Steve Schapel
miscellany at mvps.org
Fri Sep 7 04:14:30 CDT 2007
Drew, In the case of your example, I can certainly see that you have to somehow cover off the possibility of unauthorised access to the data. Sort of like what they say about justice - should be done, and also seen to be done. And I also understand what a blessing the ignorance of the users can sometimes be. :-) I appreciate the interesting discussion. Thank you. Regards Steve Drew Wutka wrote: > Case in point, I built a system we call the ISFE. Information Systems > Front End. It's our request tracking system (asset management, etc.). > We are a public company, we use the ISFE to PROVE that the work we do > was authorized. It has an electronic signature capability. We get > audited based on the information in that system AND based on the > integrity of that system. If I was an auditor, and I was able to just > get directly into the tables, with no security stopping me, I would fail > the company using that application.