This is a dedicated watch page for a single video.
You are the Information Security Manager of HDA Inc. You are addressing a situation where one of the programmers of an application requires access to production data. What is the MOST effective recommendation?