As someone else already pointed out, although cumbersome, you can always cut&paste what you see on your 3270 screen.
Don't grant people access to data they don't need. Don't grant people access to the system if you don't trust them. Of what value is an audit record that says the data has been read by xyz? Doesn't tell you if only the first few lines have been browsed or if the comlete data has been "copied" by whatever means. -- Peter Hunkeler CREDIT SUISSE ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html