RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Bernard Chester <[log in to unmask]>
Reply To:
Date:
Wed, 13 Apr 2005 15:33:48 -0700
Content-Type:
text/plain
Parts/Attachments:
text/plain (90 lines)
The trick with those ID units is that they need to be synchronized with a
central system, so the number they produce every 60 seconds is known by the
host end.  So that means that every site you used the key for would need to
be synchronized to one another (or a central system).

They are much better than a password, because:

1. If your password becomes known, you are protected because the dynamic key
number must match also.

2. If you lose your key, the password must be known, and

3. If both are lost, the key can be de-linked by calling the host security
center.

Bernard Chester, CDIA+, ICP
Principal
IMERGE Consulting, Pacific Northwest Office
7683 SE 27 Street, #316
Mercer Island, WA   98040
(office) 206-230-9253
(cell) 206-979-7389
mailto:[log in to unmask]


-----Original Message-----
From: Records Management Program [mailto:[log in to unmask]] On Behalf
Of Gary L. Grieme
Sent: Wednesday, April 13, 2005 12:25 PM
To: [log in to unmask]
Subject: Re: Identity Theft

>>>>  Please read the confidentiality statement below  <<<<

We would not want a bunch of different tokens, but what if the majority of
large vendors centralized on one token system so you could do all your
business with one?  What if a bunch of organizations non-profit and for
profit formed a consortium to get it rolling, like they did to create the
internet domain naming system?

Gary L. Grieme
Records Manager
Robins, Kaplan, Miller & Ciresi L.L.P.
Minneapolis, MN
612-349-8538
[log in to unmask]

>>> [log in to unmask] 4/13/2005 2:02:40 PM >>>

We use these "tokens' currently to sign into our VPN, they do add greater
security, but honestly what they really do is create a better password so
I'm not sure that identity theft would be any different unless we somehow
adapted this technology to replace our SSN (i.e our SSN changes every 60
seconds). I doubt you'd want to carry a token for every system you did
business with.

                           Christian Meinke, CRM
                           Edison International
                          Information Management
                                 PAX 27079
                              (626) 302-7079
                         [log in to unmask]



__________________________________________________

Information contained in this e-mail transmission is privileged,
confidential and covered by the Electronic Communications Privacy Act, 18
U.S.C. Sections 2510-2521.

If you are not the intended recipient, do not read, distribute, or reproduce
this transmission.

If you have received this e-mail transmission in error, please notify us
immediately of the error by return email and please delete the message from
your system.

Thank you in advance for your cooperation.

Robins, Kaplan, Miller & Ciresi L.L.P.
http://www.rkmc.com
__________________________________________________

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance

ATOM RSS1 RSS2