provides a straight forward, easy to manage "Roles Based" security model.
identify who can manage security. That person(s) then creates logins for your
leadership and key volunteers.
Each person's profile includes which features
they can access, and/or add, delete, and change data.
This simple security
model makes it easy to manage who can access records, who can enter and add data,
and who can run reports on a feature by feature basis.
(For best results,
maximize the window before clicking Examples.)