1.0 PURPOSE
This procedure outlines how the College shall monitor system access for unusual or suspicious activity to protect data from the risk of theft, manipulation, or misuse of financial, sensitive, or confidential information from unauthorized access and user behavior.
2.0 SCOPE
The procedure applies to all regular and administrative users of Jenzabar CX.
3.0 PROCEDURE
Monitoring User Activity of Administrative User Accounts
The Database Administrator needs to be able to correlate all super user activity in logs.
SUSE Linux maintains a list of 'super users' in a file. When a user that is included in this file attempts to execute a command as a substitute user, the attempted command is logged in a separate file. These records are imported into the Jenzabar database on a weekly basis. The records are included in a report, which is used for performing a weekly audit of substitute user commands.