This article provides an overview of how you can secure a
database so that it is not changed or copied by other Microsoft Access users.
This article assumes that you have a thorough understanding of the
pieces that make up the Microsoft Access security model: workgroups, accounts,
ownership, and permissions.
Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.