[AccessD] Transactions

Steve Schapel miscellany at mvps.org
Fri Sep 7 04:14:30 CDT 2007


Drew,

In the case of your example, I can certainly see that you have to 
somehow cover off the possibility of unauthorised access to the data. 
Sort of like what they say about justice - should be done, and also seen 
to be done.

And I also understand what a blessing the ignorance of the users can 
sometimes be. :-)

I appreciate the interesting discussion.  Thank you.

Regards
Steve


Drew Wutka wrote:

> Case in point, I built a system we call the ISFE.  Information Systems
> Front End.  It's our request tracking system (asset management, etc.).
> We are a public company, we use the ISFE to PROVE that the work we do
> was authorized.  It has an electronic signature capability.  We get
> audited based on the information in that system AND based on the
> integrity of that system.  If I was an auditor, and I was able to just
> get directly into the tables, with no security stopping me, I would fail
> the company using that application.



More information about the AccessD mailing list