You can use the server's default trace to try to pinpoint who is removing the access. This is a security event that should be captured, assuming that the default trace hasn't been modified.
http://blogs.technet.com/b/beatrice/archive/2008/04/29/sql-server-default-trace.aspx
Hope this helps!
↧