Report Secured Decryption Activity
Access
The system audits users whenever they view secure
data, such as the customer’s full credit card number. For example, if
you use the Credit Card Number Full Display (available from the Deposit
Detail Inquiry screen) to "unmask" and view the customer's
full credit card number, an audit record is created. The system also creates
an audit record when a user attempts to access secure data and is denied
access due to security restrictions. You can use this routine to report
the audit data that is retained by the system when users view or attempt
to access secure data. The report sorts by data type (credit card, etc.),
by access date, and then by access time. Once the run-time options have
been selected, choose Run to produce
the report.
Data available to be reported on is retained on the system for a minimum
of 12 months before it is purged during month-end processing. The Secured Audit Retention Months field in Accounts
Receivable Control Settings determines how long this data is retained.
Access
Requested ByYou can
report on one, multiple, or all (login) users who requested access to
secure data. If you leave the field blank, you report on all users. You
can click the search button to select a user ID from the list or you can
click the action button and access the Multiple
Staff Selection Window, which you use to select multiple users.
Granted ByYou can
report on one, multiple, or all users who granted access to secure data.
If you leave the field blank, you report on all users. You can click the
search button to select a user ID from the list or you can click the action
button and access the Multiple
Staff Selection Window, which you use to select multiple users. The
Granted By user is the user whose ID and password were entered to permit
access to the secure data. If the login user requesting access has security
clearance, the report shows the same ID in the Requested By and Granted
By columns.
Customer CodeYou can
report on all customers by leaving the field blank, or you can specify
one customer on which to report. If you click the search button, you access
the Search for a Customer
screen, which you can use to locate a customer code.
Type
Start DateIf you
leave this field blank your report includes audit data with the earliest
available access/attempted access (by user) dates. You can click the calendar
and select a date if you want to limit the report to only audit data with
access/attempted access dates on or after the date you specify.
End DateIf you
leave this field blank your report includes audit data with the latest
available access/attempted access (by user) dates. You can click the calendar
and select a date if you want to limit the report to only audit data with
access/attempted access dates on or before the date you specify.
Attempted AccessYou can
restrict the report to only Granted attempts to access secure data, only
Denied attempts, or All attempts - successful and failed - to access secure
data.
Send Output toThe output
destination of the report displays. To change the output destination,
click on the Actions button and select Output
Settings.
Export PathIf you
select either the Personal
Report Viewer ( PRV), Excel Export,
or ASCII Export, this field displays the pre-set computer drive and folder
location to which the system exports the report data. You cannot edit
the export path using this process.

