Unauthorized access to system results in data being intentionally altered or deleted

Control

Require documented and approved support for all JVs