End users should only view data using forms. However, knowledgeable users may know how to circumvent basic security and access/edit/delete data from tables. This article demonstrates one way of protecting tables and queries from unwanted modification.
www.isladogs.co.uk