On Aug 15, 2007, at 1:56 PM, William Boyer wrote:
The question is, if audited internally, or externally, how do we prove data's encrypted.
You might try the TSMtape utility, as distributed from: http://sourceforge.net/project/shownotes.php?release_id=529290 in order to physically examine what ends up in the storage pool - which would be the most definitive method of proof, of the type auditors might insist upon. Richard Sims
