> It is better to protect the data, rather than the method of copying.  
 
That doesn't help if you want the programmer to work on a program 
but you don't want him to take it with him.  
 
 
> Date: Thu, 17 Apr 2008 20:41:35 +0000
> From: [EMAIL PROTECTED]
> Subject: Re: how to audit the usage of IND$FILE
> To: IBM-MAIN@BAMA.UA.EDU
> 
> >But the exposure exists because you gave the user READ access to the data.
> 
> This has been discussed before on the RACF-L forum.
> It is better to protect the data, rather than the method of copying.
> 
> -
> Too busy driving to stop for gas!
 
 
 
_________________________________________________________________
Get in touch in an instant. Get Windows Live Messenger now.
http://www.windowslive.com/messenger/overview.html?ocid=TXT_TAGLM_WL_Refresh_getintouch_042008
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to