Unfortunately, some places do use the user1, user2 approach of sharing one user ID amopng many same-type users. I try to educate the Admin that all audits and activity logs are useless that way as you cannot pin any activity on a user. The response usually reflects how relevant (or not) this is to the organization.
Henry -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Pete Theisen Sent: 2008-05-05 11:02 AM To: [EMAIL PROTECTED] Subject: Re: Program Key On Monday 05 May 2008 08:42, [EMAIL PROTECTED] wrote: > I use keys that include the client's name. This way, the keys 'brand' the > software for the one client and are useless to pass around. Hi Henry! How do you deal with the offices that pass around the login name as well? I have worked in places like that. -- Regards, Pete http://www.pete-theisen.com/ [excessive quoting removed by server] _______________________________________________ Post Messages to: [email protected] Subscription Maintenance: http://leafe.com/mailman/listinfo/profox OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/[EMAIL PROTECTED] ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.

