Close

Our Privacy Statement & Cookie Policy

All Thomson Reuters websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.


Print this pageForward this document  Security system

DT Max features a multi-level security system which enables users to set up the program so that only authorized personnel are allowed to use certain specified attributes.

When DT Max is first installed, all users can access any program feature as passwords are not required until the security system is activated.

The user ID and password concept is tied to the DT Max database. If you use different databases on different disks or subdirectories, each database must have its own security system setup.

If a user wishes to input a confidential set of clients, a new database can be set up in a separate subdirectory, defining that particular person as the system supervisor and sole authorized user of that database.

To activate the security system, you must follow the steps below:

  1. Choose a system supervisor
  2. Assign system supervisor status to someone in DT Max
  3. Make passwords mandatory for using DT Max
  4. Assign access rights for all other DT Max users

When running DT Max, a user is first required to enter his/her user ID, that is a unique code of one to four letters typically consisting of the user's initials.

If the security system is active, DT Max will check to see that the user ID and password are authorized. If not, the user will be prompted to enter the user ID or the password again, as the case may be. For security reasons, the password is not visible on the screen while being typed in.

Once the correct user ID and password have been entered, DT Max will only allow that user to access those parts of the program for which they were given authorization, as assigned by the system supervisor in the security system.

Users can see what rights they were granted by selecting the change password option.

If your environment does not warrant relying on a security system, there is no obligation to use such a feature. A password requirement that was previously set can be disabled.

April 16, 1999