Developing a sound data protection strategy is one of the more
complex tasks faced by today's IT organizations. Historically
speaking, many companies have been concerned about data protection
only from access (i.e., authentication and authorization), backup and
recovery or business continuity perspectives. Today, an increasing
number of regulatory requirements that govern the protection of
personal information (e.g., health records, financial statements,
credit/debit card information, social security numbers etc.) are
driving increased company efforts to protect information and guard
against the various ways it may fall out of their control.
http://searchstorage.bitpipe.com/detail/RES/1199459074_778.html?
src=wc_sstr_fgru_01_21_08&li=86737&asrc=EM_FGMC_2924825&uid=6570353
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html