Security

  • Log on via user code and password
  • Passwords are stored encrypted, so not even the system administrator can read them
  • System administrator assigns a profile for each user
  • The Profile controls access to each function in the system.  Choices are
    • no access
    • read-only access
    • read and write access
  • For example, you may have volunteers assigned to maintain the family and member information–thus, read and write access.  And they might logically have read/write access to maintain Yahrzeits.  However, you may wish to provide no access to financial data for that set of helpers.