Privacy

Database
On the one hand, TCM4000 can be a very open system, aimed at making sure that all information is available to all users. On the other hand, TCM's designer are aware of the fact that there are areas of information which need to be restricted to either an individual or group within the overall organisation. At its' simplest level, the TCM4000 database is all about paths. Paths are set from the User's machine to the main database, the index, the diaries, the Templates etc. etc. This is all very straightforward and because of this fundamental design concept it is very easy to set a separate path or paths to different databases which can be on different physical drives. At the simplest level, the Managing Director of an organisation could, on his workstation, have one set of paths which points at the main business database on the server, and a different set of paths on the local drive of his machine on which he could keep personnel details, Bank, Accountancy and Solicitor details and all telephone callse, letters, e-mails etc. This local drive is therefore physically totally removed from the main system and can be covered by various levels of password at machine log on stage as well as passwords on the folder and on TCM.

Information Display
Unlike many databases, TCM4000 allows you to configure the display of field information which each user is allowed to see.

User Rights
TCM4000 is big on user rights, giving the Administrator wide and precise control over which Setup items the User is entitled to see or to manipulate.

Summary
It is difficult to achieve total security in any system against a dedicated, expert hacker who is bent on breaking into a system, but with TCM4000 correctly configured with your operating system and some simple disciplines you should successfully be able to keep your data away from unauthorised eyes.)

< Back