Data owners will determine what access and authorizations users will have by:
A. delegating authority to data custodian.
B. cloning existing user accounts.
C. determining hierarchical preferences.
D. mapping to business needs.
A. delegating authority to data custodian.
B. cloning existing user accounts.
C. determining hierarchical preferences.
D. mapping to business needs.