How Does Chain Of Custody For Access Control Data Work?

IPVMU Certified | 01/11/23 01:58pm
I am genuinely curious because I've not heard an authoritative answer:
How should Chain of Custody (CoC) apply to access control data?
** * **** *****, *** ***** that *** ********** ****/******** (** ******' case, **** ****) ** ******** ******/*** tampered ****, ********* ** ******, *** storage ** ****** - ****** ** might ** **** ** *** *********.
*** *****, *** ***** ******** * fairly ******** ************ ******, ** ********* process **** ********* **** ******* ******* filetypes, *** ** ******* *****, ****** DVRs/NVRs/VMSes ***** ** ****** *** ****** securely.
*** ** ****** ******* **** ******* in **** *****?
Agree
Disagree
Informative: 1
Unhelpful
Funny
Login to read this IPVM discussion.
Why do I need to log in?
IPVM answers and moderates the industry's most accurate and in-depth discussions. Subscriber payments enable us to do so.
Newest Discussions
Discussion | Posts | Latest |
---|---|---|
Started by
Alex Jason
|
4
|
less than a minute by Alex Jason |
Started by
Undisclosed End User #1
|
9
|
less than a minute by Undisclosed End User #4 |
Started by
Charles Rollet
|
2
|
21 minutes by Undisclosed #1 |
Started by
Brian Rhodes
|
13
|
less than a minute by Undisclosed Integrator #3 |
Started by
Undisclosed End User #1
|
5
|
2 minutes by Undisclosed Integrator #3 |