Well, I'm not familiar with the process you're using, but, from what I've read, the issue is people who have access to the SQL table that contains your documents, but doesn't have to go through your program? If that's the case, what about encryption? Even if it's something as simple as a ROT13 variant, so long as only your code knows how to encrypt and decrypt the document, then anyone accessing the files will have to go through your program to do it.
Of course, maybe I'm not understanding (as mentioned above) or being hopelessly naïve, but hey... Joel _______________________________________________ Post Messages to: [email protected] Subscription Maintenance: http://leafe.com/mailman/listinfo/profox OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/514EA2FDB74F4A8F8CE47C8B04754EBE@ASUS1 ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.

