Access control: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Create the page to align with qualifications material.)
 
imported>Doug Williamson
m (Added categories)
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
Access controls limit the use of a treasury management system to authorised personnel.<br />
Access controls limit the use of a treasury management system to authorised personnel.<br />
This helps keep data secure and avoids unauthorised access to and alteration of data.<br />
 
Access controls help protect the integrity and security of treasury transaction data
This helps keep data secure and avoids unauthorised access to and alteration of any data.<br />
In this way access controls help protect the integrity and security of treasury transaction data.




Line 13: Line 14:
*[[System and network controls]]
*[[System and network controls]]
*[[Treasury Management System]]
*[[Treasury Management System]]
[[Category:Manage_risks]]
[[Category:Technology]]

Latest revision as of 09:14, 3 June 2015

Access controls limit the use of a treasury management system to authorised personnel.

This helps keep data secure and avoids unauthorised access to and alteration of any data.
In this way access controls help protect the integrity and security of treasury transaction data.


See also