I was really annoyed after I'd set up a database on my C drive only to find all Access databases somehow "inherited" the same security - obviously the same mdw file.
C-drive has nothing to do with it. The currently active workgroup for Access is a registry setting. It applies to ALL Access databases until you join a new workgroup. Unless ....
There are threads here about command-line options to select the workgroup from the short-cut icon. Basically, you build a shortcut to your DB. Then you look at the icon's properties via right-click and select Properties.
Then in the "target" line you will see that Access is being launched. If you add a /wkgrp switch you can make the icon's target override the registry entry. Something like
".... {launch access } {database path} ..."
and between launching Access and the database path, you insert
/wkgrp "drive-letter:/torturous-path/umphty-oomph.mdw"
This is basically a spot-override of the currently active workgroup recorded in your registry. Look up "Command-line" in the Help files to see the complete range of tricks you can play by setting up the icon ahead of time to include some options.
it seems to me that all you have to do is delete the "secured.mdw" file and you're into the database with full administrative priviledges.
Number six is wrong to say this. The TRUTH is if you delete the secured.mdw, NOBODY gets into the DB again if it was correctly set up with workgroup security. You see, the DB is ENCRYPTED when you do that. A poorly secured DB uses the "default" MDW file that everyone has a copy of, so it isn't that the DB is public, it is that the DECRYPTION KEY is public. This is a fine - but significant - difference.
Having said that you will never make Access truley secure as users have read/write permissions for the drive it is in, so they can steal the whole DB and send it off to a professional to desecure for them if they want to spend the money
Bat17 is correct, but if you are in THAT kind of environment, you have some choices:
1. Involve your security managers in setting up object auditing on the MDB to see who does what to it. There IS a way to determine if someone COPIED the DB if object auditing and session auditing are both turned on. To do this, you need to have a security manager who knows about auditing and System Access Control Lists and who is willing to cooperate.
2. Convert the DB to an external server (SQL Server, ORACLE are two good choices but there are others) and use ODBC. That seriously "raises the ante" for someone who wants to steal your DB.
3. Revive corporal punishment for security violations.

I understand the barbed whip works wonders as an attitude adjustment tool. But if you happen to work in a country where that kind of punishment is considered passe', maybe this wouldn't work.

(In case you weren't sure, I kind of like the character "Argus Finch" in the
Harry Potter series... even though he's only a squib, but I actually know a couple of spells.)
4. Screen your employees. Know your users. Know their usage patterns. Yeah, I know, sounds like .... WORK. It is. But anything worth doing (like securing a database) is worth doing well.