Various application setting can be maintained via profile options. Unauthorized or inappropriate changes to profile options could lead to changes to key control configurations, change to approvals processes, and/or changes to access to sensitive data. |