Work Management Standards › Implementation of Security
Implementation of Security
In a live system you will need to decide:
- Who owns the data objects, such as database files, data areas, and data queues
- Who owns the execution objects, such as programs, device files, and message files
- Who may use which objects
- Who has rights to control jobs and to examine spooled print output