Chapter 16. Database Security

Security is receiving an increasing amount of focus. With everything from privacy issues, government regulations, and computer crimes, security requires a fair amount of attention and dedication. Your Microsoft Access databases are not exempt from this need for attention.

This chapter discusses the various security methods available to secure your Access databases, including the data contained in them and the custom forms, reports, and code you've developed in your databases. Whether you need to set up security to meet regulations regarding the privacy of information about people stored in your database or to meet your organization's security standards over confidential company information or to protect intellectual property rights, this chapter will help you choose which security methods to use.

You should also be aware that Access 2003 also has some new security features that enhance its ability to protect your computer from an Access database with malicious code designed to attack your computer. Those security enhancements are covered in Chapter 20"Macro Security"—Digital Signatures and Sandboxes.

This chapter will cover shared-level security, user-level security, encoding a database, making an MDE file, and using VBA to manipulate security. This chapter also covers some aspects of the Access security model, which require a deeper level of thought. This especially includes a discussion about user-level security and the detachment between the MDW ...

Get Access 2003 VBA Programmer's Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.