<Is the recreated .MSG file, with its associated attachment pointers and
attachment files, a legitimate, legal version of the record?>
Are you safe - is the evidentiary value of your records protected - if you
can provide proof of chain of custody by means of computer-generated audit
trail records that include details of :
-import/export from other systems,
-file encryption,
-file compression
by any and all systems?
Or maybe the problem is that there is unlikely to be that level of
spohistication in any audit trails of any of the systems J. is using?
Maureen Cusack, T.E.S.L., M.I.St.
http://www.maureencusack.net
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance