Information Technology Reference
In-Depth Information
If.you.decide.to.use.e-mail.as.a.means.of.transferring.data,.
you.should.consider.the.classiication.of.the.information..If.it.
is.sensitive.in.any.way,.you.should.look.at.the.possibility.of.
encrypting. the. e-mail. transmissions. or. possibly. encrypting.
the.documents..Most.e-mail.applications.have.the.capacity.to.
encrypt. their. contents,. or. there. are. third-party. add-ins. that.
will.allow.you.to.do.so..Encrypting.the.documents.or.other.
evidence.can.also.be.accomplished.with.commonplace.tools,.
several.of.which.are.referenced.in.Appendix.C.
Should. you. decide. to. use. an. online. service,. you. should.
ensure.that.the.service.provider.contract.includes.the.following:
•. Information. security. policies. that. address. the. coni-
dentiality .of.your.data,.its.availability,.and.its.integrity
•. Backgrounding.of.its.employees.who.will.have.access.
to.your.data
•. Well-deined.procedures.for.access.to.the.data
•. Deined. and. practiced. authentication. protocols. to.
ensure.data.are.accessed.only.by.those.with.the.cor-
rect.and.current.rights
•. Disaster.recovery.and.business.continuity.policies.and.
practices.that.are.both.well.documented.and.auditable
•. 24/7/365.access.to.support.and.priority.assistance
•. Effective. and. timely. notiication. procedures. in. case.
any.issues.affect.the.conidentiality,.integrity,.or.avail-
ability.of.your.data
•. Data. management,. access,. retention,. and. archiving.
procedures.that.meet.your.requirements
These.contractual.requirements.are.important.in.any.ser-
vice. that. you. use. online,. but. when. you. decide. that. this. is.
how.you.are.going.to.disseminate.legally.relevant.electronic.
evidence,.they.become.paramount.to.ensuring.your.data.are.
there.when.you.need.them,.and.that.the.integrity.of.the.data.
is.unsullied.
Whatever.medium.makes.the.most.sense.to.achieve.the.
goals. of. sharing. your. data. with. another. party,. the. most.
Search WWH ::




Custom Search