An auditing system and method for analyzing email, including capturing email transferred over a network and transferring the email to a data analyzer. The email can be encrypted for safe transfer to the analysis location. Once the email is delivered to the analysis location, it is decrypted and the analysis process begins. The analysis of the email includes scanning the email for specific search terms found in a lexicon and then identifying trends based on scanning results.