Access control: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Missing full stop) |
imported>Doug Williamson (Make clear that last sentence is a consequence of the preceding one.) |
||
Line 1: | Line 1: | ||
Access controls limit the use of a treasury management system to authorised personnel.<br /> | Access controls limit the use of a treasury management system to authorised personnel.<br /> | ||
This helps keep data secure and avoids unauthorised access to and alteration of data.<br /> | |||
This helps keep data secure and avoids unauthorised access to and alteration of any data.<br /> | |||
In this way access controls help protect the integrity and security of treasury transaction data. | |||
Revision as of 11:01, 31 May 2015
Access controls limit the use of a treasury management system to authorised personnel.
This helps keep data secure and avoids unauthorised access to and alteration of any data.
In this way access controls help protect the integrity and security of treasury transaction data.