Work Management Standards
›
Implementation of Security
Implementation of Security
In a live system you will need to decide:
Who owns the data objects, such as database files, data areas, and data queues
Who owns the execution objects, such as programs, device files, and message files
Who may use which objects
Who has rights to control jobs and to examine spooled print output
Copyright © 2014 CA. All rights reserved.
Rate This Page
The content on this page was useful to me.
Disagree strongly
1
2
3
4
5
Agree strongly
Submit rating and optional comments about this page