Purpose:


The purpose of this procedure is to enforce the access control to all IT systems in a secure, easy to use manner through clear directions regarding creation, deletion of User IDs and also for reporting and reviewing the users’ access control privileges.