Access to a computer system should be restricted to individuals who have a need to know, and the access should be consistent with their responsibility. The system should also be restricted at the field level, instead of at the workstation level. The problem with workstations is that they are connected to a larger network, and security may not be adequate. In addition, passwords should be required to identify the user; and users should be limited to deleting, adding and modifying data. Access to a computer system should be restricted to individuals who have a need to know, and the access should be consistent with their responsibility. The system should also be restricted at the field level, instead of at the workstation level. The problem with workstations is that they are connected to a larger network, and security may not be adequate. In addition, passwords should be required to identify the user; and users should be limited to deleting, adding and modifying data. Access to a computer system should be restricted to individuals who have a need to know, and the access should be consistent with their responsibility. The system should also be restricted at the field level, instead of at the workstation level. The problem with workstations is that they are connected to a larger network, and security may not be adequate. In addition, passwords should be required to identify the user; and users should be limited to deleting, adding and modifying data. Access to a computer system should be restricted to individuals who have a need to know, and the access should be consistent with their responsibility. The system should also be restricted at the field level, instead of at the workstation level. The problem with workstations is that they are connected to a larger network, and security may not be adequate. In addition, passwords should be required to identify the user; and users should be limited to deleting, adding and modifying data.
|