Call Us Toll Free: (800) IVy-1792 | (800) 489-1792

IVy Incidents

Public Safety and Security Incident Reporting System

User Access

Protect your information

A system such as IVy Incidents contains sensitive, critical and "protected by law" information in its database. Protecting that information warrants much more than just guarding it with passwords. You need to have a way to give your users access to view what your organization and the law permits for them to see.

For that reason, beyond the encrypted and non-retrievable password protection, we have designed an advanced access permissions system that allows the system administrators to control all access to users in detail. IVy Incidents has literally hundreds of access permissions that can be made in to groups, given a group name such as "Security Supervisors" and then assigned to the corresponding users. You can also assign "distributed documents only" rights so the people that receive electronically distributed documents can only view and search those documents.

Furthermore, because sometimes investigations might be directed to your own personnel, you have the ability to assign a security clearance level to each report or dispatch record and prevent users that have rights to read those documents from viewing them. Clearance levels are customizable and can be as many as you wish to have. Users can be assigned different clearance levels for incident reports and dispatch records while they also have a predefined default clearance level so they do not have to adjust it every time they create a document.

Finally, because IVY Incidents can end up having a vast amount of users, we have created a new type of user management that can allow users with certain access permissions to create other users that have up to their own access permissions. For example, if you wish, you can allow a department manager that has access to modify the Ban List, to create users that also have access to modify the Ban List but the department manager cannot give them access permissions to parts of the system that he or she does not have access to themselves. User creation is also tracked internally so you can always find out who created another user. With this feature, you can share the workload of managing users for the whole organization. On the other hand, you can decide that only a specific user can create users and stay with a more traditional way of managing user administration.

Some features described in this webside may be in QA testing phase and will be available soon.