>You must not have auditors. This is not an audit issue.
>This is a security breach waiting to happen. Auditors can only monitor procedures. And, they can only point out issues that SMEs have identified. >How do you prevent someone from calling their program the same name as one in >the internal table? That's the third part: compliance. - Ted MacNEIL [email protected] Twitter: @TedMacNEIL ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

