On 2014-01-20, at 00:09, R.S. wrote:
> 
> 2. LAS, BUT NOT LEAST: you assumed site's policies are reasonable. Security 
> people are reasonable. Bad assumption. There are so many cases proving the 
> opposite. As an example I've met lately: one has to degauss disk drives which 
> were never ever used for storing company data. Whole dasd box was never 
> attached to any host. However, in order to dispose the box, despite of common 
> sense, he has to remove every disk drive, degauss it, store it's serial 
> number in the protocol (as well as the vendor and type/model). Why? Policy!
> 
The alternative may require maintaining an audit trail of which
drives do not contain company data.  This may be more expensive
than degaussing everything, and bears the risk of misclassification.

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to