Restricting physical and system access is the single strongest control IT can deploy. Access controls are largely preventative in nature and consequently can have the most negative impact on business process if data access management is not well managed. A well governed access management process requires a formalized process for management approval of access to both systems and physical locations. Use this template to ensure that employee access is approved by a manager and that this approval is retained for auditing purposes.
IBM i User Access Request Form
1 Download
Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.