skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the User Security for the User
go to beginning of chapter: Using the System Responsibly Using the System Responsibly
go to previous page: Logging Out Without Compromising System Security Logging Out Without Compromising System Security
go to next page: Protecting DataProtecting Data
end of book navigation links

Checklist for Contributing to System Security  



Although security features are implemented by the security administrator as requirements for all users, this chapter has described ways in which you can contribute to system security. The following list reviews voluntary security actions:
go to previous page: Logging Out Without Compromising System Security Logging Out Without Compromising System Security
go to next page: Protecting DataProtecting Data