|
Hi, Scott: Security rule #2: People who have access to the data, have access to the data. Security rule #3: When security measures have been implemented that restrict what users can *do* with the data: Refer to Security rule #2. Darrell Darrell A. Martin - 630-754-2141 Manager, Computer Operations dmartin@xxxxxxxxxxxxx midrange-l-bounces@xxxxxxxxxxxx wrote on 03/22/2007 10:28:38 AM:
Could you take a picture of the screen with your camera phone? Security rule #1: Don't believe it! Regards, Scott Ingvaldson
This e-mail, including attachments, may contain information that is confidential and/or proprietary, and may only be used by the person to whom this email is addressed. If the recipient of this e-mail is not the intended recipient or an authorized agent, the reader is hereby notified that any dissemination, distribution, or copying of this e-mail is prohibited. If this e-mail has been delivered to you in error, please notify the sender by replying to this message and deleting this e-mail immediately.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.