An auditing system and method for analyzing email, including capturing
email transferred over a network and transferring the email to a data
analyzer. The email can be encrypted for safe transfer to the analysis
location. Once the email is delivered to the analysis location, it is
decrypted and the analysis process begins. The analysis of the email
includes scanning the email for specific search terms found in a lexicon
and then identifying trends based on scanning results.