Database Security, User Access & Data Integrity
The security and integrity of corporate data is often a key concern. Legrand CRM features a number of functions that enable organisations to regulate data access and ensure data integrity, these include;
User permissions control exactly what a user can and cannot do when logged into the system using their username and password (anyone using Legrand is required to login using a username and password, user access rights can be changed by an administrator at any time and user accounts can also be made inactive). Potentially worth noting for companies wishing to operate more than one database is that users can have different user access rights in different databases if desired.
Legrand CRM includes user roles or groups. Each group can be defined as to what functions within the system they are able to perform. For each module a range of permissions can be set including whether a user has add, edit and/or delete functions. Once a role is defined users can be assigned to it and subsequently be assigned those permissions.
An optional function within Legrand CRM is team based access restrictions. Team based access enables an organisation to define teams and use these to restrict access to some CRM data.
A common example of this would be establishing teams for sales representatives whereby managers may wish to restrict users such that they can only see CRM records assigned to them or their team. With Legrand a flexible hierarchy of teams can be defined and implemented to support this.
More information about team based access functions is avaliable here.
Legrand CRM keeps track of the Creator and creation date of a record, as well as who last modified a record and when. The Search function can be applied to Creator, Creation Date, Modifier and Last Modified Date; this enables you to quickly find which records have been recently changed and identify who performed the change.
In some cases business requirements dictate that some data changes are logged or reported. We have deployed a number of solutions around this including detailed database logging when key data is changed as well as automated email alerts.