Security
Security in ICM is complex but flexible:
-
You can view, record, and report on intelligence gathered from different sources and in a range of contexts.
-
You can also protect and separate this data to meet legal and policy requirements.
ICM uses roles and permissions to control access to features. This means you can control what users can do – For example who can create cases.
All changes to data are audited. For example, you can see when data was changed, who changed it, and the old and new values.
When a user deletes information, they can't see it any more but it's still in the database. All deleted records are still in the database if you want to look at them.
Roles and permissions aren't used to assign access to individual cases, incident reports, information reports, and their associated entities. Instead, you can use the Access tab of individual entities and source entities to specify who can access them.
A team is a group of users who need the same level of access to information. For example, you might have an Admin team.