skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the UserSecurity for the User
go to beginning of chapter: Using the System ResponsiblyUsing the System Responsibly
go to previous page: Logging Out Without Compromising System SecurityLogging Out Without Compromising System Security
go to next page: Protecting DataProtecting Data
end of book navigation links

Checklist for Contributingto System Security  



Although security features are implemented by the securityadministrator as requirements for all users, this chapter has describedways in which you can contribute to system security. The followinglist reviews voluntary security actions:
go to previous page: Logging Out Without Compromising System SecurityLogging Out Without Compromising System Security
go to next page: Protecting DataProtecting Data