Help? No. You have 'circled the wagons' much to tightly. and left no space for manuevering -or to get in or out of the area. It is -for me- a stalemate.
As to suggestions. I can off er only two:
1.[tab]Learn and implement the built in security. this is the better (only?) long term soloution. It is effective and would be a standard approach which other responsibe programmers can follow when you are 'promoted' to another position. It is well documented and can offer the data access control you need.
2.[tab]do not place the data in a table in the db at all. Make it be a set of literals (perhaps a UDT with the elements representing the table fields). Within the startup object, initallize the literals to the values necessary. Inform hte db users community that any / all changes must be acoomdate via a formally approveed request from the "administrative' person. Have that individual provide you with a signed hard copy of any / all required changes -which you would then manually implement in the code. Since the user community appears to be quite sophisticated, I would expect that at least some of them would be able to bypass even this approach if you leave the initalization in 'plain view' in a module in the .MDB. To circumvent their intrusion, you should make the initalization process into an MDE (compiled) db which is added as a reference to the MDB program. Further, the controls where the info is displayed need to be "locked" as a user may still change the immediate content. All references to the values need to be revised to the initalized values, as opposed to the table (or query) values. these measures will, in my opinion, be comprimized by determined 'hackers', but might provide a brief respite while you learn and implements the security. Making hte entire front end into an MDE db would help, and could possibly even be a much longer term soloution, as the hackers would then need to figure out where the source is and change that - but determined hackers acting from within the organization will probably do that at some point.
I would repeat and emphisize that violations of company policy re un-authourised changing of data should be a 'carrear decision'. (e.g. FIRE THEM on the spot.) Then, again, in your situation you will not be abloe to prove who alltered what or even when it was latered, so you will never have the information to even accuse any individual of the trespass.
MichaelRed
m.red@att.net
Searching for employment in all the wrong places