<?xml version="1.0" encoding="utf-8"?>
<StrategicPlan>
  <Name>Best Practices for Business-Quality Communications:  Moving to a Higher Level of Maturity than E-mail</Name>
  <Description>The Capability Maturity Model (CMM) is a widely recognized framework for evaluating the formality and optimization of processes.E-mail is a highly immature (CMM Level 1, Chaotic) means of creating, sharing, and managing business records.  A more mature process for meeting the underlying requirements would achive the following goals.</Description>
  <OtherInformation>
  </OtherInformation>
  <!--Strategic Plan Core-->
  <StrategicPlanCore>
    <Vision>
      <Description>
      </Description>
      <Identifier>Vision_676bac22-3425-482e-8d44-c8a4c03b54a8</Identifier>
    </Vision>
    <Mission>
      <Description>
      </Description>
      <Identifier>Mission_676bac22-3425-482e-8d44-c8a4c03b54a8</Identifier>
    </Mission>
    <Goal>
      <Name>Strategic Alignment</Name>
      <Description>Enable users to retrieve information that is directly and explicitly related to their own objectives.</Description>
      <Identifier>Goal_fbb240e2-2734-42bd-8612-8170af14c5b0</Identifier>
      <SequenceIndicator>1</SequenceIndicator>
      <OtherInformation>
      </OtherInformation>
    </Goal>
    <Goal>
      <Name>Importance &amp; Relevance</Name>
      <Description>Enable users to automatically prioritise communications according to relevance to tasks which are aligned with their strategic objectives.</Description>
      <Identifier>Goal_921342fc-ea9b-401d-810c-f1abebcc00aa</Identifier>
      <SequenceIndicator>2</SequenceIndicator>
      <OtherInformation>Enable users to automatically prioritise communications according to relevance to tasks which are aligned with their strategic objectives.</OtherInformation>
    </Goal>
    <Goal>
      <Name>Retrieval</Name>
      <Description>Enable users to retrieve information exactly when and where they choose.</Description>
      <Identifier>Goal_9a48c03f-80ae-4e35-b3b7-247b1e9aa974</Identifier>
      <SequenceIndicator>3</SequenceIndicator>
      <OtherInformation>Enable users to retrieve information exactly when and where they choose.</OtherInformation>
    </Goal>
    <Goal>
      <Name>Narrow Casting</Name>
      <Description>Enable users to receive information that is discretely targeted to them based upon their personal attributes, interests, and particularly their intentions (longer-term goals and near-term objectives).</Description>
      <Identifier>Goal_905ab8bf-0e8d-4ad1-827a-490904c61e1d</Identifier>
      <SequenceIndicator>4</SequenceIndicator>
      <OtherInformation>Enable users to receive information that is discretely targeted to them based upon their personal attributes, interests, and particularly their intentions (longer-term goals and near-term objectives).</OtherInformation>
    </Goal>
    <Goal>
      <Name>Attachments</Name>
      <Description>Prohibit the transmittal of attachments</Description>
      <Identifier>Goal_278e50aa-4086-4189-8797-59dbb9bec721</Identifier>
      <SequenceIndicator>5</SequenceIndicator>
      <OtherInformation>
      </OtherInformation>
    </Goal>
    <Goal>
      <Name>Requirements</Name>
      <Description>Enable usage of the applications, tools, and services that are well suited to the underlying requirements.</Description>
      <Identifier>Goal_9ec179b0-d00a-4bf2-b8fc-ada328dd610d</Identifier>
      <SequenceIndicator>6</SequenceIndicator>
      <OtherInformation>Enable usage of the applications, tools, and services that are well suited to the underlying requirements.</OtherInformation>
    </Goal>
    <Goal>
      <Name>Trusted Networks</Name>
      <Description>Establish White List trusted networks based upon an open standard(s).</Description>
      <Identifier>Goal_bf6c00b6-701a-4d5a-88d5-6122542584de</Identifier>
      <SequenceIndicator>7</SequenceIndicator>
      <OtherInformation>Establish White List trusted networks based upon an open standard(s).</OtherInformation>
    </Goal>
    <Goal>
      <Name>De-Duplication</Name>
      <Description>Disallow the needless duplication of information.</Description>
      <Identifier>Goal_b56e4a98-4349-4483-8846-b7c6c90861ca</Identifier>
      <SequenceIndicator>8</SequenceIndicator>
      <OtherInformation>Disallow the needless duplication of information.</OtherInformation>
    </Goal>
    <Goal>
      <Name>Context</Name>
      <Description>Ensure that business records contain sufficient context.</Description>
      <Identifier>Goal_7a06c829-785a-4fe0-a519-99c030f97f0b</Identifier>
      <SequenceIndicator>9</SequenceIndicator>
      <OtherInformation>Each business record should contain sufficient context to meet the requirements for the purpose for which it was created. Additionally, sufficient metadata should be associated with each record to facilitate its management and discovery.</OtherInformation>
    </Goal>
    <Goal>
      <Name>E-Discovery</Name>
      <Description>Reduce the cost and increase the precision of discovery.</Description>
      <Identifier>Goal_5e5d08c1-8f08-4880-bf8f-c6bd91ec3516</Identifier>
      <SequenceIndicator>10</SequenceIndicator>
      <OtherInformation>Apply the best practices outlined in this plan in order to reduce the cost and increase the precision of discovery not only in litigation but also in support of routine business processes as well as queries by interested stakeholders.</OtherInformation>
    </Goal>
    <Goal>
      <Name>Spoliation</Name>
      <Description>Ensure that records cannot be destroyed except in accordance with an approved disposition schedule.</Description>
      <Identifier>Goal_3adbb6ab-b38b-4541-96a1-d49e78356cf4</Identifier>
      <SequenceIndicator>11</SequenceIndicator>
      <OtherInformation>Ensure that records may not be destroyed or made inaccessible if they may exist anywhere else.</OtherInformation>
    </Goal>
    <Goal>
      <Name>Vampire Effect</Name>
      <Description>Avoid using systems that enable the distribution of records in way that are unmanageable.</Description>
      <Identifier>Goal_c802d785-b13a-4758-9b31-7e6b8c69fd08</Identifier>
      <SequenceIndicator>12</SequenceIndicator>
      <OtherInformation>Avoid using systems that enable the distribution of records in ways that are unmanageable.</OtherInformation>
    </Goal>
    <Goal>
      <Name>Collaboration</Name>
      <Description>Use tools, applications, and services that meet the underlying requirements for efficient and effective collaboration</Description>
      <Identifier>Goal_dbf3b38a-40ec-433e-9c21-f957b7ae4354</Identifier>
      <SequenceIndicator>13</SequenceIndicator>
      <OtherInformation>
      </OtherInformation>
    </Goal>
    <Goal>
      <Name>Linkages</Name>
      <Description>Linkages</Description>
      <Identifier>Goal_90343cdd-eee2-4b43-b480-a7e4584f8e09</Identifier>
      <SequenceIndicator>14</SequenceIndicator>
      <OtherInformation>Allow links to be created between any different pieces of information whilst retaining the context of both the source and the destination.</OtherInformation>
    </Goal>
    <Goal>
      <Name>Security</Name>
      <Description>Security</Description>
      <Identifier>Goal_b08854b9-a115-42d5-8690-1653bef5f41c</Identifier>
      <SequenceIndicator>15</SequenceIndicator>
      <OtherInformation>Communications should be secured against unauthorised access.

Security is required both for information during transmission, and when it is in storage.</OtherInformation>
    </Goal>
    <Goal>
      <Name>Identity</Name>
      <Description>Each party to a communication should be verifiably identified</Description>
      <Identifier>Goal_ed58f9a0-dc2b-4288-bd9c-d4c6e31a8311</Identifier>
      <SequenceIndicator>16</SequenceIndicator>
      <OtherInformation>Identity confers context and credibility, and helps to prevent fraud. It is a requirement for contractual arrangements, KYC-type regulations, and in the event of communications subject to non-disclosure agreements.</OtherInformation>
    </Goal>
  </StrategicPlanCore>
  <!--Administrative Information-->
  <AdministrativeInformation>
    <Identifier>StrategyPlan_676bac22-3425-482e-8d44-c8a4c03b54a8</Identifier>
    <StartDate>
    </StartDate>
    <EndDate>
    </EndDate>
    <PublicationDate>2025-09-04</PublicationDate>
    <Source>https://www.stratnavapp.com/StratML/Part1/676bac22-3425-482e-8d44-c8a4c03b54a8</Source>
    <Submitter>
      <Identifier>Submitter_676bac22-3425-482e-8d44-c8a4c03b54a8</Identifier>
      <GivenName>
      </GivenName>
      <Surname>
      </Surname>
      <PhoneNumber>
      </PhoneNumber>
      <EmailAddress>
      </EmailAddress>
    </Submitter>
  </AdministrativeInformation>
</StrategicPlan>