RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Larry Medina <[log in to unmask]>
Reply To:
Records Management Program <[log in to unmask]>
Date:
Sun, 14 Feb 2010 23:04:27 -0800
Content-Type:
text/plain
Parts/Attachments:
text/plain (27 lines)
> http://bit.ly/beBam7
>

No surprise here, it's like encrypted files.

But it raises the question we've discussed here many times before... if
employees encrypt/lock/password protect files, then the files are migrated
to servers, or (as in this case) located during a 'crawl' through
repositories in response to a discovery action, how does the responding
party address this?

Employees come and go, content remains behind and while it may not happen
maliciously, records are not accessible.  Does an organization need to
address this in policy/procedure?  It's obviously to late to do it after an
employee has left.


-- 
Larry Medina
Danville, CA
RIM Professional since 1972

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

ATOM RSS1 RSS2