- The success or failure of the resource access attempt is determined purely by operating system-level security.
- No access attempts are to be audited.
- All access attempts are audited.
- Access attempts to link the datasheet to the main report, based on the relationships that were defined in the database.
- It is a systematic attempt to strengthen our competitive ability.