9+ MN State Employee Email Login & Info [Guide]


9+ MN State Employee Email Login & Info [Guide]

Official digital correspondence programs utilized by people employed by the federal government of Minnesota are designed to facilitate inside and exterior communication associated to state enterprise. These programs usually present a safe and auditable technique of conveying data, collaborating on initiatives, and interesting with the general public. For instance, a workers member within the Division of Income may use this method to correspond with taxpayers relating to their filings.

Using these programs is essential for sustaining transparency, accountability, and effectivity inside state authorities. It gives a file of communications, guaranteeing compliance with knowledge retention insurance policies and facilitating responses to public data requests. Moreover, these programs typically combine with different state functions, streamlining workflows and enhancing inter-agency collaboration. Traditionally, the adoption of standardized digital communication has considerably decreased paper utilization and improved the velocity of knowledge dissemination throughout numerous authorities branches.

The next sections will delve into acceptable use insurance policies, safety protocols, knowledge retention pointers, and entry procedures related to these programs, offering an intensive understanding of their operation and administration throughout the state of Minnesota.

1. Official communication channel

The idea of an “official communication channel” is intrinsically linked to using Minnesota state worker e-mail. The designation of this method because the official channel implies that digital correspondence carried out via it carries vital weight and is taken into account authoritative for state-related enterprise. Consequently, selections, directives, and delicate data disseminated by way of this medium are legally binding and require strict adherence. For example, an official coverage change communicated by way of the state worker e-mail system is taken into account the formal announcement of that change, with related authorized and operational implications. The reliability and safety of the e-mail system are due to this fact paramount to make sure the integrity of official state communication.

The significance of utilizing the state e-mail system because the official channel stems from the necessity for accountability, transparency, and record-keeping inside authorities operations. By centralizing official communications inside this devoted platform, the state can preserve complete audit trails, facilitating responses to public data requests and guaranteeing compliance with knowledge retention insurance policies. Contemplate the state of affairs of a contract negotiation: the official file of presents, counteroffers, and last agreements resides throughout the state worker e-mail system, offering a verifiable timeline of occasions. Additional, the system’s safety features, equivalent to encryption and entry controls, shield delicate data from unauthorized entry and tampering, which is essential for sustaining the confidentiality of official communications.

In abstract, the Minnesota state worker e-mail system’s function because the “official communication channel” is prime to the efficient and clear operation of state authorities. This designation mandates strict adherence to safety protocols, knowledge retention insurance policies, and acceptable use pointers. Understanding this relationship is essential for all state staff to make sure they’re speaking responsibly and legally, thereby upholding the integrity and accountability of state governance.

2. Information safety protocols

Stringent knowledge safety protocols are inextricably linked to the safety and integrity of the Minnesota state worker e-mail system. These protocols are in place to guard delicate knowledge transmitted and saved throughout the e-mail system, mitigating the danger of unauthorized entry, knowledge breaches, and compliance violations.

  • Encryption Requirements

    Encryption is a basic safety measure that transforms readable knowledge into an unreadable format, defending it from unauthorized interception. The state mandates using strong encryption requirements, each in transit (throughout e-mail transmission) and at relaxation (when saved on servers). For example, Transport Layer Safety (TLS) is often employed to encrypt emails as they journey throughout networks, stopping eavesdropping. Robust encryption algorithms, equivalent to AES-256, are utilized to safe emails saved on state servers, rendering them unintelligible to anybody with out correct authorization.

  • Entry Controls and Authentication

    Rigorous entry management mechanisms are carried out to limit entry to the state worker e-mail system primarily based on roles and permissions. Multi-factor authentication (MFA) is commonly required, necessitating customers to offer a number of types of identification (e.g., password and a code from a cell app) to confirm their id. Function-based entry management (RBAC) ensures that staff can solely entry the data and functionalities needed for his or her job duties, limiting the potential injury from compromised accounts. A hypothetical instance consists of granting a human assets worker entry to personnel data whereas proscribing entry for an IT assist workers member.

  • Intrusion Detection and Prevention Methods

    Intrusion Detection Methods (IDS) and Intrusion Prevention Methods (IPS) repeatedly monitor community site visitors and system exercise for malicious habits and unauthorized entry makes an attempt. These programs analyze patterns, signatures, and anomalies to establish potential safety threats, equivalent to phishing assaults, malware infections, and brute-force login makes an attempt. Upon detecting a menace, the IPS mechanically blocks the malicious exercise, whereas the IDS alerts safety personnel for additional investigation. For instance, if a state worker receives a suspicious e-mail with a malicious attachment, the IPS may block the e-mail earlier than it reaches the worker’s inbox, stopping potential hurt.

  • Information Loss Prevention (DLP) Measures

    Information Loss Prevention (DLP) measures are designed to stop delicate knowledge from leaving the state worker e-mail system with out correct authorization. DLP programs analyze e-mail content material and attachments for confidential data, equivalent to social safety numbers, monetary knowledge, and guarded well being data (PHI). If a person makes an attempt to ship an e-mail containing delicate knowledge to an exterior recipient with out correct justification, the DLP system can block the e-mail, notify the person, and alert safety personnel. This helps to stop unintended or intentional knowledge leaks, guaranteeing compliance with privateness laws like HIPAA and state knowledge safety legal guidelines.

The coordinated utility of those knowledge safety protocolsencryption, entry controls, intrusion detection, and knowledge loss preventionforms a strong protection towards potential threats to the Minnesota state worker e-mail system. These protocols aren’t static; they’re frequently up to date and refined to deal with rising safety dangers and make sure the ongoing safety of delicate state data. Failure to stick to those protocols may lead to severe penalties, together with knowledge breaches, authorized liabilities, and reputational injury to the state.

3. Acceptable Use Pointers

Acceptable Use Pointers (AUGs) present a framework for the accountable and moral utilization of the Minnesota state worker e-mail system. These pointers are designed to stop misuse, guarantee safety, and preserve professionalism in all digital communications carried out via state assets. Strict adherence to those pointers is a situation of employment for state staff and is essential for shielding the integrity and fame of the state authorities.

  • Prohibition of Private Use

    A key tenet of the AUGs is the restriction of the state e-mail system for private or personal enterprise. The system is meant completely for official state enterprise. Examples of prohibited private use embody sending or receiving private emails, participating in political advocacy, or utilizing the system for private monetary transactions. Violations can lead to disciplinary motion, as much as and together with termination of employment, and potential authorized ramifications if state assets are used for unlawful actions.

  • Confidentiality and Information Safety

    The AUGs mandate strict adherence to confidentiality protocols and knowledge safety requirements. State staff are answerable for safeguarding delicate data, together with private knowledge, monetary data, and commerce secrets and techniques, from unauthorized disclosure. This consists of avoiding the transmission of unencrypted delicate knowledge, exercising warning when forwarding emails, and adhering to knowledge retention insurance policies. Improper dealing with of confidential data can result in knowledge breaches, authorized penalties, and reputational injury to the state.

  • Skilled Conduct and Communication

    The AUGs emphasize the significance of sustaining skilled conduct and communication in all digital interactions carried out via the state e-mail system. Workers are anticipated to speak respectfully, keep away from offensive or discriminatory language, and chorus from participating in harassment or bullying. Inappropriate or unprofessional communication can create a hostile work atmosphere and expose the state to authorized legal responsibility. Examples of unacceptable habits embody sending harassing emails, making derogatory feedback, or participating in private assaults.

  • Safety Consciousness and Compliance

    The AUGs stress the significance of safety consciousness and compliance with state safety insurance policies. Workers are required to be vigilant towards phishing assaults, malware threats, and different safety dangers. This consists of repeatedly updating passwords, avoiding suspicious hyperlinks or attachments, and promptly reporting any safety incidents to the IT safety division. Failure to adjust to safety protocols can compromise the safety of all the state community and expose delicate knowledge to unauthorized entry.

In conclusion, Acceptable Use Pointers are an integral element of the Minnesota state worker e-mail system, offering a essential framework for accountable and moral digital communication. By adhering to those pointers, state staff contribute to sustaining the integrity, safety, and professionalism of state authorities, safeguarding delicate data, and stopping potential authorized and reputational dangers. The rigorous enforcement of those pointers is crucial to make sure that the state e-mail system stays a trusted and dependable software for conducting official state enterprise.

4. Retention insurance policies

Retention insurance policies are a essential element governing the administration and disposition of digital communications throughout the Minnesota state worker e-mail system. These insurance policies dictate the size of time particular kinds of emails should be preserved, guaranteeing compliance with authorized, regulatory, and operational necessities.

  • Authorized and Regulatory Compliance

    Retention insurance policies are sometimes mandated by authorized statutes and regulatory frameworks, requiring state companies to protect sure e-mail communications for specified durations. These necessities could stem from open authorities legal guidelines, knowledge privateness laws, or industry-specific requirements. For instance, emails associated to monetary transactions could must be retained for a number of years to adjust to auditing necessities. Failure to stick to those authorized and regulatory retention necessities can lead to penalties, authorized liabilities, and reputational injury for the state.

  • Litigation Readiness

    E mail communications could be essential proof in authorized proceedings. Retention insurance policies be sure that related emails are preserved and accessible within the occasion of litigation, investigations, or audits. A well-defined retention coverage facilitates environment friendly and cost-effective e-discovery processes, enabling the state to reply promptly and successfully to authorized requests. For instance, emails associated to contract negotiations or coverage selections could also be important for defending the state’s pursuits in a authorized dispute. The absence of a transparent retention coverage could end result within the lack of essential proof, hindering the state’s potential to defend itself in court docket.

  • Information Administration and Archival

    Retention insurance policies are integral to efficient data administration practices inside state authorities. They decide which emails are thought of official data and require long-term preservation for historic or informational functions. This consists of emails documenting vital coverage selections, key occasions, or company operations. Emails designated as official data are sometimes transferred to archival programs for everlasting preservation, guaranteeing their accessibility for future analysis and reference. A sturdy retention coverage ensures that beneficial institutional data is preserved for future generations of state staff.

  • Operational Effectivity and Storage Administration

    Retention insurance policies additionally play an important function in optimizing storage administration and bettering operational effectivity throughout the state worker e-mail system. By defining clear retention durations for several types of emails, the state can decrease the quantity of cupboard space required and scale back the prices related to sustaining giant e-mail archives. Outdated or non-essential emails are mechanically deleted or archived, releasing up beneficial storage assets and bettering the efficiency of the e-mail system. A well-designed retention coverage streamlines e-mail administration, enabling state staff to concentrate on their major job duties with out being burdened by an unwieldy e-mail inbox.

In abstract, retention insurance policies are important for guaranteeing the accountable and compliant administration of the Minnesota state worker e-mail system. These insurance policies handle authorized, regulatory, and operational necessities, enabling the state to protect essential data, reply successfully to authorized requests, and optimize storage assets. A complete and well-enforced retention coverage is essential for sustaining transparency, accountability, and effectivity inside state authorities.

5. Public file entry

Minnesota state worker e-mail correspondence, in lots of situations, falls beneath the purview of public file legal guidelines. Which means that, topic to sure exemptions, emails despatched and acquired by state staff utilizing the state e-mail system are accessible to the general public upon request. The underlying precept is that authorities operations must be clear, and the general public has a proper to understand how its authorities conducts enterprise. The state e-mail system, due to this fact, capabilities not solely as a communication software but in addition as a repository of probably disclosable data. A sensible instance is an e-mail trade between a state company and a vendor relating to a contract bid; this correspondence is often thought of a public file and topic to disclosure. Understanding this connection is significant for state staff to make sure they conduct official communications with an consciousness that these communications could develop into publicly accessible.

The interaction between public file entry and the state worker e-mail system necessitates the implementation of strong insurance policies and procedures. These insurance policies dictate how public file requests are processed, what kinds of data are exempt from disclosure (e.g., personal knowledge, attorney-client privileged communications), and the way redactions are dealt with to guard confidential data. For example, if a public file request is acquired for a state worker’s emails, the company should evaluate the emails to establish and redact any data that’s legally protected against disclosure earlier than releasing the paperwork. This course of requires cautious consideration to element and an intensive understanding of relevant state legal guidelines and laws. Furthermore, the quantity of public file requests can place a major burden on state companies, requiring devoted workers and assets to handle these requests effectively and successfully.

In conclusion, the linkage between public file entry and Minnesota state worker e-mail underscores the significance of accountable and clear communication inside state authorities. State staff should be cognizant of the potential for his or her emails to develop into public data and conduct themselves accordingly. The efficient administration of public file requests is crucial for guaranteeing authorities accountability whereas defending privateness rights and confidential data. Challenges exist in balancing these competing pursuits, requiring ongoing refinement of insurance policies and procedures to navigate the complexities of public file regulation within the digital age.

6. Inner system integration

The seamless connection between Minnesota state worker e-mail and numerous inside programs represents a essential side of recent state authorities operations. This integration streamlines workflows, enhances knowledge accessibility, and improves general effectivity, basically altering how state staff work together with data and conduct their every day duties.

  • Calendaring and Scheduling Integration

    Integration with calendaring programs permits state staff to handle appointments, schedule conferences, and share availability straight via their e-mail. For instance, an worker may schedule a gathering with colleagues and exterior stakeholders straight from an e-mail message, mechanically including it to everybody’s calendars and sending out reminders. This integration reduces scheduling conflicts, improves communication, and minimizes administrative overhead.

  • Doc Administration System Integration

    E mail integration with doc administration programs permits staff to simply share, retailer, and observe paperwork. A state worker engaged on a legislative report can seamlessly connect the doc to an e-mail, which is then mechanically saved within the applicable folder throughout the doc administration system. This ensures model management, enhances collaboration, and gives a centralized repository for vital paperwork, fostering improved group and accountability.

  • Workflow Automation Integration

    Integrating e-mail with workflow automation programs permits for the streamlining of processes like buy requests, depart approvals, and expense reimbursements. A state worker initiating a purchase order request can set off an automatic workflow straight from their e-mail, routing the request to the suitable approvers and offering notifications at every stage. This reduces guide effort, accelerates processing instances, and ensures adherence to established procedures.

  • Buyer Relationship Administration (CRM) Integration

    Integration with CRM programs permits state staff to handle interactions with residents and stakeholders successfully. A state worker responding to an inquiry from a citizen can entry the person’s contact data, previous interactions, and related case particulars straight from the e-mail interface. This permits personalised communication, improved customer support, and higher monitoring of citizen interactions. For example, a division of well being worker can entry a citizen’s vaccination file straight via an e-mail message, permitting for higher and quicker communication.

These examples spotlight the pivotal function of inside system integration in optimizing the Minnesota state worker e-mail expertise. This connectivity promotes knowledge accuracy, reduces redundancies, and empowers staff to carry out their duties extra successfully. The continued growth and refinement of those integrations are important for enhancing state authorities operations and bettering service supply to the general public.

7. Skilled conduct normal

The “Skilled conduct normal” is intrinsically linked to the suitable use of the Minnesota state worker e-mail system. This normal dictates the anticipated habits and communication type for all state staff when using state assets, together with digital communication platforms. A breach of the “Skilled conduct normal” by way of state e-mail can lead to disciplinary actions, authorized ramifications, and injury to the state’s fame. For instance, sending harassing or discriminatory emails violates each the skilled conduct normal and doubtlessly state and federal legal guidelines, making a legal responsibility for the worker and the state.

The state worker e-mail system serves as an extension of the office; due to this fact, the identical skilled expectations apply. This consists of sustaining respectful communication, avoiding private assaults, and refraining from sharing inappropriate content material. Contemplate an occasion the place an worker makes use of state e-mail to disseminate political endorsements or solicitations. This violates the skilled conduct normal by misusing state assets for non-official functions and doubtlessly violating marketing campaign finance laws. Such actions can erode public belief and undermine the integrity of state authorities.

Upholding the “Skilled conduct normal” in state worker e-mail communication just isn’t merely a matter of coverage compliance however a dedication to moral governance. Constant utility of this normal fosters knowledgeable work atmosphere, protects delicate data, and ensures that state assets are used responsibly. The problem lies in successfully speaking and imposing these requirements throughout a various workforce, requiring ongoing coaching and clear examples of applicable and inappropriate e-mail utilization.

8. Safety incident reporting

Minnesota state worker e-mail programs are frequent targets for safety incidents, necessitating a strong reporting mechanism. The integrity of state operations depends closely on the confidentiality, availability, and integrity of knowledge communicated via this medium. Consequently, immediate and correct reporting of potential or precise safety breaches associated to the state e-mail system is paramount. For example, ought to a state worker obtain a phishing e-mail requesting credentials or observe suspicious exercise inside their account, quick reporting turns into essential. Failure to report such incidents can result in compromised knowledge, system disruptions, and potential authorized liabilities for the state.

The significance of safety incident reporting stems from its function in enabling well timed responses and mitigating potential injury. When an worker stories a suspected phishing try, the IT safety workforce can analyze the e-mail, establish its supply, and implement measures to dam related assaults throughout all the state e-mail system. Equally, reporting a compromised account permits for quick password resets, system scans, and investigation of unauthorized entry. With out this reporting, malicious actors can function undetected, doubtlessly having access to delicate data or launching additional assaults. Actual-world examples embody situations the place unreported phishing emails have led to the compromise of quite a few state worker accounts, leading to knowledge breaches and monetary losses.

The effectiveness of safety incident reporting relies on clear communication channels, well-defined reporting procedures, and a tradition of safety consciousness amongst state staff. Workers should be educated on tips on how to establish and report safety incidents, assured that they won’t be penalized for reporting in good religion, and supplied with accessible reporting mechanisms. The absence of those parts can create a reluctance to report, hindering the state’s potential to detect and reply to safety threats successfully. Ongoing coaching and constant messaging are important to strengthen the significance of safety incident reporting and make sure the ongoing safety of the Minnesota state worker e-mail system.

9. Storage quota limitations

Storage quota limitations are an inherent element of the Minnesota state worker e-mail system, straight influencing its performance and utilization. These limitations, expressed as a most allowable knowledge quantity per person, exist as a result of infrastructure prices, safety issues, and the necessity for environment friendly system efficiency. Insufficiently managed storage results in decreased system velocity, doubtlessly affecting productiveness throughout state companies. For instance, if an worker’s mailbox reaches its quota, the system could forestall sending or receiving additional emails, disrupting communication and hindering every day duties. State companies typically implement quota insurance policies to make sure that e-mail servers function effectively and to manage knowledge progress, which might pose safety and compliance dangers.

The implementation of storage quotas necessitates diligent e-mail administration practices amongst state staff. Workers should repeatedly archive or delete older, non-essential emails to remain inside their assigned limits. This could contain transferring emails to a separate archival system or deleting attachments which are now not required. Compliance with these measures ensures the general system well being and permits for the graceful operation of communication channels. Failure to stick to storage quotas can lead to decreased performance, knowledge loss, or administrative intervention to handle overloaded mailboxes. In sensible phrases, this implies elevated time spent managing inboxes as a substitute of specializing in major job capabilities.

In conclusion, storage quota limitations are a significant but typically neglected side of the Minnesota state worker e-mail system. These constraints require proactive e-mail administration, balancing the necessity for knowledge retention with the operational realities of restricted storage assets. Successfully managing this steadiness is crucial for sustaining system effectivity, lowering prices, and mitigating potential safety dangers throughout the state authorities’s communication infrastructure. The continued problem lies in offering satisfactory storage whereas fostering accountable e-mail utilization habits amongst state staff.

Continuously Requested Questions

This part addresses frequent inquiries relating to the utilization, safety, and administration of Minnesota state worker e-mail programs.

Query 1: What constitutes acceptable use of the Minnesota state worker e-mail system?

Acceptable use is outlined as communication straight associated to official state enterprise. Private use, political advocacy, and any exercise violating state or federal regulation are strictly prohibited. Workers ought to seek the advice of the state’s Acceptable Use Coverage for particular steering.

Query 2: What steps are taken to make sure the safety of the Minnesota state worker e-mail system?

A number of layers of safety measures are carried out, together with encryption of knowledge in transit and at relaxation, multi-factor authentication for entry, intrusion detection and prevention programs, and knowledge loss prevention protocols. Common safety audits and worker coaching are additionally carried out.

Query 3: What are the information retention insurance policies governing Minnesota state worker e-mail?

Information retention insurance policies fluctuate relying on the content material and nature of the e-mail. Sure communications are topic to authorized or regulatory retention necessities and should be preserved for specified durations. State companies preserve schedules outlining these retention durations, and staff are anticipated to stick to those pointers.

Query 4: How can a member of the general public request entry to Minnesota state worker e-mail data?

Minnesota operates beneath open authorities legal guidelines. Members of the general public can submit public file requests to the related state company. The company is answerable for reviewing the requested emails, redacting any data exempt from disclosure, and offering entry to the non-exempt parts.

Query 5: What are the storage quota limitations for Minnesota state worker e-mail accounts?

Storage quotas are carried out to handle system assets and guarantee environment friendly operation. Particular quota limits fluctuate by company, however staff are usually anticipated to handle their mailboxes successfully by archiving or deleting older, non-essential emails. Contact the IT division for extra particulars on the quota sizes.

Query 6: What’s the process for reporting a safety incident involving the Minnesota state worker e-mail system?

Any suspected safety incident, equivalent to a phishing e-mail or compromised account, must be reported instantly to the company’s IT safety division or designated safety contact. Immediate reporting is essential for mitigating potential injury and guaranteeing the integrity of the state e-mail system.

The accountable and compliant utilization of the Minnesota state worker e-mail system is essential for sustaining transparency, safety, and accountability in state authorities operations.

The next sections will delve into finest practices for e-mail administration and methods for maximizing productiveness whereas adhering to state insurance policies.

Ideas for Efficient Minnesota State Worker E mail Utilization

Efficient administration and accountable utilization of the Minnesota state worker e-mail system are essential for sustaining productiveness, safety, and compliance with state insurance policies. The next ideas provide steering for state staff navigating this important communication software.

Tip 1: Frequently Archive or Delete Pointless Emails. Over time, gathered emails can eat beneficial cupboard space and hinder system efficiency. Implement a routine for archiving or deleting emails which are now not wanted for ongoing duties or authorized compliance. This observe not solely frees up storage but in addition streamlines e-mail searches and improves general effectivity.

Tip 2: Make the most of Folders and Labels for Group. A well-organized inbox enhances productiveness and facilitates fast retrieval of knowledge. Create folders and labels to categorize emails by challenge, subject, or sender. This structured method transforms the inbox from a chaotic repository into an environment friendly data administration system.

Tip 3: Make use of a Clear and Concise Topic Line. The topic line is a essential aspect in e-mail communication, offering recipients with a right away understanding of the message’s content material. A transparent and concise topic line will increase the chance that the e-mail will probably be learn promptly and understood accurately. Keep away from imprecise or generic topic strains that fail to convey the e-mail’s goal.

Tip 4: Train Warning with Attachments and Hyperlinks. Emails containing attachments or hyperlinks can pose a safety threat. Confirm the sender’s id and the authenticity of the attachment or hyperlink earlier than clicking or downloading. Report any suspicious emails to the IT safety division instantly.

Tip 5: Preserve Skilled Communication at All Instances. The state worker e-mail system is knowledgeable communication software. All emails ought to adhere to the state’s requirements of conduct, together with respectful language, correct data, and applicable tone. Keep away from private assaults, discriminatory language, and any communication that could possibly be construed as harassment.

Tip 6: Concentrate on “Reply All” perform. Train warning with the “Reply All” perform. Earlier than sending, fastidiously take into account whether or not each recipient must obtain the data. Overuse of the “Reply All” perform can muddle inboxes and waste beneficial time.

Tip 7: Guarantee correct use of CC and BCC characteristic. CC characteristic is used to ship an e-mail to particular person for data however BCC characteristic is for privateness concern to keep away from expose emails to others.

The following pointers present a framework for maximizing productiveness, mitigating dangers, and upholding skilled requirements whereas using the Minnesota state worker e-mail system. Adherence to those pointers promotes environment friendly communication and protects the integrity of state authorities operations.

The next sections will present a conclusion and checklist of motion gadgets.

Conclusion

This exploration has underscored the multifaceted nature of the Minnesota state worker e-mail system. It serves not merely as a software for communication, however as a essential element of state authorities infrastructure, intricately woven into authorized, safety, and operational frameworks. Key facets equivalent to acceptable use insurance policies, knowledge safety protocols, retention necessities, and public file accessibility collectively outline the boundaries inside which state staff should function. The mixing with inside programs additional highlights its significance in streamlining workflows and guaranteeing environment friendly authorities processes.

The accountable and knowledgeable use of those official communication channels is paramount. State staff should stay vigilant in upholding safety protocols, adhering to knowledge retention insurance policies, and sustaining skilled requirements in all digital correspondence. The continued effectiveness and integrity of Minnesota state authorities rely, partly, on the diligence and duty with which its staff make the most of and handle the official digital communication system. The mentioned insurance policies should be reviewed repeatedly and up to date to remain aligned with finest practices and to fulfill new challenges.