All,
We have been having an interesting discussion on the BareMetal List about
what part RM people can and do play in the selection of an off-site data
protection service.
I was just wondering given that this is the RM list what criteria RM people
would use if they were given the opportunity to select a vendor in their own
right.
Of main interest, what chain of custody criteria would you look for?
Gerard
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance