Did you know… you can control Security settings for processing records, accessing record types and features, and communication concerning records and users, in System Configuration of Blue Mountain RAM?
Security for Adding, Editing, Signing, and Processing Records – Blue Mountain RAM’s Rule System enables you to control who can do what at any given point in time with records. An unlimited number of rules can be created for each record type, so you can control it as you wish for as many circumstances as it will face at your organization. Each rule has its own independent configuration and security settings. Rule security settings may be applied to any combination of individuals, groups, and personnel fields (listing a personnel field is a means of dynamically specifying a person. The person will be whoever is listed in the field on the record). For example, the person(s) authorized to sign off on a work order, could be “Bob Smith”, any member of the “Supervisors” group, and/or whoever is listed in the work order’s “Supervisor” field.
Security for Accessing Records and Features – Each site and dataset has its own set of security choices for who may access the records and features. Security configuration is granular, affording you the ability to apply either uniform or individualistic security settings. Example #1: choose whether each particular user and group will have access to all record types or just those record types with which they work. Example #2: choose whether access to the Query Design Feature (the right to build queries) will be provided, and if so, to which record types. Additionally, choose whether each user or group may share their query designs with other users or groups with which they wish to share.
Security for Communications – Blue Mountain RAM can communicate a broad spectrum of information concerning what should happen, is happening, and already did happen, to the records in Blue Mountain RAM with its Notification System. Besides choosing what information you wish to communicate (new asset added, work due, signature required, work failed, purchase request submitted, field edited, etc.), you also choose who receives the communication. Designate any combination of individuals, groups, and fields, as the recipients of notifications (notifications that do not concern records, such as, “User failed logon”, omit the “field” option).
For further information, consult your Blue Mountain RAM manuals. If necessary, contact us for downloads of PDFs of the manuals. Consider attending a Blue Mountain Regulatory Asset Manager Training to learn about this subject as well as many, many more! Visit our Product Training page to learn more.