Protecting sensitive data

  • Thread starter Thread starter Martin Ball
  • Start date Start date
M

Martin Ball

I am building an Access 2002 db for a small company which wants data
for certain of its clients to be accessible only by the 2 most
important users - they don't want other casual users taking away the
list of important clients that has been built up over the years.

I did think of holding this particular data in a database of its own
so that I can use Windows folder/file security, which would allow
access only to the 2 important users. However, they have a simple
peer-peer network - from what I've read, seems if folders/files are
shared, they are shared amongst ALL users. Is this still possible or
do they need a network server?

Or could Access security be used, possibly using encryption also?
 
You could use access security to limit access to a particular table of data.
You could also include all the records in one table, but not give any of the
users access directly to the table. Have two queries, one that pulls the
important clients, and one that pulls the normal clients. Grant access to
those queries based on the user. I think you would have to have the query
run using "owner's permission" if the users don't have access directly to
the table.

To set that, while in query design view, right-click and select properties.
Then change the run permissions to owner's.

HTH
Rick


I am building an Access 2002 db for a small company which wants data
for certain of its clients to be accessible only by the 2 most
important users - they don't want other casual users taking away the
list of important clients that has been built up over the years.

I did think of holding this particular data in a database of its own
so that I can use Windows folder/file security, which would allow
access only to the 2 important users. However, they have a simple
peer-peer network - from what I've read, seems if folders/files are
shared, they are shared amongst ALL users. Is this still possible or
do they need a network server?

Or could Access security be used, possibly using encryption also?
 
Back
Top