RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Steve Morgan <[log in to unmask]>
Reply To:
Records Management Program <[log in to unmask]>
Date:
Mon, 25 Sep 2006 08:24:35 -0700
Content-Type:
text/plain
Parts/Attachments:
text/plain (37 lines)
It would seem that if anybody ever got a copy of an "unscrupulous" email
and a company had that program installed, they could set themselves up
for litigation. Even though there are no addresses on it and a person
could show that it had to come from "that" company because of the
information contained therein. Or, do you think "they" could get away
with something because you could prove, for sure, who sent it.

I'm sure someone would be able to figure out a way to "spoof" an
account. Don't you. Nothing is ever foolproof.


Steve Morgan

-----Original Message-----
From: Records Management Program [mailto:[log in to unmask]] On
Behalf Of Larry Medina
Sent: Monday, September 25, 2006 7:53 AM
To: [log in to unmask]
Subject: Re: Disappearing e-mail

Depending on the industry you're in, you could be prohibited from using
such a system... examples might be the Financial Services, Municipal
Government, Pharmaceuticals, etc.

It's a novel concept, but as Ginny said, sounds like a potential train
wreck if misused, and you can believe it will be misused.  From what I
read about it, sounds as if it can be used internally only, not over a
POP server, so I doubt you would have to concern yourself with external
attacks, unless someone figures a way to "spoof" and internal account
and then it's "off to the races", with no ability to identify the source
node!

Larry

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance

ATOM RSS1 RSS2