If users are well trained on the interactive and flow-on effects of changes that they can make to existing defaults within Jim2, the level of security that management will need to implement will be reduced.
If users receive a security warning, the administrator should be made aware of the sequence of events that caused it, and provide additional training to the user, or change that user's security settings to something more appropriate.
Security should be used to complement the Options, Setups and automated warnings that Jim2 already has in place. Setting security measures to restrict access to Jim2 functions should be performed to prevent untrained users from performing functions, or pre-empting accidental data changes in areas that are particularly sensitive to the company workflow.
There are some functions which have a roll-on effect when chosen as secured areas. For example, if a security group is nominated to not be able to view jobs, that group won't be able to view a list of jobs.
Within Jim2, security level is identified by security groups, tags and categories. Each employee can belong to more than one security group, tag or category, and has access rights to certain areas and functions within Jim2 that have been set up for those particular security groups, tags and categories. User security overrides certain settings in Tools > Options.
When reports are devised, they are identified by ascending report levels – the higher the number, the more sensitive company information the report contains. Security groups must include an appropriate report level.
There are a large number of functions within Jim2 that can be restricted from use via Security. The option of allowing or denying any user or group the right to access any or all of those functions is available.
|