Greetings:
Does anyone have any best practices or guidelines they use within their IT
departments for the retention of IT security breach or attempt incident
reports/logs/responses, etc. The only thing I can find that might relate
is the Canadian and/or Ontario Statute of Limitations.
Guidance and suggestions greatly appreciated,
Irene Gelyk
Records Management
Research in Motion Limited
[log in to unmask]
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]