RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Irene Gelyk <[log in to unmask]>
Reply To:
Records Management Program <[log in to unmask]>
Date:
Tue, 19 Feb 2008 12:06:39 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (19 lines)
Greetings:

Does anyone have any best practices or guidelines they use within their IT 
departments for the retention of IT security breach or attempt incident 
reports/logs/responses, etc.  The only thing I can find that might relate 
is the Canadian and/or Ontario Statute of Limitations.  

Guidance and suggestions greatly appreciated,

Irene Gelyk
Records Management
Research in Motion Limited
[log in to unmask]

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

ATOM RSS1 RSS2