How does JIDS prevent unauthorized access?

How does JIDS prevent unauthorized access?

Authorized users are uniquely identified to the system by their e-mail address authenticated with a password. In addition, all data is properly secured with specific rights customized to a group, project or user based on their role. The workflow set up in JIDS requires review and sign-off at several levels to ensure processes are reviewed and approved as they progress through the system. For more detailed information on JIDS’ security, click the document link below.

Have more questions? Submit a request

0 Comments

Article is closed for comments.
Powered by Zendesk