ClickTime uses a role-based method to control access to the data. This ensures that only authorized users can carry out specified functions and that sensitive data is not visible to people who do not have the privilege to view it and maintain it. ...
Please follow the below steps to create a custom security role for your contractor or subcontractor. 1- Create a new security role for the supervisor / office user and grant the level of access for the role they will be performing. See how to create ...
Please follow the below steps to create a custom security role for your contractor or subcontractor. 1- Create a new security role for the contractor and grant the level of access for the role. See how to create Security Roles. Notes. The System ...
Our ClickTime web and mobile application were built to take into consideration small, medium and large organizations. Medium and large organizations have two types of employees as follows: Remote or field workers These employees will be able to use ...
To grant your client access to the system for viewing the roster and other data, follow these steps: 1. Navigate to "Settings" > "Users & Permissions". 2. Add the user's information, including their first and last name, email, and select the security ...