Well, I'm not familiar with the process you're using, but, from what I've 
read, the issue is people who have access to the SQL table that contains 
your documents, but doesn't have to go through your program?  If that's the 
case, what about encryption?  Even if it's something as simple as a ROT13 
variant, so long as only your code knows how to encrypt and decrypt the 
document, then anyone accessing the files will have to go through your 
program to do it.

Of course, maybe I'm not understanding (as mentioned above) or being 
hopelessly naïve, but hey...


Joel 


_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/514EA2FDB74F4A8F8CE47C8B04754EBE@ASUS1
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to