>You must not have auditors.

This is not an audit issue.

>This is a security breach waiting to happen.

Auditors can only monitor procedures.
And, they can only point out issues that SMEs have identified.

>How do you prevent someone from calling their program the same name as one in 
>the internal table?

That's the third part: compliance.
-
Ted MacNEIL
[email protected]
Twitter: @TedMacNEIL

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to