Anyone using digital signatures with their internal email systems for
sensitive information distribution? I'd be interested in knowing your
approaches, the applications for which you might be considering this, and
any pitfalls/learnings along the way.
Thanks in advance....
Director, Information Technology
California Baptist University
[log in to unmask]