How Does Chain Of Custody For Access Control Data Work?

I am genuinely curious because I've not heard an authoritative answer:

How should Chain of Custody (CoC) apply to access control data?

IPVM Image

** * **** *****, *** ***** that *** ********** ****/******** (** ******' case, **** ****) ** ******** ******/*** tampered ****, ********* ** ******, *** storage ** ****** - ****** ** might ** **** ** *** *********.

*** *****, *** ***** ******** * fairly ******** ************ ******, ** ********* process **** ********* **** ******* ******* filetypes, *** ** ******* *****, ****** DVRs/NVRs/VMSes ***** ** ****** *** ****** securely.

*** ** ****** ******* **** ******* in **** *****?

Agree
Disagree
Informative: 1
Unhelpful
Funny
Login to read this IPVM discussion.
Why do I need to log in?
IPVM answers and moderates the industry's most accurate and in-depth discussions. Subscriber payments enable us to do so.