Back up your database before you edit or delete records to help protect the database from system failures and also against mistakes that the Undo command cannot fix.

 

It is also a good practice to make a backup of your database before you run any action query, especially if the query will change or delete a lot of data.

To start a backup operation, click the Microsoft Office Button  point to Manage, and then click Backup Database.

Splitting a database is another way to prevent the corruption of database files and limit the loss of data by keeping the data in a separate file that users do not access directly.

When making a backup, we recommend that you use the default file name. That way, when you restore data or objects from a backup, it is easier to determine which database the backup came from and when the backup was made.

Do not t rely on a screen saver to protect your computer from unauthorized access when you step away from your desk. Press the Windows logo key+L to lock your computer.

When you digitally sign a Microsoft Visual Basic for Applications (VBA) project, consider getting a timestamp so that others can verify your signature even after the certificate used for the signature has expired. For more information about VBA security and timestamps, see the links in

If you are sure that an Access application containing code or macros (macro: An action or set of actions that you can use to automate tasks.) is from a trusted location (trusted location: A folder or file path on your computer or a location on your intranet from which it is safe to run code. Default trusted locations include the Templates, Addins, and Startup folders, and you can specify your own trusted locations.) and you do not want to be notified about this again, you can click Trust all documents from this publisher in the Microsoft Office Security Options dialog box.

Doing this adds the publisher to your trusted publishers (trusted publisher: The developer of a macro that is trusted by you on your computer. The trusted publisher is identified by the certificate that they used to digitally sign the macro. Also known as a trusted source.) list in the Trust Center.