Real World Microsoft Access Database Protection and Security

Overview

Protecting and securing your data is a matter of balancing software technology and people processes. If you trust the people who use your database, then data protection is a straightforward computer process. If you cannot afford to trust your users, you have to make it as difficult as you can for users to thwart your security and protection measures, but at the same time make it as easy as possible to use your database. This chapter takes you through the conventional ways of protecting your data with workgroup ( user -level) security and then outlines a new technique that allows you to use Windows Security to secure your Access database. Finally, I offer advice to anyone who is contemplating distributing important Access data outside the company network.

The technical aspects covered in the chapter follow:

The demonstration material for this chapter includes a form to open the Access database with shortcut commands so that you can hide the location of the database or workgroup file.

Note  

To find the demonstration material, open the download database for your version of Access ”for example, grMAP2002.mdb ” and select Chapter 10. Before running any samples that involve data, you may need to relink the tables to the Northwind database on your computer.

Категории