How are you going to know who has made the change if you a have no security at the appplication level or any other method of identification. As troublesome as it may appear have your vendor log in as you would any other user, in the long run tracking all changes and or modifications will be more efficient. Employees are one of the highest security risk for any company. Users tend to let others use thier workstation not knowing what ill effect a vendor or outside person call do. security, security, security.
If you use no password at the access database you must clear the last logged on user, otherwise the next person just has to hit enter. ( remember you had no password)
With any Access database, Microsoft Access stores the name of the last user to have accessed the database in the Windows registry. When you implement Access Security, the name of the last user appears in the Logon dialog box whenever the database is opened.
To prevent the last user's name from appearing in the Name box of the Logon dialog box, create a shortcut that includes the /user switch, but which does not include the name of a user. For an example of how to do this, follow these steps. This example assumes that Northwind.mdb is the secured database, and it creates a shortcut based on this assumption.
Right-click the Windows desktop where you intend to open and use your secured Microsoft Access database.
Point to New, and then click Shortcut.
On the first page of the Create Shortcut Wizard, type the following command line, and then click Next:
"C:\Program Files\Microsoft Office\Office\MSACCESS.EXE" "C:\Program Files\Microsoft Office\Office\Samples\Northwind.mdb" /user
On the second page, type Northwind 2000, and then click Finish.
Double-click the new shortcut. Note that the Name box in the Logon dialog box is blank.