On 27 May 2008 07:28:24 -0700, [EMAIL PROTECTED] (Hal Merritt) wrote: >Some potential good news is that auditors may be (finally) starting to apply >the same rules to the tinkertoys as the MF.
The security solutions that need to protect data on a stolen laptop are not the same security solutions that we have developed for a mainframe. But some of those solutions may be applicable to all sizes of computers. When the auditor's rules are implemented for all sizes of computers, then the cost-benefit analysis will be more straightforward. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

