As someone else already pointed out, although cumbersome, you can 
always cut&paste what you see on your 3270 screen.

Don't grant people access to data they don't need.
Don't grant people access to the system if you don't trust them. 

Of what value is an audit record that says the data has been read
by xyz? Doesn't tell you if only the first few lines have been
browsed or if the comlete data has been "copied" by whatever
means.

-- 
Peter Hunkeler
CREDIT SUISSE

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to