<Is the recreated .MSG file, with its associated attachment pointers and 
attachment files, a legitimate, legal version of the record?>

Are you safe - is the evidentiary value of your records protected - if you 
can provide proof of chain of custody by means of computer-generated audit 
trail records that include details of :

-import/export from other systems,
-file encryption,
-file compression

by any and all systems?

Or maybe the problem is that there is unlikely to be that level of 
spohistication in any audit trails of any of the systems J. is using?




Maureen Cusack, T.E.S.L., M.I.St.

http://www.maureencusack.net

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance