21. ISend was originally aimed at law firms and other small businesses that traffic in sensitive documents. 22. It can come in handy for situations like sharing documents among several members of a work group or for sensitive documents on an office file server. 23. It warns employees to thwart hackers by keeping internal conversations private, encrypting sensitive working documents and shredding or erasing old working documents. 24. It will also be illegal to execute a number of the most sensitive legal documents online. 25. Johnson points out that state and federal laws require the timely destruction of some sensitive documents that, if found by the wrong people, could cause considerable damage. 26. Ms. Caviness had somehow failed to remove the most sensitive document in the stack. 27. Reams of sensitive documents have been destroyed, and along with them any hopes of uncovering the truth about some of the most painful chapters in Mexican history. 28. She said she found it shocking that low-level aides in the Clinton White House were allowed to handle such sensitive documents. 29. Since that disaster, the agency has stressed rigorous training and drills among its employees on how to quickly and effectively destroy and dispose of sensitive documents in emergencies. 30. She pointed out that judges can already seal sensitive documents, making them unavailable to the public. |