> http://bit.ly/beBam7
>
No surprise here, it's like encrypted files.
But it raises the question we've discussed here many times before... if
employees encrypt/lock/password protect files, then the files are migrated
to servers, or (as in this case) located during a 'crawl' through
repositories in response to a discovery action, how does the responding
party address this?
Employees come and go, content remains behind and while it may not happen
maliciously, records are not accessible. Does an organization need to
address this in policy/procedure? It's obviously to late to do it after an
employee has left.
--
Larry Medina
Danville, CA
RIM Professional since 1972
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]