Post-Employment
: Access Controls
Access privileges are defined at both the role (job position) and individual levels. This provides the utmost in flexibility and security for maintaining privacy and the integrity of sensitive information. Identity verification is limited only by the budgetary constraints of the organization. Schemas for access control include any combination of: local network log-ons; secondary log-ons with usernames, passwords and challenge questions; workstation, network or IP addresses; and a variety of biometric identity verification devices. Integrates with:
|