Access Restricted
As users work in their area of responsibility, they might never know that
secured and sensitive information exists in the system. Awareness of such data depends on
the type of masking applied to the items within the security class and the access provided
to a user or group.
If a user does not have access, the items, including
searches, do not display.
Checking Naturally Authorized People
Security Officers know that with established rules the correct people are
permitted to view information. Authorized people can be checked from each security class.
Rules and exceptions can be examined separately.
Authorization by Exception
Authorized people can be checked from each security class. The exception
that causes authorization is presented.
Audit Personal Authorization
Security Officers can determine what categories and individual items a
person can see by viewing the security classes on a person, which lists all classes with a
person’s natural access, and by exceptions on a person, which lists the exceptions assigned
to the person.
IP Security Log Checkout Entries Report
This checkout action trigger is added for type DOCUMENTS to log the
checkout and an object of type IP Security Log Entry with an attribute value of Export Log
Entry = Check Out is created.
|