-handed because the messages will have been deleted.

Some officials have chosen the tempting fix of using pop-up messages to prompt end users. When a user creates an e-mail and hits Send, a pop-up message asks whether the e-mail is a record and, if the answer is yes, where it should be filed.

Officials at those agencies believe they now have e-mail records management under control. Almost always, they are wrong.

Using desktop pop-up messages for e-mail records management is a bad idea for at least three major reasons.

First, as a general principle, information technology should increase worker productivity, not decrease it. Asking workers to take the time to decide whether something is a record and where it should be filed takes time away from their jobs. The seconds end users take to make those decisions add up to minutes, hours and days subtracted from their productivity. This is poor IT management policy.

Second, asking end users to make records management decisions means that the agency ends up having as many records managers as it has end users. This also is poor records management policy. Trained records officers are the only people who should be making such decisions.

End-user pop-ups are effective only if the agency is willing to make a sustained investment in training and quality control for end users. Unless they are truly serious about records management, almost no agencies will make that commitment.

Third, e-mail pop-ups don't work. End users know records management is not their responsibility. They resist the pop-ups, play games with the system, declare everything a nonrecord or simply do not comply. The policy ends up annoying its end users and the agency gets lousy e-mail records management.

The best practice in electronic records management — whether for e-mail or document management systems — is to minimize end-user involvement.

Electronic records management should occur in the background, transparent and nonintrusive to end users.

Creating such a system is not rocket science. But it takes ingenuity and cooperation among records managers and IT managers, characteristics conspicuously lacking in most agencies.

Sprehe is president of Sprehe Information Management Associates Inc. in Washington, D.C. He can be reached at jtsprehe@jtsprehe.com.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group