IBM i User Access Request Form

Author(s): Frank Trovato

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Restricting physical and system access is the single strongest control IT can deploy. Access controls are largely preventative in nature and consequently can have the most negative impact on business process if data access management is not well managed. A well governed access management process requires a formalized process for management approval of access to both systems and physical locations. Use this template to ensure that employee access is approved by a manager and that this approval is retained for auditing purposes.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019