A security policy should define the roles of information owner, information user, and information custodian. ... Because security is a business function, departments should relay their security requirements to IT, which then must design and buildanbsp;...
|Title||:||Experts' Guide to OS/400 & I5/OS Security|
|Author||:||Carol Woodbury, Patrick Botz|
|Publisher||:||System iNetwork - 2004-01-01|