What security is in place to protect us from unauthorised users?
A. Security is vital to ensure that unauthorised personnel cannot return an item of plant to operation before it is safe to do so. PAS uses i-button technology for positive user identification to ensure that only authorised personnel can create, issue, modify and surrender permits. These tiny low cost devices are simple, convenient and provide excellent functionality and protection. No passwords to remember, minimal keyboard activity; and when the user withdraws the i-button, they are automatically logged off the system. Each user is assigned a specific role within PAS, granting them access to specific functions in PAS. For example, a permit applicant can create and submit an application, search and view permits but not plan or issue permits.
Related Questions
- What legal protections and security controls are available to protect the confidentiality of the data and to prevent unauthorized users?
- WHAT TYPES OF SECURITY MEASURES ARE IN PLACE TO PROTECT UNAUTHORIZED USERS FROM ACCESSING THE DATABASE?
- What security is in place to protect us from unauthorised users?