Products and Solutions
 EMA® Mail
 EMA® Cyber Defense
 EMA® Print
 EMA® Scan
 EMA® File
 EMA® Voice
EMA® for SAP Solutions
 SAP Metadata
 SAP Live Migration
 SAP Scan
 S/4 HANA Relief
ARTEC SMART Integration Tools
Firegate VPN
eDiscovery Solutions
Case Management
VSTOR® Vault
 Product Details
 Object Storage
ARTEC Cloud Solutions
 Cloud Models
 Managed Services
 Microsoft 365
Mailserver migration
Microsoft 365 tips
EMA® is Easy to Use
Data Formats
Protect Your Investment
Comprehensive Archiving
Storage Technology
Data Security Concept
Protection Against Cyber Attacks
Big Data - Knowledge is Power
Software Architecture
Single Sign-On
Folder Synchronization
User Access
Full-Text Search
Backup and Recovery
ANA Server
Trusted EMA®
Hot Standby
Digital Signatures
Attributes and Metadata
Department archives/Linking
Federated Search
Retroactive Archiving
WAN Synchronization
EMA® DeDup Server
EMA® App
Outlook extension
Good to Know
Legally Compliant Archiving
Protecting Personal Information
Why WORM Is No Solution
Problems with certifications
Stubbing - (Not) A Solution
Who Uses EMA®?
Why Bother with Archiving
Benefits of an Appliance
Dealing with private e-mails
Laws and Regulations
Overview of the Most Important Regulations
General Data Protection Regulation (DSGVO)
Right to be "forgotten"
Events and Webinars
Press Releases
Press Review
Partner Program
Partner Portal
ARTEC Promotional Program
ARTEC Expert Network
Services & Support
Consulting Services
Technical Consulting
Software Development
Software Subscription & Warranty
Product Support
Company History
Green responsibility
Where to Find Us
Job Openings
Terms and Conditions
Protected Trademarks and Patents
Information for Investors
Privacy Policy
Corporate Information

Protecting Personal Information

Another requirement for an archiving solution is protecting personal information in compliance with privacy regulations. These not only include organization-internal regulations, such as rules regarding the use of private e-mail on the company network, but also protecting the archive against unauthorized access and malicious manipulation.

A Common Weak Point: The All-Powerful Administrator

A problem especially common with archiving solutions that are entirely software-based is that network administrators have access permissions that are too relaxed. After all, they have to get their job done. Unrestrained access poses a problem in terms of privacy protection. If administrators have free rein, the security of an archive can no longer be guaranteed.

Intelligent Solutions Ensure the Archive is Safe

EMA®'s Four-Eye-Principle authentication is an innovative solution to this age-old problem. It can be used to configure the archive so that it only allows access to stored e-mail messages if another user, such as an employee representative, is present. This additional layer of security provides an effective way to prevent abuse of privileges, and is a great aid in implementing organization-internal privacy regulations.