82,897
edits
Amwelladmin (talk | contribs) No edit summary |
Amwelladmin (talk | contribs) No edit summary |
||
Line 5: | Line 5: | ||
So the real ask ought to be “to {{confiprov|put beyond practical use}}” and have an exception for regulatory retention, and the practical realities of how information technology actually works: every internal email creates copies on all kinds of different servers and so on; non-magnetic erasures can in theory be undone. Theoretical eradication of a file is impossible; what matters is practical removal of the information from persons in whose grubby fingers the poor {{confiprov|discloser}}’s (cough) legitimate business interests can suffer. | So the real ask ought to be “to {{confiprov|put beyond practical use}}” and have an exception for regulatory retention, and the practical realities of how information technology actually works: every internal email creates copies on all kinds of different servers and so on; non-magnetic erasures can in theory be undone. Theoretical eradication of a file is impossible; what matters is practical removal of the information from persons in whose grubby fingers the poor {{confiprov|discloser}}’s (cough) legitimate business interests can suffer. | ||
===[[Derived information]]=== | |||
There’s also a conceptual issue with [[Derived information - Confi Provision|information the receiving party has derived]] from the {{confiprov|confidential information}}: | There’s also a conceptual issue with [[Derived information - Confi Provision|information the receiving party has derived]] from the {{confiprov|confidential information}}: | ||
{{derived information}} | {{derived information}} |