RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Sender:
Records Management Program <[log in to unmask]>
Date:
Tue, 17 May 2016 12:18:30 -0400
Reply-To:
Scott Guthery <[log in to unmask]>
Subject:
MIME-Version:
1.0
Content-Transfer-Encoding:
7bit
In-Reply-To:
Content-Type:
text/plain; format=flowed; charset="UTF-8"; reply-type=original
From:
Scott Guthery <[log in to unmask]>
Parts/Attachments:
text/plain (14 lines)
If (cryptographic) key management is part of the archival/records management 
remit, then there would be a tight coupling between an enterprise's computer 
security policies, practices, & processes and its records management 
policies, practices, & processes.  A key breach would be an example of an 
event that would trigger records management activity, perhaps for the 
records as well as the key.  See NIST SP 800-57 &c.

Cheers, Scott 

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

ATOM RSS1 RSS2