Drew Wutka
DWUTKA at Marlow.com
Fri Sep 7 08:02:08 CDT 2007
Ditto. ;) Drew -----Original Message----- From: accessd-bounces at databaseadvisors.com [mailto:accessd-bounces at databaseadvisors.com] On Behalf Of Steve Schapel Sent: Friday, September 07, 2007 4:15 AM To: Access Developers discussion and problem solving Subject: Re: [AccessD] Transactions Drew, In the case of your example, I can certainly see that you have to somehow cover off the possibility of unauthorised access to the data. Sort of like what they say about justice - should be done, and also seen to be done. And I also understand what a blessing the ignorance of the users can sometimes be. :-) I appreciate the interesting discussion. Thank you. Regards Steve Drew Wutka wrote: > Case in point, I built a system we call the ISFE. Information Systems > Front End. It's our request tracking system (asset management, etc.). > We are a public company, we use the ISFE to PROVE that the work we do > was authorized. It has an electronic signature capability. We get > audited based on the information in that system AND based on the > integrity of that system. If I was an auditor, and I was able to just > get directly into the tables, with no security stopping me, I would fail > the company using that application. -- AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com The information contained in this transmission is intended only for the person or entity to which it is addressed and may contain II-VI Proprietary and/or II-VI BusinessSensitve material. If you are not the intended recipient, please contact the sender immediately and destroy the material in its entirety, whether electronic or hard copy. You are notified that any review, retransmission, copying, disclosure, dissemination, or other use of, or taking of any action in reliance upon this information by persons or entities other than the intended recipient is prohibited.