TechWhirl (TECHWR-L) is a resource for technical writing and technical communications professionals of all experience levels and in all industries to share their experiences and acquire information.
For two decades, technical communicators have turned to TechWhirl to ask and answer questions about the always-changing world of technical communications, such as tools, skills, career paths, methodologies, and emerging industries. The TechWhirl Archives and magazine, created for, by and about technical writers, offer a wealth of knowledge to everyone with an interest in any aspect of technical communications.
Subject:Re: Request for research help From:Sean Fitzpatrick <Sean -dot- Fitzpatrick -at- SMED -dot- COM> Date:Wed, 26 Nov 1997 15:06:16 -0500
I've been through cycles of fussiness. For a while at IBM, we changed our
log-on password every 6 weeks. Eventually that was extended to 6 months. Of
course the company went into the tank shortly thereafter, but the connection
was never proven beyond a reasonable doubt.
What reasons are there for having a second-party authorization?
--the first person isn't really competent to do the work or make the decision
--the resource is so sensitive that it is necessary to restrict access
--it is easy to make a mistake and difficult to recover from one, so double
checking is necessary.
The trend in business now-a-days is to devolve authority downward. What
mishaps does the second authorization prevent, what are the probabilities of
them happening, how severe would be the consequences and how hard would it be
to recover, and what does second authorization say about your job descriptions
and employees?
Sean Fitzpatrick
Shared Medical Systems, Malvern, PA