<Is the recreated .MSG file, with its associated attachment pointers and attachment files, a legitimate, legal version of the record?> Are you safe - is the evidentiary value of your records protected - if you can provide proof of chain of custody by means of computer-generated audit trail records that include details of : -import/export from other systems, -file encryption, -file compression by any and all systems? Or maybe the problem is that there is unlikely to be that level of spohistication in any audit trails of any of the systems J. is using? Maureen Cusack, T.E.S.L., M.I.St. http://www.maureencusack.net List archives at http://lists.ufl.edu/archives/recmgmt-l.html Contact [log in to unmask] for assistance