John, To use Truecrypt, you could set up an encrypted data drive just to hold the data files and set a mapping before loading the program to open the Truecrypt disk for access which you can do from VFP directly, not forgetting of course to close the Truecrypt disk when processing is completed.
Dave -----Original Message----- From: ProFox [mailto:[email protected]] On Behalf Of Dave Crozier Sent: 13 March 2014 09:40 To: ProFox Email List Subject: RE: Encryption +1 for Cryptor and also TrueCrypt Dave -----Original Message----- From: ProFox [mailto:[email protected]] On Behalf Of Paul Newton Sent: 13 March 2014 08:52 To: [email protected] Subject: RE: Encryption I have used a product called Cryptor in the past with great success ... http://www.xitech-europe.co.uk/cryptor5.php Paul Newton -----Original Message----- From: ProfoxTech [mailto:[email protected]] On Behalf Of AndyHC Sent: 13 March 2014 08:00 To: [email protected] Subject: Re: Encryption On 13/03/2014 06:21, Christof Wollenhaupt wrote: > Hi John, > > a) Please start reading about the data protection act before you do > anything. This is a good introduction: > http://ico.org.uk/Global/~/media/documents/library/Data_Protection/Pra > ctical_application/THE_GUIDE_TO_DATA_PROTECTION.ashx > > b) Your approach would not help you in any way to comply with the data > protection act. Compliance is not a matter of technically encrypting > data, it's a whole system that starts with the process, not a > technical implementation detail. You first need to be clear about who > is processing and storing which data for which purpose. > True, but 90% of Data Protection legislation is ludicrously over the top for a small group/club/society, this is to some extent recognised by the 'not for profit' exemption from registration (qv). If you need to do anything then simple precautions should be adequate - e.g. # use a truecrypt volume # keep your dbf's on a usb stick and lock it up when not in use. # do a simple hash/de-hash in program for any sensitive fields** - I have used a plain xor with a substring of a string that happens to be in the program already - you won't keep out the NSA whatever you do; you are not going to be subject to serious commercial espionage, you just need to keep out nosey parkers! ** ICO only says "Encrypt any personal information held electronically that would cause damage or distress if it were lost or stolen." [excessive quoting removed by server] _______________________________________________ Post Messages to: [email protected] Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/[email protected] ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.

