RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Larry Medina <[log in to unmask]>
Reply To:
Larry Medina <[log in to unmask]>
Date:
Mon, 3 Oct 2005 09:52:51 -0700
Content-Type:
text/plain
Parts/Attachments:
text/plain (27 lines)
On 10/3/05, Bob Chase <[log in to unmask]> wrote:
>
> On behalf of a colleague, does anyone have any insights on the
> scheduling and retention of encryption/decryption tools, such as keys,
> software, codes and passwords for encrypted archival/permanent records?


This is purely a logic thing, but the decryption tools should obviously be
held until the time the encrypted items are decrypted... if they're
archival/permanent records, then it would be the same retention period as
the records.

However, for encryption to work properly, you typically CHANGE the
encryption key every time you access and re-encrypt the records, and
depending on the nature of the records, when personnel who had access to the
encryption keys leave an organization.

Larry

--
Larry Medina
Danville, CA
RIM Professional since 1972

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance

ATOM RSS1 RSS2