Security Concepts

How to Use OnLine Help

Before setting up security on your system, you need to understand certain concepts that were used in the creation of the security feature.

Title

Each StaffSuite user is set up as a Staffing Service Rep. Each staffing service rep has a title for their position. A title represents the role a rep plays at your staffing service. Receptionist, Recruiter, Interviewer, Owner, Coordinator, and Salesperson are all examples of titles.

Titles and Templates

When your system is initially set-up, every title is also the name of a template. A template simply defines the access levels of a title. Therefore, there is a coordinator template that defines the access levels for a coordinator in your system. There is a recruiter template that defines the access levels for a recruiter in your system.

Why does StaffSuite have both titles and templates? Each staffing service has their own titles for certain roles. For instance, you may use the term "staffing provider" instead of coordinator. StaffSuite allows you to change the title while keeping the associated template. Thus, you can change the title "coordinator" to "staffing provider" and keep the same security privileges associated with a coordinator. However, the system will refer to the rep as a "staffing provider" on all screens (rather than "coordinator").

StaffSuite does allow you to create your own templates by copying current templates and editing them. However, we do not advise doing so. New templates will not be updated by future releases of StaffSuite. Therefore, we suggest that you keep the system templates and change the titles associated with them when needed.

To access another topic, you can click on the link below...or you can simply click on the arrow at the bottom right to go to the Determining Security Access topic:

Clicking on the light bulb icon in the upper right corner of the "walk-through" pages will take you back to the Security Information main page.

If you want to return to the Security main topic, click here.

Related Topics:

Return to General Information

Go to Determining Security Access