IBM i User Access Request Form


Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Restricting physical and system access is the single strongest control IT can deploy. Access controls are largely preventative in nature and consequently can have the most negative impact on business process if data access management is not well managed. A well governed access management process requires a formalized process for management approval of access to both systems and physical locations. Use this template to ensure that employee access is approved by a manager and that this approval is retained for auditing purposes.

Hide Details

Search Code: 58529
Published: May 2, 2013
Last Revised: May 2, 2013

Related Content

GET HELP Contact Us
×
VL Methodology