I am concerned about using a read event trigger. I wonder if anyone has experience using them. I am not worried about the logic of the trigger program but rather the impact of all those triggers.
Here's my scenario. We have legacy applications that access some sensitive personal information. We need to know anytime someone accesses the highly sensitive information. (HIPAA) Our thought is to have a read trigger that captures any access to these records and log them.
Open to other suggestions.
Here's my scenario. We have legacy applications that access some sensitive personal information. We need to know anytime someone accesses the highly sensitive information. (HIPAA) Our thought is to have a read trigger that captures any access to these records and log them.
Open to other suggestions.
Comment