And although the machine that was lost is "password protected", the files
are not encrypted that are stored on it.
This is another case of where it seems that the "process" was more flawed
than the "protection"... why was the machine storing ANY of this information
anyway? Why wasn't it stored elsewhere and then the machine allowed to
access it on an as needed basis?
http://www.forbes.com/markets/2005/08/30/jpmorgan-chase-breach-0830markets18.html
--
Larry Medina
Danville, CA
RIM Professional since 1972
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance