How does JIDS prevent unauthorized access?
Authorized users are uniquely identified to the system by their e-mail address authenticated with a password. In addition, all data is properly secured with specific rights customized to a group, project or user based on their role. The workflow set up in JIDS requires review and sign-off at several levels to ensure processes are reviewed and approved as they progress through the system. For more detailed information on JIDS’ security, click the document link below.