Automatic identification of employees who open files and modify data will deter any unruly employees from destructive behavior, increase responsibility of staff and compel concentration.  Essential user restrictions will minimize unintentional deletion of precious data.