Configurable access roles within the system control who can access information via the system..
Other frequently asked security questions include:
How do you encrypt user data?
How do you isolate my data from other clients?
What are your disaster recovery processes?
How do you screen your employees and contractors?
What measures do you have in place to prevent unauthorised viewing of customer data?
Commercial
Technical
talonfms.com