On Aug 15, 2007, at 1:56 PM, William Boyer wrote:
The question is, if audited
internally, or externally, how do we prove data's encrypted.
You might try the TSMtape utility, as distributed from:
in order to physically examine what ends up in the storage pool -
which would be the most definitive method of proof, of the type
auditors might insist upon.