We apply the following methods to ensure this:
An MD5 checksum is calculated on each recording file and stored separately from the recording file itself. Should a single bit be changed in the recording file, a comparison of the checksums will indicate that it is no longer the original file.
All recording files are double encrypted using industry standard and accepted encryption algorithms. This ensures that no one is able to listen to a recording without using our original recording software.
Access to recordings can be password protected via ONYX.
Please note:
As with all computer programming, we can not guarantee that the above is 100% 'hack' proof. We have applied the best-known technology available to us to ensure that we get as close to 100% security as is possible.
With ONYX we have no control over either storage location or access to recordings, so it is still possible for people to delete recordings if they have access to the files via a network etc. This obviously needs to be managed correctly.
We are not aware of a single instance where recordings from any of our systems have been rejected in a legal dispute
This information may not be applicable to all countries. Please check with your local authorities.