[Date Prev][Date Next] [Chronological] [Thread] [Top]

alteration of Audit Log in Access

Jennifer Price at Metamor (about to be Ciber) has indicated that she can access the GEMS Access database and alter the Audit log without entering a password.  What is the position of our development staff on this issue?  Can we justify this?  Or should this be anathema?