Hi Ron,
good to see that you are on the LISTSERV. I have told Shredit to remove their totes. We emailed you a PO to shred our materials I believe Friday. Please let me help you organize a Pikes Peak area chapter of ARMA.
Steve
El Paso County
-------------- Original message from Ron Vince <[log in to unmask]>: --------------
> McAfee's also has a file shredding option with their anti-virus. It
> works out of the deleted files folder and give you the option to delete
> or to shred.
>
> Ron
>
> Ron Vince
> Vice President of Sales and Business Development
> [log in to unmask]
> 303.468-0478Direct
> 303.321.6464Direct Fax
>
>
>
>
> DocuVault LLC
> 5155 E. 46th Ave.
> Denver, CO 80216
> 303.308.1000
> 303.308.1008 Fax
> www.docuvault.com
>
>
>
>
> [This email transmission may contain information that is proprietary,
> privileged
> and/or confidential and is intended exclusively for the person (s) to
> whom it is addressed.
> Any use, copying, retention or disclosure by any person other than the
> intended recipient or
> their designees is strictly prohibited. If you are not the intended
> recipient or their designee,
> please notify the sender immediately by return email and delete all
> copies.]
> -----Original Message-----
> From: Records Management Program [mailto:[log in to unmask]] On
> Behalf Of Larry Medina
> Sent: Thursday, October 04, 2007 10:39 AM
> To: [log in to unmask]
> Subject: Re: "Shredding" software
>
> >
> > When I discuss the disposition of electronic records, people are
> > surprised and often concerned that by simply deleting an electronic
> file
> > it is not truly destroyed, but still discoverable. This type of
> software
> > would be very useful for that purpose, but I can also see it as being
> > very dangerous for people to be able to obliterate files, especially
> in
> > the world of drag and drop. I am interested in anyone's opinion of
> this
> > issue or use of this or similar software.
> >
>
> Of concern with the use of this type of "file deleting software" is that
> an
> organization have clearly stated policies on when it is to be used, and
> by
> whom. Improper or unauthorized complete erasure of files can be
> potentially
> seen as spoliation, especially if (as Gerry properly reminds us) all
> copies,
> backups, archived content, etc. is not also deleted. If during a
> discovery
> action the information is not found in it's likely location, but can be
> found elsewhere, it raises a large question as to what ELSE was deleted
> when
> and who had the authority to do it?
>
> I think there are numerous cases in which complete deletion of
> electronic
> content is appropriate, but ensuring that policies and practices exist
> so
> it's done appropriately is very important.
>
> Larry
> --
> Larry Medina
> Danville, CA
> RIM Professional since 1972
>
> List archives at http://lists.ufl.edu/archives/recmgmt-l.html
> Contact [log in to unmask] for assistance
> To unsubscribe from this list, click the below link. If not already
> present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of
> the message.
> mailto:[log in to unmask]
>
> List archives at http://lists.ufl.edu/archives/recmgmt-l.html
> Contact [log in to unmask] for assistance
> To unsubscribe from this list, click the below link. If not already present,
> place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
> mailto:[log in to unmask]
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]
|