How does JIDS prevent unauthorized access?

How does JIDS prevent unauthorized access?

Authorized users are uniquely identified to the system by their e-mail address authenticated with a password. In addition, all data is properly secured with specific rights customized to a group, project or user based on their role. The workflow set up in JIDS requires review and sign-off at several levels to ensure processes are reviewed and approved as they progress through the system. For more detailed information on JIDS’ security, click here.

Have more questions? Submit a request

0 Comments

Article is closed for comments.
Powered by Zendesk